x86-64 buffer overflow exploits and the borrowed code chunk exploitation technique. Whitepaper describing NX technology and its limitations. It contains in depth discussion and sample code for the Hammer/Linux platform, analyzes the weaknesses and discusses countermeasures.
You can download it from the following link: https://packetstormsecurity.com/files/download/40442/no-nx.pdf
Source: https://packetstormsecurity.com/files/40442/no-nx.pdf.html

