Introduction

Exploit Development Technical Journal

The purpose of this gitbook is to consolidate various exploitation techniques conveniently. Each technique will have a corresponding CTF challenge to show a controlled implementation.

‌If you have any questions you can contact me via Twitter - @0xRoman1arrow-up-right

For additional recourses check out the scuffed low level stash.arrow-up-right

Last updated