![[ICO]](/icons/blank.gif) | Name | Last modified | Size | Description |
|
![[PARENTDIR]](/icons/back.gif) | Parent Directory | | - | |
![[ ]](/icons/layout.gif) | Network Attacks and Exploitation.pdf | 2018-08-04 16:54 | 25M | |
![[ ]](/icons/layout.gif) | The Web Application Hackers Handbook - Discovering & Exploiting Security Flaws.pdf | 2019-03-07 16:01 | 11M | |
![[ ]](/icons/layout.gif) | Cracking Drupal - A Drop in the Bucket (2009).pdf | 2019-03-07 17:37 | 10M | |
![[ ]](/icons/layout.gif) | Hack Attacks Testing.pdf | 2019-03-07 15:33 | 9.6M | |
![[ ]](/icons/layout.gif) | Stealing the Network - How to Own a Shadow.pdf | 2019-03-07 16:00 | 9.1M | |
![[ ]](/icons/unknown.gif) | CD Cracking Uncovered - Protection Against Unsanctioned CD Copying.chm | 2019-03-07 15:42 | 9.0M | |
![[ ]](/icons/layout.gif) | Hack Attacks Revealed.pdf | 2018-08-04 16:56 | 8.2M | |
![[ ]](/icons/layout.gif) | Building Trojan Hardware at Home.pdf | 2019-03-07 16:48 | 7.9M | |
![[ ]](/icons/layout.gif) | WAP, Bluetooth & 3G Programming - Cracking the Code.pdf | 2019-03-07 16:02 | 7.5M | |
![[ ]](/icons/layout.gif) | Syngress - Buffer Overflow Attacks - Dec 2004.pdf | 2021-04-02 10:37 | 5.4M | |
![[ ]](/icons/layout.gif) | Disabling the MacBook Webcam Indicator LED.pdf | 2013-12-20 23:22 | 4.4M | |
![[ ]](/icons/layout.gif) | Python Web Hacking Essentials (2015).pdf | 2019-03-07 18:06 | 2.9M | |
![[ ]](/icons/layout.gif) | Bluepilling the Xen Hypervisor.pdf | 2012-01-17 23:46 | 2.6M | |
![[ ]](/icons/layout.gif) | Firewalls And Networks - How To Hack Into Remote Computers - Part Two - Gaining Access and Securing the Gateway.pdf | 2019-03-07 15:33 | 2.4M | |
![[ ]](/icons/layout.gif) | Top Web App Attack Methods and How to Combat Them.pdf | 2019-03-07 15:30 | 2.3M | |
![[ ]](/icons/layout.gif) | Brute Force - Cracking the Data Encryption Standard.pdf | 2019-03-07 15:41 | 2.1M | |
![[ ]](/icons/layout.gif) | Assessing and Exploiting Web Applications with Samurai WTF.pdf | 2019-03-07 15:31 | 1.6M | |
![[ ]](/icons/layout.gif) | The Art of Invisibility 2017.pdf | 2018-08-04 16:49 | 1.4M | |
![[ ]](/icons/layout.gif) | Security Flaws in Universal Plug and Play (2013).pdf | 2019-03-07 16:10 | 1.1M | |
![[ ]](/icons/layout.gif) | Chapter 3 - Footprinting and Scanning.pdf | 2019-03-07 15:30 | 802K | |
![[ ]](/icons/layout.gif) | Next Generation Web Attacks - HTML 5, DOM(L3) and XHR(L2).pdf | 2018-08-04 16:59 | 735K | |
![[ ]](/icons/layout.gif) | Root on Server.pdf | 2019-03-07 15:37 | 716K | |
![[ ]](/icons/layout.gif) | Buffer Overflow (Root on Server II).pdf | 2019-03-07 15:37 | 700K | |
![[ ]](/icons/layout.gif) | Windows Services - All roads lead to SYSTEM.pdf | 2018-08-04 17:00 | 700K | |
![[ ]](/icons/layout.gif) | The New Ways to Attack Applications on Operating Systems under ExecShield.pdf | 2021-04-20 10:49 | 658K | |
![[ ]](/icons/layout.gif) | WINDOWX IT - Attacco a Router Alice Gate 2 Plus.pdf | 2012-03-20 22:40 | 621K | |
![[ ]](/icons/layout.gif) | GRE - Attacking Generic Routing Encapsulation.pdf | 2019-03-07 18:26 | 583K | |
![[ ]](/icons/layout.gif) | Linux - Format String Exploitation.pdf | 2020-04-12 19:21 | 483K | |
![[ ]](/icons/layout.gif) | Using VBReFormer to Reverse a VB SN Checker and Creating a KeyGen.pdf | 2021-04-02 10:37 | 438K | |
![[ ]](/icons/layout.gif) | Data Retrieval over DNS in SQL Injection Attacks.pdf | 2018-11-06 23:26 | 436K | |
![[ ]](/icons/layout.gif) | Password Cracking Techniques.pdf | 2019-03-07 15:36 | 433K | |
![[ ]](/icons/layout.gif) | Solution for elfZ Crackme 2.pdf | 2021-04-02 10:37 | 419K | |
![[ ]](/icons/layout.gif) | Stack Smashing.pdf | 2008-10-16 17:02 | 399K | |
![[ ]](/icons/layout.gif) | w3af User Guide (2012).pdf | 2019-03-07 16:10 | 384K | |
![[ ]](/icons/layout.gif) | Attacking RFID System.pdf | 2019-03-07 13:45 | 382K | |
![[ ]](/icons/layout.gif) | Demystifying Authentication Attacks.pdf | 2019-03-07 15:30 | 344K | |
![[ ]](/icons/layout.gif) | Bypassing ASLR DEP.pdf | 2019-03-07 18:17 | 344K | |
![[ ]](/icons/layout.gif) | Dns Cache Poisoning.pdf | 2019-03-07 15:38 | 321K | |
![[ ]](/icons/layout.gif) | Man in the Middle.pdf | 2018-08-04 16:57 | 320K | |
![[ ]](/icons/layout.gif) | Cracking Passwords Guide.pdf | 2011-11-25 18:05 | 272K | |
![[ ]](/icons/layout.gif) | Automated Credit Card Fraud.pdf | 2011-05-28 04:07 | 248K | |
![[ ]](/icons/layout.gif) | Scapy Documentation.pdf | 2019-03-07 18:26 | 244K | |
![[ ]](/icons/layout.gif) | XBiohazardx's Easy Crackme.pdf | 2021-04-02 10:37 | 124K | |
![[ ]](/icons/layout.gif) | Format String Vulnerability.pdf | 2020-04-12 19:32 | 109K | |
![[ ]](/icons/layout.gif) | The Twelve Most Common Application Level Hack Attacks.pdf | 2019-03-07 15:33 | 102K | |
![[ ]](/icons/unknown.gif) | Lena151 KeygenMe 1 Solution.chm | 2019-03-07 18:18 | 102K | |
![[ ]](/icons/layout.gif) | Hackback - A DIY Guide for those without the patience to wait for whistleblowers.pdf | 2019-03-07 15:39 | 82K | |
![[ ]](/icons/layout.gif) | Cracking Veneta Insipid Crackme v.2.pdf | 2021-04-02 10:35 | 39K | |
![[TXT]](/icons/text.gif) | Linux - Elevation of Privileges.html | 2020-05-07 09:51 | 26K | |
![[ ]](/icons/layout.gif) | KeyGening X3CHUN Crypto KeygenMe #2.pdf | 2021-04-02 10:35 | 18K | |
![[TXT]](/icons/text.gif) | LES - Linux privilege escalation auditing tool.html | 2020-05-05 09:45 | 15K | |
![[TXT]](/icons/text.gif) | nBaUrD0V.txt | 2018-01-14 18:06 | 4.7K | |
![[DIR]](/icons/folder.gif) | LES: Linux privilege escalation auditing tool_files/ | 2020-05-05 09:46 | - | |
|