index-of.es


Imagen



Icon  Name                                                                                                                   Last modified      Size  Description
[DIR] Parent Directory                                                                                                                            -   
[   ] A brief tutorial on GCC inline asm (x86 biased).pdf                                                                    13-Jan-2017 13:36   70K  
[   ] A Practical Dynamic Buffer Overflow Detector.pdf                                                                       13-Jan-2017 13:36  138K  
[   ] A Signature-free Buffer Overflow Attack Blocker.pdf                                                                    13-Jan-2017 13:36  309K  
[   ] A Useful Approach to Finding Bugs.pdf                                                                                  13-Jan-2017 13:36  233K  
[   ] Access Through Access.pdf                                                                                              13-Jan-2017 13:36  554K  
[   ] Accurate analysis of heap and stack overflows by means of age stamps.pdf                                               13-Jan-2017 13:36  257K  
[   ] ActiveX - Active Exploitation.pdf                                                                                      13-Jan-2017 13:36  172K  
[   ] Advanced_Buffer_Overflow_Methods_[Izik].pdf                                                                            13-Jan-2017 13:36   19K  
[   ] Alternative Java Threading Designs for Real-Time Environments.pdf                                                      13-Jan-2017 13:36  203K  
[   ] Analysis of ANI anih Header Stack Overflow Vulnerability.pdf                                                           13-Jan-2017 13:36  131K  
[   ] Analyzing local privilege escalations in win32k.pdf                                                                    13-Jan-2017 13:36  192K  
[   ] Anatomy of a Malware.pdf                                                                                               13-Jan-2017 13:36   47K  
[   ] andrewg-ruxcon_2010.pdf                                                                                                13-Jan-2017 13:36  342K  
[   ] Anti-Debugging 8211 A Developers View.pdf                                                                              13-Jan-2017 13:36  208K  
[   ] APT.pdf                                                                                                                13-Jan-2017 13:36  2.5M  
[   ] ARM Addressing Modes Quick Reference Card.pdf                                                                          13-Jan-2017 13:36  210K  
[   ] ARM Developer Suite - Assembler Guide.pdf                                                                              13-Jan-2017 13:36  1.6M  
[   ] ARM IAR Assembler - Reference Guide - for Advanced RISC Machines Ltd - ARM Cores.pdf                                   13-Jan-2017 13:36  1.3M  
[   ] ASLR - Address Space Layout Randomization.pdf                                                                          13-Jan-2017 13:36  259K  
[   ] Assault on PHP Applications.pdf                                                                                        13-Jan-2017 13:36  2.9M  
[   ] Attacking the core.pdf                                                                                                 13-Jan-2017 13:36  5.3M  
[   ] bh08sotirovdowd.pdf                                                                                                    13-Jan-2017 13:36  684K  
[   ] BHDC-2010-Paper.pdf                                                                                                    13-Jan-2017 13:36  260K  
[   ] BHUS10_Slides_Payload_already_inside_data_reuse_for_ROP_exploits_v1.pdf                                                13-Jan-2017 13:36  207K  
[   ] BHUSA09-Oh-DiffingBinaries-PAPER.pdf                                                                                   13-Jan-2017 13:36  601K  
[   ] BlackHat-USA-2010-Meer-History-of-Memory-Corruption-Attacks-wp.pdf                                                     13-Jan-2017 13:36  3.8M  
[   ] Blended attacks exploits, Vulnerabilities and Buffer-Overlow Techinques.pdf                                            13-Jan-2017 13:36  781K  
[   ] Blind Exploitation of Stack Overflow Vulnerabilities.pdf                                                               13-Jan-2017 13:36  161K  
[   ] Breaking-virtualization-by-switching-to-Virtual-8086-mode_final.pdf                                                    13-Jan-2017 13:36  768K  
[   ] Browser Vulnerability Analysis.pdf                                                                                     13-Jan-2017 13:36  444K  
[   ] Buffer Overflow Attacks on Linux Principles Analyzing and Protection.pdf                                               13-Jan-2017 13:36   56K  
[   ] Building A Simple Stack Abstraction.pdf                                                                                13-Jan-2017 13:36  8.0K  
[   ] Bypassing Hardware Based Data Execution Prevention (DEP) On Windows 2003 SP2.pdf                                       13-Jan-2017 13:36  497K  
[   ] Bypassing non-executable-stack during exploitation using return-to-libc.pdf                                            13-Jan-2017 13:36   15K  
[   ] Bypassing Web Application Firewalls with HTTP Parameter Pollution.pdf                                                  13-Jan-2017 13:36  103K  
[   ] Bypassing Windows heap protections.pdf                                                                                 13-Jan-2017 13:36   88K  
[   ] Calling conventions for different C++ compilers and operating systems.pdf                                              13-Jan-2017 13:36  358K  
[   ] Common Control System Vulnerability.pdf                                                                                13-Jan-2017 13:36  311K  
[   ] Compile-time stack requirements analysis with GCC.pdf                                                                  13-Jan-2017 13:36   51K  
[   ] Compression Plus and Tumbleweed EMF Stack Overflow Security Advisory.pdf                                               13-Jan-2017 13:36  114K  
[   ] Confidence2010 ROP and JIT-Spray.pdf                                                                                   13-Jan-2017 13:36  918K  
[   ] confidence_slideshow.pdf                                                                                               13-Jan-2017 13:36  1.6M  
[   ] Cracking the basics.pdf                                                                                                13-Jan-2017 13:36  196K  
[   ] Cyclic Redundancy Check (CRC).pdf                                                                                      13-Jan-2017 13:36   64K  
[   ] D1T1 - Tavis Ormandy - Making Software Dumber.pdf                                                                      13-Jan-2017 13:36   78K  
[   ] D1T2 - Alexey Sintsov - JIT Spray Attacks and Advanced Shellcode.pdf                                                   13-Jan-2017 13:36  1.1M  
[   ] D2 - Gynvael Coldwind - Case Study of Recent Windows Vulnerabilities.pdf                                               13-Jan-2017 13:36  1.3M  
[   ] Debugging multi-threaded applications with RTOS-aware tools.pdf                                                        13-Jan-2017 13:36  181K  
[   ] Decimalisation Table Attacks for PIN Cracking.pdf                                                                      13-Jan-2017 13:36  132K  
[   ] Defeating DEP through a mapped file.pdf                                                                                13-Jan-2017 13:36  533K  
[   ] Defeating the Stack Based Buffer Overflow Prevention Mechanism of Microsoft Windows 2003 Server.pdf                    13-Jan-2017 13:36  110K  
[   ] defeating-xpsp2-heap-protection.pdf                                                                                    13-Jan-2017 13:36   90K  
[   ] Defending Embedded Systems Against Buffer Overflow via Hardware-Software.pdf                                           13-Jan-2017 13:36   74K  
[   ] DEPinDepth.ppt                                                                                                         13-Jan-2017 13:36  2.9M  
[   ] DEPLIB.pdf                                                                                                             13-Jan-2017 13:36  2.0M  
[   ] DEPLIB20_ekoparty.pdf                                                                                                  13-Jan-2017 13:36  419K  
[   ] Developing StrongARM Linux shellcode.pdf                                                                               13-Jan-2017 13:36   95K  
[   ] DNS Cache Poisoning Vulnerability.pdf                                                                                  13-Jan-2017 13:37  2.0M  
[   ] Dynamic Buffer Overflow Detection.pdf                                                                                  13-Jan-2017 13:37  244K  
[   ] Elementary Structures.pdf                                                                                              13-Jan-2017 13:37  193K  
[   ] Eliminating stack overflow by abstract interpretation.pdf                                                              13-Jan-2017 13:37  101K  
[   ] Eliminating the Threat of Kernel Stack Overflows.pdf                                                                   13-Jan-2017 13:37  156K  
[   ] EN-Advanced SQL Injection In SQL Server Applications.pdf                                                               13-Jan-2017 13:37  291K  
[   ] EN-Bypass windows server 2008.pdf                                                                                      13-Jan-2017 13:37  217K  
[   ] EN-Exploit writing tutorial part 4 _ From Exploit to Metasploit %80%93 The basics.pdf                                  13-Jan-2017 13:37   35K  
[   ] EN-Exploiting Format String Vulnerabilities.pdf                                                                        13-Jan-2017 13:37  229K  
[   ] EN-Game Hacking.pdf                                                                                                    13-Jan-2017 13:37  1.6M  
[   ] EN-NOx86-64 buffer overflow exploits and the borrowed code chunks exploitation technique -NX.pdf                       13-Jan-2017 13:37   82K  
[   ] Engineering Heap Overflow Exploits with JavaScript.pdf                                                                 13-Jan-2017 13:37  136K  
[   ] Evolving Shell Code (Symantec).pdf                                                                                     13-Jan-2017 13:37  157K  
[   ] Evolving Successful Stack Overflow Attacks for Vulnerability Testing.pdf                                               13-Jan-2017 13:37  473K  
[   ] Experiencing Enhanced Emulation Debugging.pdf                                                                          13-Jan-2017 13:37  873K  
[   ] Exploit writing tutorial part 1 _ Stack Based Overflows.pdf                                                            13-Jan-2017 13:37  706K  
[   ] Exploit writing tutorial part 2 _ Stack Based Overflows - jumping to shellcode.pdf                                     13-Jan-2017 13:37  522K  
[   ] Exploit writing tutorial part 3 _ SEH Based Exploits.pdf                                                               13-Jan-2017 13:37  1.7M  
[   ] Exploit writing tutorial part 3b _ SEH Based Exploits - just another example.pdf                                       13-Jan-2017 13:37   73K  
[   ] Exploit writing tutorial part 4 _ From Exploit to Metasploit - The basics.pdf                                          13-Jan-2017 13:37   34K  
[   ] Exploit writing tutorial part 6 _ Bypassing Stack Cookies, SafeSeh, HW DEP and ASLR.pdf                                13-Jan-2017 13:37  3.1M  
[   ] Exploit writing tutorial part 7 _ Unicode - from 0x00410041 to calc.pdf                                                13-Jan-2017 13:37  619K  
[   ] Exploit writing tutorial part 8 _ Win32 Egg Hunting.pdf                                                                13-Jan-2017 13:37  3.5M  
[   ] Exploiting ARM Linux Systems.pdf                                                                                       13-Jan-2017 13:37  667K  
[   ] Exploiting Stack Overflows in the Linux Kernel.pdf                                                                     13-Jan-2017 13:37  289K  
[   ] Exploiting the iOS Kernel.pdf                                                                                          13-Jan-2017 13:37  201K  
[   ] Exploring Windows CE Shellcode.pdf                                                                                     13-Jan-2017 13:37  242K  
[   ] ferminjserna-exploitsmitigationsemet-100328034335-phpapp02.pdf                                                         13-Jan-2017 13:37  475K  
[   ] Finding_and_Understanding_Bugs_in_C_Compilers.pdf                                                                      13-Jan-2017 13:37  309K  
[   ] Format String Attacks.pdf                                                                                              13-Jan-2017 13:37  217K  
[   ] Fuzzing_for_software_vulnerability_discovery.pdf                                                                       13-Jan-2017 13:37  5.6M  
[   ] GDT and LDT in Windows kernel vulnerability exploitation.pdf                                                           13-Jan-2017 13:37  682K  
[   ] hawkes_ruxcon.pdf                                                                                                      13-Jan-2017 13:37  1.1M  
[   ] Heap Feng Shui in JavaScript.pdf                                                                                       13-Jan-2017 13:37  164K  
[   ] HES10-jvanegue_zero-allocations.pdf                                                                                    13-Jan-2017 13:37  823K  
[   ] HES2010_Evolution_Of_Microsofts_Mitigations.pdf                                                                        13-Jan-2017 13:37  1.8M  
[   ] How Conficker makes use of MS08-067.pdf                                                                                13-Jan-2017 13:37  193K  
[   ] HTTP Parameter Pollution.pdf                                                                                           13-Jan-2017 13:37  1.2M  
[   ] Hybrid Engine for Polymorphic Shellcode Detection.pdf                                                                  13-Jan-2017 13:37  924K  
[   ] Implementing a Soft Stack in Data Memory on the MAXQ2000.pdf                                                           13-Jan-2017 13:37   35K  
[   ] InsecurityofPoorlyDesignedRemoteFileInclusionPayloads-Part2.pdf                                                        13-Jan-2017 13:37  349K  
[   ] Intel Assembler CodeTable 80x86.pdf                                                                                    13-Jan-2017 13:37  147K  
[   ] KernelPool.pdf                                                                                                         13-Jan-2017 13:37  403K  
[   ] kernel_modules.pdf                                                                                                     13-Jan-2017 13:37   52K  
[   ] Lateral SQL Injection_ A ew Class of Vulnerability in Oracle.pdf                                                       13-Jan-2017 13:37  154K  
[   ] Learn Information Gathering By Example.pdf                                                                             13-Jan-2017 13:37  1.1M  
[   ] Linux Memory Protection Mechanism Linux Memory Protection Mechanism.pdf                                                13-Jan-2017 13:37   35K  
[   ] Linux Security HOWTO.pdf                                                                                               13-Jan-2017 13:37  428K  
[   ] Linux Security Quick Reference Guide.pdf                                                                               13-Jan-2017 13:37   69K  
[   ] LINUX System Call Quick Reference.pdf                                                                                  13-Jan-2017 13:37   55K  
[   ] LPC-ALPC-slides.pdf                                                                                                    13-Jan-2017 13:37  2.7M  
[   ] Mac OS X PPC Shellcode Tricks.pdf                                                                                      13-Jan-2017 13:37  142K  
[   ] Metasploit.pdf                                                                                                         13-Jan-2017 13:37  6.9M  
[   ] MPI and Password Cracking.pdf                                                                                          13-Jan-2017 13:37   96K  
[   ] NetWare Kernel Stack Overflow Exploitation.pdf                                                                         13-Jan-2017 13:37  291K  
[   ] Network-Level Polymorphic Shellcode Detection Using Emulation.pdf                                                      13-Jan-2017 13:37  110K  
[   ] Non-Executable Stack ARM Exploitation Research Paper.pdf                                                               13-Jan-2017 13:37  346K  
[   ] Non-Executable Stack ARM Exploitation.pdf                                                                              13-Jan-2017 13:37  225K  
[   ] On Evolving Buffer Overflow Attacks Using Genetic Programming.pdf                                                      13-Jan-2017 13:37  294K  
[   ] On the Infeasibility of Modeling Polymorphic Shellcode.pdf                                                             13-Jan-2017 13:37  360K  
[   ] Online Stack Overflow Detection on the TMS320C28x DSP.pdf                                                              13-Jan-2017 13:37  407K  
[   ] Optimal Register Reassignment for Register Stack Overflow Minimization.pdf                                             13-Jan-2017 13:37  571K  
[   ] OWASL_IL_2010_Jan_-_Moshe_Ben_Abu_-_Advanced_Heapspray.pdf                                                             13-Jan-2017 13:37  194K  
[   ] owasp_201011.pdf                                                                                                       13-Jan-2017 13:37  901K  
[   ] Paper_Payload_already_inside_data_reuse_for_ROP_exploits.pdf                                                           13-Jan-2017 13:37  205K  
[   ] Path Optimization in Programs and its Application to Debugging.pdf                                                     13-Jan-2017 13:37  168K  
[   ] Payload Already Inside_ Data re-use for ROP Exploits WhitePaper.pdf                                                    13-Jan-2017 13:37  209K  
[   ] Payload Already Inside_ Data re-use for ROP Exploits-slide.pdf                                                         13-Jan-2017 13:37  206K  
[   ] PBX Vulnerability Analysis.pdf                                                                                         13-Jan-2017 13:37  224K  
[   ] PE Infection - How to Inject a dll.pdf                                                                                 13-Jan-2017 13:37  707K  
[   ] php_fuzzing_auditing.pdf                                                                                               13-Jan-2017 13:37  280K  
[   ] Polymorphic Shellcodes vs. Application IDSs.pdf                                                                        13-Jan-2017 13:37   27K  
[   ] PowerPC-OS X (Darwin) Shellcode Assembly.pdf                                                                           13-Jan-2017 13:37  282K  
[   ] Practical Return Oriented Programming.pdf                                                                              13-Jan-2017 13:37  1.7M  
[   ] Pratical Linux Shellcode.pdf                                                                                           13-Jan-2017 13:37  126K  
[   ] Pwn2Own-2010-Windows7-InternetExplorer8.pdf                                                                            13-Jan-2017 13:37  304K  
[   ] RARLab's WinRAR Local Stack Overflow.pdf                                                                               13-Jan-2017 13:37   67K  
[   ] Recent Shellcode Developments.pdf                                                                                      13-Jan-2017 13:38  195K  
[   ] Recovering the Toolchain Provenance of Binary Code.pdf                                                                 13-Jan-2017 13:38  362K  
[   ] Repairing Return Address Stack for Buffer Overflow Protection.pdf                                                      13-Jan-2017 13:38  193K  
[   ] report.pdf                                                                                                             13-Jan-2017 13:38  1.7M  
[   ] Return Oriented Programming for the ARM Architecture.pdf                                                               13-Jan-2017 13:38  853K  
[   ] Return Oriented Programming.pdf                                                                                        13-Jan-2017 13:38  1.0M  
[   ] Return-oriented Programming without Returns (on the x86).pdf                                                           13-Jan-2017 13:38  430K  
[   ] Return-Oriented Programming-Systems Languages and Applications.pdf                                                     13-Jan-2017 13:38  612K  
[   ] Reverse Code Engineering (RCE).pdf                                                                                     13-Jan-2017 13:38  234K  
[   ] Reverse Engineer's Cookbook.pdf                                                                                        13-Jan-2017 13:38  174K  
[   ] Reverse Engineering MAC Protocol.pdf                                                                                   13-Jan-2017 13:38  289K  
[   ] Reverse Engineering MAC_ A Non-Cooperative Game Model 2.pdf                                                            13-Jan-2017 13:38  146K  
[   ] REVERSE ENGINEERING UNDER SIEGE.pdf                                                                                    13-Jan-2017 13:38   24K  
[   ] Reverse Engineering_ Anti-Cracking Techniques.pdf                                                                      13-Jan-2017 13:38  331K  
[   ] Reverse Engineering_ Memory Analysis.pdf                                                                               13-Jan-2017 13:38  756K  
[   ] Reverse Engineering_ Smashing the Signature.pdf                                                                        13-Jan-2017 13:38  924K  
[   ] Reverse-Engineering a Cryptographic RFID Tag.pdf                                                                       13-Jan-2017 13:38  246K  
[   ] Reverse-engineering transcription control networks.pdf                                                                 13-Jan-2017 13:38  1.3M  
[   ] Reversing C++.pdf                                                                                                      13-Jan-2017 13:38  602K  
[   ] rootedcon_0day_english.pdf                                                                                             13-Jan-2017 13:38  317K  
[   ] rop.pdf                                                                                                                13-Jan-2017 13:38  1.0M  
[   ] ROPdefender.pdf                                                                                                        13-Jan-2017 13:38  423K  
[   ] ROP_Whitepaper.pdf                                                                                                     13-Jan-2017 13:38  472K  
[   ] Safely Searching Process Virtual Address Space.pdf                                                                     13-Jan-2017 13:38  169K  
[   ] SAP security_ attacking sap client.pdf                                                                                 13-Jan-2017 13:38  581K  
[   ] sean_ruxcon2010.pdf                                                                                                    13-Jan-2017 13:38  5.6M  
[   ] Secure_Programing_with_GCC_and_GLbc.pdf                                                                                13-Jan-2017 13:38  366K  
[   ] Security Implications of Windows Access Tokens.pdf                                                                     13-Jan-2017 13:38  1.2M  
[   ] SEH all-at-once attack a New technique to bypass SafeSEH+SEHOP protections.pdf                                         13-Jan-2017 13:38  1.2M  
[   ] SEH Overwrites Simplified v1.01.pdf                                                                                    13-Jan-2017 13:38  349K  
[   ] Session Fixation Vulnerability in Web-based Applications.pdf                                                           13-Jan-2017 13:38  405K  
[   ] SH-4 CPU Core Architecture.pdf                                                                                         13-Jan-2017 13:38  1.8M  
[   ] Shellcoding for Linux and Windows Tutorial.pdf                                                                         13-Jan-2017 13:38  107K  
[   ] Stack Based Buffer Overflows and Protection Mechanisms.pdf                                                             13-Jan-2017 13:39  502K  
[   ] Stack Overflow Detection Using The ST9 TIMER-WATCHDOG.pdf                                                              13-Jan-2017 13:39   59K  
[   ] Stack Overflow Exploitation Explained.pdf                                                                              13-Jan-2017 13:39  1.5M  
[   ] Stack overflow on Windows Vista.pdf                                                                                    13-Jan-2017 13:39  148K  
[   ] Stack overflow on Windows XP SP2.pdf                                                                                   13-Jan-2017 13:39  153K  
[   ] Stack Overflow_ A Great Place for Answers.pdf                                                                          13-Jan-2017 13:39   26K  
[   ] Stack Smashing Protector (slides - NDH 2010).pdf                                                                       13-Jan-2017 13:39  116K  
[   ] Statically Detecting Likely Buffer Overflow Vulnerabilities.pdf                                                        13-Jan-2017 13:39  119K  
[   ] Steganography FAQ.pdf                                                                                                  13-Jan-2017 13:39  316K  
[   ] stsi2010.pdf                                                                                                           13-Jan-2017 13:39  2.1M  
[   ] Surgically returning to randomized lib(c).pdf                                                                          13-Jan-2017 13:39  203K  
[   ] Symantec Altiris Deployment Solution Elevation of Privileges Vulnerabilities.pdf                                       13-Jan-2017 13:39  799K  
[   ] Syscall Proxying - Simulating remote execution.pdf                                                                     13-Jan-2017 13:39  101K  
[   ] System Call Sequence (_chmod example).pdf                                                                              13-Jan-2017 13:39   46K  
[   ] Testing C Programs for Buffer Overflow Vulnerabilities.pdf                                                             13-Jan-2017 13:39   97K  
[   ] The ARM Instruction Set.pdf                                                                                            13-Jan-2017 13:39  683K  
[   ] The cross-page overwrite and it's application in heap overflows.pdf                                                    13-Jan-2017 13:39   32K  
[   ] The Geometry of Innocent Flesh on the Bone_ Return-into-libc without Function Calls on the x86.pdf                     13-Jan-2017 13:39  281K  
[   ] The Law and Economics of Reverse Engineering.pdf                                                                       13-Jan-2017 13:39  1.3M  
[   ] The Legitimate Vulnerability Market.pdf                                                                                13-Jan-2017 13:39  332K  
[   ] The Linux Kernel Module Programming Guide.pdf                                                                          13-Jan-2017 13:39  539K  
[   ] The unbearable lightness of PIN cracking.pdf                                                                           13-Jan-2017 13:39  174K  
[   ] The.Shellcoder's.Handbook.Discovering.and.Exploiting.Security.Holes.2nd.Edition.pdf                                    13-Jan-2017 13:39  8.7M  
[   ] There_s_a_Party_at_Ring0.pdf                                                                                           13-Jan-2017 13:39  390K  
[   ] Sockets, Shellcode , Porting and Codeing - Reverse Engineering Exploits and Tool Coding for Security Professionals.pdf 13-Jan-2017 13:39  112M  
[   ] TippingPoint IPS Signature Evasion through Packet Fragmentation.pdf                                                    13-Jan-2017 13:39   76K  
[   ] Towards the Reverse Engineering of Denormalized Relational Databases.pdf                                               13-Jan-2017 13:39  926K  
[   ] Understanding Windows Shellcode.pdf                                                                                    13-Jan-2017 13:39  425K  
[   ] Using (ShoutBoxes) to control malicious software.pdf                                                                   13-Jan-2017 13:39   83K  
[   ] understanding_Linux_virtual_memory_manager.pdf                                                                         13-Jan-2017 13:39  633K  
[   ] Using dual-mappings to evade automated unpackers.pdf                                                                   13-Jan-2017 13:39  102K  
[   ] Vulnerability Scanning for Buffer Overflow.pdf                                                                         13-Jan-2017 13:39   77K  
[   ] Web Application Security - Buffer Overflows_ Are you really at risk.pdf                                                13-Jan-2017 13:39  130K  
[   ] win64_confidence2010.pdf                                                                                               13-Jan-2017 13:39  206K  
[   ] Windows Assembly Programming Tutorial.pdf                                                                              13-Jan-2017 13:39  121K  
[   ] Win32 Stack BufferOverFlow Real Life Vuln-Dev Process.pdf                                                              13-Jan-2017 13:39  1.3M  
[   ] Wireless Security and Buffer Overflows.pdf                                                                             13-Jan-2017 13:39   44K  
[   ] WPAD TECHNOLOGY WEAKNESSES.pdf                                                                                         13-Jan-2017 13:39  343K  
[   ] Writing MIPS-IRIX shellcode.pdf                                                                                        13-Jan-2017 13:39  157K  
[   ] Writing shellcode exploits for VoIP phones.pdf                                                                         13-Jan-2017 13:39  177K  
[   ] Writing Small Shellcode.pdf                                                                                            13-Jan-2017 13:39  141K  
[   ] Writing shellcode for Linux and BSD.pdf                                                                                13-Jan-2017 13:39  233K  
[   ] Xcon2005_SoBeIt.pdf                                                                                                    13-Jan-2017 13:39  200K  
[   ] x86 Assembly Language Reference Manual.pdf                                                                             13-Jan-2017 13:39  787K  
[   ] XCon2010_win7.pdf                                                                                                      13-Jan-2017 13:39  468K  






© 2013-2017 - index-of.es


email feed