86 lines
9.5 KiB
Plaintext
86 lines
9.5 KiB
Plaintext
[38;5;12m [39m[38;2;255;187;0m[1m[4mAwesome ARM Exploitation[0m
|
||
|
||
[38;5;14m[1m![0m[38;5;12mAwesome[39m[38;5;14m[1m (https://cdn.rawgit.com/sindresorhus/awesome/d7305f38d29fed78fa85652e3a63e154dd8e8829/media/badge.svg)[0m[38;5;12m (https://github.com/sindresorhus/awesome)[39m
|
||
|
||
[38;5;12mA collection of awesome videos, articles, books, tools and resources about ARM exploitation.[39m
|
||
|
||
[38;2;255;187;0m[4mContents[0m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mConference Talks / Videos[0m[38;5;12m (#conference-talks--videos)[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mArticles / Papers[0m[38;5;12m (#articles--papers)[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mResources[0m[38;5;12m (#resources)[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mCTF / Training Binaries[0m[38;5;12m (#ctf--training-binaries)[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mBooks[0m[38;5;12m (#books)[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mTools[0m[38;5;12m (#tools)[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mCourses[0m[38;5;12m (#courses)[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mRelated Awesome Lists[0m[38;5;12m (#related-awesome-lists)[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mContributing[0m[38;5;12m (#contributing)[39m
|
||
|
||
[38;2;255;187;0m[4mConference Talks / Videos[0m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mExploitation on ARM[0m[38;5;12m (https://www.youtube.com/watch?v=kykVyJ0dm8Y) - Itzhak Avraham - Defcon 18 (2010)[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mARM Exploitation ROPMAP[0m[38;5;12m (https://www.youtube.com/watch?v=VDyf_tJ8IUg) - Long Le - Blackhat USA (2011)[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mAdvanced ARM Exploitation[0m[38;5;12m (https://www.youtube.com/watch?v=gdsPydfBfSA) - Stephen Ridley & Stephen Lawler - Blackhat USA (2012)[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mARM Assembly and Shellcode Basics[0m[38;5;12m (https://www.youtube.com/watch?v=BhjJBuX0YCU) - Saumil Shah - 44CON (2017)[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mHeap Overflow Exploits for Beginners (ARM Exploitation Tutorial)[0m[38;5;12m (https://www.youtube.com/watch?v=L8Ya7fBgEzU) - Billy Ellis (2017)[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mIntroduction to Exploitation on ARM64[0m[38;5;12m (https://www.youtube.com/watch?v=xVyH68HFsQU) - Billy Ellis - Codetalks (2018)[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mMake ARM Shellcode Great Again[0m[38;5;12m (https://www.youtube.com/watch?v=9tx293lbGuc) - Saumil Shah - Hack.lu (2018)[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mARM Memory Tagging, how it improves C++ memory safety[0m[38;5;12m (https://www.youtube.com/watch?v=iP_iHroclgM) - Kostya Serebryany - LLVM (2018)[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mBreaking Samsung's ARM Trustzone[0m[38;5;12m (https://i.blackhat.com/USA-19/Thursday/us-19-Peterlin-Breaking-Samsungs-ARM-TrustZone.pdf)[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mHacker Nightmares: Giving Hackers a Headache with Exploit Mitigations[0m[38;5;12m (https://www.youtube.com/watch?v=riQ-WyYrxh4) - Azeria - Virtual Arm Research Summit (2020)[39m
|
||
|
||
[38;2;255;187;0m[4mArticles / Papers[0m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mARM Assembly Basics Series[0m[38;5;12m (https://azeria-labs.com/writing-arm-assembly-part-1/) - Azeria[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mARM Binary Exploitation Series[0m[38;5;12m (https://azeria-labs.com/writing-arm-shellcode/) - Azeria[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mSmashing the ARM Stack[0m[38;5;12m (https://www.merckedsecurity.com/blog/smashing-the-arm-stack-part-1) - Mercked Security[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mIntroduction to ARMv8 64-bit Architecture[0m[38;5;12m (https://quequero.org/2014/04/introduction-to-arm-architecture/) - pnuic[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mAlphanumeric RISC ARM Shellcode[0m[38;5;12m (http://phrack.org/issues/66/12.html) - (Phrack) - Yves Younan, Pieter Philippaerts[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mReturn-Oriented Programming on a Cortex-M Processor[0m[38;5;12m (https://ieeexplore.ieee.org/document/8029521)[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1m3or ARM Exploitation Series[0m[38;5;12m (https://blog.3or.de/arm-exploitation-return-oriented-programming.html) - Dimitrios Slamaris[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mDeveloping StrongARM/Linux Shellcode[0m[38;5;12m (http://www.phrack.com/issues/58/10.html) - (Phrack) - funkysh[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mReversing and Exploiting ARM Binaries[0m[38;5;12m (http://www.mathyvanhoef.com/2013/12/reversing-and-exploiting-arm-binaries.html) - Mathy Vanhoef[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mARM Exploitation for IoT Series[0m[38;5;12m (https://quequero.org/2017/07/arm-exploitation-iot-episode-1/) - Andrea Sindoni[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mReverse Engineering of ARM Microcontrollers[0m[38;5;12m (https://rdomanski.github.io/Reverse-engineering-of-ARM-Microcontrollers/) - Rdomanski[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mARM64 Reversing and Exploitation Part 1 - ARM Instruction Set + Simple Heap Overflow[0m
|
||
[38;5;14m[1m (http://highaltitudehacks.com/2020/09/05/arm64-reversing-and-exploitation-part-1-arm-instruction-set-heap-overflow/) - HighAltitudeHacks[0m
|
||
|
||
[38;2;255;187;0m[4mResources[0m
|
||
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mARM Architecture Reference Manual[0m[38;5;12m (http://infocenter.arm.com/help/index.jsp?topic=/com.arm.doc.subset.architecture.reference/index.html)[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mOnline ARM Assembler[0m[38;5;12m (https://azm.azerialabs.com/)[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mARM TEE Reversing and Exploitation[0m[38;5;12m (https://github.com/enovella/TEE-reversing)[39m
|
||
|
||
[38;2;255;187;0m[4mCTF / Training Binaries[0m
|
||
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mExploit Me[0m[38;5;12m (https://github.com/bkerler/exploit_me)[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mExploit Challenges[0m[38;5;12m (https://github.com/Billy-Ellis/Exploit-Challenges)[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mAzeria ARM Lab[0m[38;5;12m (https://azeria-labs.com/emulate-raspberry-pi-with-qemu/)[39m
|
||
|
||
[38;2;255;187;0m[4mBooks[0m
|
||
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mPractical Reverse Engineering[0m[38;5;12m (https://www.wiley.com/en-us/Practical+Reverse+Engineering%3A+x86%2C+x64%2C+ARM%2C+Windows+Kernel%2C+Reversing+Tools%2C+and+Obfuscation-p-9781118787311) (Chapter 2) - Bruce Dang, Alexandre Gazet and Elias Bachalany[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mBeginners Guide to Exploitation on ARM[0m[38;5;12m (https://zygosec.com/book.html) - Volumes 1 & 2 - Billy Ellis[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mARM Assembly Language: Fundamentals & Techniques[0m[38;5;12m (https://www.amazon.co.uk/ARM-Assembly-Language-Fundamentals-Techniques/dp/1439806101) - William Hohl[39m
|
||
|
||
[38;2;255;187;0m[4mTools[0m
|
||
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mRopper[0m[38;5;12m (https://github.com/sashs/Ropper)[39m
|
||
|
||
[38;2;255;187;0m[4mCourses[0m
|
||
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mAzeria ARM Training[0m[38;5;12m (https://training.azeria-labs.com/)[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mPentest Academy ARM Assembly[0m[38;5;12m (https://www.pentesteracademy.com/course?id=46)[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mPentest Academy Reverse Engineering for ARM Platforms[0m[38;5;12m (https://www.pentesteracademy.com/course?id=49)[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mIHackArm Offensive ARM Exploitation[0m[38;5;12m (https://ihackarm.com/)[39m
|
||
|
||
[38;2;255;187;0m[4mRelated Awesome Lists[0m
|
||
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mAwesome Android Security[0m[38;5;12m (https://github.com/ashishb/android-security-awesome)[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mAwesome iOS Security[0m[38;5;12m (https://github.com/ashishb/osx-and-ios-security-awesome)[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mAwesome IoT Hacks[0m[38;5;12m (https://github.com/nebgnahz/awesome-iot-hacks)[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mAwesome Exploit Development[0m[38;5;12m (https://github.com/FabioBaroni/awesome-exploit-development)[39m
|
||
|
||
[38;5;14m[1m[4mContributing[0m[38;2;255;187;0m[4m (CONTRIBUTING.md)[0m
|
||
|
||
[38;5;12mYour contributions are always welcome![39m
|
||
|
||
[38;5;12marmexploitation Github: https://github.com/HenryHoggard/awesome-arm-exploitation[39m
|