Summary Capture the Flag Vulnerability Discovery Auditing Source Auditing Binaries Auditing Webapps Exploit Creation Binary Exploits 1 Binary Exploits 2 Webapp Exploits Forensics Toolkit Creation Toolkit Prep Operational Tradecraft Case Studies Contributors