Binary Exploitation
x86-64 Heap-Based Exploitation
Understanding glibc Internals, Use-After-Free, Tcache Poisoning, Double Free, and Heap Overflow Techniques on x86-64 Linux
FreeStart
Exploitation, reverse engineering, and low-level internals. From userland to Ring -1.
Understanding glibc Internals, Use-After-Free, Tcache Poisoning, Double Free, and Heap Overflow Techniques on x86-64 Linux
Understanding, Finding, and Exploiting Stack Buffer Overflows on x86-64 Linux
CPU Architecture, Registers, Virtual Memory, Process Layout, The Stack, The Heap, Calling Conventions, and Memory Protections