Automatic Exploit Generation

I get a lot of questions on Zeratoolarrow-up-right, and so this small series is designed to talk about the techniques that go into some simple automatic exploit generation.

Last updated