. . . "How to bypass exploit mitigations such as ASLR, DEP, and stack canaries." .