- awesome-ctf - A curated list of CTF frameworks, libraries, resources and softwares
- pwndbg - a collection of python that makes debugging with gdb suck less; a PEDA replacement
- pwntools - CTF framework and exploit development library
- malloc.c -
malloc()
implementation in glib-2.23 (as found in Ubuntu 16.04.1 LTS) - how2heap - Awesome collection of various heap exploitation techniques
- fastbin fever - Explanation of the consolidation of fastbin chunks
- Understanding the heap by breaking it (pdf) - A Black Hat 07 presentation
- X86 EXPLOITATION 101: HEAP OVERFLOWS… UNLINK ME, WOULD YOU PLEASE? - An overview of heap exploitation and little bit of history
- Reversing My Life (Chinese) - AngelBoy's blog on advanced heap exploitation
- X86 EXPLOITATION 101: “HOUSE OF FORCE” – JEDI OVERFLOW - Exploiting the top (wilderness) chunk
- MallocInternals - Overview of Malloc techniques
- Return-Oriented Programming: Exploits Without Code Injection (Black Hat 2008)
- Bypassing non-executable-stack during exploitation using return-to-libc
- Introduction to return oriented programming
- Framing Signals—A Return to Portable Shellcode (Original paper)
- Playing with signals : An overview on Sigreturn Oriented Programming
- Sigreturn-oriented programming and its mitigation
- Presentation by angelboy
- X86 EXPLOITATION 101: “FORMAT STRINGS” – I’LL TELL YA WHAT TO SAY
- Exploiting Format String Vulnerabilities - A 2001 paper on this topic