Useful tools and techniques for Binary Exploitation | Cyber Security / Ethical Hacking