Browser Exploitation
Browser Exploitation Foundations
JavaScript Engines, V8 Internals, Object Representation, JIT Compilation, Garbage Collection, Sandbox Architecture, and the Path to RCE
FreeStart
Hardcore courses in exploitation, reverse engineering, binary pwn, hypervisor escapes, and low-level internals. Windows, Linux, macOS.
JavaScript Engines, V8 Internals, Object Representation, JIT Compilation, Garbage Collection, Sandbox Architecture, and the Path to RCE
Every Named Heap Exploitation Technique, Explained and Exploited
Understanding glibc Internals, Use-After-Free, Tcache Poisoning, Double Free, and Heap Overflow Techniques on x86-64 Linux
Join researchers and exploit developers learning with Orika Project.