Banner
Post Memory Corruption Memory Analysis

In this presentation, we introduce a new exploitation methodology of invalid memory reads and writes, based on dataflow analysis after a memory corruption bug has occurred inside a running process.

http://www.slideshare.net/endrazine/ccc28c3-post-memory-corruption-memory-analysis
Post Memory Corruption Memory Analysis

Pmcma is a tool aimed at determining if a given software bug is an exploitable vulnerability by automatically writting an exploit for it.

http://www.pmcma.org/