And how modern binaries protect against attacks
And how attackers can bypass DEP to achieve code execution.
And how printing a string led to code execution?!!
And how the Heartbleed bug works!
And how a jammed laptop key led to code execution?!!
How To Patch Binaries For Hackers And Pen Testers.
Analyzing and Hacking Binaries with Ghidra.
Useful tips to up your Bash game.