Hacking The Art of Exploitation – 2nd Edition
![](https://encryptedhacks.org/wp-content/uploads/2023/10/content-1-775x1024.webp)
Course Layout
Chapter 1: Introduction
Chapter 2: Programming
Chapter 3: Exploitation
Chapter 4: Networking
Chapter 5: Shellcode
Chapter 6: Countermeasures
Chapter 7: Cryptology
Chapter 8: Conclusion
Chapter 1: Introduction
Chapter 2: Programming
Chapter 3: Exploitation
Chapter 4: Networking
Chapter 5: Shellcode
Chapter 6: Countermeasures
Chapter 7: Cryptology
Chapter 8: Conclusion
0 Comments