Posts

Windows Exploit Development (primer II) : Corrupting Structured Exception Handling and Controlling Memory Pointers

Windows Exploit Development (primer) : Debugging Threads and Analyzing Memory

Toward a critical phenomenology of closed source security