Tutorials
- IRC
- Nessus
- Netcat
- Nmap
- Shellcode
- Buffer Overflows
- Buffer Overflows II
- Metasploit Basics
- Heap Overflows
- Format Strings
- Web Attacks
- Password Cracking
- Firewalls
- Stagers
- Password Cracking 2
- Session Hijack
- Reverse Engineering
Textbooks
- The Browser Hacker's Handbook (2014)
- The Web Application Hacker's Handbook (2011)
- The Art of Software Security Assessment (2006)
Additional Readings
- Exploiting Format String Vulnerabilities
- Heap Overflows
- XSS Cheat Sheet
- Windows Shellcode
- Buffer Overflow Detection
- Beyond Stack Smashing
- Smashing The Modern Stack For Fun And Profit
- Advanced Format String Exploitation
- Return to libc
- Advanced Return to libc Exploits
- Defeating A Non Executable Stack Patch
- Defeating Address Space Layout Randomization
- Once Upon a Free
- Vudo
- Bypassing StackShield and StackGuard
- Fixing Races for Fun and Profit
- SQL Insertion
- Metasploit 3.0 Developer’s Guide
- Metasploit Framework User Guide
- XSS with Real-time Remote Attacker Control