about this course

hello, i'm anna exploits

i created grokking exploits as a free, comprehensive resource for anyone wanting to understand the intricate world of exploit development. this course is born from a simple belief: security knowledge should be accessible to everyone who wants to make the digital world safer.

why this course exists

too often, exploit development is shrouded in mystery, relegated to closed forums and expensive training programs. i wanted to change that. grokking exploits provides a low-level dissection of how exploits work—from the fundamentals of memory layout to advanced exploitation techniques.

this isn't just theory. every module is designed to give you hands-on understanding of the mechanisms that attackers use and defenders must understand. by learning how systems break, you'll be better equipped to build systems that don't.

what makes this different

grokking exploits takes a systematic approach to exploit development. we start with the absolute fundamentals and build up to advanced techniques, ensuring you understand not just the "how" but the "why" behind every exploit.

  • low-level focus: we dive deep into assembly, memory structures, and hardware behavior to understand exploits at their core.
  • practical examples: every concept is illustrated with real-world scenarios and working code you can experiment with.
  • modern techniques: learn how to bypass current security mechanisms like ASLR, DEP, and stack canaries.
  • ethical foundation: security research must be conducted responsibly. we emphasize legal and ethical considerations throughout.

who this course is for

whether you're a security researcher, penetration tester, software developer, or simply curious about how exploits work, this course will give you the knowledge you need. some programming experience is helpful, but the course is designed to be accessible to anyone willing to put in the effort to learn.

free and open

grokking exploits is and will always be free. knowledge about security shouldn't be locked behind paywalls. my hope is that by making this information accessible, we can collectively raise the bar for software security and create a generation of developers and researchers who understand these systems deeply.

get in touch

have questions, feedback, or suggestions? i'd love to hear from you. you can reach me at contact@grokkingexploits.com or follow the project on github.