Jump to ratings and reviews
Rate this book

From Day Zero to Zero Day: A Hands-On Guide to Vulnerability Research

Rate this book
Find security holes before the bad guys do. 

Break into the world of vulnerability research—or expand your cybersecurity specialities—and become a zero-day hunter.


Vulnerability research is one of the most effective ways to prevent zero-day attacks, making it a highly sought-after skills set in the cybersecurity realm. This book is designed to help newcomers navigate the intersection of disciplines needed to find unknown security flaws before they can be exploited. In it, author Eugene “Spaceraccoon” Lim—an award-winning white-hat hacker—presents a comprehensive roadmap of starter strategies in vulnerability research that will enable you to begin hunting zero days right away. Delving into the intricacies of code review, reverse-engineering, fuzzing, and more, Lim guides you step-by-step on how to discover real-world vulnerabilities in the wild. Even experienced researchers can benefit from Lim’s insights, expanding their toolkits and discovering new zero days along the way.

Learn how

Strategically select appropriate targets for vulnerability research
Master the art of code review and automate variant analysis
Reverse-engineer software with a focus on discovering vulnerabilities
Bootstrap fuzzing harnesses and analyze crashes
Develop exploits and proof-of-concepts

From Day Zero to Zero Day is your gateway to mastering vulnerability research—an increasingly critical domain in safeguarding our digital landscape.

342 pages, Kindle Edition

Published August 12, 2025

13 people are currently reading
45 people want to read

About the author

Eugene Lim

1 book1 follower

Ratings & Reviews

What do you think?
Rate this book

Friends & Following

Create a free account to discover what your friends think of this book!

Community Reviews

5 stars
5 (71%)
4 stars
2 (28%)
3 stars
0 (0%)
2 stars
0 (0%)
1 star
0 (0%)
Displaying 1 - 2 of 2 reviews
9 reviews
August 5, 2025
Amazing book. Easy to read for the subject matter. It should however be mentioned that this is an advanced book and does require some exsisting knowledge of sevurity concepts like buffer overflows etc. So if you don't already have a strong grasp on Computer science and cyber security concepts it might be worth reading some other fundamental books before this one.
Additionnally it is probably a good idea to be familiar with programming in c based languages and have some python scripting experince since the examples provided will be in these languages.

The book goes through the major points of vulnerability reasearch and guides you through finding vulnerabilities in vulnerable components. Don't expect to be a complete expert after reading this book. It gives insight and guides you to what topics you should dive further into. It does all it can with the ~300 pages it has.

If you are looking for resources to prepare to read this book I would reccomend:
- Hacking the art of exploitation
- Pratical malware analysis
- Some of the "Black hat" books from no starch
- A book on programming python
- And finally maybe also a book on C programming

Great book, I will for sure return and use this as a reference source in the future!
Profile Image for Sam.
57 reviews26 followers
August 24, 2025
Thorough, extensive, and genuinely insightful. Learned quite a bit about Automated Static Analysis. Will definitely be utilizing this one as a reference a lot in the future.
Displaying 1 - 2 of 2 reviews

Can't find what you're looking for?

Get help and learn more about the design.