Title: The Egg Hunter
Video: The Egg Hunter

After taking the Metasploit Unleashed course I came across Skape's paper in the exploit section: Safely Searching Process Virtual Address Space

This is a detailed look out how the Egg Hunter works and how it can be implemented with an exploit. Make sure to select the full screen toggle and thanks for watching. Also you might want to lower your volume if you're at work .

-Lincoln