OrikaOrika Project
CoursesCategoriesTeam
Log inSign up

Binary Exploitation

Try to understand how to exploit binary vulnerabilities ! - You need solid basics in C and x86/x86_64 INTEL assembly. - You must understand memory management (stack, heap, registers, calling conventions). - You should know how to quickly use a dynamic debugger. - You should understand how to work with a decompiler like IDA Pro.

4 courses available

Binary Exploitation

House of - Heap Exploitation

Every Named Heap Exploitation Technique, Explained and Exploited

$10Enroll
Binary Exploitation

x86-64 Heap-Based Exploitation

Understanding glibc Internals, Use-After-Free, Tcache Poisoning, Double Free, and Heap Overflow Techniques on x86-64 Linux

FreeStart
Binary Exploitation

x86-64 Stack-Based Buffer Overflows

Understanding, Finding, and Exploiting Stack Buffer Overflows on x86-64 Linux

FreeStart
Binary Exploitation

Computer Memory Foundations

CPU Architecture, Registers, Virtual Memory, Process Layout, The Stack, The Heap, Calling Conventions, and Memory Protections

FreeStart
OrikaOrika Project © 2026
CoursesCategoriesTeam