Course Overview

This comprehensive course covers 28 chapters divided into 7 parts, taking you from basic exploitation concepts to advanced real-world techniques. Each chapter includes hands-on labs, vulnerable programs, and detailed explanations.

📚 Part 1: Foundations

  • Introduction to Exploitation
  • Computer Architecture
  • Assembly Language
  • Debugging Techniques

🔧 Part 2: Basic Exploitation

  • Buffer Overflows
  • Stack Exploitation
  • Return-Oriented Programming
  • Shellcode Development

⚡ Part 3: Advanced Techniques

  • Heap Exploitation
  • Format String Exploitation
  • Integer Overflows
  • Race Conditions

🌐 Part 4: Modern Exploitation

  • Web Vulnerabilities
  • Browser Exploitation
  • Web Application Exploitation
  • Mobile Exploitation

🛡️ Part 5: Real-World Exploitation

  • IoT Exploitation
  • DEP/NX Bypass
  • Stack Canaries
  • Kernel Exploitation

🔬 Part 6: Advanced Topics

  • Advanced ROP Techniques
  • Advanced Heap Exploitation
  • Advanced Shellcode Development
  • Exploit Mitigation Bypass

🏆 Part 7: Competition & Real-World

  • Advanced Fuzzing Techniques
  • Exploit Development Methodology
  • Competition Exploitation
  • Real-World Exploitation

🚀 Quick Start

Get started with the course by cloning the repository and building the labs:

git clone https://github.com/rasiras/exploit-development-course.git
cd exploit-development-course
chmod +x build_all_labs.sh
./build_all_labs.sh

Each chapter contains detailed instructions, vulnerable programs, and exploitation scripts.

📖 28 Chapters

Comprehensive coverage from basics to advanced techniques

🔬 Hands-on Labs

Practical exercises with real vulnerable programs

💻 Exploitation Scripts

Ready-to-use Python exploitation frameworks

🛠️ Build Scripts

Automated compilation for all lab environments