hack -h

A technical guide with a focus on computer security. Your walkthrough to Penetration Testing and Computer Defense.

Exploit Development

- Becoming a Technical Ninja

Environment Build - Virtual Machine Configuration

Gera’s Insecure Programming Challenges - Getting Setup

Tools - What you’ll need to start Exploit Development

Stack Warmup 1 - Basic Buffer Overflow

Stack Warmup 5a - Basic Buffer Overflow

Stack Warmup 5b - Writing Shellcode