Cool whitepaper discussing the return into libc attacks used to bypass non-executable stacks.
1ba3c2707f91d623e72b2c5a1148eab35db801819661c3567ab2521765535e5f
© 2022 Packet Storm. All rights reserved.