grokking exploits
home modules about
home modules about
modules / module 01

introduction to exploit development

learn the fundamentals of exploit development, memory layout, and basic vulnerability concepts that form the foundation of security research.

01 →

what is exploit development?

understand the fundamentals of exploit development, its role in cybersecurity, and the ethical considerations involved.

02 →

memory layout fundamentals

explore how programs organize memory, including the stack, heap, data segments, and code sections.

03 →

cpu architecture basics

learn about registers, instruction sets, and how the CPU executes programs at the hardware level.

04 →

introduction to assembly language

get familiar with x86/x64 assembly language and how high-level code translates to machine instructions.

05 →

debugging tools and techniques

master essential debugging tools like GDB, WinDbg, and learn how to analyze program behavior at runtime.

06 →

common vulnerability types

survey the landscape of security vulnerabilities including buffer overflows, format strings, and use-after-free bugs.

07 →

security mitigations overview

understand modern protection mechanisms like ASLR, DEP, stack canaries, and how they defend against exploits.

08 →

setting up your lab environment

configure a safe and effective lab environment for practicing exploit development with virtual machines and tools.

← back to modules