Would you like to delve into the arcane world of cybersecurity? You will need patience and persistence… A lot of it.

Binary Exploitation

An in-depth guide with resources to learn binary exploitation, starting from a basic buffer overflow to bypassing modern protections.

Reverse Engineering

Dive into a rabbit hole where you spend hours staring at disassembled assembly code and reverse one function after another, slowly putting it all together.

pwn.college

Intro to Cybersecurity(orange belt)

A collection of notes,references and links that might save you a few hours of time.

  • Note: Do no expect solutions here.