Binary Exploitation
House of - Heap Exploitation
Every Named Heap Exploitation Technique, Explained and Exploited
$10Enroll
Exploitation, reverse engineering, and low-level internals. From userland to Ring -1.
Every Named Heap Exploitation Technique, Explained and Exploited
The foundational course for everything else on this platform. Covers the Windows kernel architecture byte by byte. Protection rings, security tokens, EPROCESS internals, system call mechanics, the kernel attack surface, and privilege escalation techniques.
Filter Bypass, CSP Evasion, Mutation XSS, Blind XSS, Prototype Pollution, DOM Clobbering, postMessage Exploitation, and Weaponised Payloads