Exploit Development
Security & Hacking
exploit development
buffer overflow
shellcode
vulnerabilities
defensive
Exploit development involves creating code that takes advantage of vulnerabilities. Learn buffer overflows, shellcode, and defensive techniques. (For defensive security purposes only.)
Related Concepts
Reverse Engineering
Reverse engineering involves analyzing software or hardware to understand how it works. Used for security research, malware analysis, and learning.
Penetration Testing
Penetration testing simulates attacks to find security weaknesses. Learn tools, methodologies, and how to conduct professional security assessments.
More Security & Hackings
Ethical Hacking
Black Hat Hacker
Reverse Engineering
Shell Scripting
Cryptography
Cybersecurity
CTF (Capture The Flag)
Digital Forensics
Security Auditing
Linux
Command Line
System Administration
Penetration Testing
Honeypot
Network Security
Vulnerability Assessment
White Hat Hacker
Malware Analysis
Bug Bounty
Web Security