Skip to content

Commit e455f49

Browse files
committed
Fixed links (replaced embed)
1 parent 79b0084 commit e455f49

File tree

1 file changed

+14
-14
lines changed

1 file changed

+14
-14
lines changed

README.md

+14-14
Original file line numberDiff line numberDiff line change
@@ -4,21 +4,21 @@ Step-by-step stack-based exploitation techniques. This information aims at helpi
44
Binary exploitation (PWN) tutorials to help you understand the foundations of stack-based exploitation techniques.
55

66
* Basic Concepts:
7-
* **Endianness** https://www.youtube.com/embed/T8E_JRqN0fY
8-
* **Global Offset Table (GOT) and Procedure Linkage Table (PLT)** https://www.youtube.com/embed/B4-wVdQo040
9-
* **How to debug the exploit** https://www.youtube.com/embed/CWxDhp0OFzI
7+
* **Endianness** https://www.youtube.com/watch?v=T8E_JRqN0fY
8+
* **Global Offset Table (GOT) and Procedure Linkage Table (PLT)** https://www.youtube.com/watch?v=B4-wVdQo040
9+
* **How to debug the exploit** https://www.youtube.com/watch?v=CWxDhp0OFzI
1010
* Exploitation Techniques:
11-
* **Buffer Overflow Foundations** https://www.youtube.com/embed/0_merdYty4Y
12-
* **Buffer Overflow to overwrite memory with arbitrary values** https://www.youtube.com/embed/DiyFDCuyPqg
13-
* **Execution Flow Hijacking (ret2win)** https://www.youtube.com/embed/-VUtXwDm5yQ
14-
* **Shellcode Execution (ret2shellcode)** https://www.youtube.com/embed/6Yiupj3XHrM
15-
* **Integer Overflow / Underflow** https://www.youtube.com/embed/Mfaq4PW8H1I
16-
* **Format String** https://www.youtube.com/embed/0-ulL3Y0MS8
17-
* **PIE and Canary Bypass** https://www.youtube.com/embed/FpKL2cAlJbM
18-
* **GOT overwrite** https://www.youtube.com/embed/9SWYvhY5dYw
19-
* **Return Oriented Programming (ROP)** https://www.youtube.com/embed/8zRoMAkGYQE
20-
* **Return to Libc (ret2libc)** https://www.youtube.com/embed/TTCz3kMutSs
21-
* **Making stack executable with malicious mprotect call** https://www.youtube.com/embed/r_tysAKIELs
11+
* **Buffer Overflow Foundations** https://www.youtube.com/watch?v=0_merdYty4Y
12+
* **Buffer Overflow to overwrite memory with arbitrary values** https://www.youtube.com/watch?v=DiyFDCuyPqg
13+
* **Execution Flow Hijacking (ret2win)** https://www.youtube.com/watch?v=-VUtXwDm5yQ
14+
* **Shellcode Execution (ret2shellcode)** https://www.youtube.com/watch?v=6Yiupj3XHrM
15+
* **Integer Overflow / Underflow** https://www.youtube.com/watch?v=Mfaq4PW8H1I
16+
* **Format String** https://www.youtube.com/watch?v=0-ulL3Y0MS8
17+
* **PIE and Canary Bypass** https://www.youtube.com/watch?v=FpKL2cAlJbM
18+
* **GOT overwrite** https://www.youtube.com/watch?v=9SWYvhY5dYw
19+
* **Return Oriented Programming (ROP)** https://www.youtube.com/watch?v=8zRoMAkGYQE
20+
* **Return to Libc (ret2libc)** https://www.youtube.com/watch?v=TTCz3kMutSs
21+
* **Making stack executable with malicious mprotect call** https://www.youtube.com/watch?v=r_tysAKIELs
2222
* **Advanced Format String**
2323
* **vfprintf internal buffer** https://www.youtube.com/watch?v=K690__BET10
2424
* **Abusing %s and %n** https://www.youtube.com/watch?v=FF8SRxMP8Bc

0 commit comments

Comments
 (0)