Skip to content

Latest commit

 

History

History
62 lines (57 loc) · 7.67 KB

File metadata and controls

62 lines (57 loc) · 7.67 KB

Exploit Development: Case Studies

This repository is intended as a personal list of exploit development case studies I stumble upon during my work. My categorization is not very granular — I'm skipping differentiation between user-mode and kernel-mode, as well as type of the software being exploited. Exploit primitives are what's really important, therefore the only two categories I'm using are Windows and Unix-like (including Linux, Android, MacOS, iOS, BSDs, et cetera).

Windows

Unix-like