Index of /Books and Docs on Hacking/Hacking/Reversing and Exploiting/Exploiting

[ICO]NameLast modifiedSizeDescription

[PARENTDIR]Parent Directory  -  
[   ]A Buffer Overflow Study Attacks & Defenses.pdf2025-04-18 09:07 485K 
[   ]ASLR and Smack and Laugh Reference.pdf2025-04-18 09:07 509K 
[   ]Access Denied - Guide for Code Breakers.pdf2025-04-18 09:07 5.1M 
[   ]Advanced Windows Exploitation.pdf2025-04-18 09:07 340K 
[   ]Buffer Overflows - Anatomy of an Exploit (2012).pdf2025-04-18 09:07 234K 
[   ]Bypassing DEP with WPM & ROP Case Study Audio Converter.pdf2025-04-18 09:07 334K 
[   ]DEP in Depth.pdf2025-04-18 09:07 595K 
[   ]Defeating DEP and ASLR.pdf2025-04-18 09:07 1.2M 
[   ]Detecting and exploiting integer overflows.pdf2025-04-18 09:07 494K 
[   ]Exploit Writing Tutorial - Part 5 - How Debugger Modules and Plugins can Speed up Basic Exploit Development.pdf2025-04-18 09:07 1.0M 
[DIR]Exploit Writing Tutorial/2025-04-18 09:07 -  
[   ]Exploiting Format String Vulnerabilities.pdf2025-04-18 09:07 229K 
[   ]Exploiting Software - How To Break Code.pdf2025-04-18 09:07 7.6M 
[   ]Hacking - The Art of Exploitation - 2nd Edition.pdf2025-04-18 09:07 4.4M 
[   ]JBoss Exploitation.pdf2025-04-18 09:07 456K 
[TXT]Joomla com_tag exploit.txt2025-04-18 09:07 446  
[DIR]Linux Exploit Development/2025-04-18 09:07 -  
[   ]Linux Kernel Crash Book - Everything you need to know.pdf2025-04-18 09:07 4.9M 
[   ]Memory Exploits and Defenses.pdf2025-04-18 09:07 630K 
[   ]Multiple D-Link Authentication Bypass Vulnerabilities.pdf2025-04-18 09:07 51K 
[   ]Non-Executable Stack ARM Exploitation.pdf2025-04-18 09:07 230K 
[   ]OpenBSD Remote Exploiting.pdf2025-04-18 09:07 256K 
[   ]Overcoming Trial Version Software Cracking Using a Hybridized Self-Modifying Technique.pdf2025-04-18 09:07 453K 
[   ]Packed, Printable, and Polymorphic Return-Oriented Programming.pdf2025-04-18 09:07 466K 
[   ]Practical Windows XP - 2003 Heap Exploitation.pdf2025-04-18 09:07 807K 
[   ]Return Oriented Programming Exploitation without Code Injection.pdf2025-04-18 09:07 4.0M 
[   ]Return into libc without Function Calls.pdf2025-04-18 09:07 398K 
[   ]Runtime Attacks - Buffer Overflow and Return-Oriented-Programming.pdf2025-04-18 09:07 6.6M 
[   ]SEH Exploitation.pdf2025-04-18 09:07 380K 
[   ]Smashing The Stack For Fun And Profit.pdf2025-04-18 09:07 178K 
[   ]StegoSploit - Exploiting the Browser using only Images.pdf2025-04-18 09:07 33M 
[   ]Tactical Exploitation.pdf2025-04-18 09:07 391K 
[   ]Understanding SEH (Structured Exception Handler) Exploitation.pdf2025-04-18 09:07 1.1M 
[   ]Understanding the Low Fragmentation Heap.pdf2025-04-18 09:07 1.1M 
[   ]Unix ASM Codes Development for Vulnerabilities.pdf2025-04-18 09:07 274K 
[   ]Writing Manual - Shellcode by Hand.pdf2025-04-18 09:06 1.3M 
[   ]Zero-Day Exploit - Countdown to Darkness.pdf2025-04-18 09:06 3.7M