- Intro to Computer Systems, Summer 2017
- Modern Binary Exploitation Spring 2015
- OpenSecurityTraining
- Stanford Computer Security Laboratory
- CS642 Fall 2014: Computer Security
- Offensive Computer Security Spring 2014
- System Security and Binary Code Analysis
- SATSMT Summer School 2011
- CS 161 : Computer Security Spring 2017
- Introduction to Computer Security Fall 2015
- 格式化字符串blind pwn详细教程
- 软件分析技术
- Compiler Design
- Optimizing Compilers
- Principles of Program Analysis
- Static Program Analysis
- CS 252r: Advanced Topics in Programming Languages
- Advanced Digital Forensics and Data Reverse Engineering
- CS261: Security in Computer Systems
- CS 161 : Computer Security Spring 2015
- Secure Software Systems Spring 2017
- CS 576 Secure Systems Fall 2014
- CS 577 Cybersecurity Lab Fall 2014
- sec-wiki
- Shellcodes database for study cases
- Corelan Team Articles
- LOW-LEVEL ATTACKS AND DEFENSES
- FuzzySecurity
- LiveOverflow
- Debugging Fundamentals for Exploit Development
- Introduction to return oriented programming (ROP)
- Smashing The Stack For Fun And Profit
- Understanding DEP as a mitigation technology part 1
- Tricks for Exploit Development
- Preventing the Exploitation of Structured Exception Handler (SEH) Overwrites with SEHOP
- From 0x90 to 0x4c454554, a journey into exploitation.
- Checking the boundaries of static analysis
- Deep Wizardry: Stack Unwinding
- Linux (x86) Exploit Development Series
- Hack The Virtual Memory
- Hacking: The Art of Exploitation, 2nd Edition by Jon Erickson
- The Shellcoder's Handbook: Discovering and Exploiting Security Holes, 2nd Edition by Chris Anley et al
- The IDA Pro Book: The Unofficial Guide to the World's Most Popular Disassembler 2nd Edition
- Practical Malware Analysis by Michael Sikorski and Andrew Honig
- Practical Reverse Engineering by Dang, Gazet, Bachaalany
- Fuzzing: Brute Force Vulnerability Discovery