4: Ret2Win with Function Parameters (x86/x64) - Buffer Overflow - Intro to Binary Exploitation (Pwn)

Similar Tracks
5: Injecting Shellcode (Shellcraft/MSFVenom) - Buffer Overflows - Intro to Binary Exploitation (Pwn)
CryptoCat
Reverse Engineering for Beginners: How to Perform Static Analysis on any Piece of Software
ethicalPap_