index-of.co.uk


Imagen


Icon  Name                                                                                        Size  
[PARENTDIR] Parent Directory                                                                              -   
[   ] 02_lecture.pdf                                                                              538K  
[   ] 0x01_local_linux_x86_shellcoding_without_any_high_level_language.pdf                         97K  
[   ] 0x02_bypassing_local_Linux_x86_ASLR_protection.pdf                                          110K  
[   ] 1 Linux exploit writing tutorial part 1 - Stack overflow.pdf                                847K  
[   ] 1-Stack_Based_Overflows.pdf                                                                 3.1M  
[   ] 10-Chaining_DEPwithROP.pdf                                                                  5.9M  
[   ] 11-heap-spraying-demystified.pdf                                                            7.5M  
[   ] 16981.pdf                                                                                   741K  
[   ] 2-Writing_BufferOverflow_Exploits.pdf                                                       2.0M  
[   ] 3 Linux exploit development part 3 - ret2libc.pdf                                           553K  
[   ] 3-Writing_SEH_BasedExploits-A.pdf                                                           3.5M  
[   ] 3-Writing_SEH_BasedExploits-B.pdf                                                           1.3M  
[   ] 4-FromExploit_to_Metasploit_Basics.pdf                                                      1.8M  
[   ] 4a Linux exploit development part 3 (rev 2) - Real app demo.pdf                             304K  
[   ] 4b Linux exploit development part 2 (rev 2) - Real app demo (part 2).pdf                    572K  
[   ] 5 Linux exploit development part 4 - ASCII armor bypass + return-to-plt.pdf                 600K  
[   ] 5-Debugger modules_&_plugins_speedup.pdf                                                    2.5M  
[   ] 6-Bypassing_StackCookies_SafeSeh_SEHOP_HWDEP_ASLR.pdf                                       4.9M  
[   ] 7-Unicode.pdf                                                                               2.4M  
[   ] 8-Win32_Egg_Hunting.pdf                                                                     5.3M  
[   ] 9-Win32_shellcoding.pdf                                                                     4.9M  
[   ] AMD64 Architecture Programmer's Manual Volume 3 General-Purpose and System Instructions.pdf 2.0M  
[   ] ASM_Language.pdf                                                                            1.0M  
[   ] Access_Denied - Code_Breakers_Guide.pdf                                                     5.1M  
[   ] Advanced Windows Exploitation.pdf                                                           340K  
[   ] BSidesLA-13.pdf                                                                             1.3M  
[   ] C016391321.pdf                                                                              453K  
[   ] CF2_08_file_analysis2_w5-6.pdf                                                              2.7M  
[   ] Chapter02 - RuntimeAttacks.pdf                                                              6.6M  
[   ] DEAMON-Guide du cracking pour debutants.pdf                                                 867K  
[   ] DEPinDepth.pdf                                                                              595K  
[   ] Debugging with gdb.pdf                                                                      1.0M  
[   ] Defeating DEP and ASLR.pdf                                                                  1.2M  
[   ] Detecting and exploiting integer overflows.pdf                                              494K  
[   ] Ensamblador(SPA).pdf                                                                        1.0M  
[   ] FSU_Reversing.pdf                                                                           3.9M  
[   ] FormatStringAttack.pdf                                                                      121K  
[   ] Fuzzing Brute Force Vulnerability Discovery.pdf                                              28M  
[   ] Fuzzing.pdf                                                                                 4.5M  
[   ] Hacking - The Art of Exploitation_2nd Ed.pdf                                                4.4M  
[   ] Intel32-1-Basic Architecture.pdf                                                            2.4M  
[   ] Intel32-2-Instruction Set ReferenceA.pdf                                                    2.2M  
[   ] Intel32-2-Instruction Set ReferenceB.pdf                                                    1.7M  
[   ] Intel32-3-System Programming Guide.pdf                                                      4.4M  
[   ] Introduccion al Cracking en Linux 01 - Introduccion.pdf                                     471K  
[   ] Introduccion al Cracking en Linux 02 - GDB.pdf                                              343K  
[   ] Introduccion al Cracking en Linux 03 - Instalacion Radare.pdf                               284K  
[   ] Introduccion al Cracking en Linux 04 - Manejo de Radare.pdf                                 750K  
[   ] Introduccion al Cracking en Linux 05 - IDA.pdf                                              1.5M  
[   ] Introduccion al Cracking en Linux 06 - GDB(II).pdf                                          1.0M  
[   ] Introduccion al Cracking en Linux 07 - ELF.pdf                                              776K  
[   ] Introduccion al Cracking en Linux 08-ELF(II).pdf                                            523K  
[   ] Introduccion-Explotacion-Software-Linux.pdf                                                 552K  
[   ] K5.pdf                                                                                      6.2M  
[   ] Linux_Kernel_Crash_Book.pdf                                                                 4.9M  
[   ] Non-Executable Stack ARM Exploitation(def18).pdf                                            230K  
[   ] OpenBSD Remote Exploiting.pdf                                                               256K  
[   ] Packed, Printable, and Polymorphic Return-Oriented Programming.pdf                          466K  
[   ] Practical Windows XP-2003 Heap Exploitation BH09.pdf                                        807K  
[   ] Pucsek_Dean_Msc_2013.pdf                                                                    3.0M  
[   ] ROP Exploitation without Code Injection.pdf                                                 4.0M  
[   ] Return_into_libc_without_Function_Calls.pdf                                                 398K  
[   ] Reversing - Secrets of Reverse Engineering.pdf                                              8.6M  
[   ] Reversing a Simple Virtual Machine.pdf                                                      260K  
[   ] SEH Exploitation.pdf                                                                        380K  
[   ] Sebastien Doucet - SecTor 2010 Slides.pdf                                                   1.0M  
[   ] Smashing The Stack For Fun And Profit.pdf                                                   178K  
[   ] The Ida Pro Book.pdf                                                                         26M  
[   ] The “Ultimate”Anti-Debugging Reference.pdf                                              723K  
[   ] The.IDA.Pro.Book.2nd.Edition.Jun.2011.pdf                                                   9.2M  
[   ] Understanding SEH Exploitation.pdf                                                          1.1M  
[   ] Understanding the Low Fragmentation Heap-BH10.pdf                                           1.1M  
[   ] Unix ASM Codes Development for Vulnerabilities.pdf                                          274K  
[   ] WinDbg_A_to_Z_color.pdf                                                                     1.5M  
[   ] binary-obfuscation-090807130946-phpapp02.pdf                                                7.5M  
[   ] iii-tutorial.pdf                                                                            482K  
[   ] tuto_defi_mars_138_135.pdf                                                                  517K  
[   ] x86 Disassembly.pdf                                                                         1.1M  


© 2013-2017 - index-of.co.uk


email feed