Exploit Development Exploit Development, Part 1: Anatomy of Buffer OverflowsExploit Development, Part 2: Writing a Simple Buffer OverflowExploit Development, Part 3: Finding Vulnerabilities by Fuzzing with Spike Buy it now! Buy it now! Buy it now!