Reversing and Exploiting with Free Tools: Part 4 | Core Security

https://www.coresecurity.com/blog/reversing-and-exploiting-free-tools-part-4