Some techniques for Binary Exploitation
Buffer Overflow
BOF with Shellcode
Return Oriented Programming (ROP)
Return to libc
Return to syscall
SigReturn Oriented Programming (SROP)
https://lamecarrot.wordpress.com/2021/06/07/return-oriented-programming-rop-gnu-linux-version/
Format String Vuln
Use after free and double free
Bypass basic protection methods
Resources
For Modern Binary Exploitation https://github.com/nnamon/linux-exploitation-course https://exploit.education/fusion/
For Kernel Exploitation https://github.com/xairy/linux-kernel-exploitation https://github.com/s0wr0b1ndef/linux-kernel-exploitation