In this second video, we'll be re-using the stack-based-overflow exploit from the first tutorial along with the Windows 11 x64 environment it was developed for. By the end of the tutorial, you will have learned: What jump code is, When and how to use jump code, How do develop custom jumpcode, Flow of exploitation depending on jump operations. We'll also be using tools such as WinDBG and mona.py throughout the process - all based on the original Corelan workflow, but using modern systems and tooling.