[Computer-security-2024-2025] Slides for 1st part of software exploitation are online