# Vulnerability Discovery

- [Reverse Engineering](/breaking-bits/vulnerability-discovery/reverse-engineering.md)
- [Modern Vulnerability Research Techniques on Embedded Systems](/breaking-bits/vulnerability-discovery/reverse-engineering/modern-approaches-toward-embedded-research.md)
- [Remote Dynamic Blackbox Java App Analysis](/breaking-bits/vulnerability-discovery/reverse-engineering/remote-dynamic-blackbox-java-jar-analysis.md): Java Bytecode Debugging and Dynamic Instrumentation Through Eclipse
- [Emulation](/breaking-bits/vulnerability-discovery/emulation.md)
- [QEMU Usermode Tracing](/breaking-bits/vulnerability-discovery/emulation/qemu-usermode-tracing.md)
- [Building QEMU on Ubuntu](/breaking-bits/vulnerability-discovery/emulation/building-qemu-on-ubuntu.md)
- [Fuzzing with AFL](/breaking-bits/vulnerability-discovery/fuzzing-with-afl.md)
- [Automated Vulnerability Discovery](/breaking-bits/vulnerability-discovery/automated-exploit-development.md)
- [Buffer Overflows](/breaking-bits/vulnerability-discovery/automated-exploit-development/buffer-overflows.md): Using angr to find overflows
- [Analyzing Functions](/breaking-bits/vulnerability-discovery/automated-exploit-development/analyzing-functions.md): angr to analyze and trace functions
- [Automatic Exploit Generation](/breaking-bits/vulnerability-discovery/automatic-exploit-generation.md)
- [Automatic Rop Chain Generation](/breaking-bits/vulnerability-discovery/automatic-exploit-generation/automatic-rop-chain-generation.md)
