Skip to content

Update README.md #9

New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Open
wants to merge 1 commit into
base: main
Choose a base branch
from
Open
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
20 changes: 20 additions & 0 deletions README.md
Original file line number Diff line number Diff line change
Expand Up @@ -101,6 +101,26 @@

[Microcontroller Courses from Coursera](https://www.coursera.org/courses?query=microcontroller)

[ARM64 Blog Series - Part 1: ARM Instruction Set + Simple Heap Overflow](https://8ksec.io/arm64-reversing-and-exploitation-part-1-arm-instruction-set-simple-heap-overflow/)

[ARM64 Blog Series - Part 2: Use After Free](https://8ksec.io/arm64-reversing-and-exploitation-part-2-use-after-free/)

[ARM64 Blog Series - Part 3: A Simple ROP Chain](https://8ksec.io/arm64-reversing-and-exploitation-part-3-a-simple-rop-chain/)

[ARM64 Blog Series - Part 4: Using Mprotect() To Bypass NX Protection](https://8ksec.io/arm64-reversing-and-exploitation-part-4-using-mprotect-to-bypass-nx-protection-8ksec-blogs/)

[ARM64 Blog Series - Part 5: Writing Shellcode](https://8ksec.io/arm64-reversing-and-exploitation-part-5-writing-shellcode-8ksec-blogs/)

[ARM64 Blog Series - Part 6: Exploiting An Uninitialized Stack Variable Vulnerability](https://8ksec.io/arm64-reversing-and-exploitation-part-6-exploiting-an-uninitialized-stack-variable-vulnerability/)

[ARM64 Blog Series - Part 7: Bypassing ASLR And NX](https://8ksec.io/arm64-reversing-and-exploitation-part-7-bypassing-aslr-and-nx/)

[ARM64 Blog Series - Part 8: Exploiting An Integer Overflow Vulnerability](https://8ksec.io/arm64-reversing-and-exploitation-part-8-exploiting-an-integer-overflow-vulnerability/)

[ARM64 Blog Series - Part 9 :Exploiting An Off By One Overflow Vulnerability](https://8ksec.io/arm64-reversing-and-exploitation-part-9-exploiting-an-off-by-one-overflow-vulnerability/)

[ARM64 Blog Series - Part 10: Intro To Arm Memory Tagging Extension (MTE)](https://8ksec.io/arm64-reversing-and-exploitation-part-10-intro-to-arm-memory-tagging-extension-mte/)

# ARM Tools & Projects

[Back to the Top](https://github.com/mikeroyal/ARM-Guide#table-of-contents)
Expand Down