Posts

Windows Exploit Development : Exploiting Structured Exception Handling and ROP Chaining

Windows Exploit Development (primer II) : Corrupting Structured Exception Handling and Controlling Memory Pointers

Windows Exploit Development (primer) : Debugging Threads and Analyzing Memory