modules
introduction to exploit development
learn the fundamentals of exploit development, memory layout, and basic vulnerability concepts that form the foundation of security research.
8 topicsbuffer overflow attacks
master stack-based buffer overflows, understand shellcode injection, and learn how to bypass basic security mechanisms.
12 topicsreturn-oriented programming
explore advanced exploitation techniques using ROP chains to bypass modern security protections like DEP and ASLR.
10 topicsheap exploitation
dive into heap memory management, understand use-after-free vulnerabilities, and craft heap-based exploits.
15 topicsformat string vulnerabilities
understand printf-family vulnerabilities, learn arbitrary write primitives, and master format string exploitation.
9 topicsadvanced exploitation techniques
explore kernel exploits, race conditions, and cutting-edge exploitation methods used in modern security research.
13 topics