Writing a ret2libc exploit on a protected binary that prevents the use of execve syscall
A detailled journey pwning a x86 32-bit ELF binary
Instead of buying a laptop, you can choose building what we call a Small Form Factor PC if it suits your needs.
A guide to implement a robust traceroute program