8. Reverse Engineering
1. Binary Analysis on Linux2. Binary Analysis on a 64-bit Linux3. Binary Analysis Methodology4. Advanced Binary Analysis5. Buffer Overflow Attack on a 32-bit Machine6. Privilege Escalation via Buffer Overflow Attack7. Writing an Exploit Code on a 64-bit Machine8. ROP Fundamental Exploitation9. Exploiting Linux Kernel ROP and ROPgadget10. Reverse Engineering a Binary with Ghidra11. Reverse Engineering with Debuggers12. Fuzzing an Application with zzuf12. Identifying and Debugging Stack Buffer Overflows Using Address Sanitizer14. Fuzzing an Application with American Fuzzy Lop (AFL)15. Fuzzing an Application with American Fuzzy Lop (AFL) and Capstone Framework16. Additional Capabilities of Address Sanitizer17. Fuzzing an Application with Peach Framework