Preparation
New References
- https://tulpa-security.com/2017/07/18/288/
 - https://m101.github.io/binholic/2018/04/28/yet-another-osce-review.html
 - https://github.com/FabioBaroni/awesome-exploit-development
 
Summarized References
- https://aminbohio.com/study-guide-tips-offensive-security-certified-expert-osce-cracking-the-perimeter-ctp/
 
Tools
- Olly Debugger
 - WinDBG
 - Immunity Debugger with Mona
 - CFF Explorer
 - LordPE
 - DevCPP
 - nasm
 - VulnServer
 
Training
Open Security Training
- Introductory Intel x86: Architecture, Assembly, Applications, & Alliteration
 - Introduction To Software Exploits
 - Exploits 2: Exploitation in the Windows Environment
 
Exploit development
- Corelan Exploit Writing Tutorial Series
 - Exploit Writing Tutorial Part 1 – Stack Based Overflows
 - Buffer Overflows in the Microsoft Windows® Environment
 - Basic Reverse Engineering with Immunity Debugger
 
Egg hunting
- "Safely Searching Process Virtual Address Space" By Skape
 - Egg Hunters – Fuzzy Security
 - Egg Hunters – A Twist In Buffer Overflows
 
Fuzzing
- 15 Minute Guide To Fuzzing
 - SkyDogCon 2015: Fuzzing Basics – Scott M
 - An Introduction to Fuzzing: Using fuzzers (SPIKE) to find vulnerabilities
 
Practice
Bypassing exploit mitigation:
- Bypassing ASLR/DEP
 - Exploit writing tutorial part 6 : Bypassing Stack Cookies, SafeSeh, SEHOP, HW DEP and ASLR
 - Exploit Dev 101: Bypassing ASLR on Windows
 - Bypassing ASLR and DEP on Windows 7: The Audio Converter Case
 
Shellcoding:
- Exploit Writing Tutorial Part 9 – Introduction To Win32 Shellcoding
 - ShellCode By Hand
 - http://security.cs.rpi.edu/courses/binexp-spring2015/lectures/7/05_lecture.pdf
 - http://sh3llc0d3r.com/windows-reverse-shell-shellcode-i/
 
Web app security
- Web Application Pentesting – Webpwnized
 - File Inclusion Vulnerabilities
 - Guide Book on Cross Site Scripting
 - Finding vulnerabilities in Web Applications
 
AV evasion:
- https://resources.infosecinstitute.com/bypassing-antivirus/
 - https://www.youtube.com/watch?v=tBY46vs0ptE
 - https://dl.packetstormsecurity.net/papers/bypass/bypassing-av.pdf
 - https://pentest.blog/art-of-anti-detection-1-introduction-to-av-detection-techniques/
 
Practice
VulnServer Walk-throughs
CTF
- CTP Registration: http://fc4.me/