Name Size
Parent Directory -
02_lecture.pdf 538K
0x01_local_linux_x86_shellcoding_without_any_high_level_language.pdf 97K
0x02_bypassing_local_Linux_x86_ASLR_protection.pdf 110K
1 Linux exploit writing tutorial part 1 - Stack overflow.pdf 847K
1-Stack_Based_Overflows.pdf 3.1M
10-Chaining_DEPwithROP.pdf 5.9M
11-heap-spraying-demystified.pdf 7.5M
16981.pdf 741K
2-Writing_BufferOverflow_Exploits.pdf 2.0M
3 Linux exploit development part 3 - ret2libc.pdf 553K
3-Writing_SEH_BasedExploits-A.pdf 3.5M
3-Writing_SEH_BasedExploits-B.pdf 1.3M
4-FromExploit_to_Metasploit_Basics.pdf 1.8M
4a Linux exploit development part 3 (rev 2) - Real app demo.pdf 304K
4b Linux exploit development part 2 (rev 2) - Real app demo (part 2).pdf 572K
5 Linux exploit development part 4 - ASCII armor bypass + return-to-plt.pdf 600K
5-Debugger modules_&_plugins_speedup.pdf 2.5M
6-Bypassing_StackCookies_SafeSeh_SEHOP_HWDEP_ASLR.pdf 4.9M
7-Unicode.pdf 2.4M
8-Win32_Egg_Hunting.pdf 5.3M
9-Win32_shellcoding.pdf 4.9M
AMD64 Architecture Programmer's Manual Volume 3 General-Purpose and System Instructions.pdf 2.0M
ASM_Language.pdf 1.0M
Access_Denied - Code_Breakers_Guide.pdf 5.1M
Advanced Windows Exploitation.pdf 340K
BSidesLA-13.pdf 1.3M
C016391321.pdf 453K
CF2_08_file_analysis2_w5-6.pdf 2.7M
Chapter02 - RuntimeAttacks.pdf 6.6M
DEAMON-Guide du cracking pour debutants.pdf 867K
DEPinDepth.pdf 595K
Debugging with gdb.pdf 1.0M
Defeating DEP and ASLR.pdf 1.2M
Detecting and exploiting integer overflows.pdf 494K
Ensamblador(SPA).pdf 1.0M
FSU_Reversing.pdf 3.9M
FormatStringAttack.pdf 121K
Fuzzing Brute Force Vulnerability Discovery.pdf 28M
Fuzzing.pdf 4.5M
Hacking - The Art of Exploitation_2nd Ed.pdf 4.4M
Intel32-1-Basic Architecture.pdf 2.4M
Intel32-2-Instruction Set ReferenceA.pdf 2.2M
Intel32-2-Instruction Set ReferenceB.pdf 1.7M
Intel32-3-System Programming Guide.pdf 4.4M
Introduccion al Cracking en Linux 01 - Introduccion.pdf 471K
Introduccion al Cracking en Linux 02 - GDB.pdf 343K
Introduccion al Cracking en Linux 03 - Instalacion Radare.pdf 284K
Introduccion al Cracking en Linux 04 - Manejo de Radare.pdf 750K
Introduccion al Cracking en Linux 05 - IDA.pdf 1.5M
Introduccion al Cracking en Linux 06 - GDB(II).pdf 1.0M
Introduccion al Cracking en Linux 07 - ELF.pdf 776K
Introduccion al Cracking en Linux 08-ELF(II).pdf 523K
Introduccion-Explotacion-Software-Linux.pdf 552K
K5.pdf 6.2M
Linux_Kernel_Crash_Book.pdf 4.9M
Non-Executable Stack ARM Exploitation(def18).pdf 230K
OpenBSD Remote Exploiting.pdf 256K
Packed, Printable, and Polymorphic Return-Oriented Programming.pdf 466K
Practical Windows XP-2003 Heap Exploitation BH09.pdf 807K
Pucsek_Dean_Msc_2013.pdf 3.0M
ROP Exploitation without Code Injection.pdf 4.0M
Return_into_libc_without_Function_Calls.pdf 398K
Reversing - Secrets of Reverse Engineering.pdf 8.6M
Reversing a Simple Virtual Machine.pdf 260K
SEH Exploitation.pdf 380K
Sebastien Doucet - SecTor 2010 Slides.pdf 1.0M
Smashing The Stack For Fun And Profit.pdf 178K
The Ida Pro Book.pdf 26M
The “Ultimate”Anti-Debugging Reference.pdf 723K
The.IDA.Pro.Book.2nd.Edition.Jun.2011.pdf 9.2M
Understanding SEH Exploitation.pdf 1.1M
Understanding the Low Fragmentation Heap-BH10.pdf 1.1M
Unix ASM Codes Development for Vulnerabilities.pdf 274K
WinDbg_A_to_Z_color.pdf 1.5M
binary-obfuscation-090807130946-phpapp02.pdf 7.5M
iii-tutorial.pdf 482K
tuto_defi_mars_138_135.pdf 517K
x86 Disassembly.pdf 1.1M