binaryexploitation
binaryexploitation copied to clipboard
A massive documentation about binary protections, exploitation techniques, and computer architecture concepts.
Binary Exploitation
{% hint style="danger" %} This project is a work in progress. The :tools: emoji is used where work has to be done. {% endhint %}
This project aims to gather all the pwn exploitation techniques, binary protections and vulnerabilities in one place!
Keep in mind that these guides are maintained by non-omniscient security enthusiasts in their spare time. You will probably find things missing or mistakes, do not hesitate to open pull requests to fix them.
{% embed url="https://github.com/p0dalirius/binaryexploitation" %}
Feel free to contribute on the project, give feedback/suggestions or reach out to me on Twitter (@podalirius_).
Pull requests are welcome. Feel free to open an issue if you want to add other features.