Windows Exploit Development (primer II) : Corrupting Structured Exception Handling and Controlling Memory Pointers Posted by Keith Makan May 20, 2018 Exploit Development Memory Corruption Reverse Engineering Windows Exploit Development +