📚 Part 1: Foundations

Chapter 1: Introduction to Exploitation

Learn the fundamentals of exploit development and security research.

Chapter 2: Computer Architecture

Understand CPU architecture, memory layout, and execution flow.

Chapter 3: Assembly Language

Master x86 assembly language for exploit development.

Chapter 4: Debugging Techniques

Learn debugging tools and techniques for exploit development.

🔧 Part 2: Basic Exploitation

Chapter 5: Buffer Overflows

Understand and exploit buffer overflow vulnerabilities.

Chapter 6: Stack Exploitation

Master stack-based exploitation techniques.

Chapter 7: Return-Oriented Programming

Learn ROP techniques to bypass security mitigations.

Chapter 8: Shellcode Development

Create and optimize shellcode for various platforms.

⚡ Part 3: Advanced Techniques

Chapter 9: Heap Exploitation

Exploit heap-based vulnerabilities and memory corruption.

Chapter 10: Format String Exploitation

Exploit format string vulnerabilities for information disclosure.

Chapter 11: Integer Overflows

Understand and exploit integer overflow vulnerabilities.

Chapter 12: Race Conditions

Exploit race conditions and timing vulnerabilities.

🌐 Part 4: Modern Exploitation

Chapter 13: Web Vulnerabilities

Exploit web-based vulnerabilities and client-side attacks.

Chapter 14: DEP/NX Bypass

Bypass Data Execution Prevention and NX protections.

Chapter 15: Stack Canaries

Bypass stack canary protections in modern binaries.

Chapter 16: Kernel Exploitation

Exploit kernel-level vulnerabilities and privilege escalation.

Chapter 17: Browser Exploitation

Exploit browser vulnerabilities and JavaScript engines.

Chapter 18: Web Application Exploitation

Exploit web application vulnerabilities and server-side issues.

Chapter 19: Mobile Exploitation

Exploit mobile application vulnerabilities on iOS and Android.

Chapter 20: IoT Exploitation

Exploit vulnerabilities in Internet of Things devices.

🔬 Part 5: Advanced Topics

Chapter 21: Advanced ROP Techniques

Advanced return-oriented programming and gadget chains.

Chapter 22: Advanced Heap Exploitation

Advanced heap exploitation techniques and memory manipulation.

Chapter 23: Advanced Shellcode Development

Advanced shellcode techniques and anti-detection methods.

Chapter 24: Exploit Mitigation Bypass

Bypass modern exploit mitigations and security protections.

🏆 Part 6: Competition & Real-World

Chapter 25: Advanced Fuzzing Techniques

Advanced fuzzing methodologies and automated vulnerability discovery.

Chapter 26: Exploit Development Methodology

Systematic approach to exploit development and research.

Chapter 27: Competition Exploitation

CTF challenges and competition-level exploitation techniques.

Chapter 28: Real-World Exploitation

Real-world exploitation scenarios and production system vulnerabilities.