![img-work-detail-02 Linux BOF](https://bufferoverflows.net/wp-content/uploads/2018/10/img-work-detail-02.jpg)
Linux BOF
Learn how you can exploit BOF applications on Linux Operating system including the debugging tools and methods.
![img-work-detail-01 Windows BOF](https://bufferoverflows.net/wp-content/uploads/2018/10/img-work-detail-01.jpg)
Windows BOF
Experiment the art of exploiting windows based applications along with discovering handy tools and scripts can help you the exploitation process.
![img-work-detail-02 Advanced exploitations](https://bufferoverflows.net/wp-content/uploads/2018/10/img-work-detail-02.jpg)
Advanced exploitations
Learn about the techniques and methods of exploiting applications with memory restrictions enabled and the bypassing techniques including ROP stuff.
![img-work-detail-01 Red Teaming & CTF writeups](https://bufferoverflows.net/wp-content/uploads/2018/10/img-work-detail-01.jpg)
Red Teaming & CTF writeups
CTF writeups for Hackthebox and Vulnhub.
![img-work-detail-02 Coding ASM,PY](https://bufferoverflows.net/wp-content/uploads/2018/10/img-work-detail-02.jpg)
Coding ASM,PY
Learn how you can create your own fuzzing scripts using python and some advanced topics in forensics and exploit development.
![img-work-detail-01 Shellcoding](https://bufferoverflows.net/wp-content/uploads/2018/10/img-work-detail-01.jpg)
Shellcoding
Learn how you can create powerful shellcodes automatically and manually along with bypassing anti-viruses.