1. Introduction
  2. 1. Capture the Flag
    1. 1.1. Find a CTF
    2. 1.2. Find a Job
  3. 2. Vulnerability Discovery
    1. 2.1. Auditing Source
    2. 2.2. Auditing Binaries
    3. 2.3. Auditing Webapps
  4. 3. Exploit Creation
    1. 3.1. Binary Exploits 1
    2. 3.2. Binary Exploits 2
    3. 3.3. Webapp Exploits
  5. 4. Forensics
  6. 5. Toolkit Creation
    1. 5.1. Toolkit Prep
  7. 6. Operational Tradecraft
    1. 6.1. Case Studies
  8. Contributing

CTF Field Guide

Toolkit Creation