index-of.co.uk


Imagen


Icon  Name                                                                                        Last modified      Size  Description
[DIR] Parent Directory                                                                                                 -   
[   ] 02_lecture.pdf                                                                              13-Jun-2017 12:57  538K  
[   ] 0x01_local_linux_x86_shellcoding_without_any_high_level_language.pdf                        13-Jun-2017 12:57   97K  
[   ] 0x02_bypassing_local_Linux_x86_ASLR_protection.pdf                                          13-Jun-2017 12:57  110K  
[   ] 1 Linux exploit writing tutorial part 1 - Stack overflow.pdf                                13-Jun-2017 12:57  847K  
[   ] 1-Stack_Based_Overflows.pdf                                                                 13-Jun-2017 12:57  3.1M  
[   ] 10-Chaining_DEPwithROP.pdf                                                                  13-Jun-2017 12:57  5.9M  
[   ] 11-heap-spraying-demystified.pdf                                                            13-Jun-2017 12:57  7.5M  
[   ] 16981.pdf                                                                                   13-Jun-2017 12:57  741K  
[   ] 2-Writing_BufferOverflow_Exploits.pdf                                                       13-Jun-2017 12:57  2.0M  
[   ] 3 Linux exploit development part 3 - ret2libc.pdf                                           13-Jun-2017 12:57  553K  
[   ] 3-Writing_SEH_BasedExploits-A.pdf                                                           13-Jun-2017 12:57  3.5M  
[   ] 3-Writing_SEH_BasedExploits-B.pdf                                                           13-Jun-2017 12:57  1.3M  
[   ] 4-FromExploit_to_Metasploit_Basics.pdf                                                      13-Jun-2017 12:57  1.8M  
[   ] 4a Linux exploit development part 3 (rev 2) - Real app demo.pdf                             13-Jun-2017 12:57  304K  
[   ] 4b Linux exploit development part 2 (rev 2) - Real app demo (part 2).pdf                    13-Jun-2017 12:57  572K  
[   ] 5 Linux exploit development part 4 - ASCII armor bypass + return-to-plt.pdf                 13-Jun-2017 12:57  600K  
[   ] 5-Debugger modules_&_plugins_speedup.pdf                                                    13-Jun-2017 12:57  2.5M  
[   ] 6-Bypassing_StackCookies_SafeSeh_SEHOP_HWDEP_ASLR.pdf                                       13-Jun-2017 12:57  4.9M  
[   ] 7-Unicode.pdf                                                                               13-Jun-2017 12:57  2.4M  
[   ] 8-Win32_Egg_Hunting.pdf                                                                     13-Jun-2017 12:57  5.3M  
[   ] 9-Win32_shellcoding.pdf                                                                     13-Jun-2017 12:57  4.9M  
[   ] AMD64 Architecture Programmer's Manual Volume 3 General-Purpose and System Instructions.pdf 13-Jun-2017 12:57  2.0M  
[   ] ASM_Language.pdf                                                                            13-Jun-2017 12:57  1.0M  
[   ] Access_Denied - Code_Breakers_Guide.pdf                                                     13-Jun-2017 12:57  5.1M  
[   ] Advanced Windows Exploitation.pdf                                                           13-Jun-2017 12:57  340K  
[   ] BSidesLA-13.pdf                                                                             13-Jun-2017 12:57  1.3M  
[   ] C016391321.pdf                                                                              13-Jun-2017 12:57  453K  
[   ] CF2_08_file_analysis2_w5-6.pdf                                                              13-Jun-2017 12:57  2.7M  
[   ] Chapter02 - RuntimeAttacks.pdf                                                              13-Jun-2017 12:57  6.6M  
[   ] DEAMON-Guide du cracking pour debutants.pdf                                                 13-Jun-2017 12:57  867K  
[   ] DEPinDepth.pdf                                                                              13-Jun-2017 12:57  595K  
[   ] Debugging with gdb.pdf                                                                      13-Jun-2017 12:57  1.0M  
[   ] Defeating DEP and ASLR.pdf                                                                  13-Jun-2017 12:57  1.2M  
[   ] Detecting and exploiting integer overflows.pdf                                              13-Jun-2017 12:57  494K  
[   ] Ensamblador(SPA).pdf                                                                        13-Jun-2017 12:57  1.0M  
[   ] FSU_Reversing.pdf                                                                           13-Jun-2017 12:57  3.9M  
[   ] FormatStringAttack.pdf                                                                      13-Jun-2017 12:57  121K  
[   ] Fuzzing Brute Force Vulnerability Discovery.pdf                                             13-Jun-2017 12:57   28M  
[   ] Fuzzing.pdf                                                                                 13-Jun-2017 12:57  4.5M  
[   ] Hacking - The Art of Exploitation_2nd Ed.pdf                                                13-Jun-2017 12:58  4.4M  
[   ] Intel32-1-Basic Architecture.pdf                                                            13-Jun-2017 12:58  2.4M  
[   ] Intel32-2-Instruction Set ReferenceA.pdf                                                    13-Jun-2017 12:58  2.2M  
[   ] Intel32-2-Instruction Set ReferenceB.pdf                                                    13-Jun-2017 12:58  1.7M  
[   ] Intel32-3-System Programming Guide.pdf                                                      13-Jun-2017 12:58  4.4M  
[   ] Introduccion al Cracking en Linux 01 - Introduccion.pdf                                     13-Jun-2017 12:58  471K  
[   ] Introduccion al Cracking en Linux 02 - GDB.pdf                                              13-Jun-2017 12:58  343K  
[   ] Introduccion al Cracking en Linux 03 - Instalacion Radare.pdf                               13-Jun-2017 12:58  284K  
[   ] Introduccion al Cracking en Linux 04 - Manejo de Radare.pdf                                 13-Jun-2017 12:58  750K  
[   ] Introduccion al Cracking en Linux 05 - IDA.pdf                                              13-Jun-2017 12:58  1.5M  
[   ] Introduccion al Cracking en Linux 06 - GDB(II).pdf                                          13-Jun-2017 12:58  1.0M  
[   ] Introduccion al Cracking en Linux 07 - ELF.pdf                                              13-Jun-2017 12:58  776K  
[   ] Introduccion al Cracking en Linux 08-ELF(II).pdf                                            13-Jun-2017 12:58  523K  
[   ] Introduccion-Explotacion-Software-Linux.pdf                                                 13-Jun-2017 12:58  552K  
[   ] K5.pdf                                                                                      13-Jun-2017 12:58  6.2M  
[   ] Linux_Kernel_Crash_Book.pdf                                                                 13-Jun-2017 12:58  4.9M  
[   ] Non-Executable Stack ARM Exploitation(def18).pdf                                            13-Jun-2017 12:58  230K  
[   ] OpenBSD Remote Exploiting.pdf                                                               13-Jun-2017 12:58  256K  
[   ] Packed, Printable, and Polymorphic Return-Oriented Programming.pdf                          13-Jun-2017 12:58  466K  
[   ] Practical Windows XP-2003 Heap Exploitation BH09.pdf                                        13-Jun-2017 12:58  807K  
[   ] Pucsek_Dean_Msc_2013.pdf                                                                    13-Jun-2017 12:58  3.0M  
[   ] ROP Exploitation without Code Injection.pdf                                                 13-Jun-2017 12:58  4.0M  
[   ] Return_into_libc_without_Function_Calls.pdf                                                 13-Jun-2017 12:58  398K  
[   ] Reversing - Secrets of Reverse Engineering.pdf                                              13-Jun-2017 12:58  8.6M  
[   ] Reversing a Simple Virtual Machine.pdf                                                      13-Jun-2017 12:58  260K  
[   ] SEH Exploitation.pdf                                                                        13-Jun-2017 12:58  380K  
[   ] Sebastien Doucet - SecTor 2010 Slides.pdf                                                   13-Jun-2017 12:58  1.0M  
[   ] Smashing The Stack For Fun And Profit.pdf                                                   13-Jun-2017 12:58  178K  
[   ] The Ida Pro Book.pdf                                                                        13-Jun-2017 12:58   26M  
[   ] The “Ultimate”Anti-Debugging Reference.pdf                                              13-Jun-2017 12:58  723K  
[   ] The.IDA.Pro.Book.2nd.Edition.Jun.2011.pdf                                                   13-Jun-2017 12:58  9.2M  
[   ] Understanding SEH Exploitation.pdf                                                          13-Jun-2017 12:58  1.1M  
[   ] Understanding the Low Fragmentation Heap-BH10.pdf                                           13-Jun-2017 12:58  1.1M  
[   ] Unix ASM Codes Development for Vulnerabilities.pdf                                          13-Jun-2017 12:58  274K  
[   ] WinDbg_A_to_Z_color.pdf                                                                     13-Jun-2017 12:58  1.5M  
[   ] binary-obfuscation-090807130946-phpapp02.pdf                                                13-Jun-2017 12:57  7.5M  
[   ] iii-tutorial.pdf                                                                            13-Jun-2017 12:58  482K  
[   ] tuto_defi_mars_138_135.pdf                                                                  13-Jun-2017 12:58  517K  
[   ] x86 Disassembly.pdf                                                                         13-Jun-2017 12:58  1.1M  


© 2013-2017 - index-of.co.uk


email feed