课程
站点
文章
书籍
Intro to Computer Systems, Summer 2017
Modern Binary Exploitation Spring 2015
OpenSecurityTraining
Stanford Computer Security Laboratory
CS642 Fall 2014: Computer Security
Offensive Computer Security Spring 2014
System Security and Binary Code Analysis
SATSMT Summer School 2011
CS 161 : Computer Security Spring 2017
Introduction to Computer Security Fall 2015
格式化字符串blind pwn详细教程
软件分析技术
Compiler Design
Optimizing Compilers
Principles of Program Analysis
Static Program Analysis
CS 252r: Advanced Topics in Programming Languages
Advanced Digital Forensics and Data Reverse Engineering
CS261: Security in Computer Systems
CS 161 : Computer Security Spring 2015
Secure Software Systems Spring 2017
CS 576 Secure Systems Fall 2014
CS 577 Cybersecurity Lab Fall 2014
sec-wiki
Shellcodes database for study cases
Corelan Team Articles
LOW-LEVEL ATTACKS AND DEFENSES
FuzzySecurity
LiveOverflow
Debugging Fundamentals for Exploit Development
Introduction to return oriented programming (ROP)
Smashing The Stack For Fun And Profit
Understanding DEP as a mitigation technology part 1
Tricks for Exploit Development
Preventing the Exploitation of Structured Exception Handler (SEH) Overwrites with SEHOP
From 0x90 to 0x4c454554, a journey into exploitation.
Checking the boundaries of static analysis
Deep Wizardry: Stack Unwinding
Linux (x86) Exploit Development Series
Hack The Virtual Memory
Hacking: The Art of Exploitation, 2nd Edition by Jon Erickson
The Shellcoder's Handbook: Discovering and Exploiting Security Holes, 2nd Edition by Chris Anley et al
The IDA Pro Book: The Unofficial Guide to the World's Most Popular Disassembler 2nd Edition
Practical Malware Analysis by Michael Sikorski and Andrew Honig
Practical Reverse Engineering by Dang, Gazet, Bachaalany
Fuzzing: Brute Force Vulnerability Discovery
Last updated 3 years ago