Name Size
Parent Directory -
x86 Assembly Language Reference Manual.pdf 787K
win64_confidence2010.pdf 206K
understanding_Linux_virtual_memory_manager.pdf 633K
stsi2010.pdf 2.1M
sean_ruxcon2010.pdf 5.6M
rop.pdf 1.0M
rootedcon_0day_english.pdf 317K
report.pdf 1.7M
php_fuzzing_auditing.pdf 280K
owasp_201011.pdf 901K
kernel_modules.pdf 52K
hawkes_ruxcon.pdf 1.1M
ferminjserna-exploitsmitigationsemet-100328034335-phpapp02.pdf 475K
defeating-xpsp2-heap-protection.pdf 90K
confidence_slideshow.pdf 1.6M
bh08sotirovdowd.pdf 684K
andrewg-ruxcon_2010.pdf 342K
Xcon2005_SoBeIt.pdf 200K
XCon2010_win7.pdf 468K
Writing shellcode for Linux and BSD.pdf 233K
Writing shellcode exploits for VoIP phones.pdf 177K
Writing Small Shellcode.pdf 141K
Writing MIPS-IRIX shellcode.pdf 157K
Wireless Security and Buffer Overflows.pdf 44K
Windows Assembly Programming Tutorial.pdf 121K
Win32 Stack BufferOverFlow Real Life Vuln-Dev Process.pdf 1.3M
Web Application Security - Buffer Overflows_ Are you really at risk.pdf 130K
WPAD TECHNOLOGY WEAKNESSES.pdf 343K
Vulnerability Scanning for Buffer Overflow.pdf 77K
Using dual-mappings to evade automated unpackers.pdf 102K
Using (ShoutBoxes) to control malicious software.pdf 83K
Understanding Windows Shellcode.pdf 425K
UCPy_ Reverse-Engineering Python.pdf 133K
Towards the Reverse Engineering of Denormalized Relational Databases.pdf 926K
TippingPoint IPS Signature Evasion through Packet Fragmentation.pdf 76K
There_s_a_Party_at_Ring0.pdf 390K
The.Shellcoder's.Handbook.Discovering.and.Exploiting.Security.Holes.2nd.Edition.pdf 8.7M
The unbearable lightness of PIN cracking.pdf 174K
The cross-page overwrite and it's application in heap overflows.pdf 32K
The Linux Kernel Module Programming Guide.pdf 539K
The Legitimate Vulnerability Market.pdf 332K
The Law and Economics of Reverse Engineering.pdf 1.3M
The Geometry of Innocent Flesh on the Bone_ Return-into-libc without Function Calls on the x86.pdf 281K
The ARM Instruction Set.pdf 683K
Testing C Programs for Buffer Overflow Vulnerabilities.pdf 97K
System Call Sequence (_chmod example).pdf 46K
Syscall Proxying - Simulating remote execution.pdf 101K
Symantec Altiris Deployment Solution Elevation of Privileges Vulnerabilities.pdf 799K
Surgically returning to randomized lib(c).pdf 203K
Steganography FAQ.pdf 316K
Statically Detecting Likely Buffer Overflow Vulnerabilities.pdf 119K
Stack overflow on Windows XP SP2.pdf 153K
Stack overflow on Windows Vista.pdf 148K
Stack Smashing Protector (slides - NDH 2010).pdf 116K
Stack Overflow_ A Great Place for Answers.pdf 26K
Stack Overflow Exploitation Explained.pdf 1.5M
Stack Overflow Detection Using The ST9 TIMER-WATCHDOG.pdf 59K
Stack Based Buffer Overflows and Protection Mechanisms.pdf 502K
Shellcoding for Linux and Windows Tutorial.pdf 107K
Session Fixation Vulnerability in Web-based Applications.pdf 405K
Security Implications of Windows Access Tokens.pdf 1.2M
Securing & Hardening Linux v1.0.pdf 119K
Secure_Programing_with_GCC_and_GLbc.pdf 366K
Safely Searching Process Virtual Address Space.pdf 169K
SH-4 CPU Core Architecture.pdf 1.8M
SEH all-at-once attack a New technique to bypass SafeSEH+SEHOP protections.pdf 1.2M
SEH Overwrites Simplified v1.01.pdf 349K
SAP security_ attacking sap client.pdf 581K
Reversing C++.pdf 602K
Reverse-engineering transcription control networks.pdf 1.3M
Reverse-Engineering a Cryptographic RFID Tag.pdf 246K
Reverse Engineering_ Smashing the Signature.pdf 924K
Reverse Engineering_ Memory Analysis.pdf 756K
Reverse Engineering_ Anti-Cracking Techniques.pdf 331K
Reverse Engineering MAC_ A Non-Cooperative Game Model 2.pdf 146K
Reverse Engineering MAC Protocol.pdf 289K
Reverse Engineering Exploits and Tool Coding for Security Professionals.pdf 112M
Reverse Engineer's Cookbook.pdf 174K
Reverse Code Engineering (RCE).pdf 234K
Return-oriented Programming without Returns (on the x86).pdf 430K
Return-Oriented Programming-Systems Languages and Applications.pdf 612K
Return Oriented Programming.pdf 1.0M
Return Oriented Programming for the ARM Architecture.pdf 853K
Repairing Return Address Stack for Buffer Overflow Protection.pdf 193K
Recovering the Toolchain Provenance of Binary Code.pdf 362K
Recent Shellcode Developments.pdf 195K
ROPdefender.pdf 423K
ROP_Whitepaper.pdf 472K
REVERSE ENGINEERING UNDER SIEGE.pdf 24K
RARLab's WinRAR Local Stack Overflow.pdf 67K
Pwn2Own-2010-Windows7-InternetExplorer8.pdf 304K
Pratical Linux Shellcode.pdf 126K
Practical Return Oriented Programming.pdf 1.7M
PowerPC-OS X (Darwin) Shellcode Assembly.pdf 282K
Polymorphic Shellcodes vs. Application IDSs.pdf 27K
Payload Already Inside_ Data re-use for ROP Exploits-slide.pdf 206K
Payload Already Inside_ Data re-use for ROP Exploits WhitePaper.pdf 209K
Path Optimization in Programs and its Application to Debugging.pdf 168K
Paper_Payload_already_inside_data_reuse_for_ROP_exploits.pdf 205K
PE Infection - How to Inject a dll.pdf 707K
Optimal Register Reassignment for Register Stack Overflow Minimization.pdf 571K
Online Stack Overflow Detection on the TMS320C28x DSP.pdf 407K
On the Infeasibility of Modeling Polymorphic Shellcode.pdf 360K
On Evolving Buffer Overflow Attacks Using Genetic Programming.pdf 294K
OWASL_IL_2010_Jan_-_Moshe_Ben_Abu_-_Advanced_Heapspray.pdf 194K
Non-Executable Stack ARM Exploitation.pdf 225K
Non-Executable Stack ARM Exploitation Research Paper.pdf 346K
Network-Level Polymorphic Shellcode Detection Using Emulation.pdf 110K
NetWare Kernel Stack Overflow Exploitation.pdf 291K
Metasploit.pdf 6.9M
Mac OS X PPC Shellcode Tricks.pdf 142K
MPI and Password Cracking.pdf 96K
Linux Security Quick Reference Guide.pdf 69K
Linux Security HOWTO.pdf 428K
Linux Memory Protection Mechanism Linux Memory Protection Mechanism.pdf 35K
Learn Information Gathering By Example.pdf 1.1M
Lateral SQL Injection_ A ew Class of Vulnerability in Oracle.pdf 154K
LPC-ALPC-slides.pdf 2.7M
LINUX System Call Quick Reference.pdf 55K
KernelPool.pdf 403K
Intel Assembler CodeTable 80x86.pdf 147K
InsecurityofPoorlyDesignedRemoteFileInclusionPayloads-Part2.pdf 349K
Implementing a Soft Stack in Data Memory on the MAXQ2000.pdf 35K
Hybrid Engine for Polymorphic Shellcode Detection.pdf 924K
How Conficker makes use of MS08-067.pdf 193K
Heap Feng Shui in JavaScript.pdf 164K
HTTP Parameter Pollution.pdf 1.2M
HES2010_Evolution_Of_Microsofts_Mitigations.pdf 1.8M
HES10-jvanegue_zero-allocations.pdf 823K
GDT and LDT in Windows kernel vulnerability exploitation.pdf 682K
Fuzzing_for_software_vulnerability_discovery.pdf 5.6M
Format String Attacks.pdf 217K
Finding_and_Understanding_Bugs_in_C_Compilers.pdf 309K
Exploring Windows CE Shellcode.pdf 242K
Exploiting the iOS Kernel.pdf 201K
Exploiting Stack Overflows in the Linux Kernel.pdf 289K
Exploiting ARM Linux Systems.pdf 667K
Exploit writing tutorial part 8 _ Win32 Egg Hunting.pdf 3.5M
Exploit writing tutorial part 7 _ Unicode - from 0x00410041 to calc.pdf 619K
Exploit writing tutorial part 6 _ Bypassing Stack Cookies, SafeSeh, HW DEP and ASLR.pdf 3.1M
Exploit writing tutorial part 4 _ From Exploit to Metasploit - The basics.pdf 34K
Exploit writing tutorial part 3b _ SEH Based Exploits - just another example.pdf 73K
Exploit writing tutorial part 3 _ SEH Based Exploits.pdf 1.7M
Exploit writing tutorial part 2 _ Stack Based Overflows - jumping to shellcode.pdf 522K
Exploit writing tutorial part 1 _ Stack Based Overflows.pdf 706K
Experiencing Enhanced Emulation Debugging.pdf 873K
Evolving Successful Stack Overflow Attacks for Vulnerability Testing.pdf 473K
Engineering Heap Overflow Exploits with JavaScript.pdf 136K
Eliminating the Threat of Kernel Stack Overflows.pdf 156K
Eliminating stack overflow by abstract interpretation.pdf 101K
Elementary Structures.pdf 193K
EN-NOx86-64 buffer overflow exploits and the borrowed code chunks exploitation technique -NX.pdf 82K
EN-Game Hacking.pdf 1.6M
EN-Exploiting Format String Vulnerabilities.pdf 229K
EN-Exploit writing tutorial part 4 _ From Exploit to Metasploit %80%93 The basics.pdf 35K
EN-Bypass windows server 2008.pdf 217K
EN-Advanced SQL Injection In SQL Server Applications.pdf 291K
Dynamic Buffer Overflow Detection.pdf 244K
Developing StrongARM Linux shellcode.pdf 95K
Defending Embedded Systems Against Buffer Overflow via Hardware-Software.pdf 74K
Defeating the Stack Based Buffer Overflow Prevention Mechanism of Microsoft Windows 2003 Server.pdf 110K
Defeating DEP through a mapped file.pdf 533K
Decimalisation Table Attacks for PIN Cracking.pdf 132K
Debugging multi-threaded applications with RTOS-aware tools.pdf 181K
DNS Cache Poisoning Vulnerability.pdf 2.0M
DEPinDepth.ppt 2.9M
DEPLIB20_ekoparty.pdf 419K
DEPLIB.pdf 2.0M
D2 - Gynvael Coldwind - Case Study of Recent Windows Vulnerabilities.pdf 1.3M
D1T2 - Alexey Sintsov - JIT Spray Attacks and Advanced Shellcode.pdf 1.1M
D1T1 - Tavis Ormandy - Making Software Dumber.pdf 78K
Cyclic Redundancy Check (CRC).pdf 64K
Cracking the basics.pdf 196K
Confidence2010 ROP and JIT-Spray.pdf 918K
Compression Plus and Tumbleweed EMF Stack Overflow Security Advisory.pdf 114K
Compile-time stack requirements analysis with GCC.pdf 51K
Common Control System Vulnerability.pdf 311K
Calling conventions for different C++ compilers and operating systems.pdf 358K
Bypassing non-executable-stack during exploitation using return-to-libc.pdf 15K
Bypassing Windows heap protections.pdf 88K
Bypassing Web Application Firewalls with HTTP Parameter Pollution.pdf 103K
Bypassing Hardware Based Data Execution Prevention (DEP) On Windows 2003 SP2.pdf 497K
Building A Simple Stack Abstraction.pdf 8.0K
Buffer Overflow Attacks on Linux Principles Analyzing and Protection.pdf 56K
Browser Vulnerability Analysis.pdf 444K
Breaking-virtualization-by-switching-to-Virtual-8086-mode_final.pdf 768K
Blind Exploitation of Stack Overflow Vulnerabilities.pdf 161K
Blended attacks exploits, Vulnerabilities and Buffer-Overlow Techinques.pdf 781K
BlackHat-USA-2010-Meer-History-of-Memory-Corruption-Attacks-wp.pdf 3.8M
BHUSA09-Oh-DiffingBinaries-PAPER.pdf 601K
BHUS10_Slides_Payload_already_inside_data_reuse_for_ROP_exploits_v1.pdf 207K
BHDC-2010-Paper.pdf 260K
Attacking the core.pdf 5.3M
Assault on PHP Applications.pdf 2.9M
Anti-Debugging 8211 A Developers View.pdf 208K
Anatomy of a Malware.pdf 47K
Analyzing local privilege escalations in win32k.pdf 192K
Analysis of ANI anih Header Stack Overflow Vulnerability.pdf 131K
Alternative Java Threading Designs for Real-Time Environments.pdf 203K
Advanced_Buffer_Overflow_Methods_[Izik].pdf 19K
ActiveX - Active Exploitation.pdf 172K
Accurate analysis of heap and stack overflows by means of age stamps.pdf 257K
Access Through Access.pdf 554K
ASLR - Address Space Layout Randomization.pdf 259K
ARM IAR Assembler - Reference Guide - for Advanced RISC Machines Ltd - ARM Cores.pdf 1.3M
ARM Developer Suite - Assembler Guide.pdf 1.6M
ARM Addressing Modes Quick Reference Card.pdf 210K
APT.pdf 2.5M
A brief tutorial on GCC inline asm (x86 biased).pdf 70K
A Useful Approach to Finding Bugs.pdf 233K
A Signature-free Buffer Overflow Attack Blocker.pdf 309K
A Practical Dynamic Buffer Overflow Detector.pdf 138K