In previous weeks, we've gone over techniques like shellcoding to inject our own malicious code into an executable, but many of these techniques have been countered by modern mitigations. Today, we'll be going over how we can REUSE code which already exists within a binary to execute our own arbitrary computations