Exploit Development
GOT Overwrite
A simple explanation of GOT Overwrite in GDB debugger
Return To LIBC Attack (ret2libc)
A detailed explanation of ret2libc attack and how it can be used to bypass ASLR and NX bit
Buffer Overflow (ret2func)
A detailed explanation of stack buffer overflow in C programs in which we can exploit a buffer space to return anothe...
Format String Vulnerability
A detailed explanation of format string vulnerability in C programs
Exploitation with shellcode
A simple explanation on syscalls and how to craft shellcodes with specific function