What is best methodology for discovery vulnerability and Exploit Development in binary software?

I’m new in Exploit Development and Discovery Vulnerability. I learning some technique by some course and books.I have learned Stack Buffer Overflow and Heap Buffer Overflow and Format Strings and some bypass technique for ASLR,NX,DEP , … .
But I think its only technique and I need a methodology for best performance in discovery vulnerability in binary software.
so,what is best methodology for discovery vulnerability and Exploit Development in binary software?

Well isn’t that the million dollar question

3 Likes

I find this presentation in 2017 :
BalCCon2k17 - m-r Mane Piperevski - Methodology for Vulnerability Research and Exploit Development

if you have other resource share it.

1 Like