# Exploit Development

- [Linux kernel exploit development](/breaking-bits/exploit-development/linux-kernel-exploit-development.md)
- [Setup](/breaking-bits/exploit-development/linux-kernel-exploit-development/setup.md)
- [Interacting with Kernel Modules](/breaking-bits/exploit-development/linux-kernel-exploit-development/interacting-with-kernel-modules.md)
- [Kernel stack cookies](/breaking-bits/exploit-development/linux-kernel-exploit-development/stack-cookies.md)
- [Kernel Address Space Layout Randomization (KALSR)](/breaking-bits/exploit-development/linux-kernel-exploit-development/kernel-address-space-layout-randomization-kalsr.md)
- [Supervisor mode execution protection (SMEP)](/breaking-bits/exploit-development/linux-kernel-exploit-development/supervisor-mode-execution-protection-smep.md)
- [Kernel page table isolation (KPTI)](/breaking-bits/exploit-development/linux-kernel-exploit-development/kernel-page-table-isolation-kpti.md)
- [Supervisor Mode Access Prevention (SMAP)](/breaking-bits/exploit-development/linux-kernel-exploit-development/supervisor-mode-access-prevention-smap.md)
