1A 4-step walkthrough on Linux kernel exploitation based on CVE-2017-11176 (opens in new tab)(blog.lexfo.fr)2throwaway_77185y ago1
2Nightmare – Guided Intro to Binary Exploitation/Reverse Engineering (opens in new tab)(guyinatuxedo.github.io)246throwaway_77186y ago14