![[ICO]](/icons/blank.gif) | Name | Last modified | Size | Description |
|
![[PARENTDIR]](/icons/back.gif) | Parent Directory | | - | |
![[ ]](/icons/layout.gif) | Zero-Day Exploit - Countdown to Darkness.pdf | 2025-04-18 09:06 | 3.7M | |
![[ ]](/icons/layout.gif) | Writing Manual - Shellcode by Hand.pdf | 2025-04-18 09:06 | 1.3M | |
![[ ]](/icons/layout.gif) | Unix ASM Codes Development for Vulnerabilities.pdf | 2025-04-18 09:07 | 274K | |
![[ ]](/icons/layout.gif) | Understanding the Low Fragmentation Heap.pdf | 2025-04-18 09:07 | 1.1M | |
![[ ]](/icons/layout.gif) | Understanding SEH (Structured Exception Handler) Exploitation.pdf | 2025-04-18 09:07 | 1.1M | |
![[ ]](/icons/layout.gif) | Tactical Exploitation.pdf | 2025-04-18 09:07 | 391K | |
![[ ]](/icons/layout.gif) | StegoSploit - Exploiting the Browser using only Images.pdf | 2025-04-18 09:07 | 33M | |
![[ ]](/icons/layout.gif) | Smashing The Stack For Fun And Profit.pdf | 2025-04-18 09:07 | 178K | |
![[ ]](/icons/layout.gif) | SEH Exploitation.pdf | 2025-04-18 09:07 | 380K | |
![[ ]](/icons/layout.gif) | Runtime Attacks - Buffer Overflow and Return-Oriented-Programming.pdf | 2025-04-18 09:07 | 6.6M | |
![[ ]](/icons/layout.gif) | Return into libc without Function Calls.pdf | 2025-04-18 09:07 | 398K | |
![[ ]](/icons/layout.gif) | Return Oriented Programming Exploitation without Code Injection.pdf | 2025-04-18 09:07 | 4.0M | |
![[ ]](/icons/layout.gif) | Practical Windows XP - 2003 Heap Exploitation.pdf | 2025-04-18 09:07 | 807K | |
![[ ]](/icons/layout.gif) | Packed, Printable, and Polymorphic Return-Oriented Programming.pdf | 2025-04-18 09:07 | 466K | |
![[ ]](/icons/layout.gif) | Overcoming Trial Version Software Cracking Using a Hybridized Self-Modifying Technique.pdf | 2025-04-18 09:07 | 453K | |
![[ ]](/icons/layout.gif) | OpenBSD Remote Exploiting.pdf | 2025-04-18 09:07 | 256K | |
![[ ]](/icons/layout.gif) | Non-Executable Stack ARM Exploitation.pdf | 2025-04-18 09:07 | 230K | |
![[ ]](/icons/layout.gif) | Multiple D-Link Authentication Bypass Vulnerabilities.pdf | 2025-04-18 09:07 | 51K | |
![[ ]](/icons/layout.gif) | Memory Exploits and Defenses.pdf | 2025-04-18 09:07 | 630K | |
![[ ]](/icons/layout.gif) | Linux Kernel Crash Book - Everything you need to know.pdf | 2025-04-18 09:07 | 4.9M | |
![[DIR]](/icons/folder.gif) | Linux Exploit Development/ | 2025-04-18 09:07 | - | |
![[TXT]](/icons/text.gif) | Joomla com_tag exploit.txt | 2025-04-18 09:07 | 446 | |
![[ ]](/icons/layout.gif) | JBoss Exploitation.pdf | 2025-04-18 09:07 | 456K | |
![[ ]](/icons/layout.gif) | Hacking - The Art of Exploitation - 2nd Edition.pdf | 2025-04-18 09:07 | 4.4M | |
![[ ]](/icons/layout.gif) | Exploiting Software - How To Break Code.pdf | 2025-04-18 09:07 | 7.6M | |
![[ ]](/icons/layout.gif) | Exploiting Format String Vulnerabilities.pdf | 2025-04-18 09:07 | 229K | |
![[DIR]](/icons/folder.gif) | Exploit Writing Tutorial/ | 2025-04-18 09:07 | - | |
![[ ]](/icons/layout.gif) | Exploit Writing Tutorial - Part 5 - How Debugger Modules and Plugins can Speed up Basic Exploit Development.pdf | 2025-04-18 09:07 | 1.0M | |
![[ ]](/icons/layout.gif) | Detecting and exploiting integer overflows.pdf | 2025-04-18 09:07 | 494K | |
![[ ]](/icons/layout.gif) | Defeating DEP and ASLR.pdf | 2025-04-18 09:07 | 1.2M | |
![[ ]](/icons/layout.gif) | DEP in Depth.pdf | 2025-04-18 09:07 | 595K | |
![[ ]](/icons/layout.gif) | Bypassing DEP with WPM & ROP Case Study Audio Converter.pdf | 2025-04-18 09:07 | 334K | |
![[ ]](/icons/layout.gif) | Buffer Overflows - Anatomy of an Exploit (2012).pdf | 2025-04-18 09:07 | 234K | |
![[ ]](/icons/layout.gif) | Advanced Windows Exploitation.pdf | 2025-04-18 09:07 | 340K | |
![[ ]](/icons/layout.gif) | Access Denied - Guide for Code Breakers.pdf | 2025-04-18 09:07 | 5.1M | |
![[ ]](/icons/layout.gif) | ASLR and Smack and Laugh Reference.pdf | 2025-04-18 09:07 | 509K | |
![[ ]](/icons/layout.gif) | A Buffer Overflow Study Attacks & Defenses.pdf | 2025-04-18 09:07 | 485K | |
|