=================== Reference Materials =================== --- CTF --- - `CTF Time `__ - `About CTF `__ - `DEF CON CTF `__ -------- Wargames -------- - `OverTheWire `__ - `IO Wargame `__ - `CSAW 365 `__ - `Pwnable.Kr `__ - `Pwnable.tw `__ ----- Tools ----- - `GDB Tutorial 1 `__ - `GDB Tutorial 2 `__ - `Pwndbg `__ - `Pwndbg Tutorial `__ - `Pwntools `__ - `Pwntools document `__ - `Pwntools tutorial `__ - `IDA 7.0 Freeware `__ - `Binary Ninja Demo Verions `__ - `The NSA Ghidra `__ ---------- References ---------- - `GDB `__ - `AS `__ - `GCC `__ - `x86 calling convention `__ - `Alphanumeric opcode table (x86/amd64) `__ - `Intel 64 and IA-32 Architectures Software Developer `__ - AMD64 Architecture Programmer's Manual (`vol1 `__, `vol2 `__, `vol3 `__, `vol4 `__) - `How2heap `__ - `ctf-tools `__ - `preeny `__ --------------- Books & Manuals --------------- - `Phrack Magazine `__ - `The Shellcoder's Handbook: Discovering and Exploiting Security Holes `__ - `The Web Application Hacker's Handbook: Finding and Exploiting Security Flaws `__ - `Intel Architecture Software Developer Manuals `__ - `Computer Systems: A Programmer's Perspective, 3/E `__