All Courses

Exploitation, reverse engineering, and low-level internals. From userland to Ring -1.

Browser Exploitation

Browser Exploitation Foundations

JavaScript Engines, V8 Internals, Object Representation, JIT Compilation, Garbage Collection, Sandbox Architecture, and the Path to RCE

FreeStart
Binary Exploitation

x86-64 Heap-Based Exploitation

Understanding glibc Internals, Use-After-Free, Tcache Poisoning, Double Free, and Heap Overflow Techniques on x86-64 Linux

FreeStart
Binary Exploitation

x86-64 Stack-Based Buffer Overflows

Understanding, Finding, and Exploiting Stack Buffer Overflows on x86-64 Linux

FreeStart
Binary Exploitation

Computer Memory Foundations

CPU Architecture, Registers, Virtual Memory, Process Layout, The Stack, The Heap, Calling Conventions, and Memory Protections

FreeStart
Web Exploitation

Introduction to XSS

HTML/JS Context, Reflected, Stored, and DOM-Based XSS, Browser Parsing, Cookie Theft, and Defense Mechanisms

FreeStart
Web Exploitation

SQL Injection

In-Band, Blind, Out-of-Band, Error-Based, Time-Based, Union-Based, Second-Order, and WAF Bypass Techniques

FreeStart
Cryptography

XOR and Stream Ciphers

Breaking Single-Byte and Repeating-Key XOR, Stream Cipher Attacks, Nonce Reuse Exploitation, and One-Time Pad Theory

FreeStart
Cryptography

Introduction to Cryptography

The Big Picture : Vocabulary, Concepts, and Building Blocks

FreeStart
Web Exploitation

Web Application Ecosystem

Client-Server Architecture, DNS, Cookies, Sessions, Tokens, SOP, CORS, and the Browser Security Model

FreeStart
Web Exploitation

Web Foundations

Understanding HTTP, Requests, Headers, and Mechanics of the Web

FreeStart