How to fix public exploits and make it applicable to use, examples for that - Buffer overflow and web application vuln.

Offensive Security Certified Professional (OSCP) video series by Ahmed:
Intro
-00:47 Topics
-01:04 Fixing Memory Corruption Exploits
-01:41 BOF steps overview
-03:01 DOS and BOF
-06:07 Tweaking the payload
-10:20 Cross-Compiling
-12:00 Generating our own payload
-15:35 Running .exe in Linux machine
-20:10 Fixing web exploits
-20:33 Questions to ask befors exploits
-21:32 installing & Setting up the lab
-25:51 Exploit the web lab
-26:33 Tweaking the POC'S code
-27:25 Running the exploit
-29:45 Wrapping up
-30:39 Exercise