In this lesson, we will be discussing the parts you will need when doing: binary analysis, malware analysis, reverse engineering, and so much more.
Lesson Slides
Buffer Overflow Keygen exploit