📄️ Debugging with GDB/GEF
A practical reference guide for GDB Enhanced Features (GEF) with real-world examples, advanced debugging techniques, and exploitation methodologies for reverse engineering and exploit development.
📄️ Buffer Overflow Exploitation
Hands-on examples using GDB with the GEF plugin to exploit 32-bit and 64-bit buffer overflow vulnerabilities. Includes step-by-step walkthroughs, sample code, and debugging tips.
📄️ Binary Refinery Practical
Comprehensive guide to Binary Refinery - the ultimate command-line toolkit for malware analysis, binary data manipulation, and cybersecurity investigations. Learn from basic operations to advanced forensic workflows.