Contents:
1. Modifying Windows Programs
2. Command Injection
3. Exploiting Linux Vulnerabilities
4. Exploiting Windows Vulnerabilities
1. Modifying Windows Programs
2. Command Injection
3. Exploiting Linux Vulnerabilities
4. Exploiting Windows Vulnerabilities