-
Awesome Exploit Development: A curated list of resources (books, tutorials, courses, tools and vulnerable applications) for learning about Exploit Development
https://github.com/CyberSecurityUP/Awesome-Exploit-Development -
Yet Another Awesome Exploit Development Resources
https://github.com/FabioBaroni/awesome-exploit-development -
Pwning: Reverse Engineering / Binary Exploitation Resources
https://github.com/Tzaoh/pwning -
Getting Started with Exploit Development
https://dayzerosec.com/blog/2024/07/11/getting-started-2024.html -
Reverse Engineering Course for Windows
https://debugxp.com/posts/RECourse (Website - Recommended) | https://github.com/0xZ0F/Z0FCourse_ReverseEngineering (GitHub repository for site) -
OpenSecurityTraining2 Learning Path: Vulnerability Hunting & Exploitation
https://opensecuritytraining.info/Vulnerability%20Hunting%20%20Exploitation.html -
Debuggers 1011: Introductory WinDbg
https://p.ost2.fyi/courses/course-v1:OpenSecurityTraining2+Dbg1011_WinDbg1+2024_v1/about -
Debuggers 2011: Intermediate WinDbg
https://p.ost2.fyi/courses/course-v1:OpenSecurityTraining2+Dbg2011_WinDbg2+2021_v1/about -
Debuggers 1012: Introductory GDB
https://p.ost2.fyi/courses/course-v1:OpenSecurityTraining2+Dbg1012_IntroGDB+2024_v1/about -
Learn Python
https://learnpython.org -
Debuggers 1102: Introductory IDA | Debuggers 1102: Introductory Ghidra
https://p.ost2.fyi/courses/course-v1:OpenSecurityTraining2+Dbg1101_IntroIDA+2024_v1/about | https://p.ost2.fyi/courses/course-v1:OpenSecurityTraining2+Dbg1102_IntroGhidra+2024_v2/about -
Architecture 1001: x86-64 Assembly
https://p.ost2.fyi/courses/course-v1:OpenSecurityTraining2+Arch1001_x86-64_Asm+2021_v1/about -
Architecture 1005: RISC-V Assembly
https://p.ost2.fyi/courses/course-v1:OpenSecurityTraining2+Arch1005_IntroRISCV+2024_v1/about -
Reverse Engineering 3201: Symbolic Analysis
https://p.ost2.fyi/courses/course-v1:OpenSecurityTraining2+RE3201_symexec+2021_V1/about -
Vulnerabilities 1001: C-Family Software Implementation Vulnerabilities
https://p.ost2.fyi/courses/course-v1:OpenSecurityTraining2+Vulns1001_C-family+2023_v1/about -
Vulnerabilities 1002: C-Family Software Implementation Vulnerabilities
https://p.ost2.fyi/courses/course-v1:OpenSecurityTraining2+Vulns1002_C-family+2023_v1/about -
Debuggers 3011: Advanced WinDbg
https://p.ost2.fyi/courses/course-v1:OpenSecurityTraining2+Dbg3011_WinDbg3+2023_v1/about -
Architecture 2821: Windows Kernel Internals 2
https://p.ost2.fyi/courses/course-v1:OpenSecurityTraining2+Arch2821_Windows_Kernel_Internals_2+2023_v1/about -
Exploitation 4011: Windows Kernel Exploitation: Race Condition + UAF in KTM
https://p.ost2.fyi/courses/course-v1:OpenSecurityTraining2+Exp4011_Windows_Kernel_UAF_KTM+2023_v1/about -
Architecture 4031: Introductory coreboot
https://p.ost2.fyi/courses/course-v1:OpenSecurityTraining2+Arch4031_x86-64_RV_coreboot+2021_v1/about -
CrackMy.App: Share crackmes, solve challenges, and climb the leaderboard in the ultimate reverse engineering community
https://crackmy.app -
Reversing.Kr: A site that tests your ability to Cracking & Reverse Code Engineering
http://reversing.kr -
Exploits: Mega repository for exploit development, contains individual exploits and libraries to assist during exploitation
https://github.com/jeffssh/exploits -
Reverse Engineering 101 Workshop
https://malwareunicorn.org/workshops/re101.html#0 -
Blog dedicated to RE, Malware Analysis, and Binary Exploitation writeups and notes
https://0xresetti.github.io -
Buffer Overflows Made Easy - Part 1: Introduction - The Cyber Mentor
https://www.youtube.com/watch?v=qSnPayW6F7U -
A detailed two part video showing how they found a DNS parsing vulnerability and wrote a remote root exploit for it
https://nitter.net/pedrib1337/status/1696169136991207844?s=46 -
An Intro to x86_64 Reverse Engineering
https://nora.codes/tutorial/an-intro-to-x86_64-reverse-engineering -
Reverse Engineering Foundations
https://my.ine.com/CyberSecurity/courses/5ee596db/reverse-engineering-foundations -
Practical Reverse Engineering
https://my.ine.com/CyberSecurity/courses/eac457f2/practical-reverse-engineering -
Reverse Engineering Linux 32-bit Applications
https://my.ine.com/CyberSecurity/courses/76804caa/reverse-engineering-linux-32-bit-applications -
Reverse Engineering Win32 Applications
https://my.ine.com/CyberSecurity/courses/eecfa929/reverse-engineering-win32-applications -
Exploit Development Learning Roadmap
https://www.reddit.com/r/ExploitDev/comments/7zdrzc/exploit_development_learning_roadmap -
Collection of Exploit Writeups
https://github.com/Cryptogenic/Exploit-Writeups -
PwnCollege: Learn to Hack!
https://pwn.college -
PwnCollege YT
https://youtube.com/@pwncollege/videos -
Hacking - The Art of Exploitation (2nd Edition)
https://repo.zenk-security.com/Magazine%20E-book/Hacking-%20The%20Art%20of%20Exploitation%20(2nd%20ed.%202008)%20-%20Erickson.pdf -
Smashing The Stack For Fun And Profit
http://phrack.org/issues/49/14.html#article -
DoStackBufferOverflowGood: An intentionally vulnerable Windows program and tutorial that explains how to exploit the above program
https://github.com/justinsteven/dostackbufferoverflowgood -
Course materials for Modern Binary Exploitation
https://github.com/RPISEC/MBE -
Nightmare: Intro to Binary Exploitation / Reverse Engineering course based around CTF challenges created by GuyInATuxedo
https://github.com/hoppersroppers/nightmare -
How2Heap: A repository for learning various heap exploitation techniques
https://github.com/shellphish/how2heap -
Binary Exploitation Deep Dive: Return to LIBC (with Matt) - John Hammond
https://youtube.com/watch?v=tMN5N5oid2c
Last active
January 1, 2026 22:53
-
-
Save Cur10s1tyByt3/d23715fcb9f430536f9fa0244d84dfba to your computer and use it in GitHub Desktop.
ExploitDev Resources
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment