A university course repository teaching vulnerability research, reverse engineering, and binary exploitation through hands-on labs.
Modern Binary Exploitation (MBE) is an open-source university course repository that teaches practical offensive security skills. It provides a complete curriculum with lectures, labs, and a custom wargame environment for learning binary exploitation and reverse engineering. The materials cover foundational concepts like buffer overflows and shellcoding, progressing to advanced topics such as kernel exploitation and modern mitigation bypasses.
Computer science students, security enthusiasts, and developers with C/C++ and basic assembly experience who want to learn binary exploitation from scratch. It's ideal for those entering cybersecurity or preparing for CTF competitions.
MBE offers a rare, academically-structured path into binary exploitation with hands-on labs and a pre-configured learning environment. Unlike fragmented online resources, it provides a complete, progression-based curriculum developed and tested in a university setting.
Course materials for Modern Binary Exploitation by RPISEC
Open-Awesome is built by the community, for the community. Submit a project, suggest an awesome list, or help improve the catalog on GitHub.
Offers 15 lectures and 10 labs that progress systematically from basic reverse engineering to advanced kernel exploitation, as outlined in the lecture breakdown.
Provides a pre-configured Ubuntu 14.04 VM with all tools and challenges set up, allowing for immediate practical application without complex setup.
Includes lecture slides, lab source code, and setup scripts, covering topics like stack overflows, ROP chains, and ASLR bypass in detail.
Teaches practical skills such as shellcoding, heap exploitation, and mitigation bypasses, based on real vulnerability research techniques.
Based on 2015 materials and Ubuntu 14.04 32-bit, which may not reflect modern systems with updated compilers, kernels, and security mitigations.
The README admits no lecture recordings are available, and lab solutions are not provided, which can hinder self-paced learning when stuck.
Relies on a specific VM setup that may be cumbersome to configure on newer hardware or virtualization platforms, and requires manual ASLR enabling after certain labs.