# binary-exploitation

- [32-bit Stack-based Buffer Overflow](/hackersnotes/offensive-security/code-and-process-injection/binary-exploitation/32-bit-stack-based-buffer-overflow.md)
- [64-bit Stack-based Buffer Overflow](/hackersnotes/offensive-security/code-and-process-injection/binary-exploitation/64-bit-stack-based-buffer-overflow.md)
- [Return-to-libc / ret2libc](/hackersnotes/offensive-security/code-and-process-injection/binary-exploitation/return-to-libc-ret2libc.md)
- [ROP Chaining: Return Oriented Programming](/hackersnotes/offensive-security/code-and-process-injection/binary-exploitation/rop-chaining-return-oriented-programming.md)
- [SEH Based Buffer Overflow](/hackersnotes/offensive-security/code-and-process-injection/binary-exploitation/seh-based-buffer-overflow.md)
- [Format String Bug](/hackersnotes/offensive-security/code-and-process-injection/binary-exploitation/format-string-bug.md)
