https://1library.net/document/z15w563y-dissecting-and-digging-application-source-code-for-vulnerabilities.html