Exploit Development
- Becoming a Technical Ninja
Environment Build - Virtual Machine Configuration
Gera’s Insecure Programming Challenges - Getting Setup
Tools - What you’ll need to start Exploit Development
Stack Warmup 1 - Basic Buffer Overflow
Stack Warmup 5a - Basic Buffer Overflow
Stack Warmup 5b - Writing Shellcode