OrikaOrika Project
CoursesCategoriesTeam
Log inSign up

Categories

7 categories

Binary Exploitation

Try to understand how to exploit binary vulnerabilities ! - You need solid basics in C and x86/x86_64 INTEL assembly. - You must understand memory management (stack, heap, registers, calling conventions). - You should know how to quickly use a dynamic debugger. - You should understand how to work with a decompiler like IDA Pro.

4 courses

Browser Exploitation

1 course

Cryptography

Try to understand how cryptographic systems work and how they can be broken !

2 courses

Hypervisors

Try to understand how hypervisors work at the lowest level and learn to find vulnerabilities in virtualization layers.

0 courses

Reverse Engineering

Try to understand how to reverse engineer programs ! - You need solid basics in C and x86/x86_64 INTEL assembly. - You must understand memory management (stack, heap, registers, calling conventions). - You should know how to quickly use a dynamic debugger. - You should understand how to work with a decompiler like IDA Pro.

0 courses

Web Exploitation

Try to understand how to hack web applications.

5 courses

Windows

Explore the Windows ecosystem, from system internals and driver development to administration, security, and everyday power-user techniques.

1 course

OrikaOrika Project © 2026
CoursesCategoriesTeam