binary exploitation

phoenix heap 3 - classic heap unlink attack
exploiting the infamous doug lea heap implementation, classic unlink!

phoenix final 1 - blind format string
can you do a format string attack even if you cannot see the leak ? let's see

phoenix stack 5 - stack buffer overflow
a brief write-up (and exploit) on why you should read the ***** manual