While studying this course you would be learning how to discover vulnerabilities and write a working exploit. You will also learn about egg hunters; how they work and why we need them. You will also gain knowledge on types of shellcode and what they are designed for. At the minimum, you will learn a handful of skills and techniques to start your career into security research where you can work to discover vulnerabilities in Windows based applications working on TCP/IP. The best part of the course is that you will learn step-by-step techniques to perform vulnerability research and then start coding a working exploit for the discovered vulnerability.
This e-book contains text materials from the course.