Index of /Books and Docs on Hacking/Hacking/Reversing and Exploiting/Exploiting
Name
Last modified
Size
Description
Parent Directory
-
A Buffer Overflow Study Attacks & Defenses.pdf
2025-04-18 09:07
485K
ASLR and Smack and Laugh Reference.pdf
2025-04-18 09:07
509K
Access Denied - Guide for Code Breakers.pdf
2025-04-18 09:07
5.1M
Advanced Windows Exploitation.pdf
2025-04-18 09:07
340K
Buffer Overflows - Anatomy of an Exploit (2012).pdf
2025-04-18 09:07
234K
Bypassing DEP with WPM & ROP Case Study Audio Converter.pdf
2025-04-18 09:07
334K
DEP in Depth.pdf
2025-04-18 09:07
595K
Defeating DEP and ASLR.pdf
2025-04-18 09:07
1.2M
Detecting and exploiting integer overflows.pdf
2025-04-18 09:07
494K
Exploit Writing Tutorial - Part 5 - How Debugger Modules and Plugins can Speed up Basic Exploit Development.pdf
2025-04-18 09:07
1.0M
Exploit Writing Tutorial/
2025-04-18 09:07
-
Exploiting Format String Vulnerabilities.pdf
2025-04-18 09:07
229K
Exploiting Software - How To Break Code.pdf
2025-04-18 09:07
7.6M
Hacking - The Art of Exploitation - 2nd Edition.pdf
2025-04-18 09:07
4.4M
JBoss Exploitation.pdf
2025-04-18 09:07
456K
Joomla com_tag exploit.txt
2025-04-18 09:07
446
Linux Exploit Development/
2025-04-18 09:07
-
Linux Kernel Crash Book - Everything you need to know.pdf
2025-04-18 09:07
4.9M
Memory Exploits and Defenses.pdf
2025-04-18 09:07
630K
Multiple D-Link Authentication Bypass Vulnerabilities.pdf
2025-04-18 09:07
51K
Non-Executable Stack ARM Exploitation.pdf
2025-04-18 09:07
230K
OpenBSD Remote Exploiting.pdf
2025-04-18 09:07
256K
Overcoming Trial Version Software Cracking Using a Hybridized Self-Modifying Technique.pdf
2025-04-18 09:07
453K
Packed, Printable, and Polymorphic Return-Oriented Programming.pdf
2025-04-18 09:07
466K
Practical Windows XP - 2003 Heap Exploitation.pdf
2025-04-18 09:07
807K
Return Oriented Programming Exploitation without Code Injection.pdf
2025-04-18 09:07
4.0M
Return into libc without Function Calls.pdf
2025-04-18 09:07
398K
Runtime Attacks - Buffer Overflow and Return-Oriented-Programming.pdf
2025-04-18 09:07
6.6M
SEH Exploitation.pdf
2025-04-18 09:07
380K
Smashing The Stack For Fun And Profit.pdf
2025-04-18 09:07
178K
StegoSploit - Exploiting the Browser using only Images.pdf
2025-04-18 09:07
33M
Tactical Exploitation.pdf
2025-04-18 09:07
391K
Understanding SEH (Structured Exception Handler) Exploitation.pdf
2025-04-18 09:07
1.1M
Understanding the Low Fragmentation Heap.pdf
2025-04-18 09:07
1.1M
Unix ASM Codes Development for Vulnerabilities.pdf
2025-04-18 09:07
274K
Writing Manual - Shellcode by Hand.pdf
2025-04-18 09:06
1.3M
Zero-Day Exploit - Countdown to Darkness.pdf
2025-04-18 09:06
3.7M