Hello, I wrote this to introduce a small paper for my exploitation method of SafeSEH+SEHOP bypass in Oct, 2010. (http://www.x90c.org/SEH all-at-once attack.pdf, http://www.exploit-db.com/exploits/15184) Sadly it's not portable. But leave some thoughts about the method. - SafeSEH+SEHOP all-at-once bypass explotation method principles http://www.x90c.org/SafeSEH+SEHOP principles.pdf - sehop_chain_validation.c (Reverse Engineering code) http://www.x90c.org/RE_SEHOP_chain_validation.txt