grokking exploits
home modules about
home modules about

modules

01 →

introduction to exploit development

learn the fundamentals of exploit development, memory layout, and basic vulnerability concepts that form the foundation of security research.

8 topics
02 →

buffer overflow attacks

master stack-based buffer overflows, understand shellcode injection, and learn how to bypass basic security mechanisms.

12 topics
03 →

return-oriented programming

explore advanced exploitation techniques using ROP chains to bypass modern security protections like DEP and ASLR.

10 topics
04 →

heap exploitation

dive into heap memory management, understand use-after-free vulnerabilities, and craft heap-based exploits.

15 topics
05 →

format string vulnerabilities

understand printf-family vulnerabilities, learn arbitrary write primitives, and master format string exploitation.

9 topics
06 →

advanced exploitation techniques

explore kernel exploits, race conditions, and cutting-edge exploitation methods used in modern security research.

13 topics