Size: 2.16 GB


This course will teach you the basics of exploiting a buffer overflow vulnerability. It follows the six stages of exploit development and gives a detailed walk-through of each. Each module starts by identifying the vulnerability via fuzzing. You’ll learn both, protocol fuzzing (using Spike) and file format fuzzing (using FileFuzz). It then shows you how to create a PoC to trigger the vulnerability and convert that PoC into a working exploit.

Through this course you will get introduced to various tools such as Immunity Debugger, Mona library for Immunity Debugger, Metasploit, msfvenom, Spike, File Fuzz and much more.  This course is designed to be short and concise yet packed with practical knowledge.

Each video includes learning resources (in video) and associated files (pdf slides, fuzzing scripts, python script etc.). You can just follow along and create a working exploit. It’s that simple.  Happy hacking!

Who this course is for:

  • Students curious about ethical hacking, fuzzing, exploit development


  • Have basic knowledge of Kali Linux, Fuzzing, Assembly language, Immunity Debugger

What you’ll learn

  • Exploit Development
  • Basics of Buffer Overflow
  • Protocol and File Format Fuzzing
  • Hacking


Zippyshare Links-

Note: Comment below if you find any link dead or getting problem in downloading files.

You May Also Like

Learn web application penetration testing from 00
OAuth, OpenID & SAML Crash Course: Security for Web & Mobile
Mobile Penetration Testing – iOS Application (2020 Edition)
Categories: CoursesSecurity


Leave a Reply

Your email address will not be published. Required fields are marked *