📔
Cyber Security Notes
Ctrlk
  • Introduction
  • CVEs
  • Paper Reviews
  • Large Language Models
  • Security Basics Notes
  • Enumeration and Initial Compromise
  • Post Exploitation
  • Port Forwarding Cheatsheet
  • Powershell Essentials
  • Application Security
  • Linux 64-bit Assembly
    • GDB Basics
      • My relevant GDB cheatsheet
      • Task 1 - Tamper strcmp logic
      • Breakpoints
      • Always starting with intel flavor
      • GDB TUI Mode
    • Basic Hello World Program
    • Registers in 64-bit
    • global directive
    • Reducing instructions and Removing NULL-> Optimizing memory in Assembly
    • Data Types
    • Endianness
    • Moving Data
    • push, pop, and the stack
    • Analysis - Writing data on memory location and referencing
    • Arithmetic Operations
    • Bitwise Logical Operations
    • Bit-Shifting Operations
    • Control Instructions
    • Loops
    • Procedures
    • Stack-Frames and Procedures
    • String Operations
    • Shellcoding basics
  • Cloud Security
  • API Security
  • Reverse Engineering
  • CTF Challenge Learnings
  • Applied Cryptography
  • Tools for everything
  • Openssl
Powered by GitBook
On this page

Was this helpful?

  1. Linux 64-bit Assembly

GDB Basics

My relevant GDB cheatsheetTask 1 - Tamper strcmp logicBreakpointsAlways starting with intel flavorGDB TUI Mode
PreviousLinux 64-bit AssemblyNextMy relevant GDB cheatsheet

Last updated 1 year ago

Was this helpful?