Summary
We will be covering modern binary exploitation techniques involving heap vulnerabilities and strategies to get code execution.
-->
We will be covering modern binary exploitation techniques involving heap vulnerabilities and strategies to get code execution.