Using ret2reg | Cybersecurity Notes