bxi.es


Imagen


Icon  Name                                                         Size  
[PARENTDIR] Parent Directory                                               -   
[DIR] AMD_Architecture/                                              -   
[DIR] Exploit Writing Tutorials(CorelanTeam)/                        -   
[DIR] Intel_Architecture/                                            -   
[DIR] IntroLinuxRE/                                                  -   
[DIR] LinuxExploitWritingTutorial(by Sickness)/                      -   
[DIR] ROP/                                                           -   
[   ] 0x02_bypassing_local_Linux_x86_ASLR_protection.pdf           110K  
[   ] A Buffer Overflow Study Attacks & Defenses.pdf               485K  
[   ] ASLR - Address Space Layout Randomization.pdf                259K  
[   ] ASLR Smack_Reference.pdf                                     509K  
[   ] ASM_Language.pdf                                             1.0M  
[   ] Access_Denied - Code_Breakers_Guide.pdf                      5.1M  
[   ] Advanced Windows Exploitation.pdf                            340K  
[   ] Advanced_Windows_Debugging.pdf                               9.5M  
[   ] Attacking the Windows Kernel.pdf                             294K  
[   ] Bypassing Browser Memory Protections(BH08).pdf               684K  
[   ] Bypassing DEP with WPM & ROP.pdf                             334K  
[   ] Chapter02 - RuntimeAttacks.pdf                               6.6M  
[   ] DEPinDepth.pdf                                               595K  
[   ] Debugging with gdb.pdf                                       1.0M  
[   ] Defeating DEP and ASLR.pdf                                   1.2M  
[   ] Detecting and exploiting integer overflows.pdf               494K  
[   ] Ensamblador(SPA).pdf                                         1.0M  
[   ] Exploiting Format String Vulnerabilities.pdf                 229K  
[   ] Exploiting Stack Overflows in the Linux Kernel.pdf           289K  
[   ] Format String Attacks.pdf                                    217K  
[   ] FormatStringAttack.pdf                                       121K  
[   ] Fuzzing Brute Force Vulnerability Discovery.pdf               28M  
[   ] Fuzzing Making software Dumber.pdf                            78K  
[   ] Fuzzing.pdf                                                  4.5M  
[   ] Fuzzing_for_software_vulnerability_discovery.pdf             5.6M  
[   ] Generic Anti Exploitation Technology for Windows.pdf         1.5M  
[   ] Hacking - The Art of Exploitation_2nd Ed.pdf                 4.4M  
[   ] Introduccion-Explotacion-Software-Linux.pdf                  552K  
[   ] Linux_Kernel_Crash_Book.pdf                                  4.9M  
[   ] No_NX.pdf                                                     82K  
[   ] Non-Executable Stack ARM Exploitation(def18).pdf             230K  
[   ] On the Effectiveness of Address-Space Randomization.pdf      147K  
[   ] OpenBSD Remote Exploiting.pdf                                256K  
[   ] Practical Windows XP-2003 Heap Exploitation BH09.pdf         807K  
[   ] Programming_from_the_Ground_Up.pdf                           1.3M  
[   ] Return-oriented Programming without Returns (on the x86).pdf 430K  
[   ] Reversing-Secrets of Reverse Engineering.pdf                 8.4M  
[   ] SEH Exploitation.pdf                                         380K  
[   ] Smashing The Stack For Fun And Profit.pdf                    178K  
[   ] Smashing the stack in 2010.pdf                               2.1M  
[   ] Stack Based Buffer Overflows and Protection Mechanisms.pdf   502K  
[   ] The Art of Assembly Language.pdf                             6.5M  
[   ] The Ida Pro Book.pdf                                          26M  
[   ] The “Ultimate”Anti-Debugging Reference.pdf               723K  
[   ] The.IDA.Pro.Book.2nd.Edition.Jun.2011.pdf                    9.2M  
[   ] Understanding SEH Exploitation.pdf                           1.1M  
[   ] Understanding the Low Fragmentation Heap-BH10.pdf            1.1M  
[   ] Unix ASM Codes Development for Vulnerabilities.pdf           274K  
[   ] WinDbg_A_to_Z_color.pdf                                      1.5M  
[   ] WindowsInternals_5ED.pdf                                      19M  
[   ] shellcoding_without_any_high_level_language.pdf               97K  
[   ] the_shellcoders_handbook.pdf                                 8.7M  
[   ] x86 Disassembly.pdf                                          1.1M  


© 2013-2017 - bxi.es


email feed