ABCDEFGHIJKLMNOPQRSTUVWXYZ
1
VendorOffensive SecurityRet2 SystemsSANSCorelan
2
OSEDOSEEFoundations660760BootcampAdvanced
3
DisclaimerAll information is based on what can be infered from the publically available course syllabi at the time of writting.
As such, there are certainly topics that may be covered but not explictly mentioned.
Read the course descriptions yourself for a better understand of what is covered.
4
Shellcoding
5
x86 Assemblyyyy
6
x86-64 Assemblyyyyyyy
7
Windows APIyyyyyy
8
Linux Syscallsyyy
9
Constrained shellcodeyyy
10
Egghuntersyy
11
Vulnerability Classes
12
Linear Buffer Overflowyyyyyy
13
Stackyyyyy
14
Heapyyy
15
Out-of-Bounds Accessyy
16
Format-String Attacksyy
17
Double Freey
18
Use-after-Freeyyyy
19
Type Confusionyy
20
Integer Issues (Truncation/Overflow/Signedness)y
21
Double Fetchy
22
Uninitalized Memoryyy
23
Race Conditiony
24
Exploitation Techniques
25
Saved-Ret Overwriteyyyyy
26
SEH Overwrite (Win32 Only)yyy
27
Return-Oriented-Programmingyyyyyyy
28
Stack Pivotingyy
29
Heap Groomingyyy
30
Data Attacksy
31
Primitive Chainingyy
32
Object Craftingyy
33
Allocator Exploit Techniquesyy
34
Mitigation
35
DEPyyyyyyy
36
ASLR and friendsyyyyyyy
37
Stack Cookieyyy
38
Control Flow Integrityyy
39
Arbitrary Code Guardyy
40
SMEP (kernel)y
41
Vulnerability Research
42
Reverse Engineeringyyy
43
Manual Auditing/Testingyyy
44
Diffingy
45
Fuzzingyyy
46
Windows Internalsyy
47
Heap Internalsyyyy
48
Browser/JS Engine Internalsy
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100