Icon  Name                                                                                                          Last modified      Size  
[PARENTDIR] Parent Directory - [   ] Exploit Writing Tutorial Part 1 - Stack Based Overflows.pdf 2019-03-07 18:19 3.1M [   ] Exploit Writing Tutorial Part 10 - Chaining DEP with ROP - The Rubik Cube.pdf 2019-03-07 18:19 5.9M [   ] Exploit Writing Tutorial Part 11 - Heap Spraying Demystified.pdf 2019-03-07 18:19 7.5M [   ] Exploit Writing Tutorial Part 2 - Stack Based Overflows - Jumping to Shellcode.pdf 2019-03-07 18:19 2.0M [   ] Exploit Writing Tutorial Part 3a - SEH Based Exploits.pdf 2019-03-07 18:19 3.5M [   ] Exploit Writing Tutorial Part 3b - SEH Based Exploits - Just Another Example.pdf 2019-03-07 18:19 1.3M [   ] Exploit Writing Tutorial Part 4 - From Exploit to Metasploit - The Basics.pdf 2019-03-07 18:19 1.8M [   ] Exploit Writing Tutorial Part 5 - How Debugger Modules and Plugins can Speed up Basic Exploit Development.pdf 2019-03-07 18:19 2.5M [   ] Exploit Writing Tutorial Part 6 - Bypassing Stack Cookies, SafeSeh, SEHOP, HW DEP and ASLR.pdf 2019-03-07 18:19 4.9M [   ] Exploit Writing Tutorial Part 7 - Unicode - From 0×00410041 to Calc.pdf 2019-03-07 18:19 2.4M [   ] Exploit Writing Tutorial Part 8 - Win32 Egg Hunting.pdf 2019-03-07 18:19 5.3M [   ] Exploit Writing Tutorial Part 9 - Introduction to Win32 ShellCoding.pdf 2019-03-07 18:19 4.9M