A curated list of resources (books, tutorials, courses, tools and vulnerable applications) for learning about Exploit Development
- Books
- Tutorials
- Browser Exploitation
- Kernel Exploiation
- Courses
- Tools
- Vulnerable Applications
- Exploit Databases
-
Hacking - The art of exploitation
-
A bug Hunter's Diary: A Guided Tour Through the Wilds of Software Security
-
The Shellcoder's Handbook: Discovering and Exploiting Security Holes
-
Sockets, shellcode, Porting, and coding: reverse engineering Exploits and Tool coding for security professionals
-
Writing Security tools and Exploits
-
Buffer overflow attacks: Detect, exploit, Prevent
-
Metasploit toolkit for Penetration Testing, exploit Development, and vulnerability research
-
Exploiting Ken Ward Zipper : Taking advantage of payload conversion
-
Jingle BOFs, Jingle ROPs, Sploiting all the things… with Mona v2 !
- Nightmare - guyinatuxedo
- Binary Exploitation Notes
- Modern Binary Exploitation - CSCI 4968
- Windows Exploitation - Fu11Shade
-
Windows Exploit Development – Part 2: Intro to Stack Based Overflows
-
Windows Exploit Development – Part 3: Changing Offsets and Rebased Modules
-
Windows Exploit Development – Part 4: Locating Shellcode With Jumps
-
Windows Exploit Development – Part 5: Locating Shellcode With Egghunting
-
Windows Exploit Development – Part 7: Unicode Buffer Overflows
- The Browser Hacker's Handbook 1st Edition
- Awesome Browser Exploit GitHub Repo
- Exploit Development: Browser Exploitation on Windows - CVE-2019-0567, A Microsoft Edge Type Confusion Vulnerability (Part 1)
- Exploit Development: Browser Exploitation on Windows - CVE-2019-0567, A Microsoft Edge Type Confusion Vulnerability (Part 2)
- Exploit Development: Browser Exploitation on Windows - CVE-2019-0567, A Microsoft Edge Type Confusion Vulnerability (Part 3)
[TODO]