Introduction
1.
Capture the Flag
1.1.
Find a CTF
1.2.
Find a Job
2.
Vulnerability Discovery
2.1.
Auditing Source
2.2.
Auditing Binaries
2.3.
Auditing Webapps
3.
Exploit Creation
3.1.
Binary Exploits 1
3.2.
Binary Exploits 2
3.3.
Webapp Exploits
4.
Forensics
5.
Toolkit Creation
5.1.
Toolkit Prep
6.
Operational Tradecraft
6.1.
Case Studies
Contributing
Light
Rust
Coal
Navy
Ayu
CTF Field Guide
Exploit Creation