index-of.es


Imagen


Icon  Name                                                                                                                   Last modified      Size  Description
[DIR] Parent Directory                                                                                                                            -   
[   ] A Practical Dynamic Buffer Overflow Detector.pdf                                                                       13-Mar-2017 13:43  138K  
[   ] A Signature-free Buffer Overflow Attack Blocker.pdf                                                                    13-Mar-2017 13:43  309K  
[   ] A Useful Approach to Finding Bugs.pdf                                                                                  13-Mar-2017 13:43  233K  
[   ] A brief tutorial on GCC inline asm (x86 biased).pdf                                                                    13-Mar-2017 13:43   70K  
[   ] APT.pdf                                                                                                                13-Mar-2017 13:43  2.5M  
[   ] ARM Addressing Modes Quick Reference Card.pdf                                                                          13-Mar-2017 13:43  210K  
[   ] ARM Developer Suite - Assembler Guide.pdf                                                                              13-Mar-2017 13:43  1.6M  
[   ] ARM IAR Assembler - Reference Guide - for Advanced RISC Machines Ltd - ARM Cores.pdf                                   13-Mar-2017 13:43  1.3M  
[   ] ASLR - Address Space Layout Randomization.pdf                                                                          13-Mar-2017 13:43  259K  
[   ] Access Through Access.pdf                                                                                              13-Mar-2017 13:43  554K  
[   ] Accurate analysis of heap and stack overflows by means of age stamps.pdf                                               13-Mar-2017 13:43  257K  
[   ] ActiveX - Active Exploitation.pdf                                                                                      13-Mar-2017 13:43  172K  
[   ] Advanced_Buffer_Overflow_Methods_[Izik].pdf                                                                            13-Mar-2017 13:43   19K  
[   ] Alternative Java Threading Designs for Real-Time Environments.pdf                                                      13-Mar-2017 13:43  203K  
[   ] Analysis of ANI anih Header Stack Overflow Vulnerability.pdf                                                           13-Mar-2017 13:43  131K  
[   ] Analyzing local privilege escalations in win32k.pdf                                                                    13-Mar-2017 13:43  192K  
[   ] Anatomy of a Malware.pdf                                                                                               13-Mar-2017 13:43   47K  
[   ] Anti-Debugging 8211 A Developers View.pdf                                                                              13-Mar-2017 13:43  208K  
[   ] Assault on PHP Applications.pdf                                                                                        13-Mar-2017 13:43  2.9M  
[   ] Attacking the core.pdf                                                                                                 13-Mar-2017 13:43  5.3M  
[   ] BHDC-2010-Paper.pdf                                                                                                    13-Mar-2017 13:43  260K  
[   ] BHUS10_Slides_Payload_already_inside_data_reuse_for_ROP_exploits_v1.pdf                                                13-Mar-2017 13:43  207K  
[   ] BHUSA09-Oh-DiffingBinaries-PAPER.pdf                                                                                   13-Mar-2017 13:43  601K  
[   ] BlackHat-USA-2010-Meer-History-of-Memory-Corruption-Attacks-wp.pdf                                                     13-Mar-2017 13:43  3.8M  
[   ] Blended attacks exploits, Vulnerabilities and Buffer-Overlow Techinques.pdf                                            13-Mar-2017 13:43  781K  
[   ] Blind Exploitation of Stack Overflow Vulnerabilities.pdf                                                               13-Mar-2017 13:43  161K  
[   ] Breaking-virtualization-by-switching-to-Virtual-8086-mode_final.pdf                                                    13-Mar-2017 13:43  768K  
[   ] Browser Vulnerability Analysis.pdf                                                                                     13-Mar-2017 13:43  444K  
[   ] Buffer Overflow Attacks on Linux Principles Analyzing and Protection.pdf                                               13-Mar-2017 13:43   56K  
[   ] Building A Simple Stack Abstraction.pdf                                                                                13-Mar-2017 13:43  8.0K  
[   ] Bypassing Hardware Based Data Execution Prevention (DEP) On Windows 2003 SP2.pdf                                       13-Mar-2017 13:43  497K  
[   ] Bypassing Web Application Firewalls with HTTP Parameter Pollution.pdf                                                  13-Mar-2017 13:43  103K  
[   ] Bypassing Windows heap protections.pdf                                                                                 13-Mar-2017 13:43   88K  
[   ] Bypassing non-executable-stack during exploitation using return-to-libc.pdf                                            13-Mar-2017 13:43   15K  
[   ] Calling conventions for different C++ compilers and operating systems.pdf                                              13-Mar-2017 13:43  358K  
[   ] Common Control System Vulnerability.pdf                                                                                13-Mar-2017 13:43  311K  
[   ] Compile-time stack requirements analysis with GCC.pdf                                                                  13-Mar-2017 13:43   51K  
[   ] Compression Plus and Tumbleweed EMF Stack Overflow Security Advisory.pdf                                               13-Mar-2017 13:43  114K  
[   ] Confidence2010 ROP and JIT-Spray.pdf                                                                                   13-Mar-2017 13:43  918K  
[   ] Cracking the basics.pdf                                                                                                13-Mar-2017 13:43  196K  
[   ] Cyclic Redundancy Check (CRC).pdf                                                                                      13-Mar-2017 13:43   64K  
[   ] D1T1 - Tavis Ormandy - Making Software Dumber.pdf                                                                      13-Mar-2017 13:43   78K  
[   ] D1T2 - Alexey Sintsov - JIT Spray Attacks and Advanced Shellcode.pdf                                                   13-Mar-2017 13:43  1.1M  
[   ] D2 - Gynvael Coldwind - Case Study of Recent Windows Vulnerabilities.pdf                                               13-Mar-2017 13:43  1.3M  
[   ] DEPLIB.pdf                                                                                                             13-Mar-2017 13:43  2.0M  
[   ] DEPLIB20_ekoparty.pdf                                                                                                  13-Mar-2017 13:43  419K  
[   ] DEPinDepth.ppt                                                                                                         13-Mar-2017 13:43  2.9M  
[   ] DNS Cache Poisoning Vulnerability.pdf                                                                                  13-Mar-2017 13:43  2.0M  
[   ] Debugging multi-threaded applications with RTOS-aware tools.pdf                                                        13-Mar-2017 13:43  181K  
[   ] Decimalisation Table Attacks for PIN Cracking.pdf                                                                      13-Mar-2017 13:43  132K  
[   ] Defeating DEP through a mapped file.pdf                                                                                13-Mar-2017 13:43  533K  
[   ] Defeating the Stack Based Buffer Overflow Prevention Mechanism of Microsoft Windows 2003 Server.pdf                    13-Mar-2017 13:43  110K  
[   ] Defending Embedded Systems Against Buffer Overflow via Hardware-Software.pdf                                           13-Mar-2017 13:43   74K  
[   ] Developing StrongARM Linux shellcode.pdf                                                                               13-Mar-2017 13:43   95K  
[   ] Dynamic Buffer Overflow Detection.pdf                                                                                  13-Mar-2017 13:43  244K  
[   ] EN-Advanced SQL Injection In SQL Server Applications.pdf                                                               13-Mar-2017 13:43  291K  
[   ] EN-Bypass windows server 2008.pdf                                                                                      13-Mar-2017 13:43  217K  
[   ] EN-Exploit writing tutorial part 4 _ From Exploit to Metasploit %80%93 The basics.pdf                                  13-Mar-2017 13:43   35K  
[   ] EN-Exploiting Format String Vulnerabilities.pdf                                                                        13-Mar-2017 13:43  229K  
[   ] EN-Game Hacking.pdf                                                                                                    13-Mar-2017 13:43  1.6M  
[   ] EN-NOx86-64 buffer overflow exploits and the borrowed code chunks exploitation technique -NX.pdf                       13-Mar-2017 13:43   82K  
[   ] Elementary Structures.pdf                                                                                              13-Mar-2017 13:43  193K  
[   ] Eliminating stack overflow by abstract interpretation.pdf                                                              13-Mar-2017 13:43  101K  
[   ] Eliminating the Threat of Kernel Stack Overflows.pdf                                                                   13-Mar-2017 13:43  156K  
[   ] Engineering Heap Overflow Exploits with JavaScript.pdf                                                                 13-Mar-2017 13:43  136K  
[   ] Evolving Shell Code (Symantec).pdf                                                                                     13-Mar-2017 13:43  157K  
[   ] Evolving Successful Stack Overflow Attacks for Vulnerability Testing.pdf                                               13-Mar-2017 13:43  473K  
[   ] Experiencing Enhanced Emulation Debugging.pdf                                                                          13-Mar-2017 13:43  873K  
[   ] Exploit writing tutorial part 1 _ Stack Based Overflows.pdf                                                            13-Mar-2017 13:43  706K  
[   ] Exploit writing tutorial part 2 _ Stack Based Overflows - jumping to shellcode.pdf                                     13-Mar-2017 13:43  522K  
[   ] Exploit writing tutorial part 3 _ SEH Based Exploits.pdf                                                               13-Mar-2017 13:43  1.7M  
[   ] Exploit writing tutorial part 3b _ SEH Based Exploits - just another example.pdf                                       13-Mar-2017 13:43   73K  
[   ] Exploit writing tutorial part 4 _ From Exploit to Metasploit - The basics.pdf                                          13-Mar-2017 13:43   34K  
[   ] Exploit writing tutorial part 6 _ Bypassing Stack Cookies, SafeSeh, HW DEP and ASLR.pdf                                13-Mar-2017 13:43  3.1M  
[   ] Exploit writing tutorial part 7 _ Unicode - from 0x00410041 to calc.pdf                                                13-Mar-2017 13:43  619K  
[   ] Exploit writing tutorial part 8 _ Win32 Egg Hunting.pdf                                                                13-Mar-2017 13:43  3.5M  
[   ] Exploiting ARM Linux Systems.pdf                                                                                       13-Mar-2017 13:43  667K  
[   ] Exploiting Stack Overflows in the Linux Kernel.pdf                                                                     13-Mar-2017 13:43  289K  
[   ] Exploiting the iOS Kernel.pdf                                                                                          13-Mar-2017 13:43  201K  
[   ] Exploring Windows CE Shellcode.pdf                                                                                     13-Mar-2017 13:43  242K  
[   ] Finding_and_Understanding_Bugs_in_C_Compilers.pdf                                                                      13-Mar-2017 13:43  309K  
[   ] Format String Attacks.pdf                                                                                              13-Mar-2017 13:43  217K  
[   ] Fuzzing_for_software_vulnerability_discovery.pdf                                                                       13-Mar-2017 13:43  5.6M  
[   ] GDT and LDT in Windows kernel vulnerability exploitation.pdf                                                           13-Mar-2017 13:43  682K  
[   ] HES10-jvanegue_zero-allocations.pdf                                                                                    13-Mar-2017 13:43  823K  
[   ] HES2010_Evolution_Of_Microsofts_Mitigations.pdf                                                                        13-Mar-2017 13:43  1.8M  
[   ] HTTP Parameter Pollution.pdf                                                                                           13-Mar-2017 13:43  1.2M  
[   ] Heap Feng Shui in JavaScript.pdf                                                                                       13-Mar-2017 13:43  164K  
[   ] How Conficker makes use of MS08-067.pdf                                                                                13-Mar-2017 13:43  193K  
[   ] Hybrid Engine for Polymorphic Shellcode Detection.pdf                                                                  13-Mar-2017 13:44  924K  
[   ] Implementing a Soft Stack in Data Memory on the MAXQ2000.pdf                                                           13-Mar-2017 13:44   35K  
[   ] InsecurityofPoorlyDesignedRemoteFileInclusionPayloads-Part2.pdf                                                        13-Mar-2017 13:44  349K  
[   ] Intel Assembler CodeTable 80x86.pdf                                                                                    13-Mar-2017 13:44  147K  
[   ] KernelPool.pdf                                                                                                         13-Mar-2017 13:44  403K  
[   ] LINUX System Call Quick Reference.pdf                                                                                  13-Mar-2017 13:44   55K  
[   ] LPC-ALPC-slides.pdf                                                                                                    13-Mar-2017 13:44  2.7M  
[   ] Lateral SQL Injection_ A ew Class of Vulnerability in Oracle.pdf                                                       13-Mar-2017 13:44  154K  
[   ] Learn Information Gathering By Example.pdf                                                                             13-Mar-2017 13:44  1.1M  
[   ] Linux Memory Protection Mechanism Linux Memory Protection Mechanism.pdf                                                13-Mar-2017 13:44   35K  
[   ] Linux Security HOWTO.pdf                                                                                               13-Mar-2017 13:44  428K  
[   ] Linux Security Quick Reference Guide.pdf                                                                               13-Mar-2017 13:44   69K  
[   ] MPI and Password Cracking.pdf                                                                                          13-Mar-2017 13:44   96K  
[   ] Mac OS X PPC Shellcode Tricks.pdf                                                                                      13-Mar-2017 13:44  142K  
[   ] Metasploit.pdf                                                                                                         13-Mar-2017 13:44  6.9M  
[   ] NetWare Kernel Stack Overflow Exploitation.pdf                                                                         13-Mar-2017 13:44  291K  
[   ] Network-Level Polymorphic Shellcode Detection Using Emulation.pdf                                                      13-Mar-2017 13:44  110K  
[   ] Non-Executable Stack ARM Exploitation Research Paper.pdf                                                               13-Mar-2017 13:44  346K  
[   ] Non-Executable Stack ARM Exploitation.pdf                                                                              13-Mar-2017 13:44  225K  
[   ] OWASL_IL_2010_Jan_-_Moshe_Ben_Abu_-_Advanced_Heapspray.pdf                                                             13-Mar-2017 13:44  194K  
[   ] On Evolving Buffer Overflow Attacks Using Genetic Programming.pdf                                                      13-Mar-2017 13:44  294K  
[   ] On the Infeasibility of Modeling Polymorphic Shellcode.pdf                                                             13-Mar-2017 13:44  360K  
[   ] Online Stack Overflow Detection on the TMS320C28x DSP.pdf                                                              13-Mar-2017 13:44  407K  
[   ] Optimal Register Reassignment for Register Stack Overflow Minimization.pdf                                             13-Mar-2017 13:44  571K  
[   ] PBX Vulnerability Analysis.pdf                                                                                         13-Mar-2017 13:44  224K  
[   ] PE Infection - How to Inject a dll.pdf                                                                                 13-Mar-2017 13:44  707K  
[   ] Paper_Payload_already_inside_data_reuse_for_ROP_exploits.pdf                                                           13-Mar-2017 13:44  205K  
[   ] Path Optimization in Programs and its Application to Debugging.pdf                                                     13-Mar-2017 13:44  168K  
[   ] Payload Already Inside_ Data re-use for ROP Exploits WhitePaper.pdf                                                    13-Mar-2017 13:44  209K  
[   ] Payload Already Inside_ Data re-use for ROP Exploits-slide.pdf                                                         13-Mar-2017 13:44  206K  
[   ] Polymorphic Shellcodes vs. Application IDSs.pdf                                                                        13-Mar-2017 13:44   27K  
[   ] PowerPC-OS X (Darwin) Shellcode Assembly.pdf                                                                           13-Mar-2017 13:44  282K  
[   ] Practical Return Oriented Programming.pdf                                                                              13-Mar-2017 13:44  1.7M  
[   ] Pratical Linux Shellcode.pdf                                                                                           13-Mar-2017 13:44  126K  
[   ] Pwn2Own-2010-Windows7-InternetExplorer8.pdf                                                                            13-Mar-2017 13:44  304K  
[   ] RARLab's WinRAR Local Stack Overflow.pdf                                                                               13-Mar-2017 13:44   67K  
[   ] REVERSE ENGINEERING UNDER SIEGE.pdf                                                                                    13-Mar-2017 13:44   24K  
[   ] ROP_Whitepaper.pdf                                                                                                     13-Mar-2017 13:44  472K  
[   ] ROPdefender.pdf                                                                                                        13-Mar-2017 13:44  423K  
[   ] Recent Shellcode Developments.pdf                                                                                      13-Mar-2017 13:44  195K  
[   ] Recovering the Toolchain Provenance of Binary Code.pdf                                                                 13-Mar-2017 13:44  362K  
[   ] Repairing Return Address Stack for Buffer Overflow Protection.pdf                                                      13-Mar-2017 13:44  193K  
[   ] Return Oriented Programming for the ARM Architecture.pdf                                                               13-Mar-2017 13:44  853K  
[   ] Return Oriented Programming.pdf                                                                                        13-Mar-2017 13:44  1.0M  
[   ] Return-Oriented Programming-Systems Languages and Applications.pdf                                                     13-Mar-2017 13:44  612K  
[   ] Return-oriented Programming without Returns (on the x86).pdf                                                           13-Mar-2017 13:44  430K  
[   ] Reverse Code Engineering (RCE).pdf                                                                                     13-Mar-2017 13:44  234K  
[   ] Reverse Engineer's Cookbook.pdf                                                                                        13-Mar-2017 13:44  174K  
[   ] Reverse Engineering MAC Protocol.pdf                                                                                   13-Mar-2017 13:44  289K  
[   ] Reverse Engineering MAC_ A Non-Cooperative Game Model 2.pdf                                                            13-Mar-2017 13:44  146K  
[   ] Reverse Engineering_ Anti-Cracking Techniques.pdf                                                                      13-Mar-2017 13:44  331K  
[   ] Reverse Engineering_ Memory Analysis.pdf                                                                               13-Mar-2017 13:44  756K  
[   ] Reverse Engineering_ Smashing the Signature.pdf                                                                        13-Mar-2017 13:44  924K  
[   ] Reverse-Engineering a Cryptographic RFID Tag.pdf                                                                       13-Mar-2017 13:44  246K  
[   ] Reverse-engineering transcription control networks.pdf                                                                 13-Mar-2017 13:44  1.3M  
[   ] Reversing C++.pdf                                                                                                      13-Mar-2017 13:44  602K  
[   ] SAP security_ attacking sap client.pdf                                                                                 13-Mar-2017 13:44  581K  
[   ] SEH Overwrites Simplified v1.01.pdf                                                                                    13-Mar-2017 13:44  349K  
[   ] SEH all-at-once attack a New technique to bypass SafeSEH+SEHOP protections.pdf                                         13-Mar-2017 13:44  1.2M  
[   ] SH-4 CPU Core Architecture.pdf                                                                                         13-Mar-2017 13:44  1.8M  
[   ] Safely Searching Process Virtual Address Space.pdf                                                                     13-Mar-2017 13:44  169K  
[   ] Secure_Programing_with_GCC_and_GLbc.pdf                                                                                13-Mar-2017 13:44  366K  
[   ] Securing & Hardening Linux v1.0.pdf                                                                                    08-Jun-2017 19:13  119K  
[   ] Security Implications of Windows Access Tokens.pdf                                                                     13-Mar-2017 13:44  1.2M  
[   ] Session Fixation Vulnerability in Web-based Applications.pdf                                                           13-Mar-2017 13:44  405K  
[   ] Shellcoding for Linux and Windows Tutorial.pdf                                                                         13-Mar-2017 13:44  107K  
[   ] Sockets, Shellcode , Porting and Codeing - Reverse Engineering Exploits and Tool Coding for Security Professionals.pdf 13-Mar-2017 13:45  112M  
[   ] Stack Based Buffer Overflows and Protection Mechanisms.pdf                                                             13-Mar-2017 13:44  502K  
[   ] Stack Overflow Detection Using The ST9 TIMER-WATCHDOG.pdf                                                              13-Mar-2017 13:44   59K  
[   ] Stack Overflow Exploitation Explained.pdf                                                                              13-Mar-2017 13:44  1.5M  
[   ] Stack Overflow_ A Great Place for Answers.pdf                                                                          13-Mar-2017 13:44   26K  
[   ] Stack Smashing Protector (slides - NDH 2010).pdf                                                                       13-Mar-2017 13:44  116K  
[   ] Stack overflow on Windows Vista.pdf                                                                                    13-Mar-2017 13:44  148K  
[   ] Stack overflow on Windows XP SP2.pdf                                                                                   13-Mar-2017 13:44  153K  
[   ] Statically Detecting Likely Buffer Overflow Vulnerabilities.pdf                                                        13-Mar-2017 13:44  119K  
[   ] Steganography FAQ.pdf                                                                                                  13-Mar-2017 13:44  316K  
[   ] Surgically returning to randomized lib(c).pdf                                                                          13-Mar-2017 13:44  203K  
[   ] Symantec Altiris Deployment Solution Elevation of Privileges Vulnerabilities.pdf                                       13-Mar-2017 13:44  799K  
[   ] Syscall Proxying - Simulating remote execution.pdf                                                                     13-Mar-2017 13:44  101K  
[   ] System Call Sequence (_chmod example).pdf                                                                              13-Mar-2017 13:44   46K  
[   ] Testing C Programs for Buffer Overflow Vulnerabilities.pdf                                                             13-Mar-2017 13:44   97K  
[   ] The ARM Instruction Set.pdf                                                                                            13-Mar-2017 13:44  683K  
[   ] The Geometry of Innocent Flesh on the Bone_ Return-into-libc without Function Calls on the x86.pdf                     13-Mar-2017 13:44  281K  
[   ] The Law and Economics of Reverse Engineering.pdf                                                                       13-Mar-2017 13:44  1.3M  
[   ] The Legitimate Vulnerability Market.pdf                                                                                13-Mar-2017 13:44  332K  
[   ] The Linux Kernel Module Programming Guide.pdf                                                                          13-Mar-2017 13:44  539K  
[   ] The cross-page overwrite and it's application in heap overflows.pdf                                                    13-Mar-2017 13:44   32K  
[   ] The unbearable lightness of PIN cracking.pdf                                                                           13-Mar-2017 13:44  174K  
[   ] The.Shellcoder's.Handbook.Discovering.and.Exploiting.Security.Holes.2nd.Edition.pdf                                    13-Mar-2017 13:44  8.7M  
[   ] There_s_a_Party_at_Ring0.pdf                                                                                           13-Mar-2017 13:44  390K  
[   ] TippingPoint IPS Signature Evasion through Packet Fragmentation.pdf                                                    13-Mar-2017 13:44   76K  
[   ] Towards the Reverse Engineering of Denormalized Relational Databases.pdf                                               13-Mar-2017 13:44  926K  
[   ] UCPy_ Reverse-Engineering Python.pdf                                                                                   08-Jun-2017 19:13  133K  
[   ] Understanding Windows Shellcode.pdf                                                                                    13-Mar-2017 13:44  425K  
[   ] Using (ShoutBoxes) to control malicious software.pdf                                                                   13-Mar-2017 13:44   83K  
[   ] Using dual-mappings to evade automated unpackers.pdf                                                                   13-Mar-2017 13:44  102K  
[   ] Vulnerability Scanning for Buffer Overflow.pdf                                                                         13-Mar-2017 13:44   77K  
[   ] WPAD TECHNOLOGY WEAKNESSES.pdf                                                                                         13-Mar-2017 13:44  343K  
[   ] Web Application Security - Buffer Overflows_ Are you really at risk.pdf                                                13-Mar-2017 13:44  130K  
[   ] Win32 Stack BufferOverFlow Real Life Vuln-Dev Process.pdf                                                              13-Mar-2017 13:44  1.3M  
[   ] Windows Assembly Programming Tutorial.pdf                                                                              13-Mar-2017 13:44  121K  
[   ] Wireless Security and Buffer Overflows.pdf                                                                             13-Mar-2017 13:44   44K  
[   ] Writing MIPS-IRIX shellcode.pdf                                                                                        13-Mar-2017 13:44  157K  
[   ] Writing Small Shellcode.pdf                                                                                            13-Mar-2017 13:44  141K  
[   ] Writing shellcode exploits for VoIP phones.pdf                                                                         13-Mar-2017 13:44  177K  
[   ] Writing shellcode for Linux and BSD.pdf                                                                                13-Mar-2017 13:44  233K  
[   ] XCon2010_win7.pdf                                                                                                      13-Mar-2017 13:44  468K  
[   ] Xcon2005_SoBeIt.pdf                                                                                                    13-Mar-2017 13:44  200K  
[   ] andrewg-ruxcon_2010.pdf                                                                                                13-Mar-2017 13:43  342K  
[   ] bh08sotirovdowd.pdf                                                                                                    13-Mar-2017 13:43  684K  
[   ] confidence_slideshow.pdf                                                                                               13-Mar-2017 13:43  1.6M  
[   ] defeating-xpsp2-heap-protection.pdf                                                                                    13-Mar-2017 13:43   90K  
[   ] ferminjserna-exploitsmitigationsemet-100328034335-phpapp02.pdf                                                         13-Mar-2017 13:43  475K  
[   ] hawkes_ruxcon.pdf                                                                                                      13-Mar-2017 13:43  1.1M  
[   ] kernel_modules.pdf                                                                                                     13-Mar-2017 13:44   52K  
[   ] owasp_201011.pdf                                                                                                       13-Mar-2017 13:44  901K  
[   ] php_fuzzing_auditing.pdf                                                                                               13-Mar-2017 13:44  280K  
[   ] report.pdf                                                                                                             13-Mar-2017 13:44  1.7M  
[   ] rootedcon_0day_english.pdf                                                                                             13-Mar-2017 13:44  317K  
[   ] rop.pdf                                                                                                                13-Mar-2017 13:44  1.0M  
[   ] sean_ruxcon2010.pdf                                                                                                    13-Mar-2017 13:44  5.6M  
[   ] stsi2010.pdf                                                                                                           13-Mar-2017 13:44  2.1M  
[   ] understanding_Linux_virtual_memory_manager.pdf                                                                         13-Mar-2017 13:44  633K  
[   ] win64_confidence2010.pdf                                                                                               13-Mar-2017 13:44  206K  
[   ] x86 Assembly Language Reference Manual.pdf                                                                             13-Mar-2017 13:44  787K  


© 2013-2017 - index-of.es


email feed