Support

  • Why OpSecX
  • Customer Support
OpSecX Navigation

OpSecX

Online Security Education Platform

Home

Shopping Cart

  • $0.00 0 items

Main Menu

  • Online Security Courses
    • View All Courses
    • Automated Mobile Application Security Assessment with MobSF
    • Android Security Tools Expert
    • XSSing JavaScript-MVC Applications
    • Cross Site Scripting (XSS) Attacks for Pentesters
    • Node.js Security: Pentesting and Exploitation
    • WebSecNinja: Lesser Known WebAttacks
    • Windows Exploit Development Megaprimer
    • Mobile Security Bundle
    • Web Security Bundle
  • Services
    • Application Security Services
    • Live Training
      • WebSecNinja 2.0 Live Edition
      • AndroSecNinja Live Edition
      • Mobile Security Framework Live Edition
      • Pentesting modern day application technology stack
  • Resources
    • Blog
    • Security Books
  • My Account
    • Log In
Return to Content

Unicode Based Exploit Development Continuation

Please purchase the course before starting the lesson.

Lesson tags: exploit development, unicode based exploit, unicode exploit
Unicode Based Exploit Development Introduction
Unicode Based Exploit Development Final Thoughts
Back to: Windows Exploit Development Megaprimer – WXP > Advanced Exploit Development in Windows

Windows Exploit Development Megaprimer – WXP

  • Previous
  • Next
  • Basics

  • Buffer Overflow Explained
  • Exploiting Buffer Overflows

  • Vanilla EIP Overwrite
  • Exploiting Vanilla EIP Overwrite
  • Eliminating Bad Character in your Exploit
  • Exploiting Buffer Overflow : Structured Exception Handler (SEH) Overwrite
  • Exploit Development with Mona.py

  • Mona.py - The Exploit Writer's Swiss Army Knife
  • Mona.py - Continuation
  • Converting Exploits to Metasploit Modules with mona.py
  • Advanced Exploit Development in Windows

  • Unicode Based Exploit Development Introduction
  • Unicode Based Exploit Development Continuation
  • Unicode Based Exploit Development Final Thoughts
  • Egg Hunter Basics
  • Writing an Exploit using Egg Hunter
  • Data Execution Prevention (DEP) Basics
  • Bypassing Data Execution Prevention (DEP) using ROP Chains

Copyright © 2024. All Rights Reserved.

OpSecX. | An OpenSecurity Initiative

Privacy Policy | Terms and Conditions | Customer Support | Security