• Introduction to Exploit Development
• Buffer Overflow Types and Theory
• IDA
• BinDiff, patchdiff2
• Fuzzing Process
• Calculation Offset
• Pattern Generate
• Modify Program Execution
• Format String Vulnerability
• Heap Overflow
• Heap Spraying
• Low Fragmentation Heap
• Windows Kernel
• WinDbg
• SEH Exploit
• Egg Hunting
• Return Oriented Programming
• ROP Gadgets
• Return2lbc Method
• NX Bypass