Exploit Building

how to
Hack Like a Pro: How to Build Your Own Exploits, Part 3 (Fuzzing with Spike to Find Overflows)

how to
Hack Like a Pro: How to Build Your Own Exploits, Part 2 (Writing a Simple Buffer Overflow in C)

how to
Hack Like a Pro: How to Build Your Own Exploits, Part 1 (Introduction to Buffer Overflows)