By the end of this course, you will have built an understanding of how the Linux kernel interoperates with glibc and the rest of the binary toolchain. This, in turn, will enlighten your understanding of how various software packages rely on the kernel and glibc to provide interfaces and services, as well as the “why” behind many of the features and idiosyncrasies of the kernel and glibc.
BYOL: Build Your Own Linux From Scratch
$3.00
Description
Size: 1.27 GB
Related products
Security , Shop
Exploit Development Student
If you are looking for the most practical way into the exploit development and software security world look no further. The Exploit Development Student Learning Path provides not only the fundamentals of Windows and Linux exploit development but also covers advanced Windows and Linux exploit development techniques, as well as anti-exploit mechanism bypasses.
Course at a glance
- Based on techniques professional …
- Based on techniques professional …
Animation & Graphics , Shop
School of Motion – Photoshop and Illustrator Unleashed
Photoshop and Illustrator are two very essential programs that every Motion Designer needs to know. By the end of this course, you’ll be able to create your own artwork from scratch with tools and workflows used by professional designers every day.
Adobe Photoshop and Illustrator are essential tools for every Motion Designer to master. Almost every Motion Graphics project out there …
Security , Shop
Elearnsecurity – Penetration Testing eXtreme v2
Course at a glance
- Obscure ways of exploitation and backdooring
- Advanced client side exploitation techniques
- Custom attack vector and payload creation
- In depth Active Directory Reconnaissance & Enumeration
- In depth analysis of Active Directory exploitation
- Stealthy lateral movement and evasion against modern defenses
- In depth analysis of critical domain infrastructure exploitation
- In depth details of common misconfigurations and weaknesses
- Details …
Security , Shop
eLearnSecurity – Web Application Penetration Testing eXtreme v2
Course at a glance
- The most advanced course on Web App Pentesting
- Based on techniques professional pentesters use
- Master advanced Web Application attacks & security tools
- In-depth Web Application Vulnerabilities analysis
- Covers XSS, SQL Injection, HTML5 and much more
- In-depth obfuscation and encoding techniques
- Bypassing filters and WAF techniques included
- Explore HTML5 and XML attacks vectors and exploits
- Explore advanced …