Setting up the environment for exploit development - Deep dive into exploit writing

Published --