update lists

This commit is contained in:
2025-07-18 22:22:32 +02:00
parent 55bed3b4a1
commit 5916c5c074
3078 changed files with 331679 additions and 357255 deletions

View File

@@ -1,144 +0,0 @@
<h1 id="awesome-arm-exploitation">Awesome ARM Exploitation</h1>
<p><a href="https://github.com/sindresorhus/awesome"><img
src="https://cdn.rawgit.com/sindresorhus/awesome/d7305f38d29fed78fa85652e3a63e154dd8e8829/media/badge.svg"
alt="Awesome" /></a></p>
<p>A collection of awesome videos, articles, books, tools and resources
about ARM exploitation.</p>
<h2 id="contents">Contents</h2>
<ul>
<li><a href="#conference-talks--videos">Conference Talks /
Videos</a></li>
<li><a href="#articles--papers">Articles / Papers</a></li>
<li><a href="#resources">Resources</a></li>
<li><a href="#ctf--training-binaries">CTF / Training Binaries</a></li>
<li><a href="#books">Books</a></li>
<li><a href="#tools">Tools</a></li>
<li><a href="#courses">Courses</a></li>
<li><a href="#related-awesome-lists">Related Awesome Lists</a></li>
<li><a href="#contributing">Contributing</a></li>
</ul>
<h2 id="conference-talks-videos">Conference Talks / Videos</h2>
<ul>
<li><a href="https://www.youtube.com/watch?v=kykVyJ0dm8Y">Exploitation
on ARM</a> - Itzhak Avraham - Defcon 18 (2010)</li>
<li><a href="https://www.youtube.com/watch?v=VDyf_tJ8IUg">ARM
Exploitation ROPMAP</a> - Long Le - Blackhat USA (2011)</li>
<li><a href="https://www.youtube.com/watch?v=gdsPydfBfSA">Advanced ARM
Exploitation</a> - Stephen Ridley &amp; Stephen Lawler - Blackhat USA
(2012)</li>
<li><a href="https://www.youtube.com/watch?v=BhjJBuX0YCU">ARM Assembly
and Shellcode Basics</a> - Saumil Shah - 44CON (2017)</li>
<li><a href="https://www.youtube.com/watch?v=L8Ya7fBgEzU">Heap Overflow
Exploits for Beginners (ARM Exploitation Tutorial)</a> - Billy Ellis
(2017)</li>
<li><a href="https://www.youtube.com/watch?v=xVyH68HFsQU">Introduction
to Exploitation on ARM64</a> - Billy Ellis - Codetalks (2018)</li>
<li><a href="https://www.youtube.com/watch?v=9tx293lbGuc">Make ARM
Shellcode Great Again</a> - Saumil Shah - Hack.lu (2018)</li>
<li><a href="https://www.youtube.com/watch?v=iP_iHroclgM">ARM Memory
Tagging, how it improves C++ memory safety</a> - Kostya Serebryany -
LLVM (2018)</li>
<li><a
href="https://i.blackhat.com/USA-19/Thursday/us-19-Peterlin-Breaking-Samsungs-ARM-TrustZone.pdf">Breaking
Samsungs ARM Trustzone</a></li>
<li><a href="https://www.youtube.com/watch?v=riQ-WyYrxh4">Hacker
Nightmares: Giving Hackers a Headache with Exploit Mitigations</a> -
Azeria - Virtual Arm Research Summit (2020)</li>
</ul>
<h2 id="articles-papers">Articles / Papers</h2>
<ul>
<li><a href="https://azeria-labs.com/writing-arm-assembly-part-1/">ARM
Assembly Basics Series</a> - Azeria</li>
<li><a href="https://azeria-labs.com/writing-arm-shellcode/">ARM Binary
Exploitation Series</a> - Azeria</li>
<li><a
href="https://www.merckedsecurity.com/blog/smashing-the-arm-stack-part-1">Smashing
the ARM Stack</a> - Mercked Security</li>
<li><a
href="https://quequero.org/2014/04/introduction-to-arm-architecture/">Introduction
to ARMv8 64-bit Architecture</a> - pnuic</li>
<li><a href="http://phrack.org/issues/66/12.html">Alphanumeric RISC ARM
Shellcode</a> - (Phrack) - Yves Younan, Pieter Philippaerts</li>
<li><a
href="https://ieeexplore.ieee.org/document/8029521">Return-Oriented
Programming on a Cortex-M Processor</a></li>
<li><a
href="https://blog.3or.de/arm-exploitation-return-oriented-programming.html">3or
ARM Exploitation Series</a> - Dimitrios Slamaris</li>
<li><a href="http://www.phrack.com/issues/58/10.html">Developing
StrongARM/Linux Shellcode</a> - (Phrack) - funkysh</li>
<li><a
href="http://www.mathyvanhoef.com/2013/12/reversing-and-exploiting-arm-binaries.html">Reversing
and Exploiting ARM Binaries</a> - Mathy Vanhoef</li>
<li><a
href="https://quequero.org/2017/07/arm-exploitation-iot-episode-1/">ARM
Exploitation for IoT Series</a> - Andrea Sindoni</li>
<li><a
href="https://rdomanski.github.io/Reverse-engineering-of-ARM-Microcontrollers/">Reverse
Engineering of ARM Microcontrollers</a> - Rdomanski</li>
<li><a
href="http://highaltitudehacks.com/2020/09/05/arm64-reversing-and-exploitation-part-1-arm-instruction-set-heap-overflow/">ARM64
Reversing and Exploitation Part 1 - ARM Instruction Set + Simple Heap
Overflow</a> - HighAltitudeHacks</li>
</ul>
<h2 id="resources">Resources</h2>
<ul>
<li><a
href="http://infocenter.arm.com/help/index.jsp?topic=/com.arm.doc.subset.architecture.reference/index.html">ARM
Architecture Reference Manual</a></li>
<li><a href="https://azm.azerialabs.com/">Online ARM Assembler</a></li>
<li><a href="https://github.com/enovella/TEE-reversing">ARM TEE
Reversing and Exploitation</a></li>
</ul>
<h2 id="ctf-training-binaries">CTF / Training Binaries</h2>
<ul>
<li><a href="https://github.com/bkerler/exploit_me">Exploit Me</a></li>
<li><a href="https://github.com/Billy-Ellis/Exploit-Challenges">Exploit
Challenges</a></li>
<li><a
href="https://azeria-labs.com/emulate-raspberry-pi-with-qemu/">Azeria
ARM Lab</a></li>
</ul>
<h2 id="books">Books</h2>
<ul>
<li><a
href="https://www.wiley.com/en-us/Practical+Reverse+Engineering%3A+x86%2C+x64%2C+ARM%2C+Windows+Kernel%2C+Reversing+Tools%2C+and+Obfuscation-p-9781118787311">Practical
Reverse Engineering</a> (Chapter 2) - Bruce Dang, Alexandre Gazet and
Elias Bachalany</li>
<li><a href="https://zygosec.com/book.html">Beginners Guide to
Exploitation on ARM</a> - Volumes 1 &amp; 2 - Billy Ellis</li>
<li><a
href="https://www.amazon.co.uk/ARM-Assembly-Language-Fundamentals-Techniques/dp/1439806101">ARM
Assembly Language: Fundamentals &amp; Techniques</a> - William Hohl</li>
</ul>
<h2 id="tools">Tools</h2>
<ul>
<li><a href="https://github.com/sashs/Ropper">Ropper</a></li>
</ul>
<h2 id="courses">Courses</h2>
<ul>
<li><a href="https://training.azeria-labs.com/">Azeria ARM
Training</a></li>
<li><a href="https://www.pentesteracademy.com/course?id=46">Pentest
Academy ARM Assembly</a></li>
<li><a href="https://www.pentesteracademy.com/course?id=49">Pentest
Academy Reverse Engineering for ARM Platforms</a></li>
<li><a href="https://ihackarm.com/">IHackArm Offensive ARM
Exploitation</a></li>
</ul>
<h2 id="related-awesome-lists">Related Awesome Lists</h2>
<ul>
<li><a
href="https://github.com/ashishb/android-security-awesome">Awesome
Android Security</a></li>
<li><a
href="https://github.com/ashishb/osx-and-ios-security-awesome">Awesome
iOS Security</a></li>
<li><a href="https://github.com/nebgnahz/awesome-iot-hacks">Awesome IoT
Hacks</a></li>
<li><a
href="https://github.com/FabioBaroni/awesome-exploit-development">Awesome
Exploit Development</a></li>
</ul>
<h2 id="contributing"><a href="CONTRIBUTING.md">Contributing</a></h2>
<p>Your contributions are always welcome!</p>