first for tool usage, refere to ReverseEngineering


Tools

Radare 2

GDB-PEDA

Resources:


ROP Chains

Good demo:

Usefull paths:

/proc/sched_debug # get running processes infos (like name, pid)
/proc/[PID]/maps # map all the adresse of dependencies of a binary (like base adress, libc if used, etc...)