Understanding memory corruption vulnerabilities and exploitation techniques.
Creating and optimizing shellcode for various platforms and architectures.
Modern exploitation techniques and bypass methods for security protections.
Gadget hunting, chain construction, stack pivoting
Information disclosure, partial overwrites
IOCTL handling, memory corruption
Token manipulation, process injection
XSS, CSRF, DOM manipulation
SQL injection, RCE, file inclusion
Essential tools for vulnerability research and exploit development.