My course work about basic binary exploitation.
- Memory layout of the process
- ELF and its key things
- Vulnerabilities types
- Buffer overflow
- Stack overflow
- Format string vulnerability
- [Heap overflow]
- Security techniques
- Bypass security techniques
| Name | Name | Last commit date | ||
|---|---|---|---|---|
 |  | |||
 |  | |||
 |  | |||
 |  | |||
 |  | |||
My course work about basic binary exploitation.