๐๏ธ Introducing 'Shellcode Eater'๐๏ธ 1. Setup Shellcode Eater with our examples and then write your own too!๐๏ธ 2. Decide what attacks we want to protect against๐๏ธ 3. Generate a templated policy as our starting point๐๏ธ 4. Use permissive-mode to iteratively refine your policy๐๏ธ 5. Deploying in enforcing-mode and rebooting