bxi.es




Icon  Name                                                         Last modified      Size  Description
[DIR] Parent Directory                                                                  -   
[DIR] AMD_Architecture/                                            11-Jun-2013 11:04    -   
[DIR] Exploit Writing Tutorials(CorelanTeam)/                      13-Sep-2016 12:36    -   
[DIR] Intel_Architecture/                                          11-Jun-2013 11:36    -   
[DIR] IntroLinuxRE/                                                11-Jun-2013 11:38    -   
[DIR] LinuxExploitWritingTutorial(by Sickness)/                    11-Jun-2013 11:39    -   
[DIR] ROP/                                                         11-Jun-2013 11:48    -   
[   ] 0x02_bypassing_local_Linux_x86_ASLR_protection.pdf           11-Jun-2013 10:58  110K  
[   ] A Buffer Overflow Study Attacks & Defenses.pdf               11-Jun-2013 10:58  485K  
[   ] ASLR - Address Space Layout Randomization.pdf                11-Jun-2013 11:04  259K  
[   ] ASLR Smack_Reference.pdf                                     11-Jun-2013 11:04  509K  
[   ] ASM_Language.pdf                                             11-Jun-2013 11:04  1.0M  
[   ] Access_Denied - Code_Breakers_Guide.pdf                      11-Jun-2013 10:59  5.1M  
[   ] Advanced Windows Exploitation.pdf                            11-Jun-2013 10:59  340K  
[   ] Advanced_Windows_Debugging.pdf                               11-Jun-2013 11:02  9.5M  
[   ] Attacking the Windows Kernel.pdf                             11-Jun-2013 11:04  294K  
[   ] Bypassing Browser Memory Protections(BH08).pdf               11-Jun-2013 11:04  684K  
[   ] Bypassing DEP with WPM & ROP.pdf                             11-Jun-2013 11:04  334K  
[   ] Chapter02 - RuntimeAttacks.pdf                               11-Jun-2013 11:06  6.6M  
[   ] DEPinDepth.pdf                                               11-Jun-2013 11:07  595K  
[   ] Debugging with gdb.pdf                                       11-Jun-2013 11:06  1.0M  
[   ] Defeating DEP and ASLR.pdf                                   11-Jun-2013 11:07  1.2M  
[   ] Detecting and exploiting integer overflows.pdf               11-Jun-2013 11:07  494K  
[   ] Ensamblador(SPA).pdf                                         11-Jun-2013 11:07  1.0M  
[   ] Exploiting Format String Vulnerabilities.pdf                 11-Jun-2013 11:20  229K  
[   ] Exploiting Stack Overflows in the Linux Kernel.pdf           11-Jun-2013 11:20  289K  
[   ] Format String Attacks.pdf                                    11-Jun-2013 11:20  217K  
[   ] FormatStringAttack.pdf                                       11-Jun-2013 11:20  121K  
[   ] Fuzzing Brute Force Vulnerability Discovery.pdf              11-Jun-2013 11:28   28M  
[   ] Fuzzing Making software Dumber.pdf                           11-Jun-2013 11:28   78K  
[   ] Fuzzing.pdf                                                  11-Jun-2013 11:30  4.5M  
[   ] Fuzzing_for_software_vulnerability_discovery.pdf             11-Jun-2013 11:31  5.6M  
[   ] Generic Anti Exploitation Technology for Windows.pdf         11-Jun-2013 11:32  1.5M  
[   ] Hacking - The Art of Exploitation_2nd Ed.pdf                 11-Jun-2013 11:33  4.4M  
[   ] Introduccion-Explotacion-Software-Linux.pdf                  11-Jun-2013 11:36  552K  
[   ] Linux_Kernel_Crash_Book.pdf                                  11-Jun-2013 11:40  4.9M  
[   ] No_NX.pdf                                                    11-Jun-2013 11:41   82K  
[   ] Non-Executable Stack ARM Exploitation(def18).pdf             11-Jun-2013 11:41  230K  
[   ] On the Effectiveness of Address-Space Randomization.pdf      11-Jun-2013 11:41  147K  
[   ] OpenBSD Remote Exploiting.pdf                                11-Jun-2013 11:41  256K  
[   ] Practical Windows XP-2003 Heap Exploitation BH09.pdf         11-Jun-2013 11:41  807K  
[   ] Programming_from_the_Ground_Up.pdf                           11-Jun-2013 11:41  1.3M  
[   ] Return-oriented Programming without Returns (on the x86).pdf 11-Jun-2013 11:41  430K  
[   ] Reversing-Secrets of Reverse Engineering.pdf                 11-Jun-2013 11:44  8.4M  
[   ] SEH Exploitation.pdf                                         11-Jun-2013 11:48  380K  
[   ] Smashing The Stack For Fun And Profit.pdf                    11-Jun-2013 11:48  178K  
[   ] Smashing the stack in 2010.pdf                               11-Jun-2013 11:49  2.1M  
[   ] Stack Based Buffer Overflows and Protection Mechanisms.pdf   11-Jun-2013 11:49  502K  
[   ] The Art of Assembly Language.pdf                             11-Jun-2013 11:51  6.5M  
[   ] The Ida Pro Book.pdf                                         11-Jun-2013 11:58   26M  
[   ] The “Ultimate”Anti-Debugging Reference.pdf               11-Jun-2013 11:58  723K  
[   ] The.IDA.Pro.Book.2nd.Edition.Jun.2011.pdf                    11-Jun-2013 12:00  9.2M  
[   ] Understanding SEH Exploitation.pdf                           11-Jun-2013 12:03  1.1M  
[   ] Understanding the Low Fragmentation Heap-BH10.pdf            11-Jun-2013 12:03  1.1M  
[   ] Unix ASM Codes Development for Vulnerabilities.pdf           11-Jun-2013 12:03  274K  
[   ] WinDbg_A_to_Z_color.pdf                                      11-Jun-2013 12:04  1.5M  
[   ] WindowsInternals_5ED.pdf                                     11-Jun-2013 12:09   19M  
[   ] shellcoding_without_any_high_level_language.pdf              11-Jun-2013 10:58   97K  
[   ] the_shellcoders_handbook.pdf                                 11-Jun-2013 12:03  8.7M  
[   ] x86 Disassembly.pdf                                          11-Jun-2013 12:09  1.1M  




© 2013-2017 - bxi.es

email
feed