Reversing and Exploiting with Free Tools: Part 8 | Core Labs