Binary Exploitation
search
⌘Ctrlk
Binary Exploitation
  • Introduction to Binary Exploitation
  • Exploit Development Toolchain
  • Understanding x86 Instructions
  • Calling Conventions
  • Reverse Engineering
  • Buffer Overflows
  • Code Reuse Attacks
    • Return Oriented Programming
    • Jump Oriented Programming
    • Pure-Call Oriented Programming
  • Format String Exploitation
  • Heap Exploitation
  • Kernel Exploitation
gitbookPowered by GitBook
block-quoteOn this pagechevron-down

Code Reuse Attacks

Return Oriented Programmingchevron-rightJump Oriented Programmingchevron-rightPure-Call Oriented Programmingchevron-right
PreviousHeap-Based Buffer Overflowschevron-leftNextReturn Oriented Programmingchevron-right

Last updated 6 years ago