Share In this documentation you will learn; Continue reading on Medium » In this documentation you will learn;Continue reading on Medium » Read More Hacking on Medium #hacking Post navigation AirTouch HTB Writeup Four Ways to Steal a Syscall: Binary Rewriting vs. the Alternatives