- Stack based buffer overflow
- Off-By-One Vulnerability
- Integer overflow
- Bypassing NX bit using chained return-to-libc
- Bypassing ASLR using return-to-plt
- Bypassing ASLR using brute-force
- Bypasing ASLR using GOT overwrite and GOT dereference
- Heap overflow using unlink
- Heap based Off-By-One
- Use after free
Source tutorials: https://sploitfun.wordpress.com/2015/06/26/linux-x86-exploit-development-tutorial-series/