Name Size
Parent Directory -
LIVRES/ -
CONF SLIDES AND PAPER/ -
terrorists-handbook.pdf 194K
rapport_echelon_fr.pdf 1.0M
perl tutorial.pdf 228K
module3.pdf 430K
module2.pdf 313K
module1.pdf 412K
menace650.pdf 50K
maximum ctf.pdf 17M
int3b.pdf 3.9M
int3a.pdf 3.2M
int2b.pdf 2.9M
int2a.pdf 3.0M
int1.pdf 2.4M
emp.pdf 207K
cbd.pdf 1.0M
Winsock.pdf 124K
The Hacker Crackdown.pdf 730K
Survival, Evasion and Recovery.pdf 2.6M
ProgrammingGroundUp-1-0-lettersize.pdf 1.3M
ModernLandCombat.pdf 64M
Les_actes_reflexes_du_fantassin.pdf 3.0M
Les_actes_elementaires_du_fantassin.pdf 2.1M
Learning Linux Binary Analysis.pdf 14M
Le Renseignement.pdf 165K
Jones.And.Bartlett.Rootkit.2nd.Edition.Mar.2012.ISBN.144962636X.pdf 106M
JMD2015-ECCWS.pdf 836K
IntroToCellularSecurity-20140121.pdf 1.8M
Improvised Kitchen Explosives.pdf 255K
Improvised Explosives.pdf 2.2M
IDA Pro Book_ The Unofficial Guide to the World's Most Popular Disassembler, The - Eagle, Chris.pdf 7.8M
IDA Pro Book.pdf 8.7M
How_Do_I_Crack_Satellite_and_Cable_Pay_TV_slides.pdf 29M
How to Plan, Contract and Build Your Own Home - (Malestrom).pdf 7.7M
How To Build Your Own Underground Home - (Malestrom).pdf 48M
How To Backdoor Diffie-Hellman.pdf 2.2M
Home security.pdf 183K
Home and Recreational Use of High Explosives and Homemade C-4.pdf 85K
Heat guns.pdf 57K
Hacking Exposed Mobile Security Secrets & Solutions - Neil Bergman.pdf 6.3M
GregorioCours3eme.pdf 4.2M
GLIBCGhostVulnExploit.pdf 497K
Fuzzing Brute Force Vulnerability Discovery.pdf 56M
Forristal_Hardware_Involved_Software_Attacks.pdf 1.3M
Firstov - Attacking MongoDB.pdf 2.0M
File_Format_Fuzzing_in_Android_-Alexandru_Blanda.pdf 605K
Field Manufactured Explosives.pdf 3.4M
Explosives and Propellants from Commonly Available Materials.pdf 1.9M
EN - Stack Bug - Stack Overflow ASLR bypass using ret2reg.pdf 762K
EN - Hacking Blind - BROP - Bittau.pdf 471K
Detecting and Removing Web Application Vulnerabilities with Static Analysis and Data Mining.pdf 1.5M
Deserialization - What Could Go Wrong.pdf 1.5M
Data Structures Using C, 2nd edition.pdf 18M
DEFCON-24-Mike-Rich-Use-Their-Machines-Against-Them.pdf 1.6M
DEFCON-24-Hendrik-Schmidt-Brian-Butter-Attacking-BaseStations.pdf 1.6M
DEFCON-24-Arnaud-Soullie-Workshop-Pentesting-ICS-101.pdf 4.1M
D2T2 - D. Mende & Enno Rey - Attacking 3G and 4G Networks.pdf 2.2M
Cryptologie.pdf 369K
Crc Press - The Hacker'S Handbook.pdf 1.0M
Contre espionnage.pdf 1.4M
Computer Forensics, Investigating Data and Image Files.pdf 15M
CodeView.pdf 209K
CodeSoldatIllu.pdf 290K
Certified Ethical Hacker (CEH) v3.0 Official Course.pdf 2.6M
Catalogue de stages CGI Business Consulting Security Risk Management 2017.pdf 902K
Cahier de maths 2de - _dition 2013.pdf 19M
CRC.Press.Cyber.Mar.2016.ISBN.1498734731.pdf 6.3M
CRC.Press.Crypto.Nov.2014.ISBN.1482228890.pdf 2.4M
CONFidence2009_bernardo_damele_guido_landi.pdf 745K
CIA - The Freedom Fighters Manual.pdf 3.8M
CIA - Field Expedient Methods for Explosives Preparations.pdf 1.7M
Black_Book_Companion.pdf 3.3M
BlackHat_DC_2011_Perez-Pico_Mobile_Attacks-wp.pdf 1.3M
BlackHat_DC_2011_Perez-Pico_Mobile_Attacks-Slides.pdf 2.1M
BP.New.Feb2016.ISBN.097528388X.pdf 3.4M
BH_US_12_Brossard_Backdoor_Hacking_Slides.pdf 1.6M
Auerbach.Practical.Hacking.Techniques.and.Countermeasures.Nov.2006.pdf 29M
AttackingAndDefendingBIOS-RECon2015.pdf 2.4M
Attack_tor.pdf 287K
Apress.Cryptography.In.C.And.C.Plus.Plus.2nd.Edition.Jul.2013.ISBN.1430250984.pdf 3.0M
Advanced.Bootkit.Techniques.On.Android.pdf 7.1M
AST2012.pdf 405K
ART OF EXPLOITATION, 2nd Edition.pdf 4.8M
API_Native-1.01.pdf 899K
ANDROID.pdf 2.3M
24-DEADLY-SINS-OF-SOFTWARE-SECURITY-2010.pdf 2.8M
1604.06964.pdf 309K
1510.07563v1.pdf 6.2M
1510.07563.pdf 6.2M