exploit.courses workbook
All challenges were designed by @dobin, both the challenges and the code is open source.
- Introduction to memory layout - basic
- Introduction to memroy layout - advanced
- C buffer analysis - simple
- Introduction to shellcode development
- Function Call Convention in x86 (32bit)
- C buffer analysis - with debugging
- Simple Buffer overflow - Change local variable
- Simple Buffer overflow - redirect execution flow
- Development of a buffer overflow exploit - 32 bit
- Development of a buffer overflow exploit - 64 bit
- Development of a remote buffer overflow exploit - 64 bit
- Stack canary brute force
- Simple remote buffer overflow exploit - ASLR/DEP/64bit
- Remote buffer overflow with ROP - DEP/64bit
- Remote Buffer overflow with ROP - DEP/ASLR/64bit
- ARM 32 Bit Intro
- ARM Buffer overflow
- Heap use-after-free analysis
- Heap Exploit - MovieDB Writeup
- Azeria Labs: Introduction To Writing ARM Shellcode
- Azeria Labs: TCP Bind Shell in Assembly (ARM 32-bit)
- Azeria Labs: Process Memory and Memory Corruptions
- Azeria Labs: Stack Overflow Challenges
- Azeria Labs: Introduction To Writing ARM Shellcode
- ARM64 Introduction
- GDB Tutorial
- Linux Hardening Analysis
See LICENSE.md.