Course Overview
This comprehensive course covers 28 chapters divided into 7 parts, taking you from basic exploitation concepts to advanced real-world techniques. Each chapter includes hands-on labs, vulnerable programs, and detailed explanations.
📚 Part 1: Foundations
- Introduction to Exploitation
- Computer Architecture
- Assembly Language
- Debugging Techniques
🔧 Part 2: Basic Exploitation
- Buffer Overflows
- Stack Exploitation
- Return-Oriented Programming
- Shellcode Development
⚡ Part 3: Advanced Techniques
- Heap Exploitation
- Format String Exploitation
- Integer Overflows
- Race Conditions
🌐 Part 4: Modern Exploitation
- Web Vulnerabilities
- Browser Exploitation
- Web Application Exploitation
- Mobile Exploitation
🛡️ Part 5: Real-World Exploitation
- IoT Exploitation
- DEP/NX Bypass
- Stack Canaries
- Kernel Exploitation
🔬 Part 6: Advanced Topics
- Advanced ROP Techniques
- Advanced Heap Exploitation
- Advanced Shellcode Development
- Exploit Mitigation Bypass
🏆 Part 7: Competition & Real-World
- Advanced Fuzzing Techniques
- Exploit Development Methodology
- Competition Exploitation
- Real-World Exploitation
🚀 Quick Start
Get started with the course by cloning the repository and building the labs:
git clone https://github.com/rasiras/exploit-development-course.git
cd exploit-development-course
chmod +x build_all_labs.sh
./build_all_labs.sh
Each chapter contains detailed instructions, vulnerable programs, and exploitation scripts.
📖 28 Chapters
Comprehensive coverage from basics to advanced techniques
🔬 Hands-on Labs
Practical exercises with real vulnerable programs
💻 Exploitation Scripts
Ready-to-use Python exploitation frameworks
🛠️ Build Scripts
Automated compilation for all lab environments