Here will include tutorials on the exploitation of applications on x86-32 Linux systems.
The focus here is to teach how to do exploit research in a manual way from beginning to end, meaning that I will try to avoid using tools developed by other people as much as possible and show how to develop the tools required for the detection and exploitation of a vulnerability. Obviously though there are still tools that will need to be used, for instance developing a debugger from stratch would be completely unnecessary and a waste of time, but being able to write your own shellcode and exploits as well as fuzzer scripts is very important to being a good hacker.
The tutorials will get progressively more difficult as protections are enabled and more difficult types of exploitation techniques are explored. The initial focus will be stack based vulnerabilities with protections disabled but protections and heap based vulnerabilities will be looked at after.