These are collections of blog posts which have reached a critical mass and are meant to be followed in-order as a series of tutorials. Generally, the posts are self-contained, and have enough information in them for you to get started learning on your own, just by jumping in and reading the first post. If you feel like you’re missing something, have a look at the prior post in the series since they build on each-other, or check the Resources page of my site for info I use in the tutorials.
Insecure Programming By Example
A classic exploitation learning reference developed by the amazing gera from CORE Security. I was (I believe) originally pointed to this list by pusscat and kmx2600 via a blog post
that I can’t track down that you should go read, and was inspired to document it as a blog series almost-certainly by reading xorl’s blog. Many other tutorials have been written. This incomplete series is mine, written a long time ago in a gender far, far away…but still might be useful as an introduction to binary exploitation on Linux.
See the Resources section of my site for download links to the Virtual Machine images I use. There are many others that would also work.