This repository contains structured notes, labs, research studies, secure coding playbooks, and the certificate of completion for the “Vulnerabilities 1001: C-Family Software Implementation Vulnerabilities” course by OpenSecurityTraining2.
- 📝
01-introduction.md– Course intro & foundations - 📝
02-buffer-overflow.md– Stack buffer overflow concepts - 📝
03-format-string.md– Format string attacks - 📝
04-integer-overflow.md– Integer overflow vulnerabilities - 📝
05-use-after-free.md– UAF & dangling pointers - 📝
06-heap-exploitation.md– Heap exploitation techniques - 📝
07-rop-jop.md– Return/Jump Oriented Programming - 📝
08-mitigations.md– Modern exploit mitigations - 📝
09-case-studies.md– Real-world cases
- 💻
lab-buffer-overflow.md– Practical buffer overflow lab - 💻
lab-format-string.md– Format string exploitation lab - 💻
lab-uaf.md– Use-After-Free lab exercise
- ✅
secure-coding.md– Secure coding guidelines - ✅
detection-response.md– Detection & response guide
- 📄
case-studies.md– Case studies of famous exploits - 📄
real-world-exploits.md– Exploits in the wild - 📄
timeline.md– Vulnerability exploitation timeline
- 📘
overview.md– Course overview & objectives - 📘
syllabus.md– Full syllabus - 📘
roadmap.md– Learning roadmap - 📘
glossary.md– Terminology & definitions - 📘
references.md– References & resources
| Section | Screenshot |
|---|---|
| 📚 Course | ![]() |
| 💬 Discussions | ![]() |
📄 Vulnerabilities 1001: C-Family Software Implementation Vulnerabilities
The Vulnerabilities 1001 course is a deep dive into how software bugs in C-family languages (C, C++, etc.) evolve into full-blown vulnerabilities.
- ✅ Well-structured with both theory and labs.
- ✅ Explains not only “how” an exploit works but also the historical context and mitigation evolution.
- ✅ Practical labs make abstract concepts tangible.
⚠️ Requires solid C programming background to fully follow.
👉 Overall, this course is highly recommended for anyone serious about binary exploitation and secure software development.
Thành Danh – Red Team Learner & Security Researcher
-
GitHub: @ngvuthdanhh
-
Email: ngvu.thdanh@gmail.com
This project is licensed under the terms of the MIT License.
See LICENSE for full details.
© 2025 ngvuthdanhh. All rights reserved.



