Skip to main content

Book - The path of exploit development

· One min read
Strider

A long time ago, during my studies in informatics, I began writing shellcodes and creating binary exploits for various CTFs. I made notes along the way and considered compiling them into cheatsheets. Eventually, I consolidated all these notes into a book. I thought about to publish it on Amazon but, nahhh... I decided to let it on my drive, till now. I think it's time to just load this book on my site an maybe someone reads this book. May it helps someone to understand binary exploitation a bit.

info

This book is only about linux based exploit development

Topics are covered

  • Buffer overflow
  • Ret2Libc
  • ROP-Chain
  • Off-by-One
  • Shellcode Alchemy
  • Format-String
  • Integer Overflow/Underflow
  • Metasploit-Development

Have Fun 😃

Book cover

Download this Book