- Set of binary exploitation example problems and solutions listed in an order that I've found to be educational
- Based on the result of
pwn checksec <binary>
, you can determine what exploit what might be needed.- No Protections: Stack-Based Buffer Overflow
- NX Stack: ret2libc
- NX & ASLR: ret2plt & rop