How to Setup the Environment for Exploit Writing

As an infosec student, professional and practicer; you might have used many exploits during the pentesting process. But, have you ever tried writing an exploit by yourself, if not; then think about it. Writing an exploit needs deep understanding of the system/application and its flaws. Exploit is just like a piece of software that takes […]