Binary Exploitation
House of - Heap Exploitation
Every Named Heap Exploitation Technique, Explained and Exploited
$10Enroll
Exploitation, reverse engineering, and low-level internals. From userland to Ring -1.
Every Named Heap Exploitation Technique, Explained and Exploited
Understanding glibc Internals, Use-After-Free, Tcache Poisoning, Double Free, and Heap Overflow Techniques on x86-64 Linux
Understanding, Finding, and Exploiting Stack Buffer Overflows on x86-64 Linux
CPU Architecture, Registers, Virtual Memory, Process Layout, The Stack, The Heap, Calling Conventions, and Memory Protections