Would you like to delve into the arcane world of cybersecurity? You will need patience and persistence… A lot of it.
Binary Exploitation
An in-depth guide with resources to learn binary exploitation, starting from a basic buffer overflow to bypassing modern protections.
Reverse Engineering
Dive into a rabbit hole where you spend hours staring at disassembled assembly code and reverse one function after another, slowly putting it all together.
pwn.college
Intro to Cybersecurity(orange belt)
A collection of notes,references and links that might save you a few hours of time.
- Note: Do no expect solutions here.