Introduction - If you have any usage issues, please Google them yourself
The first chapter, Windows stack overflow entry under Chapter II, Windows under Chapter III of preparation of initial ShellCode, the back door of the preparation and extraction ShellCode Chapter IV heap overflow Windows under Chapter V of the use of programming code ShellCode Dafa deformation Chapter VI High ShellCode preparation Chapter VII of the technology, the discovery of vulnerabilities, analysis and use of