Linux Exploit Development - Level 0
Linux Exploit Development - ctf
| Name | Level, Description, Solution | 
| Tokyo Westerns/MMA CTF 2nd 2016: greeting | Baby, Format String + Overwrite GOT and .fini_array section, Video, Exploit | 
| DEF CON CTF Qualifier 2016: xkcd | Baby, Heartbleed, Video, Exploit | 
| DEF CON CTF Qualifier 2015: babyecho | Baby, Format string + leak memory address + bypass ASLR, Exploit | 
| CSAW CTF Qualification Round 2013: Exploitation 200 | Baby, Shellcode + leak self-implementation canary, Exploit | 
| EBCTF 2013: PWN 200 Brainfuck | Baby, ++ pointer + Underflow to get system function, Exploit | 
| X-MAS CTF 2019: Sn0wverfl0w | Easy, ret2libc with leak, Binary | 
Windows Exploit Development - Exercises from CLS Exploits
| Name | Level, Description, Solution | 
| Level 1b | Baby, Buffer Overflow overwriting random value with bypass jlcondition, Solve | 
| Level 2 | Baby, Buffer Overflow overwriting a cte value and bypass check because of strcpy, Solve | 
| Level 3 | Baby, Buffer Overflow overwriting a cte value and bypass check because of strcpy (Part 2), Solve | 
| Level 4 | Baby, Bypass check with strcpy and overflow, Solve | 
| Level 5 | Baby, Heap allocation and bypass Anti-Debugging, Solve | 
| Level 6 | Baby, Overflow for using strcat string concatenate + flag decision, Solve | 
| Level 7 | Baby, Overwrite RET with memory address to win |