
This is by no means an in-depth article on exploit types, or any information on a specific application, but more a quick guide on the methodology I generally use. There are hundreds of articles on various exploit techniques for various … Continue reading