
Linux 32-bit Reverse Engineering
Linux 32-bit Reverse Engineering
Intermediate
5( 78 Reviews )
5 hrs 48 mins
Security Architecture and Operations
Perform real world reverse engineering on Linux 32-bit executables and develop buffer overflow, heap overflow, format string, and kernel exploits.
Perform real world reverse engineering on Linux 32-bit executables and develop buffer overflow, heap overflow, format string, and kernel exploits.
Upgrade to Pro +
Gain hands-on experience, enhance your expertise, and achieve mastery in cybersecurity with our Pro plans.
Reviews
5
78 reviews
Average Course Rating
5 stars
64%4 stars
35%3 stars
0%2 stars
1%1 stars
0%Related Courses
Short Course

CCNA - Understanding Routers and Switches
Security Architecture and Operations
A comprehensive guide to understanding the in-depth functioning of routers and switches for the preparation of CCNA Exam.
Short Course

CISSP Certification Domains 5, 6, 7, and 8 Video Training
Cybersecurity
This course is ideal for individuals who desire to pass the Information Systems Security Professional CISSP Certification Exam and want to gain more insight and knowledge around IT, Information, and Cyber Security from a management/senior leader perspective.
Short Course

Curso Completo de Hacking Ético y Pentest con Metasploit - Spanish
Cybersecurity
Domina Metasploit y técnicas de hacking ético: vulnerabilidades, explotación y creacion de malware ¡Desde 0 a experto!
Short Course

Cybersecurity Strategies for Banks and NBFCs
Cybersecurity
Essential Strategies to Protect Banks and NBFCs from Hackers, Data Breaches, and Cybercrime