Exploit Development

This section contains articles exploring the theory, concepts, and defensive implications of modern software exploitation techniques across multiple architectures and operating systems. Each article breaks down how particular vulnerability classes work, and how an adversary would typically abuse them.