Skip to main content

ECDX - Exploit Development Student


ECDX - Exploit Development Student from the popular eLearnSecurity Institute and INE is an Exploit Development training at the beginner level. Prerequisites for this course Completion of the eJPT courseIs. The eCXD course is a hands-on course with many examples of exploit development for both Windows and Windows operating systems. In this course, you will not only learn the basics but also the important Windows and Linux exploration techniques. You will also learn how to bypass anti-exploitation technologies such as antivirus. In this course you will gain an in-depth understanding of topics such as Software Debugging, Shellcoding, Windows and Linux exploration, how to search for Zero Day vulnerabilities, bypassing modern anti-exploitation technologies, and work. With Immunity Debugger, x32dbg, Mona, Pwntools, GDB, Ropper software. 

  • Course prerequisites
  • Completion of the eJPT course
  • Course specifications
  • Course level: Beginner
  • Time: 18 hours and 48 minutes
  • Includes: ‌ 6 videos | 19 laboratories | ‌ 31 slides
  • Professor: Lukasz Mikula
  • ECXD Course Content - Exploit Development Student
  •  Linux Exploit Development
  • Linux Stack Smashing
  • Linux Exploit Countermeasures & Bypasses
  • Linux Return Oriented Programming
  • Linux Shellcoding
  • Linux Advanced Exploitation
  • Windows Exploit Development
  • Windows Stack Smashing
  • Windows SEH-based Overflows
  • Windows Egghunting
  • Unicode Buffer Overflows
  • Windows Shellcoding
  • Windows Return Oriented Programming


Link to Download

Related links

Comments

Popular posts from this blog

9774 hash passwords

blake2b-256(jade41) blake2b-256(jade420) blake2b-256(jade429) blake2b-256(jade44) blake2b-256(jade456) blake2b-256(jade4ever69) blake2b-256(jade50) blake2b-256(jade5264) blake2b-256(jade555) blake2b-256(jade5565) blake2b-256(jade69) blake2b-256(Jade69) blake2b-256(jade98) blake2b-256(jadebaby11121) blake2b-256(jadebink) blake2b-256(jadeblue) blake2b-256(jadecape) blake2b-256(jadeck) blake2b-256(jadeclub) blake2b-256(jaded) blake2b-256(jaded1) blake2b-256(jaded2) blake2b-256(jaded69) blake2b-256(jadedbaby) blake2b-256(jadedd) blake2b-256(jadedragonflower) blake2b-256(jadeds) blake2b-256(jadeduck) blake2b-256(jadeee) blake2b-256(jadeeeee) blake2b-256(jadefox) blake2b-256(jadehungder) blake2b-256(jadejade) blake2b-256(jadejord) blake2b-256(jadejs) blake2b-256(jadeland) blake2b-256(jadelilly) blake2b-256(jadelugo) blake2b-256(jadelyn) blake2b-256(jadelynn) blake2b-256(jadelynp) blake2b-256(jaden) blake2b-256(jaden0) blake2b-256(jaden1) blake2b-2...

The Base Blockchain Airdrop: Hidden Opportunities You Don’t Want to Miss!

The Base blockchain, supported by Coinbase, is making waves in the crypto space with its surging Total Value Locked (TVL) and potential airdrop opportunities. In this article, we'll dive deep into Base's ecosystem, its key protocols, and strategies for maximizing potential rewards. We'll also explore SynFutures, a standout perpetual protocol, and other exciting opportunities that could set the stage for a lucrative airdrop. Base Blockchain: A Rising Star Current Status Base has climbed to the sixth position among blockchains in terms of TVL, surpassing even Arbitrum, the long-time leader in Ethereum Layer 2 solutions. With $4 billion+ in TVL , Base's rapid growth is drawing attention from the crypto community. Why the Excitement Around a Potential Airdrop? Coinbase Backing: As a leading exchange, Coinbase's involvement ensures credibility and innovation. Changing Regulations: With evolving regulatory clarity, there's renewed optimism for potential rewards lik...

5849 hash passwords

sha3-224(080394m) sha3-224(080395) sha3-224(080395n) sha3-224(080396) sha3-224(080397) sha3-224(080398) sha3-224(080399) sha3-224(080399tujh) sha3-224(0803jp) sha3-224(0803ma) sha3-224(0804) sha3-224(08040) sha3-224(080400) sha3-224(080401) sha3-224(080402) sha3-224(080403) sha3-224(080404) sha3-224(080405) sha3-224(080406) sha3-224(080407) sha3-224(080408) sha3-224(08040804) sha3-224(080410) sha3-224(080419) sha3-224(08041931) sha3-224(08041934) sha3-224(08041939) sha3-224(08041942) sha3-224(08041946) sha3-224(08041947) sha3-224(08041948) sha3-224(08041949) sha3-224(08041950) sha3-224(08041951) sha3-224(08041952) sha3-224(08041953) sha3-224(08041954) sha3-224(08041955) sha3-224(08041956) sha3-224(08041957) sha3-224(08041958) sha3-224(08041959) sha3-224(08041960) sha3-224(08041961) sha3-224(08041962) sha3-224(08041963) sha3-224(08041964) sha3-224(08041965) sha3-224(08041966) sha3-224(08041967) sha3-224(08041968) sha3-224(08041969) sh...