Domain overview
This domain focuses on turning memory corruption, logic flaws and parsing failures into reliable control. The emphasis is on process, not mystique: triage, primitives, debugging, payload strategy and repeatability.
Related certification context
These tracks are strong reference points for the exploit-development side of the platform.
- OffSec OSED / EXP-301Windows user-mode exploit development and disciplined memory-corruption workflow.
- OffSec OSEE / EXP-401Advanced exploitation and high-end exploit engineering context.
Curated public references
- pwntools Documentationdocs.pwntools.com/en/stable/
- gef-legacy.readthedocs.io · Latestgef-legacy.readthedocs.io/en/latest/
- pwndbgpwndbg.re/
- Shell-Stormshell-storm.org/
- Exploit Databaseexploit-db.com/
- GitHub · longld / pedagithub.com/longld/peda
- ir0nstone.gitbook.io · Notesir0nstone.gitbook.io/notes/
Brief index
Introduction
Low-level research workflows for exploiting vulnerable programs in a controlled way.
Shell-Codes/Payloads Build Your Own (Linux Shellcoding)
Low-level research workflows for exploiting vulnerable programs in a controlled way.
Python Pentesting
Low-level research workflows for exploiting vulnerable programs in a controlled way.
Go Pentesting
Low-level research workflows for exploiting vulnerable programs in a controlled way.
Bash Pentesting
Low-level research workflows for exploiting vulnerable programs in a controlled way.
Powershell Pentesting
Low-level research workflows for exploiting vulnerable programs in a controlled way.
Ruby Pentesting
Low-level research workflows for exploiting vulnerable programs in a controlled way.
Exploit Analysis
Low-level research workflows for exploiting vulnerable programs in a controlled way.
Format String Exploitation
Low-level research workflows for exploiting vulnerable programs in a controlled way.
Building A Metasploit Exploit
Low-level research workflows for exploiting vulnerable programs in a controlled way.
Finding Opcodes
Low-level research workflows for exploiting vulnerable programs in a controlled way.
Macos Shellcoding
Low-level research workflows for exploiting vulnerable programs in a controlled way.
Windows Shellcoding
Low-level research workflows for exploiting vulnerable programs in a controlled way.
Developing Exploit Pack Exploits
Low-level research workflows for exploiting vulnerable programs in a controlled way.
Av/Edr Evasion Programming
Low-level research workflows for exploiting vulnerable programs in a controlled way.
Programming Malicious Office Macros
Low-level research workflows for exploiting vulnerable programs in a controlled way.
Ecxd - Exploit Development Certification
Turning bugs into reliable control through debugging, primitives, payloads and constraints.
Quick Reference
Low-level research workflows for exploiting vulnerable programs in a controlled way.
