1. Sanitizers
2. Intro-to-fuzzing
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
.PHONY: using-gcc using-gcc-static using-clang | |
using-gcc: | |
g++-4.8 -o main-gcc -lasan -O -g -fsanitize=address -fno-omit-frame-pointer main.cpp && \ | |
ASAN_OPTIONS=symbolize=1 ASAN_SYMBOLIZER_PATH=$(shell which llvm-symbolizer) ./main-gcc | |
using-gcc-static: | |
g++-4.8 -o main-gcc-static -static-libstdc++ -static-libasan -O -g -fsanitize=address -fno-omit-frame-pointer main.cpp && \ | |
ASAN_OPTIONS=symbolize=1 ASAN_SYMBOLIZER_PATH=$(shell which llvm-symbolizer) ./main-gcc-static |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
import sys, os | |
import ctypes | |
import math | |
import struct | |
#### Ignore #### | |
EC = '\x1b[0m' | |
BOLD = '\x1b[1m' |
- Sicurezza dei sistemi e delle reti UNIMI a.a. 2015/16
- Penetration Testing: A Hands-On Introduction to Hacking -book
- Infrastructure-pentest
- The Hacker Playbook 3: Practical Guide To Penetration Testing Paperback -book
- Beginner Network Penetration Testing course
- Notes for Beginner Network Pentesting Course