zma.es


Imagen



Icon  Name                                                                 Size  
[DIR] Parent Directory                                                       -   
[DIR] AMD_Architecture/                                                      -   
[DIR] Intel_Architecture/                                                    -   
[DIR] IntroLinuxRE/                                                          -   
[DIR] LinuxExploitWritingTutorial(by Sickness)/                              -   
[DIR] ROP/                                                                   -   
[   ] 0x01_local_linux_x86_shellcoding_without_any_high_level_language.pdf  97K  
[   ] 0x02_bypassing_local_Linux_x86_ASLR_protection.pdf                   110K  
[   ] A Buffer Overflow Study Attacks & Defenses.pdf                       485K  
[   ] ASLR - Address Space Layout Randomization.pdf                        259K  
[   ] ASLR Smack_Reference.pdf                                             509K  
[   ] ASM_Language.pdf                                                     1.0M  
[   ] Access_Denied - Code_Breakers_Guide.pdf                              5.1M  
[   ] Advanced Windows Exploitation.pdf                                    340K  
[   ] Advanced_Windows_Debugging.pdf                                       9.5M  
[   ] Attacking the Windows Kernel.pdf                                     294K  
[   ] Bypassing Browser Memory Protections(BH08).pdf                       684K  
[   ] Bypassing DEP with WPM & ROP.pdf                                     334K  
[   ] Chapter02 - RuntimeAttacks.pdf                                       6.6M  
[   ] DEPinDepth.pdf                                                       595K  
[   ] Debugging with gdb.pdf                                               1.0M  
[   ] Defeating DEP and ASLR.pdf                                           1.2M  
[   ] Detecting and exploiting integer overflows.pdf                       494K  
[   ] Ensamblador(SPA).pdf                                                 1.0M  
[   ] Exploiting Format String Vulnerabilities.pdf                         229K  
[   ] Exploiting Stack Overflows in the Linux Kernel.pdf                   289K  
[   ] Format String Attacks.pdf                                            217K  
[   ] FormatStringAttack.pdf                                               121K  
[   ] Fuzzing Brute Force Vulnerability Discovery.pdf                       28M  
[   ] Fuzzing Making software Dumber.pdf                                    78K  
[   ] Fuzzing.pdf                                                          4.5M  
[   ] Fuzzing_for_software_vulnerability_discovery.pdf                     5.6M  
[   ] Generic Anti Exploitation Technology for Windows.pdf                 1.5M  
[   ] Hacking - The Art of Exploitation_2nd Ed.pdf                         4.4M  
[   ] Introduccion-Explotacion-Software-Linux.pdf                          552K  
[   ] Linux_Kernel_Crash_Book.pdf                                          4.9M  
[   ] No_NX.pdf                                                             82K  
[   ] Non-Executable Stack ARM Exploitation(def18).pdf                     230K  
[   ] On the Effectiveness of Address-Space Randomization.pdf              147K  
[   ] OpenBSD Remote Exploiting.pdf                                        256K  
[   ] Practical Windows XP-2003 Heap Exploitation BH09.pdf                 807K  
[   ] Programming_from_the_Ground_Up.pdf                                   1.3M  
[   ] Return-oriented Programming without Returns (on the x86).pdf         430K  
[   ] Reversing-Secrets of Reverse Engineering.pdf                         8.4M  
[   ] SEH Exploitation.pdf                                                 380K  
[   ] Smashing The Stack For Fun And Profit.pdf                            178K  
[   ] Smashing the stack in 2010.pdf                                       2.1M  
[   ] Stack Based Buffer Overflows and Protection Mechanisms.pdf           502K  
[   ] The Art of Assembly Language.pdf                                     6.5M  
[   ] The Ida Pro Book.pdf                                                  26M  
[   ] The “Ultimate”Anti-Debugging Reference.pdf                       723K  
[   ] The.IDA.Pro.Book.2nd.Edition.Jun.2011.pdf                            9.2M  
[   ] Understanding SEH Exploitation.pdf                                   1.1M  
[   ] Understanding the Low Fragmentation Heap-BH10.pdf                    1.1M  
[   ] Unix ASM Codes Development for Vulnerabilities.pdf                   274K  
[   ] WinDbg_A_to_Z_color.pdf                                              1.5M  
[   ] WindowsInternals_5ED.pdf                                              19M  
[   ] the_shellcoders_handbook.pdf                                         8.7M  
[   ] x86 Disassembly.pdf                                                  1.1M  



© 2013-2017 - zma.es


email feed