Name Size
Parent Directory -
A Practical Dynamic Buffer Overflow Detector.pdf 138K
A Signature-free Buffer Overflow Attack Blocker.pdf 309K
A Useful Approach to Finding Bugs.pdf 233K
A brief tutorial on GCC inline asm (x86 biased).pdf 70K
APT.pdf 2.5M
ARM Addressing Modes Quick Reference Card.pdf 210K
ARM Developer Suite - Assembler Guide.pdf 1.6M
ARM IAR Assembler - Reference Guide - for Advanced RISC Machines Ltd - ARM Cores.pdf 1.3M
ASLR - Address Space Layout Randomization.pdf 259K
Access Through Access.pdf 554K
Accurate analysis of heap and stack overflows by means of age stamps.pdf 257K
ActiveX - Active Exploitation.pdf 172K
Advanced_Buffer_Overflow_Methods_[Izik].pdf 19K
Alternative Java Threading Designs for Real-Time Environments.pdf 203K
Analysis of ANI anih Header Stack Overflow Vulnerability.pdf 131K
Analyzing local privilege escalations in win32k.pdf 192K
Anatomy of a Malware.pdf 47K
Anti-Debugging 8211 A Developers View.pdf 208K
Assault on PHP Applications.pdf 2.9M
Attacking the core.pdf 5.3M
BHDC-2010-Paper.pdf 260K
BHUS10_Slides_Payload_already_inside_data_reuse_for_ROP_exploits_v1.pdf 207K
BHUSA09-Oh-DiffingBinaries-PAPER.pdf 601K
BlackHat-USA-2010-Meer-History-of-Memory-Corruption-Attacks-wp.pdf 3.8M
Blended attacks exploits, Vulnerabilities and Buffer-Overlow Techinques.pdf 781K
Blind Exploitation of Stack Overflow Vulnerabilities.pdf 161K
Breaking-virtualization-by-switching-to-Virtual-8086-mode_final.pdf 768K
Browser Vulnerability Analysis.pdf 444K
Buffer Overflow Attacks on Linux Principles Analyzing and Protection.pdf 56K
Building A Simple Stack Abstraction.pdf 8.0K
Bypassing Hardware Based Data Execution Prevention (DEP) On Windows 2003 SP2.pdf 497K
Bypassing Web Application Firewalls with HTTP Parameter Pollution.pdf 103K
Bypassing Windows heap protections.pdf 88K
Bypassing non-executable-stack during exploitation using return-to-libc.pdf 15K
Calling conventions for different C++ compilers and operating systems.pdf 358K
Common Control System Vulnerability.pdf 311K
Compile-time stack requirements analysis with GCC.pdf 51K
Compression Plus and Tumbleweed EMF Stack Overflow Security Advisory.pdf 114K
Confidence2010 ROP and JIT-Spray.pdf 918K
Cracking the basics.pdf 196K
Cyclic Redundancy Check (CRC).pdf 64K
D1T1 - Tavis Ormandy - Making Software Dumber.pdf 78K
D1T2 - Alexey Sintsov - JIT Spray Attacks and Advanced Shellcode.pdf 1.1M
D2 - Gynvael Coldwind - Case Study of Recent Windows Vulnerabilities.pdf 1.3M
DEPLIB.pdf 2.0M
DEPLIB20_ekoparty.pdf 419K
DEPinDepth.ppt 2.9M
DNS Cache Poisoning Vulnerability.pdf 2.0M
Debugging multi-threaded applications with RTOS-aware tools.pdf 181K
Decimalisation Table Attacks for PIN Cracking.pdf 132K
Defeating DEP through a mapped file.pdf 533K
Defeating the Stack Based Buffer Overflow Prevention Mechanism of Microsoft Windows 2003 Server.pdf 110K
Defending Embedded Systems Against Buffer Overflow via Hardware-Software.pdf 74K
Developing StrongARM Linux shellcode.pdf 95K
Dynamic Buffer Overflow Detection.pdf 244K
EN-Advanced SQL Injection In SQL Server Applications.pdf 291K
EN-Bypass windows server 2008.pdf 217K
EN-Exploit writing tutorial part 4 _ From Exploit to Metasploit %80%93 The basics.pdf 35K
EN-Exploiting Format String Vulnerabilities.pdf 229K
EN-Game Hacking.pdf 1.6M
EN-NOx86-64 buffer overflow exploits and the borrowed code chunks exploitation technique -NX.pdf 82K
Elementary Structures.pdf 193K
Eliminating stack overflow by abstract interpretation.pdf 101K
Eliminating the Threat of Kernel Stack Overflows.pdf 156K
Engineering Heap Overflow Exploits with JavaScript.pdf 136K
Evolving Successful Stack Overflow Attacks for Vulnerability Testing.pdf 473K
Experiencing Enhanced Emulation Debugging.pdf 873K
Exploit writing tutorial part 1 _ Stack Based Overflows.pdf 706K
Exploit writing tutorial part 2 _ Stack Based Overflows - jumping to shellcode.pdf 522K
Exploit writing tutorial part 3 _ SEH Based Exploits.pdf 1.7M
Exploit writing tutorial part 3b _ SEH Based Exploits - just another example.pdf 73K
Exploit writing tutorial part 4 _ From Exploit to Metasploit - The basics.pdf 34K
Exploit writing tutorial part 6 _ Bypassing Stack Cookies, SafeSeh, HW DEP and ASLR.pdf 3.1M
Exploit writing tutorial part 7 _ Unicode - from 0x00410041 to calc.pdf 619K
Exploit writing tutorial part 8 _ Win32 Egg Hunting.pdf 3.5M
Exploiting ARM Linux Systems.pdf 667K
Exploiting Stack Overflows in the Linux Kernel.pdf 289K
Exploiting the iOS Kernel.pdf 201K
Exploring Windows CE Shellcode.pdf 242K
Finding_and_Understanding_Bugs_in_C_Compilers.pdf 309K
Format String Attacks.pdf 217K
Fuzzing_for_software_vulnerability_discovery.pdf 5.6M
GDT and LDT in Windows kernel vulnerability exploitation.pdf 682K
HES10-jvanegue_zero-allocations.pdf 823K
HES2010_Evolution_Of_Microsofts_Mitigations.pdf 1.8M
HTTP Parameter Pollution.pdf 1.2M
Heap Feng Shui in JavaScript.pdf 164K
How Conficker makes use of MS08-067.pdf 193K
Hybrid Engine for Polymorphic Shellcode Detection.pdf 924K
Implementing a Soft Stack in Data Memory on the MAXQ2000.pdf 35K
InsecurityofPoorlyDesignedRemoteFileInclusionPayloads-Part2.pdf 349K
Intel Assembler CodeTable 80x86.pdf 147K
KernelPool.pdf 403K
LINUX System Call Quick Reference.pdf 55K
LPC-ALPC-slides.pdf 2.7M
Lateral SQL Injection_ A ew Class of Vulnerability in Oracle.pdf 154K
Learn Information Gathering By Example.pdf 1.1M
Linux Memory Protection Mechanism Linux Memory Protection Mechanism.pdf 35K
Linux Security HOWTO.pdf 428K
Linux Security Quick Reference Guide.pdf 69K
MPI and Password Cracking.pdf 96K
Mac OS X PPC Shellcode Tricks.pdf 142K
Metasploit.pdf 6.9M
NetWare Kernel Stack Overflow Exploitation.pdf 291K
Network-Level Polymorphic Shellcode Detection Using Emulation.pdf 110K
Non-Executable Stack ARM Exploitation Research Paper.pdf 346K
Non-Executable Stack ARM Exploitation.pdf 225K
OWASL_IL_2010_Jan_-_Moshe_Ben_Abu_-_Advanced_Heapspray.pdf 194K
On Evolving Buffer Overflow Attacks Using Genetic Programming.pdf 294K
On the Infeasibility of Modeling Polymorphic Shellcode.pdf 360K
Online Stack Overflow Detection on the TMS320C28x DSP.pdf 407K
Optimal Register Reassignment for Register Stack Overflow Minimization.pdf 571K
PE Infection - How to Inject a dll.pdf 707K
Paper_Payload_already_inside_data_reuse_for_ROP_exploits.pdf 205K
Path Optimization in Programs and its Application to Debugging.pdf 168K
Payload Already Inside_ Data re-use for ROP Exploits WhitePaper.pdf 209K
Payload Already Inside_ Data re-use for ROP Exploits-slide.pdf 206K
Polymorphic Shellcodes vs. Application IDSs.pdf 27K
PowerPC-OS X (Darwin) Shellcode Assembly.pdf 282K
Practical Return Oriented Programming.pdf 1.7M
Pratical Linux Shellcode.pdf 126K
Pwn2Own-2010-Windows7-InternetExplorer8.pdf 304K
RARLab's WinRAR Local Stack Overflow.pdf 67K
REVERSE ENGINEERING UNDER SIEGE.pdf 24K
ROP_Whitepaper.pdf 472K
ROPdefender.pdf 423K
Recent Shellcode Developments.pdf 195K
Recovering the Toolchain Provenance of Binary Code.pdf 362K
Repairing Return Address Stack for Buffer Overflow Protection.pdf 193K
Return Oriented Programming for the ARM Architecture.pdf 853K
Return Oriented Programming.pdf 1.0M
Return-Oriented Programming-Systems Languages and Applications.pdf 612K
Return-oriented Programming without Returns (on the x86).pdf 430K
Reverse Code Engineering (RCE).pdf 234K
Reverse Engineer's Cookbook.pdf 174K
Reverse Engineering Exploits and Tool Coding for Security Professionals.pdf 112M
Reverse Engineering MAC Protocol.pdf 289K
Reverse Engineering MAC_ A Non-Cooperative Game Model 2.pdf 146K
Reverse Engineering_ Anti-Cracking Techniques.pdf 331K
Reverse Engineering_ Memory Analysis.pdf 756K
Reverse Engineering_ Smashing the Signature.pdf 924K
Reverse-Engineering a Cryptographic RFID Tag.pdf 246K
Reverse-engineering transcription control networks.pdf 1.3M
Reversing C++.pdf 602K
SAP security_ attacking sap client.pdf 581K
SEH Overwrites Simplified v1.01.pdf 349K
SEH all-at-once attack a New technique to bypass SafeSEH+SEHOP protections.pdf 1.2M
SH-4 CPU Core Architecture.pdf 1.8M
Safely Searching Process Virtual Address Space.pdf 169K
Secure_Programing_with_GCC_and_GLbc.pdf 366K
Securing & Hardening Linux v1.0.pdf 119K
Security Implications of Windows Access Tokens.pdf 1.2M
Session Fixation Vulnerability in Web-based Applications.pdf 405K
Shellcoding for Linux and Windows Tutorial.pdf 107K
Stack Based Buffer Overflows and Protection Mechanisms.pdf 502K
Stack Overflow Detection Using The ST9 TIMER-WATCHDOG.pdf 59K
Stack Overflow Exploitation Explained.pdf 1.5M
Stack Overflow_ A Great Place for Answers.pdf 26K
Stack Smashing Protector (slides - NDH 2010).pdf 116K
Stack overflow on Windows Vista.pdf 148K
Stack overflow on Windows XP SP2.pdf 153K
Statically Detecting Likely Buffer Overflow Vulnerabilities.pdf 119K
Steganography FAQ.pdf 316K
Surgically returning to randomized lib(c).pdf 203K
Symantec Altiris Deployment Solution Elevation of Privileges Vulnerabilities.pdf 799K
Syscall Proxying - Simulating remote execution.pdf 101K
System Call Sequence (_chmod example).pdf 46K
Testing C Programs for Buffer Overflow Vulnerabilities.pdf 97K
The ARM Instruction Set.pdf 683K
The Geometry of Innocent Flesh on the Bone_ Return-into-libc without Function Calls on the x86.pdf 281K
The Law and Economics of Reverse Engineering.pdf 1.3M
The Legitimate Vulnerability Market.pdf 332K
The Linux Kernel Module Programming Guide.pdf 539K
The cross-page overwrite and it's application in heap overflows.pdf 32K
The unbearable lightness of PIN cracking.pdf 174K
The.Shellcoder's.Handbook.Discovering.and.Exploiting.Security.Holes.2nd.Edition.pdf 8.7M
There_s_a_Party_at_Ring0.pdf 390K
TippingPoint IPS Signature Evasion through Packet Fragmentation.pdf 76K
Towards the Reverse Engineering of Denormalized Relational Databases.pdf 926K
UCPy_ Reverse-Engineering Python.pdf 133K
Understanding Windows Shellcode.pdf 425K
Using (ShoutBoxes) to control malicious software.pdf 83K
Using dual-mappings to evade automated unpackers.pdf 102K
Vulnerability Scanning for Buffer Overflow.pdf 77K
WPAD TECHNOLOGY WEAKNESSES.pdf 343K
Web Application Security - Buffer Overflows_ Are you really at risk.pdf 130K
Win32 Stack BufferOverFlow Real Life Vuln-Dev Process.pdf 1.3M
Windows Assembly Programming Tutorial.pdf 121K
Wireless Security and Buffer Overflows.pdf 44K
Writing MIPS-IRIX shellcode.pdf 157K
Writing Small Shellcode.pdf 141K
Writing shellcode exploits for VoIP phones.pdf 177K
Writing shellcode for Linux and BSD.pdf 233K
XCon2010_win7.pdf 468K
Xcon2005_SoBeIt.pdf 200K
andrewg-ruxcon_2010.pdf 342K
bh08sotirovdowd.pdf 684K
confidence_slideshow.pdf 1.6M
defeating-xpsp2-heap-protection.pdf 90K
ferminjserna-exploitsmitigationsemet-100328034335-phpapp02.pdf 475K
hawkes_ruxcon.pdf 1.1M
kernel_modules.pdf 52K
owasp_201011.pdf 901K
php_fuzzing_auditing.pdf 280K
report.pdf 1.7M
rootedcon_0day_english.pdf 317K
rop.pdf 1.0M
sean_ruxcon2010.pdf 5.6M
stsi2010.pdf 2.1M
understanding_Linux_virtual_memory_manager.pdf 633K
win64_confidence2010.pdf 206K
x86 Assembly Language Reference Manual.pdf 787K