📚 Part 1: Foundations
Chapter 1: Introduction to Exploitation
Learn the fundamentals of exploit development and security research.
Chapter 2: Computer Architecture
Understand CPU architecture, memory layout, and execution flow.
🔧 Part 2: Basic Exploitation
Chapter 5: Buffer Overflows
Understand and exploit buffer overflow vulnerabilities.
Chapter 7: Return-Oriented Programming
Learn ROP techniques to bypass security mitigations.
⚡ Part 3: Advanced Techniques
Chapter 9: Heap Exploitation
Exploit heap-based vulnerabilities and memory corruption.
Chapter 10: Format String Exploitation
Exploit format string vulnerabilities for information disclosure.
Chapter 11: Integer Overflows
Understand and exploit integer overflow vulnerabilities.
🌐 Part 4: Modern Exploitation
Chapter 13: Web Vulnerabilities
Exploit web-based vulnerabilities and client-side attacks.
Chapter 16: Kernel Exploitation
Exploit kernel-level vulnerabilities and privilege escalation.
Chapter 17: Browser Exploitation
Exploit browser vulnerabilities and JavaScript engines.
Chapter 18: Web Application Exploitation
Exploit web application vulnerabilities and server-side issues.
Chapter 19: Mobile Exploitation
Exploit mobile application vulnerabilities on iOS and Android.
🔬 Part 5: Advanced Topics
Chapter 21: Advanced ROP Techniques
Advanced return-oriented programming and gadget chains.
Chapter 22: Advanced Heap Exploitation
Advanced heap exploitation techniques and memory manipulation.
Chapter 23: Advanced Shellcode Development
Advanced shellcode techniques and anti-detection methods.
🏆 Part 6: Competition & Real-World
Chapter 25: Advanced Fuzzing Techniques
Advanced fuzzing methodologies and automated vulnerability discovery.
Chapter 26: Exploit Development Methodology
Systematic approach to exploit development and research.
Chapter 27: Competition Exploitation
CTF challenges and competition-level exploitation techniques.