Linux Binary Exploitation
A description of the "House of Corrosion" GLIBC heap exploitation techni...
ArcHeap: Automatic Techniques to Systematically Discover New Heap Exploi...
My solutions to some CTF challenges and a list of interesting resources ...