Uploaded all my Offensive Security & Reverse Engineering (OSRE) course labs (docx) to my repo found below. Most of them have very detailed instructions and should be great to get you started in Software Exploitation. 1/n
#Offsec #SoftwareExploitation #RE

exploitation.ashemery.com
The only labs I did not upload, were the RE labs, because most of them were from online CrackMe(s) and from @OphirHarpaz online #RE workshop found below. 2/n

begin.re/the-workshop
There is also probably one executable that I need to find the source for it, before I add it to the repo and also once I have time maybe I'll organize it to look better!

I don't think I'll be teaching this anymore and hope they will be useful to someone out there. 3/n
Before I end; these are FREE and you can use them as-is. You are also free to use them for your own training. If you provide credit? That would be kind of you, but if you decide not to? No worries, I get the credit in another way ;)

4/n
Finally, that's all I have for 2022 and hope I make it to 2023. Thanks to everyone out there who follows this account and to all those researchers who shared their work, so people like me can learn from.

Wishing you all a better 2023!

5/n
Forgot to mention; these labs are not just good for software exploitation, but even learning about debugging & diff x86 instructions. There are some assembly quizzes which might be useful, I'll share those too. You can find them under the line saying "Labs 2022 can be found here"
URL to the course: exploitation.ashemery.com
URL to recorded videos (EN): youtube.com/playlist?list=…
URL to recorded videos (AR): youtube.com/playlist?list=…
Just in case you ask what are the Metasploit and Post-Exploitation labs doing there? They were used to help those students who did not have a background in exploitation frameworks. So if they came to my course without that or with basic info, these serve as an intro.
These two are by no means what pentesters and red teamers use today, but again, they just helped introduce the basics to those students taking this course.
I would also like to thank all those students who took this course and they had ZERO background in any of this content and they made it all the way to the top! Most if not all, did great videos, recording their process too. THANK YOU ALL, WHEREVER YOU ARE!
Did you know that there is someone selling the videos for this course on @udemy ? I'm sure he will now grab the labs and sell them too 😬

So instead of paying for it, you can get it for FREE here!
If you don't trust the person behind this account sharing docx files, which is totally fine. PLEASE upload them to any online sandbox and check them yourself.
My goal sharing the content in DOCX format, was so you can modify them the way you see fit. You are free to use them for your own training & I'm sure you'd like to do some adjustments to headers/footers/etc. Also, English is not my first language, so even that could be adjusted.
I've updated the repo and uploaded the content in PDF format. Check the "Course Files and Resources" section of the page. REMINDER: everything is FREE and you should not pay anyone for this content! #Offsec #ExploitDev #SoftwareExploitation

exploitation.ashemery.com
All the Assembly and #RE labs have now been shared. I just need to find the reference to the Crackme(s) I used and then it should be 100% complete. #Offsec #ExploitDev #SoftwareExploitation

exploitation.ashemery.com
This should be the final set of labs published publicly. That's all folks for now... #RE #Offsec #ExploitDev #SoftwareExploitation

exploitation.ashemery.com

• • •

Missing some Tweet in this thread? You can try to force a refresh
 

Keep Current with Ali Hadi | B!n@ry

Ali Hadi | B!n@ry Profile picture

Stay in touch and get notified when new unrolls are available from this author!

Read all threads

This Thread may be Removed Anytime!

PDF

Twitter may remove this content at anytime! Save it as PDF for later use!

Try unrolling a thread yourself!

how to unroll video
  1. Follow @ThreadReaderApp to mention us!

  2. From a Twitter thread mention us with a keyword "unroll"
@threadreaderapp unroll

Practice here first or read more on our help page!

More from @binaryz0ne

Dec 31, 2022
During my last #DFIR training for 2022; I did many new video recording. Some have already been added to the #CCDFA course, while others will be added very soon. The course "currently" has 55+ hands-on labs, 50+ videos, and over 40 Q&As.

Why am I saying this? 1/3
Because @cyber5w and @hexordia are both running a 30% discount on all #DFIR courses and training which ends tomorrow! Therefore, I highly recommend you take advantage of this discount and register for the #CCDFA course. 2/3
academy.cyber5w.com/courses/ccdfa-…
Check the syllabus below & you'll be surprised with what is covered in each section. Also, this is the only #DFIR course that we currently have that covers disks, volumes, and file system forensics (FAT+NTFS) #EOM

academy.cyber5w.com/courses/ccdfa-…
Read 4 tweets

Did Thread Reader help you today?

Support us! We are indie developers!


This site is made by just two indie developers on a laptop doing marketing, support and development! Read more about the story.

Become a Premium Member ($3/month or $30/year) and get exclusive features!

Become Premium

Don't want to be a Premium member but still want to support us?

Make a small donation by buying us coffee ($5) or help with server cost ($10)

Donate via Paypal

Or Donate anonymously using crypto!

Ethereum

0xfe58350B80634f60Fa6Dc149a72b4DFbc17D341E copy

Bitcoin

3ATGMxNzCUFzxpMCHL5sWSt4DVtS8UqXpi copy

Thank you for your support!

Follow Us on Twitter!

:(