Name Size
Parent Directory -
CONF SLIDES AND PAPER/ -
LIVRES/ -
1510.07563.pdf 6.2M
1510.07563v1.pdf 6.2M
1604.06964.pdf 309K
24-DEADLY-SINS-OF-SOFTWARE-SECURITY-2010.pdf 2.8M
ANDROID.pdf 2.3M
API_Native-1.01.pdf 899K
ART OF EXPLOITATION, 2nd Edition.pdf 4.8M
AST2012.pdf 405K
Advanced.Bootkit.Techniques.On.Android.pdf 7.1M
Apress.Cryptography.In.C.And.C.Plus.Plus.2nd.Edition.Jul.2013.ISBN.1430250984.pdf 3.0M
Attack_tor.pdf 287K
AttackingAndDefendingBIOS-RECon2015.pdf 2.4M
Auerbach.Practical.Hacking.Techniques.and.Countermeasures.Nov.2006.pdf 29M
BH_US_12_Brossard_Backdoor_Hacking_Slides.pdf 1.6M
BP.New.Feb2016.ISBN.097528388X.pdf 3.4M
BlackHat_DC_2011_Perez-Pico_Mobile_Attacks-Slides.pdf 2.1M
BlackHat_DC_2011_Perez-Pico_Mobile_Attacks-wp.pdf 1.3M
Black_Book_Companion.pdf 3.3M
CIA - Field Expedient Methods for Explosives Preparations.pdf 1.7M
CIA - The Freedom Fighters Manual.pdf 3.8M
CONFidence2009_bernardo_damele_guido_landi.pdf 745K
CRC.Press.Crypto.Nov.2014.ISBN.1482228890.pdf 2.4M
CRC.Press.Cyber.Mar.2016.ISBN.1498734731.pdf 6.3M
Cahier de maths 2de - _dition 2013.pdf 19M
Catalogue de stages CGI Business Consulting Security Risk Management 2017.pdf 902K
Certified Ethical Hacker (CEH) v3.0 Official Course.pdf 2.6M
CodeSoldatIllu.pdf 290K
CodeView.pdf 209K
Computer Forensics, Investigating Data and Image Files.pdf 15M
Contre espionnage.pdf 1.4M
Crc Press - The Hacker'S Handbook.pdf 1.0M
Cryptologie.pdf 369K
D2T2 - D. Mende & Enno Rey - Attacking 3G and 4G Networks.pdf 2.2M
DEFCON-24-Arnaud-Soullie-Workshop-Pentesting-ICS-101.pdf 4.1M
DEFCON-24-Hendrik-Schmidt-Brian-Butter-Attacking-BaseStations.pdf 1.6M
DEFCON-24-Mike-Rich-Use-Their-Machines-Against-Them.pdf 1.6M
Data Structures Using C, 2nd edition.pdf 18M
Deserialization - What Could Go Wrong.pdf 1.5M
Detecting and Removing Web Application Vulnerabilities with Static Analysis and Data Mining.pdf 1.5M
EN - Hacking Blind - BROP - Bittau.pdf 471K
EN - Stack Bug - Stack Overflow ASLR bypass using ret2reg.pdf 762K
Explosives and Propellants from Commonly Available Materials.pdf 1.9M
Field Manufactured Explosives.pdf 3.4M
File_Format_Fuzzing_in_Android_-Alexandru_Blanda.pdf 605K
Firstov - Attacking MongoDB.pdf 2.0M
Forristal_Hardware_Involved_Software_Attacks.pdf 1.3M
Fuzzing Brute Force Vulnerability Discovery.pdf 56M
GLIBCGhostVulnExploit.pdf 497K
GregorioCours3eme.pdf 4.2M
Hacking Exposed Mobile Security Secrets & Solutions - Neil Bergman.pdf 6.3M
Heat guns.pdf 57K
Home and Recreational Use of High Explosives and Homemade C-4.pdf 85K
Home security.pdf 183K
How To Backdoor Diffie-Hellman.pdf 2.2M
How To Build Your Own Underground Home - (Malestrom).pdf 48M
How to Plan, Contract and Build Your Own Home - (Malestrom).pdf 7.7M
How_Do_I_Crack_Satellite_and_Cable_Pay_TV_slides.pdf 29M
IDA Pro Book.pdf 8.7M
IDA Pro Book_ The Unofficial Guide to the World's Most Popular Disassembler, The - Eagle, Chris.pdf 7.8M
Improvised Explosives.pdf 2.2M
Improvised Kitchen Explosives.pdf 255K
IntroToCellularSecurity-20140121.pdf 1.8M
JMD2015-ECCWS.pdf 836K
Jones.And.Bartlett.Rootkit.2nd.Edition.Mar.2012.ISBN.144962636X.pdf 106M
Le Renseignement.pdf 165K
Les_actes_elementaires_du_fantassin.pdf 2.1M
Les_actes_reflexes_du_fantassin.pdf 3.0M
ModernLandCombat.pdf 64M
ProgrammingGroundUp-1-0-lettersize.pdf 1.3M
Survival, Evasion and Recovery.pdf 2.6M
The Hacker Crackdown.pdf 730K
Winsock.pdf 124K
cbd.pdf 1.0M
emp.pdf 207K
int1.pdf 2.4M
int2a.pdf 3.0M
int2b.pdf 2.9M
int3a.pdf 3.2M
int3b.pdf 3.9M
maximum ctf.pdf 17M
menace650.pdf 50K
module1.pdf 412K
module2.pdf 313K
module3.pdf 430K
perl tutorial.pdf 228K
rapport_echelon_fr.pdf 1.0M
terrorists-handbook.pdf 194K