Introducing basic memory corruption techniques such as buffer overflows, format strings and heap exploitation.
Many examples taken from: https://exploit-exercises.com/
This course is about:
Walkthroughs of several CTF challenges from different areas such as reverse engineering, crypto, web, exploitation and more.
Some videos are for beginners, others are more advanced. If you don't know what CTF is, watch this introduction video.