Index of /DOCS-TECH/Hacking/Reversing and Exploiting/Exploiting
Name
Last modified
Size
Description
Parent Directory
-
StegoSploit - Exploiting the Browser using only Images.pdf
2019-03-07 16:00
33M
Exploiting Software - How To Break Code.pdf
2018-08-04 16:56
7.6M
Runtime Attacks - Buffer Overflow and Return-Oriented-Programming.pdf
2019-03-07 18:20
6.6M
Access Denied - Guide for Code Breakers.pdf
2019-03-07 18:19
5.1M
Linux Kernel Crash Book - Everything you need to know.pdf
2019-03-07 18:20
4.9M
Hacking - The Art of Exploitation - 2nd Edition.pdf
2019-03-07 18:20
4.4M
Return Oriented Programming Exploitation without Code Injection.pdf
2019-03-07 18:20
4.0M
Zero-Day Exploit - Countdown to Darkness.pdf
2019-03-07 16:03
3.7M
Writing Manual - Shellcode by Hand.pdf
2019-03-07 18:19
1.3M
Defeating DEP and ASLR.pdf
2019-03-07 18:20
1.2M
Understanding SEH (Structured Exception Handler) Exploitation.pdf
2019-03-07 18:20
1.1M
Understanding the Low Fragmentation Heap.pdf
2019-03-07 18:20
1.1M
Exploit Writing Tutorial - Part 5 - How Debugger Modules and Plugins can Speed up Basic Exploit Development.pdf
2019-03-07 13:47
1.0M
Practical Windows XP - 2003 Heap Exploitation.pdf
2019-03-07 18:20
807K
Memory Exploits and Defenses.pdf
2019-03-07 13:47
630K
DEP in Depth.pdf
2019-03-07 18:20
595K
ASLR and Smack and Laugh Reference.pdf
2019-03-07 13:47
509K
Detecting and exploiting integer overflows.pdf
2019-03-07 18:20
494K
A Buffer Overflow Study Attacks & Defenses.pdf
2019-03-07 13:47
485K
Packed, Printable, and Polymorphic Return-Oriented Programming.pdf
2019-03-07 18:20
466K
JBoss Exploitation.pdf
2019-03-07 15:31
456K
Overcoming Trial Version Software Cracking Using a Hybridized Self-Modifying Technique.pdf
2019-03-07 18:20
453K
Return into libc without Function Calls.pdf
2019-03-07 18:20
398K
Tactical Exploitation.pdf
2019-03-07 17:54
391K
SEH Exploitation.pdf
2019-03-07 18:20
380K
Advanced Windows Exploitation.pdf
2019-03-07 18:19
340K
Bypassing DEP with WPM & ROP Case Study Audio Converter.pdf
2019-03-07 13:47
334K
Unix ASM Codes Development for Vulnerabilities.pdf
2019-03-07 18:20
274K
OpenBSD Remote Exploiting.pdf
2019-03-07 18:20
256K
Buffer Overflows - Anatomy of an Exploit (2012).pdf
2019-03-07 16:08
234K
Non-Executable Stack ARM Exploitation.pdf
2019-03-07 18:20
230K
Exploiting Format String Vulnerabilities.pdf
2013-01-20 02:54
229K
Smashing The Stack For Fun And Profit.pdf
2019-03-07 18:20
178K
Multiple D-Link Authentication Bypass Vulnerabilities.pdf
2019-03-07 16:08
51K
Joomla com_tag exploit.txt
2018-10-28 21:26
446
Linux Exploit Development/
2021-04-23 12:52
-
Exploit Writing Tutorial/
2021-04-23 12:39
-