📄️ Debugging with GDB/GEF
A practical reference guide for GDB Enhanced Features (GEF) with real-world examples, advanced debugging techniques, and exploitation methodologies for reverse engineering and exploit development.
📄️ Buffer Overflow Exploitation
Hands-on examples using GDB with the GEF plugin to exploit 32-bit and 64-bit buffer overflow vulnerabilities. Includes step-by-step walkthroughs, sample code, and debugging tips.
📄️ Binary Refinery Practical
A practical reference for Binary Refinery: the command-line toolkit for malware analysis, binary data manipulation, and forensic investigations. Basic ops to advanced workflows.