- How can we automate the process of exploiting buffer overflow vulnerabilities in Windows?
- What can we do to avoid advanced protections being imposed by operating systems, such as disabling code execution on a stack in Windows?
- Why are registers different in Windows and in Red Hat?