diff --git a/README.md b/README.md index 9eaf6c6..442319c 100644 --- a/README.md +++ b/README.md @@ -13256,6 +13256,95 @@ https://www.hackingarticles.in/configure-sqlmap-for-web-gui-in-kali-linux https://www.hackingarticles.in/Penetration-Testing +-1866-Buffer Overflow Examples, Code execution by shellcode : + + +https://0xrick.github.io/binary-exploitation/bof5 + + + +-1867-Dynamic Shellcode Execution: + + + +https://www.countercept.com/blog/dynamic-shellcode-execution + + + + +-1868-JSC Exploits: + + + + +-https://googleprojectzero.blogspot.com/2019/08/jsc-exploits.html + + + + +-1869-Injecting Into The Hunt: + + + + +https://jsecurity101.com/2019/Injecting-Into-The-Hunt + + + + +-1870-Bypassing Antivirus with Golang: + + + +https://labs.jumpsec.com/2019/06/20/bypassing-antivirus-with-golang-gopher.it + + + + + +-1871-Windows Process Injection: Print Spooler: + + + +https://modexp.wordpress.com/2019/03/07/process-injection-print-spooler + + + + +-1872-Inject Shellcode Into Memory Using Unicorn : + + + +https://ethicalhackingguru.com/inject-shellcode-memory-using-unicorn + + + + +-1873-Macros and More with SharpShooter v2.0: + + + +https://www.mdsec.co.uk/2019/02/macros-and-more-with-sharpshooter-v2-0 + + + + +-1874-Fuzz Testing(Fuzzing) Tutorial: What is, Types, Tools & Example: + + + +https://www.guru99.com/fuzz-testing + + + + +-1875-Introduction to File Format Fuzzing & Exploitation: + + + +https://medium.com/@DanielC7/introduction-to-file-format-fuzzing-exploitation-922143ab2ab3 + +