Exploiting

Exploit mitigation techniques and defeat methods

Address space layout randomization

Non-executable stack (NX)

Stack protector (ProPolice)

Heap protector

Pointer obfuscation

Position Independent Executable

Fortify Source

RELRO

Information leakage

Tips

Linux specific

Tools

Various Papers and other Docs