Insecure Programming by example

Here you can find a collection of exercises that will help you teach yourself the art of insecure programs exploitation. It's not complete, but it's minted to open your mind. The idea is NOT to use any human help. In case you doubt it, we could exploit all but two of them, stay calm and good luck.
get them all
a friend's site with tons of info
pages pointing here
WARMING UP on STACK
#1
#2
#3
#4
#5

ADVANCED BUFFER OVERFLOWS
#1
#2
#3
#4
#5
#6
#7
#8
#9
#10

FORMAT STRINGS
#1
#2
#3
#4
#5

SIGNALS
#1
#2
#3
#4

ESOTERIC
#1
#2
#3
#4
#5

StackGuarded
#1
#2
#3
#4
#5
#6

Numeric
#1
#2
#3
#4
#5