Binary Exploitation
Resources
Articles
Defcon Quals: babyecho (format string vulns in gory detail) - Ron Bowes, SkullSecurity
Exploit 101 - Format Strings - Alexandre Cheron
Exploiting Format String Vulnerabilities - team teso
FAQ: The tragedy of low-level exploitation - Gynvael Coldwind
How to Learn Binary Exploitation Roadmap - Roppers Academy
Courses
CS6265: Information Security Lab - Georgia Tech
GitHub Repositories
BinExp - Linux Binary Exploitation
CTF-Workshop - Challenges for Binary Exploitation Workshop
Tools
pestudio - malware initial assessment
Websites
Binary Exploitation Notes - Andrej Ljubic
Wikipedia Articles
YouTube Playlists
Binary Exploitation / Memory Corruption - LiveOverflow
Binary Exploitation PWN101 - RazviOverflow
Last updated
Was this helpful?