WELCOME TO SHOTTING.CC
As I sit here drinking Espresso in the warmth of Springtime, I think back to the Heap Overflow Video. This is where I defeat a exploit that used strcpy() by replacing the code with strncpy() - the n is for numerics.
Finding workable exploits is easy once you crack your first box. Then its a matter of getting your executable code into RAM to execute as admin or root.
Soon, one day soon, exploits will be a thing of the past. They will have false layers of exploitation in place. This is already true with fake shells using chroot.
Hacker culture in 2017 is rife. With exploits for mobiles exceeding usual parameters. We, as hackers, have people (FEDS_) exploiting our shit. We should really pwn the FEDS if only we could!