basics-of-pwn My course work about basic binary exploitation. Table of Contents Memory layout of the process ELF and its key things ELF format Features of ELF Vulnerabilities types Buffer overflow Structure within the stack Exploitation Vulnerable code Stack overflow Jump to an arbitrary address Shellcode writing Exploitation NOP chain pwntools Format string vulnerability View vulnerability Format string specifiers Read arbitrary data Jump to an arbitrary address Writing in several stages Exploitation What else can you overwrite with a format string [Heap overflow] Security techniques Non-Executable Stack(NX) Address Space Layout Randomization(ASLR) Stack Canary Position Independent Executable(PIE) Relocation Read-Only(RELRO) [All five in the action] Bypass security techniques Return-to-libc(ret2libc) Return-oriented programming(ROP) Resources Links elf wiki elf pdf book x86 syscalls table x86-64 syscalls talbe gef docs gef repo gdb - unset environement pwntools docs pwntools repo stanford format-string pdf shellcode database stack canary collection of ctf binary exploitation solutions Books The Shellcoder's Handbook: Discovering and Exploiting Security Holes, 2nd Edition