Index of /Books and Docs on Hacking/Hacking/Reversing and Exploiting/Exploiting
Name
Last modified
Size
Description
Parent Directory
-
Zero-Day Exploit - Countdown to Darkness.pdf
2019-03-07 16:03
3.7M
Writing Manual - Shellcode by Hand.pdf
2019-03-07 18:19
1.3M
Unix ASM Codes Development for Vulnerabilities.pdf
2019-03-07 18:20
274K
Understanding the Low Fragmentation Heap.pdf
2019-03-07 18:20
1.1M
Understanding SEH (Structured Exception Handler) Exploitation.pdf
2019-03-07 18:20
1.1M
Tactical Exploitation.pdf
2019-03-07 17:54
391K
StegoSploit - Exploiting the Browser using only Images.pdf
2019-03-07 16:00
33M
Smashing The Stack For Fun And Profit.pdf
2019-03-07 18:20
178K
SEH Exploitation.pdf
2019-03-07 18:20
380K
Runtime Attacks - Buffer Overflow and Return-Oriented-Programming.pdf
2019-03-07 18:20
6.6M
Return into libc without Function Calls.pdf
2019-03-07 18:20
398K
Return Oriented Programming Exploitation without Code Injection.pdf
2019-03-07 18:20
4.0M
Practical Windows XP - 2003 Heap Exploitation.pdf
2019-03-07 18:20
807K
Packed, Printable, and Polymorphic Return-Oriented Programming.pdf
2019-03-07 18:20
466K
Overcoming Trial Version Software Cracking Using a Hybridized Self-Modifying Technique.pdf
2019-03-07 18:20
453K
OpenBSD Remote Exploiting.pdf
2019-03-07 18:20
256K
Non-Executable Stack ARM Exploitation.pdf
2019-03-07 18:20
230K
Multiple D-Link Authentication Bypass Vulnerabilities.pdf
2019-03-07 16:08
51K
Memory Exploits and Defenses.pdf
2019-03-07 13:47
630K
Linux Kernel Crash Book - Everything you need to know.pdf
2019-03-07 18:20
4.9M
Linux Exploit Development/
2023-07-17 09:20
-
Joomla com_tag exploit.txt
2018-10-28 21:26
446
JBoss Exploitation.pdf
2019-03-07 15:31
456K
Hacking - The Art of Exploitation - 2nd Edition.pdf
2019-03-07 18:20
4.4M
Exploiting Software - How To Break Code.pdf
2018-08-04 16:56
7.6M
Exploiting Format String Vulnerabilities.pdf
2013-01-20 02:54
229K
Exploit Writing Tutorial/
2023-07-17 09:20
-
Exploit Writing Tutorial - Part 5 - How Debugger Modules and Plugins can Speed up Basic Exploit Development.pdf
2019-03-07 13:47
1.0M
Detecting and exploiting integer overflows.pdf
2019-03-07 18:20
494K
Defeating DEP and ASLR.pdf
2019-03-07 18:20
1.2M
DEP in Depth.pdf
2019-03-07 18:20
595K
Bypassing DEP with WPM & ROP Case Study Audio Converter.pdf
2019-03-07 13:47
334K
Buffer Overflows - Anatomy of an Exploit (2012).pdf
2019-03-07 16:08
234K
Advanced Windows Exploitation.pdf
2019-03-07 18:19
340K
Access Denied - Guide for Code Breakers.pdf
2019-03-07 18:19
5.1M
ASLR and Smack and Laugh Reference.pdf
2019-03-07 13:47
509K
A Buffer Overflow Study Attacks & Defenses.pdf
2019-03-07 13:47
485K