Hey everyone 👋
I’m currently learning Binary Exploitation and related security concepts over the next few months, and this repository is my public learning log.
Everything I learn from basics to advanced techniques—will be documented here in a structured way.
- What this repo contains
- Lab Structure
- Goal of this repo
- Getting Started
- Progress
- Contributing
- Disclaimer
- Step-by-step learning notes on Binary Exploitation
- Practical examples and vulnerable programs
- Free hands-on labs created by me
- Writeups for each challenge
- Exploitation techniques explained in a simple way
For every topic, you will find:
- 3 custom challenges (Easy → Medium → Hard)
- Source code of vulnerable programs
- Setup instructions
solution.mdexplaining the exploitation step-by-step
You are expected to set up the lab environment yourself before solving the challenges.
This repo is meant to help learners:
- Understand how vulnerabilities actually work
- Practice exploitation in a safe environment
- Build intuition for real-world security bugs
- Improve problem-solving in CTF-style scenarios
-
Clone the repository:
git clone https://github.com/alhamrizvi-cloud/Binary-Exploitation.git cd Binary-Exploitation -
Set up your environment (GCC, GDB, etc.)
-
Start with the basics in
01. Basics.md
I’ll keep updating this repo regularly as I learn new concepts like:
- Stack-based exploitation
- Buffer overflows
- Format string bugs
- Return-oriented programming (ROP)
- Linux exploitation basics
Contributions are welcome! If you find any issues or have suggestions:
- Open an issue
- Submit a pull request
- Share your solutions or improvements
Feel free to follow along, fork the repo, and learn with me.
If you're also learning, you can try solving the challenges and compare approaches.
All content in this repository is strictly for educational purposes only.
Do not use these techniques on real systems without proper authorization.
Let’s learn binary exploitation step by step 🔥