Includes navigation links and user settings
How Binary Exploitation Mitigations Work and How They Are Defeated