Bringing this over from the old forums. There's a couple of discrepancies I was waiting to see if anyone pointed out in the old forums, most notably that I switched the order of the endianness of the egg shell code in my comments (thanks dyslexia). Doesn't really change much, but it's been bothering me for awhile now. I can finally sleep.
Title: The Egg Hunter
Video: The Egg Hunter
After taking the Metasploit Unleashed course I came across Skape's paper in the exploit section: Safely Searching Process Virtual Address Space
This is a detailed look out how the Egg Hunter works and how it can be implemented with an exploit. Make sure to select the full screen toggle and thanks for watching. Also you might want to lower your volume if you're at work .