Files
awesome-awesomeness/html/armexploitation.html
2024-04-20 19:22:54 +02:00

145 lines
6.4 KiB
HTML
Raw Blame History

This file contains ambiguous Unicode characters
This file contains Unicode characters that might be confused with other characters. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.
<h1 id="awesome-arm-exploitation">Awesome ARM Exploitation</h1>
<p><a href="https://github.com/sindresorhus/awesome"><img
src="https://cdn.rawgit.com/sindresorhus/awesome/d7305f38d29fed78fa85652e3a63e154dd8e8829/media/badge.svg"
alt="Awesome" /></a></p>
<p>A collection of awesome videos, articles, books, tools and resources
about ARM exploitation.</p>
<h2 id="contents">Contents</h2>
<ul>
<li><a href="#conference-talks--videos">Conference Talks /
Videos</a></li>
<li><a href="#articles--papers">Articles / Papers</a></li>
<li><a href="#resources">Resources</a></li>
<li><a href="#ctf--training-binaries">CTF / Training Binaries</a></li>
<li><a href="#books">Books</a></li>
<li><a href="#tools">Tools</a></li>
<li><a href="#courses">Courses</a></li>
<li><a href="#related-awesome-lists">Related Awesome Lists</a></li>
<li><a href="#contributing">Contributing</a></li>
</ul>
<h2 id="conference-talks-videos">Conference Talks / Videos</h2>
<ul>
<li><a href="https://www.youtube.com/watch?v=kykVyJ0dm8Y">Exploitation
on ARM</a> - Itzhak Avraham - Defcon 18 (2010)</li>
<li><a href="https://www.youtube.com/watch?v=VDyf_tJ8IUg">ARM
Exploitation ROPMAP</a> - Long Le - Blackhat USA (2011)</li>
<li><a href="https://www.youtube.com/watch?v=gdsPydfBfSA">Advanced ARM
Exploitation</a> - Stephen Ridley &amp; Stephen Lawler - Blackhat USA
(2012)</li>
<li><a href="https://www.youtube.com/watch?v=BhjJBuX0YCU">ARM Assembly
and Shellcode Basics</a> - Saumil Shah - 44CON (2017)</li>
<li><a href="https://www.youtube.com/watch?v=L8Ya7fBgEzU">Heap Overflow
Exploits for Beginners (ARM Exploitation Tutorial)</a> - Billy Ellis
(2017)</li>
<li><a href="https://www.youtube.com/watch?v=xVyH68HFsQU">Introduction
to Exploitation on ARM64</a> - Billy Ellis - Codetalks (2018)</li>
<li><a href="https://www.youtube.com/watch?v=9tx293lbGuc">Make ARM
Shellcode Great Again</a> - Saumil Shah - Hack.lu (2018)</li>
<li><a href="https://www.youtube.com/watch?v=iP_iHroclgM">ARM Memory
Tagging, how it improves C++ memory safety</a> - Kostya Serebryany -
LLVM (2018)</li>
<li><a
href="https://i.blackhat.com/USA-19/Thursday/us-19-Peterlin-Breaking-Samsungs-ARM-TrustZone.pdf">Breaking
Samsungs ARM Trustzone</a></li>
<li><a href="https://www.youtube.com/watch?v=riQ-WyYrxh4">Hacker
Nightmares: Giving Hackers a Headache with Exploit Mitigations</a> -
Azeria - Virtual Arm Research Summit (2020)</li>
</ul>
<h2 id="articles-papers">Articles / Papers</h2>
<ul>
<li><a href="https://azeria-labs.com/writing-arm-assembly-part-1/">ARM
Assembly Basics Series</a> - Azeria</li>
<li><a href="https://azeria-labs.com/writing-arm-shellcode/">ARM Binary
Exploitation Series</a> - Azeria</li>
<li><a
href="https://www.merckedsecurity.com/blog/smashing-the-arm-stack-part-1">Smashing
the ARM Stack</a> - Mercked Security</li>
<li><a
href="https://quequero.org/2014/04/introduction-to-arm-architecture/">Introduction
to ARMv8 64-bit Architecture</a> - pnuic</li>
<li><a href="http://phrack.org/issues/66/12.html">Alphanumeric RISC ARM
Shellcode</a> - (Phrack) - Yves Younan, Pieter Philippaerts</li>
<li><a
href="https://ieeexplore.ieee.org/document/8029521">Return-Oriented
Programming on a Cortex-M Processor</a></li>
<li><a
href="https://blog.3or.de/arm-exploitation-return-oriented-programming.html">3or
ARM Exploitation Series</a> - Dimitrios Slamaris</li>
<li><a href="http://www.phrack.com/issues/58/10.html">Developing
StrongARM/Linux Shellcode</a> - (Phrack) - funkysh</li>
<li><a
href="http://www.mathyvanhoef.com/2013/12/reversing-and-exploiting-arm-binaries.html">Reversing
and Exploiting ARM Binaries</a> - Mathy Vanhoef</li>
<li><a
href="https://quequero.org/2017/07/arm-exploitation-iot-episode-1/">ARM
Exploitation for IoT Series</a> - Andrea Sindoni</li>
<li><a
href="https://rdomanski.github.io/Reverse-engineering-of-ARM-Microcontrollers/">Reverse
Engineering of ARM Microcontrollers</a> - Rdomanski</li>
<li><a
href="http://highaltitudehacks.com/2020/09/05/arm64-reversing-and-exploitation-part-1-arm-instruction-set-heap-overflow/">ARM64
Reversing and Exploitation Part 1 - ARM Instruction Set + Simple Heap
Overflow</a> - HighAltitudeHacks</li>
</ul>
<h2 id="resources">Resources</h2>
<ul>
<li><a
href="http://infocenter.arm.com/help/index.jsp?topic=/com.arm.doc.subset.architecture.reference/index.html">ARM
Architecture Reference Manual</a></li>
<li><a href="https://azm.azerialabs.com/">Online ARM Assembler</a></li>
<li><a href="https://github.com/enovella/TEE-reversing">ARM TEE
Reversing and Exploitation</a></li>
</ul>
<h2 id="ctf-training-binaries">CTF / Training Binaries</h2>
<ul>
<li><a href="https://github.com/bkerler/exploit_me">Exploit Me</a></li>
<li><a href="https://github.com/Billy-Ellis/Exploit-Challenges">Exploit
Challenges</a></li>
<li><a
href="https://azeria-labs.com/emulate-raspberry-pi-with-qemu/">Azeria
ARM Lab</a></li>
</ul>
<h2 id="books">Books</h2>
<ul>
<li><a
href="https://www.wiley.com/en-us/Practical+Reverse+Engineering%3A+x86%2C+x64%2C+ARM%2C+Windows+Kernel%2C+Reversing+Tools%2C+and+Obfuscation-p-9781118787311">Practical
Reverse Engineering</a> (Chapter 2) - Bruce Dang, Alexandre Gazet and
Elias Bachalany</li>
<li><a href="https://zygosec.com/book.html">Beginners Guide to
Exploitation on ARM</a> - Volumes 1 &amp; 2 - Billy Ellis</li>
<li><a
href="https://www.amazon.co.uk/ARM-Assembly-Language-Fundamentals-Techniques/dp/1439806101">ARM
Assembly Language: Fundamentals &amp; Techniques</a> - William Hohl</li>
</ul>
<h2 id="tools">Tools</h2>
<ul>
<li><a href="https://github.com/sashs/Ropper">Ropper</a></li>
</ul>
<h2 id="courses">Courses</h2>
<ul>
<li><a href="https://training.azeria-labs.com/">Azeria ARM
Training</a></li>
<li><a href="https://www.pentesteracademy.com/course?id=46">Pentest
Academy ARM Assembly</a></li>
<li><a href="https://www.pentesteracademy.com/course?id=49">Pentest
Academy Reverse Engineering for ARM Platforms</a></li>
<li><a href="https://ihackarm.com/">IHackArm Offensive ARM
Exploitation</a></li>
</ul>
<h2 id="related-awesome-lists">Related Awesome Lists</h2>
<ul>
<li><a
href="https://github.com/ashishb/android-security-awesome">Awesome
Android Security</a></li>
<li><a
href="https://github.com/ashishb/osx-and-ios-security-awesome">Awesome
iOS Security</a></li>
<li><a href="https://github.com/nebgnahz/awesome-iot-hacks">Awesome IoT
Hacks</a></li>
<li><a
href="https://github.com/FabioBaroni/awesome-exploit-development">Awesome
Exploit Development</a></li>
</ul>
<h2 id="contributing"><a href="CONTRIBUTING.md">Contributing</a></h2>
<p>Your contributions are always welcome!</p>