Insecure Programming By Example
A classic exploitation learning reference developed by the amazing gera from CORE Security. I was (I believe) originally pointed to this list by pusscat and kmx2600 via a blog post
that I can’t track down that you should go read, and was inspired to document it as a blog series almost-certainly by reading xorl’s blog. Many other tutorials have been written. This incomplete series is mine, written a long time ago in a gender far, far away…but still might be useful as an introduction to binary exploitation on Linux.
See the Resources section of my site for download links to the Virtual Machine images I use. There are many others that would also work.