Posts

Windows Exploit Development (primer II) : Corrupting Structured Exception Handling and Controlling Memory Pointers