René's URL Explorer Experiment


Title: GitHub - jayjayxi/Software-Security-Learning: Software-Security-Learning

Open Graph Title: GitHub - jayjayxi/Software-Security-Learning: Software-Security-Learning

X Title: GitHub - jayjayxi/Software-Security-Learning: Software-Security-Learning

Description: Software-Security-Learning. Contribute to jayjayxi/Software-Security-Learning development by creating an account on GitHub.

Open Graph Description: Software-Security-Learning. Contribute to jayjayxi/Software-Security-Learning development by creating an account on GitHub.

X Description: Software-Security-Learning. Contribute to jayjayxi/Software-Security-Learning development by creating an account on GitHub.

Opengraph URL: https://github.com/jayjayxi/Software-Security-Learning

X: @github

direct link

Domain: patch-diff.githubusercontent.com

route-pattern/:user_id/:repository
route-controllerfiles
route-actiondisambiguate
fetch-noncev2:9907f2fd-3623-9efb-705b-c85b7736dde9
current-catalog-service-hashf3abb0cc802f3d7b95fc8762b94bdcb13bf39634c40c357301c4aa1d67a256fb
request-idB21E:30E8A:6B8CF60:8D71B67:697523C4
html-safe-nonce3a7dccddc298132834badeef4e66755209edf9386e82b708b9bf81ac983e634b
visitor-payloadeyJyZWZlcnJlciI6IiIsInJlcXVlc3RfaWQiOiJCMjFFOjMwRThBOjZCOENGNjA6OEQ3MUI2Nzo2OTc1MjNDNCIsInZpc2l0b3JfaWQiOiI2MTkzODAwMTAxOTk5NDg1ODkyIiwicmVnaW9uX2VkZ2UiOiJpYWQiLCJyZWdpb25fcmVuZGVyIjoiaWFkIn0=
visitor-hmac96d68ff1b5e8b6e700274d96b752381a26a5148a8f3fd85afaa42cad087dd6e5
hovercard-subject-tagrepository:104580294
github-keyboard-shortcutsrepository,copilot
google-site-verificationApib7-x98H0j5cPqHWwSMm6dNU4GmODRoqxLiDzdx9I
octolytics-urlhttps://collector.github.com/github/collect
analytics-location//
fb:app_id1401488693436528
apple-itunes-appapp-id=1477376905, app-argument=https://github.com/jayjayxi/Software-Security-Learning
twitter:imagehttps://opengraph.githubassets.com/1da33039383d7d33e60a60ca8cb8dbe5c9d30c6fdab80d610ef64ed0f897b2c2/jayjayxi/Software-Security-Learning
twitter:cardsummary_large_image
og:imagehttps://opengraph.githubassets.com/1da33039383d7d33e60a60ca8cb8dbe5c9d30c6fdab80d610ef64ed0f897b2c2/jayjayxi/Software-Security-Learning
og:image:altSoftware-Security-Learning. Contribute to jayjayxi/Software-Security-Learning development by creating an account on GitHub.
og:image:width1200
og:image:height600
og:site_nameGitHub
og:typeobject
hostnamegithub.com
expected-hostnamegithub.com
None4a4bf5f4e28041a9d2e5c107d7d20b78b4294ba261cab243b28167c16a623a1f
turbo-cache-controlno-preview
go-importgithub.com/jayjayxi/Software-Security-Learning git https://github.com/jayjayxi/Software-Security-Learning.git
octolytics-dimension-user_id18476058
octolytics-dimension-user_loginjayjayxi
octolytics-dimension-repository_id104580294
octolytics-dimension-repository_nwojayjayxi/Software-Security-Learning
octolytics-dimension-repository_publictrue
octolytics-dimension-repository_is_forktrue
octolytics-dimension-repository_parent_id100763899
octolytics-dimension-repository_parent_nwoCHYbeta/Software-Security-Learning
octolytics-dimension-repository_network_root_id100763899
octolytics-dimension-repository_network_root_nwoCHYbeta/Software-Security-Learning
turbo-body-classeslogged-out env-production page-responsive
disable-turbofalse
browser-stats-urlhttps://api.github.com/_private/browser/stats
browser-errors-urlhttps://api.github.com/_private/browser/errors
release488b30e96dfd057fbbe44c6665ccbc030b729dde
ui-targetfull
theme-color#1e2327
color-schemelight dark

Links:

Skip to contenthttps://patch-diff.githubusercontent.com/jayjayxi/Software-Security-Learning#start-of-content
https://patch-diff.githubusercontent.com/
Sign in https://patch-diff.githubusercontent.com/login?return_to=https%3A%2F%2Fgithub.com%2Fjayjayxi%2FSoftware-Security-Learning
GitHub CopilotWrite better code with AIhttps://github.com/features/copilot
GitHub SparkBuild and deploy intelligent appshttps://github.com/features/spark
GitHub ModelsManage and compare promptshttps://github.com/features/models
MCP RegistryNewIntegrate external toolshttps://github.com/mcp
ActionsAutomate any workflowhttps://github.com/features/actions
CodespacesInstant dev environmentshttps://github.com/features/codespaces
IssuesPlan and track workhttps://github.com/features/issues
Code ReviewManage code changeshttps://github.com/features/code-review
GitHub Advanced SecurityFind and fix vulnerabilitieshttps://github.com/security/advanced-security
Code securitySecure your code as you buildhttps://github.com/security/advanced-security/code-security
Secret protectionStop leaks before they starthttps://github.com/security/advanced-security/secret-protection
Why GitHubhttps://github.com/why-github
Documentationhttps://docs.github.com
Bloghttps://github.blog
Changeloghttps://github.blog/changelog
Marketplacehttps://github.com/marketplace
View all featureshttps://github.com/features
Enterpriseshttps://github.com/enterprise
Small and medium teamshttps://github.com/team
Startupshttps://github.com/enterprise/startups
Nonprofitshttps://github.com/solutions/industry/nonprofits
App Modernizationhttps://github.com/solutions/use-case/app-modernization
DevSecOpshttps://github.com/solutions/use-case/devsecops
DevOpshttps://github.com/solutions/use-case/devops
CI/CDhttps://github.com/solutions/use-case/ci-cd
View all use caseshttps://github.com/solutions/use-case
Healthcarehttps://github.com/solutions/industry/healthcare
Financial serviceshttps://github.com/solutions/industry/financial-services
Manufacturinghttps://github.com/solutions/industry/manufacturing
Governmenthttps://github.com/solutions/industry/government
View all industrieshttps://github.com/solutions/industry
View all solutionshttps://github.com/solutions
AIhttps://github.com/resources/articles?topic=ai
Software Developmenthttps://github.com/resources/articles?topic=software-development
DevOpshttps://github.com/resources/articles?topic=devops
Securityhttps://github.com/resources/articles?topic=security
View all topicshttps://github.com/resources/articles
Customer storieshttps://github.com/customer-stories
Events & webinarshttps://github.com/resources/events
Ebooks & reportshttps://github.com/resources/whitepapers
Business insightshttps://github.com/solutions/executive-insights
GitHub Skillshttps://skills.github.com
Documentationhttps://docs.github.com
Customer supporthttps://support.github.com
Community forumhttps://github.com/orgs/community/discussions
Trust centerhttps://github.com/trust-center
Partnershttps://github.com/partners
GitHub SponsorsFund open source developershttps://github.com/sponsors
Security Labhttps://securitylab.github.com
Maintainer Communityhttps://maintainers.github.com
Acceleratorhttps://github.com/accelerator
Archive Programhttps://archiveprogram.github.com
Topicshttps://github.com/topics
Trendinghttps://github.com/trending
Collectionshttps://github.com/collections
Enterprise platformAI-powered developer platformhttps://github.com/enterprise
GitHub Advanced SecurityEnterprise-grade security featureshttps://github.com/security/advanced-security
Copilot for BusinessEnterprise-grade AI featureshttps://github.com/features/copilot/copilot-business
Premium SupportEnterprise-grade 24/7 supporthttps://github.com/premium-support
Pricinghttps://github.com/pricing
Search syntax tipshttps://docs.github.com/search-github/github-code-search/understanding-github-code-search-syntax
documentationhttps://docs.github.com/search-github/github-code-search/understanding-github-code-search-syntax
Sign in https://patch-diff.githubusercontent.com/login?return_to=https%3A%2F%2Fgithub.com%2Fjayjayxi%2FSoftware-Security-Learning
Sign up https://patch-diff.githubusercontent.com/signup?ref_cta=Sign+up&ref_loc=header+logged+out&ref_page=%2F%3Cuser-name%3E%2F%3Crepo-name%3E&source=header-repo&source_repo=jayjayxi%2FSoftware-Security-Learning
Reloadhttps://patch-diff.githubusercontent.com/jayjayxi/Software-Security-Learning
Reloadhttps://patch-diff.githubusercontent.com/jayjayxi/Software-Security-Learning
Reloadhttps://patch-diff.githubusercontent.com/jayjayxi/Software-Security-Learning
jayjayxi https://patch-diff.githubusercontent.com/jayjayxi
Software-Security-Learninghttps://patch-diff.githubusercontent.com/jayjayxi/Software-Security-Learning
CHYbeta/Software-Security-Learninghttps://patch-diff.githubusercontent.com/CHYbeta/Software-Security-Learning
Notifications https://patch-diff.githubusercontent.com/login?return_to=%2Fjayjayxi%2FSoftware-Security-Learning
Fork 0 https://patch-diff.githubusercontent.com/login?return_to=%2Fjayjayxi%2FSoftware-Security-Learning
Star 0 https://patch-diff.githubusercontent.com/login?return_to=%2Fjayjayxi%2FSoftware-Security-Learning
chybeta.github.io/2017/08/19/Software-Security-Learning/https://chybeta.github.io/2017/08/19/Software-Security-Learning/
0 stars https://patch-diff.githubusercontent.com/jayjayxi/Software-Security-Learning/stargazers
292 forks https://patch-diff.githubusercontent.com/jayjayxi/Software-Security-Learning/forks
Branches https://patch-diff.githubusercontent.com/jayjayxi/Software-Security-Learning/branches
Tags https://patch-diff.githubusercontent.com/jayjayxi/Software-Security-Learning/tags
Activity https://patch-diff.githubusercontent.com/jayjayxi/Software-Security-Learning/activity
Star https://patch-diff.githubusercontent.com/login?return_to=%2Fjayjayxi%2FSoftware-Security-Learning
Notifications https://patch-diff.githubusercontent.com/login?return_to=%2Fjayjayxi%2FSoftware-Security-Learning
Code https://patch-diff.githubusercontent.com/jayjayxi/Software-Security-Learning
Pull requests 0 https://patch-diff.githubusercontent.com/jayjayxi/Software-Security-Learning/pulls
Actions https://patch-diff.githubusercontent.com/jayjayxi/Software-Security-Learning/actions
Projects 0 https://patch-diff.githubusercontent.com/jayjayxi/Software-Security-Learning/projects
Wiki https://patch-diff.githubusercontent.com/jayjayxi/Software-Security-Learning/wiki
Security 0 https://patch-diff.githubusercontent.com/jayjayxi/Software-Security-Learning/security
Insights https://patch-diff.githubusercontent.com/jayjayxi/Software-Security-Learning/pulse
Code https://patch-diff.githubusercontent.com/jayjayxi/Software-Security-Learning
Pull requests https://patch-diff.githubusercontent.com/jayjayxi/Software-Security-Learning/pulls
Actions https://patch-diff.githubusercontent.com/jayjayxi/Software-Security-Learning/actions
Projects https://patch-diff.githubusercontent.com/jayjayxi/Software-Security-Learning/projects
Wiki https://patch-diff.githubusercontent.com/jayjayxi/Software-Security-Learning/wiki
Security https://patch-diff.githubusercontent.com/jayjayxi/Software-Security-Learning/security
Insights https://patch-diff.githubusercontent.com/jayjayxi/Software-Security-Learning/pulse
Brancheshttps://patch-diff.githubusercontent.com/jayjayxi/Software-Security-Learning/branches
Tagshttps://patch-diff.githubusercontent.com/jayjayxi/Software-Security-Learning/tags
https://patch-diff.githubusercontent.com/jayjayxi/Software-Security-Learning/branches
https://patch-diff.githubusercontent.com/jayjayxi/Software-Security-Learning/tags
42 Commitshttps://patch-diff.githubusercontent.com/jayjayxi/Software-Security-Learning/commits/master/
https://patch-diff.githubusercontent.com/jayjayxi/Software-Security-Learning/commits/master/
.gitattributeshttps://patch-diff.githubusercontent.com/jayjayxi/Software-Security-Learning/blob/master/.gitattributes
.gitattributeshttps://patch-diff.githubusercontent.com/jayjayxi/Software-Security-Learning/blob/master/.gitattributes
.gitignorehttps://patch-diff.githubusercontent.com/jayjayxi/Software-Security-Learning/blob/master/.gitignore
.gitignorehttps://patch-diff.githubusercontent.com/jayjayxi/Software-Security-Learning/blob/master/.gitignore
README.mdhttps://patch-diff.githubusercontent.com/jayjayxi/Software-Security-Learning/blob/master/README.md
README.mdhttps://patch-diff.githubusercontent.com/jayjayxi/Software-Security-Learning/blob/master/README.md
SUMMARY.mdhttps://patch-diff.githubusercontent.com/jayjayxi/Software-Security-Learning/blob/master/SUMMARY.md
SUMMARY.mdhttps://patch-diff.githubusercontent.com/jayjayxi/Software-Security-Learning/blob/master/SUMMARY.md
READMEhttps://patch-diff.githubusercontent.com/jayjayxi/Software-Security-Learning
Software-Security-Learninghttps://chybeta.github.io/2017/08/19/Software-Security-Learning/
https://patch-diff.githubusercontent.com/jayjayxi/Software-Security-Learning#software-security-learning
chybeta: Software-Security-Learning (带目录) https://chybeta.github.io/2017/08/19/Software-Security-Learning/
how2heap总结-上http://bobao.360.cn/learning/detail/4386.html
how2heap总结-下http://bobao.360.cn/learning/detail/4383.html
Introduction to Windows Kernel Driver Exploitation (Pt. 2) - Stack Buffer Overflow to System Shellhttps://glennmcgui.re/introduction-to-windows-kernel-driver-exploitation-pt-2/
https://patch-diff.githubusercontent.com/jayjayxi/Software-Security-Learning#bin-securiy
软件安全工程师技能表https://github.com/feicong/sec_skills
https://patch-diff.githubusercontent.com/jayjayxi/Software-Security-Learning#tools
pharos: Automated static analysis tools for binary programshttps://github.com/cmu-sei/pharos
Angr:The next-generation binary analysis platform https://github.com/angr/angr
Angr:一个具有动态符号执行和静态分析的二进制分析工具 http://www.freebuf.com/sectool/143056.html
angr初探http://bestwing.me/2017/03/08/angr-study/
Vuzzer自动漏洞挖掘工具简单分析附使用介绍http://www.freebuf.com/sectool/143123.html
PEDA - Python Exploit Development Assistance for GDBhttps://github.com/longld/peda
pwntools - CTF framework and exploit development libraryhttps://github.com/Gallopsled/pwntools
https://patch-diff.githubusercontent.com/jayjayxi/Software-Security-Learning#course
Modern Binary Exploitationhttp://security.cs.rpi.edu/courses/binexp-spring2015/
Linux (x86) Exploit Development Serieshttps://sploitfun.wordpress.com/2015/06/26/linux-x86-exploit-development-tutorial-series/
liveoverflow: Binary Hacking Coursehttp://liveoverflow.com/binary_hacking/index.html
Lots of Tutorialshttps://www.fuzzysecurity.com/tutorials.html
https://patch-diff.githubusercontent.com/jayjayxi/Software-Security-Learning#hack-the-virtual-memory
Hack The Virtual Memory: C strings & /prochttps://blog.holbertonschool.com/hack-the-virtual-memory-c-strings-proc/
Hack The Virtual Memory: Python byteshttps://blog.holbertonschool.com/hack-the-virtual-memory-python-bytes/
Hack the Virtual Memory: drawing the VM diagramhttps://blog.holbertonschool.com/hack-the-virtual-memory-drawing-the-vm-diagram/
Hack the Virtual Memory: malloc, the heap & the program breakhttps://blog.holbertonschool.com/hack-the-virtual-memory-malloc-the-heap-the-program-break/
https://patch-diff.githubusercontent.com/jayjayxi/Software-Security-Learning#exploit-writing-tutorial
Stack Based Overflowshttps://www.corelan.be/index.php/2009/07/19/exploit-writing-tutorial-part-1-stack-based-overflows/
Stack Based Overflows – jumping to shellcodehttps://www.corelan.be/index.php/2009/07/23/writing-buffer-overflow-exploits-a-quick-and-basic-tutorial-part-2/
SEH Based Exploitshttps://www.corelan.be/index.php/2009/07/25/writing-buffer-overflow-exploits-a-quick-and-basic-tutorial-part-3-seh/
SEH Based Exploits – just another examplehttps://www.corelan.be/index.php/2009/07/28/seh-based-exploit-writing-tutorial-continued-just-another-example-part-3b/
From Exploit to Metasploit – The basicshttps://www.corelan.be/index.php/2009/08/12/exploit-writing-tutorials-part-4-from-exploit-to-metasploit-the-basics/
How debugger modules & plugins can speed up basic exploit developmenthttps://www.corelan.be/index.php/2009/09/05/exploit-writing-tutorial-part-5-how-debugger-modules-plugins-can-speed-up-basic-exploit-development/
Bypassing Stack Cookies, SafeSeh, SEHOP, HW DEP and ASLRhttps://www.corelan.be/index.php/2009/09/21/exploit-writing-tutorial-part-6-bypassing-stack-cookies-safeseh-hw-dep-and-aslr/
Unicode – from 0x00410041 to calchttps://www.corelan.be/index.php/2009/11/06/exploit-writing-tutorial-part-7-unicode-from-0x00410041-to-calc/
Win32 Egg Huntinghttps://www.corelan.be/index.php/2010/01/09/exploit-writing-tutorial-part-8-win32-egg-hunting/
Introduction to Win32 shellcodinghttps://www.corelan.be/index.php/2010/02/25/exploit-writing-tutorial-part-9-introduction-to-win32-shellcoding/
Chaining DEP with ROPhttps://www.corelan.be/index.php/2010/06/16/exploit-writing-tutorial-part-10-chaining-dep-with-rop-the-rubikstm-cube/
Heap Spraying Demystifiedhttps://www.corelan.be/index.php/2011/12/31/exploit-writing-tutorial-part-11-heap-spraying-demystified/
https://patch-diff.githubusercontent.com/jayjayxi/Software-Security-Learning#基础知识
Linux中的GOT和PLT到底是个啥? http://www.freebuf.com/articles/system/135685.html
关于符号执行https://github.com/enzet/symbolic-execution
https://patch-diff.githubusercontent.com/jayjayxi/Software-Security-Learning#rop
https://patch-diff.githubusercontent.com/jayjayxi/Software-Security-Learning#一步一步rop
一步一步学ROP之linux_x86篇http://cb.drops.wiki/drops/tips-6597.html
一步一步学ROP之linux_x86篇http://cb.drops.wiki/drops/papers-7551.html
一步一步学ROP之gadgets和2free篇http://cb.drops.wiki/drops/binary-10638.html
一步一步学ROP之Android ARM 32位篇http://cb.drops.wiki/drops/papers-11390.html
https://patch-diff.githubusercontent.com/jayjayxi/Software-Security-Learning#基本rop
ROP Emporiumhttps://ropemporium.com/
ropasaurusrex: a primer on return-oriented programming2https://blog.skullsecurity.org/2013/ropasaurusrex-a-primer-on-return-oriented-programming
ROP技术入门教程http://bobao.360.cn/learning/detail/3569.html
二进制漏洞利用中的ROP技术研究与实例分析https://xianzhi.aliyun.com/forum/read/840.html?fpage=2
现代栈溢出利用技术基础:ROPhttp://bobao.360.cn/learning/detail/3694.html
通过ELF动态装载构造ROP链http://wooyun.jozxing.cc/static/drops/binary-14360.html
Swing: 基础栈溢出复习 二 之 ROP http://bestwing.me/2017/03/19/stack-overflow-two-ROP/
https://patch-diff.githubusercontent.com/jayjayxi/Software-Security-Learning#brop
Blind Return Oriented Programminghttp://www.scs.stanford.edu/brop/
muhe: Have fun with Blind ROPhttp://o0xmuhe.me/2017/01/22/Have-fun-with-Blind-ROP/
Swing: 基础栈溢出复习 四 之 BROP http://bestwing.me/2017/03/24/stack-overflow-four-BROP/
https://patch-diff.githubusercontent.com/jayjayxi/Software-Security-Learning#srop
Sigreturn Oriented Programming (SROP) Attack攻击原理http://www.freebuf.com/articles/network/87447.html
Swing: 基础栈溢出复习 三 之 SROP http://bestwing.me/2017/03/20/stack-overflow-three-SROP/
https://patch-diff.githubusercontent.com/jayjayxi/Software-Security-Learning#return-to-dl-resolve
通过ELF动态装载构造ROP链 ( Return-to-dl-resolve)http://www.evil0x.com/posts/19226.html
https://patch-diff.githubusercontent.com/jayjayxi/Software-Security-Learning#栈漏洞
手把手教你栈溢出从入门到放弃(上)http://bobao.360.cn/learning/detail/3717.html
手把手教你栈溢出从入门到放弃(下)http://bobao.360.cn/learning/detail/3718.html
Hcamael: PWN学习总结之基础栈溢出http://0x48.pw/2016/11/03/0x26/
Hcamael: PWN学习总结之基础栈溢出2 http://0x48.pw/2016/11/21/0x27/
Swing: 基础栈溢出复习 之基础http://bestwing.me/2017/03/18/stack-overflow-one/
ARM栈溢出攻击实践:从虚拟环境搭建到ROP利用 http://www.freebuf.com/articles/terminal/107276.html
64-bit Linux stack smashing tutorial: Part 1https://blog.techorganic.com/2015/04/10/64-bit-linux-stack-smashing-tutorial-part-1/
64-bit Linux stack smashing tutorial: Part 2https://blog.techorganic.com/2015/04/21/64-bit-linux-stack-smashing-tutorial-part-2/
64-bit Linux stack smashing tutorial: Part 3https://blog.techorganic.com/2016/03/18/64-bit-linux-stack-smashing-tutorial-part-3/
Offset2lib: bypassing full ASLR on 64bit Linuhttp://cybersecurity.upv.es/attacks/offset2lib/offset2lib.html
https://patch-diff.githubusercontent.com/jayjayxi/Software-Security-Learning#堆漏洞
Heap Exploitationhttps://heap-exploitation.dhavalkapil.com/introduction.html
how2heaphttps://github.com/shellphish/
https://patch-diff.githubusercontent.com/jayjayxi/Software-Security-Learning#堆相关知识
PWN之堆内存管理http://paper.seebug.org/255/
Linux堆内存管理深入分析(上) http://www.freebuf.com/articles/system/104144.html
Linux堆内存管理深入分析(下) http://www.freebuf.com/articles/security-management/105285.html
Windows Exploit开发系列教程——堆喷射(一)http://bobao.360.cn/learning/detail/3548.html
Windows Exploit开发系列教程——堆喷射(二)http://bobao.360.cn/learning/detail/3555.html
Libc堆管理机制及漏洞利用技术 (一) http://www.freebuf.com/articles/system/91527.html
Notes About Heap Overflow Under Linuxhttps://blog.iret.xyz/article.aspx/linux_heapoverflow_enterance
如何理解堆和堆溢出漏洞的利用?http://www.freebuf.com/vuls/98404.html
Have fun with glibc内存管理http://o0xmuhe.me/2016/11/21/Have-fun-with-glibc%E5%86%85%E5%AD%98%E7%AE%A1%E7%90%86/
内存映射mmaphttp://www.tuicool.com/articles/A7n2ueq
glibc malloc学习笔记之fastbinhttp://0x48.pw/2017/07/25/0x35/
malloc.c源码阅读之__libc_freehttp://0x48.pw/2017/08/07/0x37/
https://patch-diff.githubusercontent.com/jayjayxi/Software-Security-Learning#堆利用技术
how2heap总结-上http://bobao.360.cn/learning/detail/4386.html
how2heap总结-下http://bobao.360.cn/learning/detail/4383.html
溢出科普:heap overflow&溢出保护和绕过http://wooyun.jozxing.cc/static/drops/binary-14596.html
现代化的堆相关漏洞利用技巧http://bobao.360.cn/learning/detail/3197.html
从一字节溢出到任意代码执行-Linux下堆漏洞利用http://bobao.360.cn/learning/detail/3113.html
Heap overflow using unlinkhttps://sploitfun.wordpress.com/2015/02/26/heap-overflow-using-unlink/?spm=a313e.7916648.0.0.x4nzYZ
Linux堆溢出漏洞利用之unlinkhttps://jaq.alibaba.com/community/art/show?spm=a313e.7916646.24000001.74.ZP8rXN&articleid=360
Linux堆溢出之Fastbin Attack实例详解http://bobao.360.cn/learning/detail/3996.html
unsorted bin attack分析http://bobao.360.cn/learning/detail/3296.html
Double Free浅析http://www.vuln.cn/6172
Understanding the heap by breaking ithttp://www.blackhat.com/presentations/bh-usa-07/Ferguson/Whitepaper/bh-usa-07-ferguson-WP.pdf
An Introduction to Use After Free Vulnerabilitieshttps://www.purehacking.com/blog/lloyd-simon/an-introduction-to-use-after-free-vulnerabilities
Use After Free漏洞浅析http://bobao.360.cn/learning/detail/3379.html?utm_source=tuicool&utm_medium=referral
Linux堆漏洞之Use after free实例http://d0m021ng.github.io/2017/03/04/PWN/Linux%E5%A0%86%E6%BC%8F%E6%B4%9E%E4%B9%8BUse-after-free%E5%AE%9E%E4%BE%8B/
堆之House of Spirithttp://bobao.360.cn/learning/detail/3417.html
https://patch-diff.githubusercontent.com/jayjayxi/Software-Security-Learning#格式化字符串漏洞
Exploiting Format String Vulnerabilitieshttps://crypto.stanford.edu/cs155old/cs155-spring08/papers/formatstring-1.2.pdf
二进制漏洞之——邪恶的printfhttp://cb.drops.wiki/drops/binary-6259.html
漏洞挖掘基础之格式化字符串http://cb.drops.wiki/drops/papers-9426.html
格式化字符串漏洞利用小结(一)http://bobao.360.cn/learning/detail/3654.html
格式化字符串漏洞利用小结(二)http://bobao.360.cn/learning/detail/3674.html
Linux下的格式化字符串漏洞利用姿势http://www.cnblogs.com/Ox9A82/p/5429099.html
Linux系统下格式化字符串利用研究 http://0x48.pw/2017/03/13/0x2c/?utm_source=tuicool&utm_medium=referral
Advances in format string exploitationhttp://phrack.org/issues/59/7.html
Exploiting Sudo format string vunerabilityhttp://www.vnsecurity.net/research/2012/02/16/exploiting-sudo-format-string-vunerability.html
https://patch-diff.githubusercontent.com/jayjayxi/Software-Security-Learning#其余漏洞
https://patch-diff.githubusercontent.com/jayjayxi/Software-Security-Learning#fsp溢出
Head First FILE Stream Pointer Overflowhttp://wooyun.jozxing.cc/static/drops/binary-12740.html
abusing the FILE structurehttps://outflux.net/blog/archives/2011/12/22/abusing-the-file-structure/
File Stream Pointer Overflows Paper.http://repo.thehackademy.net/depot_ouah/fsp-overflows.txt
溢出利用FILE结构体http://bobao.360.cn/learning/detail/3219.html
https://patch-diff.githubusercontent.com/jayjayxi/Software-Security-Learning#整数溢出
整数溢出漏洞http://blog.csdn.net/wuxiaobingandbob/article/details/44618925
https://patch-diff.githubusercontent.com/jayjayxi/Software-Security-Learning#保护绕过
https://patch-diff.githubusercontent.com/jayjayxi/Software-Security-Learning#cannary绕过
栈溢出之绕过CANARY保护 http://0x48.pw/2017/03/14/0x2d/
论canary的几种玩法http://veritas501.space/2017/04/28/%E8%AE%BAcanary%E7%9A%84%E5%87%A0%E7%A7%8D%E7%8E%A9%E6%B3%95/
Liunx下关于绕过cancry保护总结http://yunnigu.dropsec.xyz/2017/03/20/Liunx%E4%B8%8B%E5%85%B3%E4%BA%8E%E7%BB%95%E8%BF%87cancry%E4%BF%9D%E6%8A%A4%E6%80%BB%E7%BB%93/
https://patch-diff.githubusercontent.com/jayjayxi/Software-Security-Learning#内核
Introduction to Windows Kernel Driver Exploitation (Pt. 2) - Stack Buffer Overflow to System Shellhttps://glennmcgui.re/introduction-to-windows-kernel-driver-exploitation-pt-2/
HackSysExtremeVulnerableDriverhttps://github.com/hacksysteam/HackSysExtremeVulnerableDriver
Starting with Windows Kernel Exploitation – part 1 – setting up the labhttps://hshrzd.wordpress.com/2017/05/28/starting-with-windows-kernel-exploitation-part-1-setting-up-the-lab/
Starting with Windows Kernel Exploitation – part 2 – getting familiar with HackSys Extreme Vulnerable Driverhttps://hshrzd.wordpress.com/2017/06/05/starting-with-windows-kernel-exploitation-part-2/
Windows内核利用之旅:熟悉HEVD(附视频演示)http://bobao.360.cn/learning/detail/4002.html
Windows 内核攻击:栈溢出http://bobao.360.cn/learning/detail/3718.html
Linux 内核漏洞利用教程(一):环境配置http://bobao.360.cn/learning/detail/3700.html
Linux 内核漏洞利用教程(二):两个Demohttp://bobao.360.cn/learning/detail/3702.html
Linux 内核漏洞利用教程(三):实践 CSAW CTF 题目http://bobao.360.cn/learning/detail/3706.html
Linux内核ROP姿势详解(一) http://www.freebuf.com/articles/system/94198.html
Linux内核ROP姿势详解(二)http://www.freebuf.com/articles/system/135402.html
https://patch-diff.githubusercontent.com/jayjayxi/Software-Security-Learning#虚拟机逃逸
虚拟机逃逸——QEMU的案例分析(一)http://bbs.pediy.com/thread-217997.htm
虚拟机逃逸——QEMU的案例分析(二)http://bbs.pediy.com/thread-217999.htm
虚拟机逃逸——QEMU的案例分析(三) http://bbs.pediy.com/thread-218045.htm
https://patch-diff.githubusercontent.com/jayjayxi/Software-Security-Learning#arm
ARM 汇编基础速成1:ARM汇编以及汇编语言基础介绍http://bobao.360.cn/learning/detail/4070.html
ARM 汇编基础速成2:ARM汇编中的数据类型http://bobao.360.cn/learning/detail/4075.html
ARM 汇编基础速成3:ARM模式与THUMB模式http://bobao.360.cn/learning/detail/4082.html
ARM 汇编基础速成4:ARM汇编内存访问相关指令http://bobao.360.cn/learning/detail/4087.html
ARM 汇编基础速成5:连续存取http://bobao.360.cn/learning/detail/4097.html
ARM 汇编基础速成6:条件执行与分支http://bobao.360.cn/learning/detail/4104.html
ARM 汇编基础速成7:栈与函数http://bobao.360.cn/learning/detail/4108.html
https://patch-diff.githubusercontent.com/jayjayxi/Software-Security-Learning#进程注入
10种常见的进程注入技术的总结http://bobao.360.cn/learning/detail/4131.html
系统安全攻防战:DLL注入技术详解 http://www.freebuf.com/articles/system/143640.html
https://patch-diff.githubusercontent.com/jayjayxi/Software-Security-Learning#漏洞挖掘
看我如何对Apache进行模糊测试并挖到了一个价值1500刀的漏洞http://bobao.360.cn/learning/detail/4213.html
https://patch-diff.githubusercontent.com/jayjayxi/Software-Security-Learning#ctf中的pwn
pwn & exploithttps://github.com/jmpews/pwn2exploit
https://patch-diff.githubusercontent.com/jayjayxi/Software-Security-Learning#入门
跟我入坑PWN第一章http://bobao.360.cn/learning/detail/3300.html
跟我入坑PWN第二章http://bobao.360.cn/learning/detail/3339.html
https://patch-diff.githubusercontent.com/jayjayxi/Software-Security-Learning#技巧
借助DynELF实现无libc的漏洞利用小结http://bobao.360.cn/learning/detail/3298.html?utm_source=tuicool&utm_medium=referral
what DynELF does basically http://o0xmuhe.me/2016/12/24/what-DynELF-does-basically/
Finding Function's Load Address http://uaf.io/exploitation/misc/2016/04/02/Finding-Functions.html
https://patch-diff.githubusercontent.com/jayjayxi/Software-Security-Learning#总结
CTF总结https://github.com/stfpeak/CTF
pwn tipshttp://skysider.com/?p=223
CTF-pwn-tipshttps://github.com/Naetw/CTF-pwn-tips
pwn 学习总结http://www.angelwhu.com/blog/?p=460
CTF中做Linux下漏洞利用的一些心得http://www.cnblogs.com/Ox9A82/p/5559167.html
linux常见漏洞利用技术实践http://drops.xmd5.com/static/drops/binary-6521.html
https://patch-diff.githubusercontent.com/jayjayxi/Software-Security-Learning#wp
堆溢出学习之0CTF 2017 Babyheap http://0x48.pw/2017/08/01/0x36/
一道有趣的CTF PWN题http://bobao.360.cn/learning/detail/3189.html
Exploit-Exercises Nebula全攻略https://github.com/1u4nx/Exploit-Exercises-Nebula
三个白帽之从pwn me调试到Linux攻防学习http://wooyun.jozxing.cc/static/drops/binary-16700.html
https://patch-diff.githubusercontent.com/jayjayxi/Software-Security-Learning#android-security
https://patch-diff.githubusercontent.com/jayjayxi/Software-Security-Learning#exercise
DIVA Androidhttps://github.com/payatu/diva-android/
Android安全项目入门篇https://mp.weixin.qq.com/s?__biz=MzI4NjEyMDk0MA==&mid=2649846643&idx=1&sn=0286e8f1b3e6da0acbd129cb248eac2a
https://patch-diff.githubusercontent.com/jayjayxi/Software-Security-Learning#skill
初探 Android SO 开发http://www.ikey4u.com/blog/android-develop/android-so/
Android App漏洞学习(一)https://mp.weixin.qq.com/s?__biz=MzI5MDQ2NjExOQ==&mid=2247484642&idx=1&sn=d34ec8b6fc9b5a63b627316e13821b13&chksm=ec1e34cadb69bddc80598c93a0aef429d0b1d668b4fc6e5e6b31a7a3ebfa713aafda1f1b8f7a&scene=21#wechat_redirect
Android App漏洞学习(二) https://mp.weixin.qq.com/s?__biz=MzI5MDQ2NjExOQ==&mid=2247484706&idx=1&sn=eb49d5f71f89fd4d2e3bec23c44c0ae6&chksm=ec1e350adb69bc1c9f775bfaf997459e1cfa3beb065f553ed90fbd88220d7739487e9f7208bd#rd
WIKI: Androidhttp://wiki.ioin.in/sort/android
Android组件安全https://mp.weixin.qq.com/s?__biz=MzI5MDQ2NjExOQ==&mid=2247484387&idx=1&sn=7264428205276452d40c1ef7b1ed0dcc&chksm=ec1e33cbdb69badd00794f81caa43e5d62e0dc9bb7b9baa9d4c3c9eb64a3a0a18613356bf584#rd
通过 WebView 攻击 Android 应用https://zhuanlan.zhihu.com/p/28107901
https://patch-diff.githubusercontent.com/jayjayxi/Software-Security-Learning#tool
走到哪黑到哪——Android渗透测试三板斧http://bobao.360.cn/learning/detail/4254.html
Brida:将frida与burp结合进行移动app渗透测试http://www.4hou.com/penetration/6916.html
https://patch-diff.githubusercontent.com/jayjayxi/Software-Security-Learning#浏览器安全
浅谈多浏览器的自动化测试http://www.freebuf.com/articles/others-articles/145586.html
浏览器漏洞挖掘思路https://zhuanlan.zhihu.com/p/28719766
https://patch-diff.githubusercontent.com/jayjayxi/Software-Security-Learning#iososx-securiy
OSX/iOS reverse engineeringhttps://github.com/michalmalik/osx-re-101
https://patch-diff.githubusercontent.com/jayjayxi/Software-Security-Learning#ios
https://patch-diff.githubusercontent.com/jayjayxi/Software-Security-Learning#exercise-1
Damn Vulnerable iOS Application (DVIA)http://damnvulnerableiosapp.com/#trainings
https://patch-diff.githubusercontent.com/jayjayxi/Software-Security-Learning#skill-1
IosHackStudyhttps://github.com/pandazheng/IosHackStudy
Papers, Slides and Thesis Archive : iOShttps://papers.put.as/ios/ios/
ios-wiki: iOS Securityhttp://security.ios-wiki.com/
apple官方文档:iOS Securityhttps://www.apple.com/business/docs/iOS_Security_Guide.pdf
iOS安全系列汇总http://esoftmobile.com/2014/02/14/ios-security/
浅谈iOS应用安全自动化审计https://security.tencent.com/index.php/blog/msg/105
iOS安全审计入门http://www.freebuf.com/articles/terminal/123098.html
iOS内核漏洞挖掘–fuzz&代码审计http://blog.pangu.io/xkungfoo2015/
https://patch-diff.githubusercontent.com/jayjayxi/Software-Security-Learning#osx
https://patch-diff.githubusercontent.com/jayjayxi/Software-Security-Learning#exercise-2
OS X : Crackmeshttps://reverse.put.as/crackmes/
https://patch-diff.githubusercontent.com/jayjayxi/Software-Security-Learning#skill-2
Papers, Slides and Thesis Archive : Mac OS Xhttps://papers.put.as/macosx/macosx/
实现 macOS 内核监控的几种方法https://paper.seebug.org/380/
chybeta.github.io/2017/08/19/Software-Security-Learning/https://chybeta.github.io/2017/08/19/Software-Security-Learning/
Readme https://patch-diff.githubusercontent.com/jayjayxi/Software-Security-Learning#readme-ov-file
Please reload this pagehttps://patch-diff.githubusercontent.com/jayjayxi/Software-Security-Learning
Activityhttps://patch-diff.githubusercontent.com/jayjayxi/Software-Security-Learning/activity
0 starshttps://patch-diff.githubusercontent.com/jayjayxi/Software-Security-Learning/stargazers
1 watchinghttps://patch-diff.githubusercontent.com/jayjayxi/Software-Security-Learning/watchers
0 forkshttps://patch-diff.githubusercontent.com/jayjayxi/Software-Security-Learning/forks
Report repository https://patch-diff.githubusercontent.com/contact/report-content?content_url=https%3A%2F%2Fgithub.com%2Fjayjayxi%2FSoftware-Security-Learning&report=jayjayxi+%28user%29
Releaseshttps://patch-diff.githubusercontent.com/jayjayxi/Software-Security-Learning/releases
Packages 0https://patch-diff.githubusercontent.com/users/jayjayxi/packages?repo_name=Software-Security-Learning
https://github.com
Termshttps://docs.github.com/site-policy/github-terms/github-terms-of-service
Privacyhttps://docs.github.com/site-policy/privacy-policies/github-privacy-statement
Securityhttps://github.com/security
Statushttps://www.githubstatus.com/
Communityhttps://github.community/
Docshttps://docs.github.com/
Contacthttps://support.github.com?tags=dotcom-footer

Viewport: width=device-width


URLs of crawlers that visited me.