Posts

Introduction to The ELF Format (Part VI): The Symbol Table and Relocations (Part 2)

Windows Exploit Development : Exploiting Structured Exception Handling and ROP Chaining

Windows Exploit Development (primer II) : Corrupting Structured Exception Handling and Controlling Memory Pointers

Windows Exploit Development (primer) : Debugging Threads and Analyzing Memory