Heap vulnerabilities have dominated the interest of the security research community for quite long time due to their potential of finding innovative exploitation ways. Starting
Read MorePhoto by Marek Studzinski on Unsplash In this article, I will be talking about the Endianness structure and the exploit development process. Endianness refers to the order in w
Read More