Ş̷̦̥̹̤̦͋̌̔͒̈́̉̈́͒͛̎̈́́͊̉̾̕̚e̶̜͖̻͆͒̌̇̈̀̐͆͑͌̀͝ͅc̷̨̖̱̥̤̓̈́̄̒̕͠ŗ̶̢̝̟̱͉̠̙̜͔̣̙͖͂̈͑̍̈̈́́̄̊̎̈̊͑̕͜͝͝ȩ̴̡̧̩̞̲̩͎͙̞͕̮̲̺͙̜̠̪̭͙͂̊̉̒͌̈̂̿̏̉͑ͅt̵̨̧̨̧̧̢͔̫͇͉̞̘̥̫̥̱̞̬̩̓̽͆̒̍̑̈́͑͆̍͜͠ş̶̛͇̪̝̝͕̻̪͇̭̖̘͇̼̞͉̮̏̀̾̅̏͜͜ͅ ̸̛̛̣͌̈́̋̂̅̋̈́̃̆͐́̀̐ȧ̶̧̨̜̠̟̖̼͈̰̻̞̥̞̣̀̌ͅͅr̶̡̡̡͇̝̻̞̤̘̻̩̖̞̮͚̜͓͚̩̞͐̽͝e̸̗͕̥̰̤͖̲͔̺͉̦̣̾̊̈́̿͛̀̀̂͗͑̋͌̓ ̸̛͔̣̬͉͖̟̟̠̬͍̞͈̤̓̊̀̽̓̋̒̿̂͊m̵̢̛̮̭̗̠͕̠͔̞̺̦̖̻̩͕͓̪̝̋̎͐͌̓̔̉͛̂̊͐̈́͂͌̐́̔̓̕͠é̴̢̡̢̟̲̝̙̬̱̱̳̥̠̞̤̬̯́͜͜ḁ̶̘̞͈͈̘͕̻̬̲̟̌͌̎̋̏̕͜͝͝n̸̛̙̦͎͍̰̖̗͚̼̈́̆̊̇̈́͝t̸͙͎͓̻̰̥̭̲̯̭̼͉̺̥̻͕͎̆̉̀̏̑́̉̌͗̽ ̶̹̗̅͋̄͛͑̓͗̀̽t̴̡̰͙̣͔̣͓̮̄̔͂̍͛̋̓͐͂̽͊̓̽͆̄̑ͅơ̵̧̫̐͌̓̾̈́̑̔̀̕͘͝͝ ̶̮̉͌̊̋̂̌̄̕b̷̨̛̞̫̝͈̼̫̝̬̟̱̓̔͊̆̄̓̽̌͘ë̷̢̧̻̘̻̞͎̝̣͚͚̬͎̤͇̖͙̪͔͔̓̎̀̾̈͌̄̂̑͂̔̾̉̅͝͠ ̵̛̟͚̳͇͔͉̈̀̓̓̔͂͑̈͛̀̉͊͋̈́͑̕̕̚͘r̴͕͔̗̓̿͠ę̷̢̥̳̟̱̝̤͉͎̱͚̙̫̦̗̆̓̑̒̂̋͒͂̇̒̒̐̕͝ͅv̸̡̛͉̫̙͕̣͇͓͖̺͔̦̞̖͚͒̂̈́͗͆́̃̅͗͐ȩ̸̧̧̧̦̪̙͔̱͉̪̩̜̅̀̅̑á̵̹̣̪̺̪͉͙͍̳̪̱̌͌͆͑̏͛̏͌̅̋̈́ļ̷̢̣̗̭̮͕̹̟͉̥̗͎̠̗͍̖͋̈́̅̈͆̀̾̂̆̉̎e̴̛̛̻͂̈͌̉́̌̓̾̐̂̚d̶̩̭̝͈̖͙̭͔͎̖̄̏̇̊̏̎̏̓̓̊̌̆̀̄̅̑̒̈́́

Month November 2020

Part 1: Introduction to Exploit Development

Introduction This is the first part of my exploit development series. The first part will cover the basic things like Ideology, Mechanism behind exploits and a couple of things to keep in mind if we want to get to and… Continue Reading →

-->