References / Resources

So while I was learning Binary Exploitation / Reverse Engineering skills, I had to use a lot of different resources. Here are some of the resources I used.

Address Sanitization:

https://ray-cp.github.io/archivers/0CTF_2019_PWN_WRITEUP#aegis

Calling scanf:

https://github.com/bennofs/docs/blob/master/asisfinals-2017/mrshudson.py

Unsafe Unlink:

https://www.lazenca.net/pages/viewpage.action?pageId=7536654

Fast bin attack:

https://twisted-fun.github.io/2018-05-24-RCTF18-PWN-317/
https://github.com/sajjadium/ctf-writeups/tree/master/RCTF/2018/babyheap

How to use SROP attack:

https://www.akashtrehan.com/writeups/backdoorctf17/2funsignals/

How to build a ROP Chain:

http://hexfact0r.dk/2016/03/06/boston-key-party-ctf-2016-simple-calc/
https://jkrshnmenon.wordpress.com/2018/09/17/csaw-ctf-quals-2018-turtles-writeup/
https://lordidiot.github.io/2018-09-03/tokyowesterns-ctf-2018-load-pwn/
http://pastebinthehacker.blogspot.com/2017/01/insomnihack-2017-baby.html 

Reversing mart of the libc free function:

https://0xabe.io/ctf/exploit/2016/03/07/Boston-Key-Party-pwn-Complex-Calc.html

Executing a House of Force Attack:

https://www.youtube.com/watch?v=f1wp6wza8ZI
https://www.youtube.com/watch?v=dnHuZLySS6g
https://www.youtube.com/watch?v=PISoSH8KGVI
https://gist.github.com/LiveOverflow/dadc75ec76a4638ab9ea#file-cookbook-py-L20

House of Spirit:

https://dangokyo.me/2017/12/04/hack-lu-ctf-2014-pwn-oreo-write-up/

Reverse Engineering Skills:

https://github.com/ByteBandits/writeups/tree/master/bostonkeyparty-2016/reverse/Alewife/sudhackar
https://github.com/p4-team/ctf/tree/master/2016-03-06-bkpctf/re_5_Frog_Fractions_2
http://capturetheswag.blogspot.com.au/2015/09/csaw-2015-quals-ftp-re300-challenge.html
https://quanyang.github.io/csaw-ctf-quals-2016-deedeedee/
https://www.incertia.net/blog/csaw-quals-2016-tar-tar-binks-400/
https://github.com/perfectblue/ctf-writeups/tree/master/insomnihack-teaser-2019/junkyard
https://dustri.org/b/defeating-the-recons-movfuscator-crackme.html

Angr:

https://github.com/elklepo/pwn/blob/master/PlaidCTF_2019/i_can_count/exploit.py
https://github.com/angr/angr-doc/tree/master/examples/securityfest_fairlight

Nested Code:

https://github.com/smokeleeteveryday/CTF_WRITEUPS/tree/master/2016/BKPCTF/reversing/unholy

Heap Exploitation:

http://geeksspeak.github.io/blog/2015/09/21/csaw-2015-pwn250-contacts/
https://github.com/ret2libc/ctfs/tree/master/csaw2016/hungman
https://amritabi0s.wordpress.com/2017/09/18/csaw-quals-2017-zone-writeup/
https://github.com/sajjadium/ctf-writeups/tree/master/CSAWQuals/2018/alien_invasion
https://raywang.tech/2018/05/14/DEF-CON-Quals-2018-It-s-a-Me/
https://github.com/balsn/ctf_writeup/tree/master/20180512-defconctfqual#race-wars
https://github.com/EmpireCTF/empirectf/blob/master/writeups/2019-04-12-PlaidCTF/README.md#150-pwnable--cppp

Overflow:

http://blog.bitsforeveryone.com/2015/09/writeup-csaw-2015-exploitables-300-ftp2.html
https://github.com/ctfs/write-ups-2015/tree/master/csaw-ctf-2015/pwn/precision-100
https://teamrocketist.github.io/2017/09/18/Pwn-CSAW-Pilot/
https://github.com/Caesurus/CTF_Writeups/tree/master/2017-GoogleCTF_Quals/wiki

Obfuscated Reversing:

http://ohaithe.re/post/129657401392/csaw-quals-2015-reversing-500-wyvern

Emulated Reversing:

http://bruce30262.logdown.com/posts/301384--csaw-ctf-2015-hacking-time

Integer Bugs:

https://devel0pment.de/?p=1191

Custom Heap:

https://github.com/ByteBandits/writeups/blob/master/csaw-quals-2017/pwn/minesweeper/sudhackar/README.md

Stack Pivot:

https://ctftime.org/writeup/11273

Python:

https://hexplo.it/escaping-the-csawctf-python-sandbox/

Arm:

http://tasteless.eu/post/2014/09/csaw-2014-quals-wololo-rev300/
https://ctftime.org/writeup/12568

Shellcoding:

https://ctftime.org/writeup/10040
https://lordidiot.github.io/2019-02-03/nullcon-hackim-ctf-2019/#easy-shell
https://lordidiot.github.io/2019-02-03/nullcon-hackim-ctf-2019/#peasy-shell

Exploitation:

https://jkrshnmenon.wordpress.com/2018/09/17/csaw-ctf-quals-2018-turtles-writeup/
http://v0ids3curity.blogspot.in/2014/09/csaw-ctf-quals-2014-s3-exploitation-300.html
https://github.com/EmpireCTF/empirectf/blob/master/writeups/2019-01-19-Insomni-Hack-Teaser/README.md#onewrite