binaryexploitation icon indicating copy to clipboard operation
binaryexploitation copied to clipboard

A massive documentation about binary protections, exploitation techniques, and computer architecture concepts.

Binary Exploitation

{% hint style="danger" %} This project is a work in progress. The :tools: emoji is used where work has to be done. {% endhint %}

This project aims to gather all the pwn exploitation techniques, binary protections and vulnerabilities in one place!

Keep in mind that these guides are maintained by non-omniscient security enthusiasts in their spare time. You will probably find things missing or mistakes, do not hesitate to open pull requests to fix them.

{% embed url="https://github.com/p0dalirius/binaryexploitation" %}

Feel free to contribute on the project, give feedback/suggestions or reach out to me on Twitter (@podalirius_).

Pull requests are welcome. Feel free to open an issue if you want to add other features.