Fruits of Learning
search
⌘Ctrlk
Fruits of Learning
  • Overview
  • Tools & Cheatsheets
  • Hacking Methodology
  • Hands-on Practice
  • Changelog
  • Courses
    • 📦Hack The Box
    • 🕴️OffSec
      • 🦊EXP-301
        • Module 1: Windows User Mode Exploit Development: General Course Information
        • Module 2: WinDbg and x86 Architecture
        • Module 3: Exploiting Stack Overflows
        • Module 4: Exploiting SEH Overflows
        • Module 5: Introduction to IDA Pro
        • Module 6: Overcoming Space Restrictions: Egghunters
        • Module 7: Creating Custom Shellcode
        • Module 8: Reverse Engineering for Bugs
        • Module 9: Stack Overflows and DEP Bypass
        • Module 10: Stack Overflows and ASLR Bypass
        • Module 11: Format String Specifier Attack Part I
        • Module 12: Format String Specifier Attack Part II
        • Module 13: Trying Harder: The Labs
      • 🐙EXP-312
      • ⚓IR-200
      • 🐉PEN-103
      • 🐲PEN-200
      • 🛜PEN-210
      • 🔗PEN-300
      • ⚛️SEC-100
      • 🛡️SOC-200
      • 🐝TH-200
      • 🦉WEB-200
      • 🕷️WEB-300
    • 💸SANS
    • 🛡️Security Blue Team
gitbookPowered by GitBook
block-quoteOn this pagechevron-down
githubEdit
  1. Courseschevron-right
  2. 🕴️OffSecchevron-right
  3. 🦊EXP-301

Module 7: Creating Custom Shellcode

PreviousModule 6: Overcoming Space Restrictions: Egghunterschevron-leftNextModule 8: Reverse Engineering for Bugschevron-right