Hacking Books and Tools Archive

Hacking Books and Tools Archive
The price must be from $0.00 to $1,000.00

0 - A Cryptographic File System for Unix.pdf 82.48
1 - An Introduction to Cryptography.pdf 1213.96
2 - Attacking_NTLM_with_precomputed_hashtables.pdf 119.31
3 - Basic Transposition Ciphers.txt 7.56
4 - D1T2 - Skyper - Cracking the GSM A5-1 Encryption in Seconds.pdf 3526.83
5 - DATA ENCRYPTION STANDARD - DES.pdf 178.92
6 - defeating_encryption.pdf 490.99
7 - DES.pdf 59.10
8 - EN- Serpent- A Proposal for the Advanced Encryption Standard.pdf 172.94
9 - EN-Attacking unbalanced RSA-CRT using SPA.pdf 301.32
10 - EN-Attacks on Steganographic Systems.pdf 963.68
11 - EN-Cryptanalyse Md4.pdf 159.37
12 - EN-Crypto.pdf 190.55
13 - EN-Crypto2.pdf 173.92
14 - EN-DETECTING HIDDEN MESSAGES USING HIGHER-ORDER STATISTICAL MODELS.pdf 167.32
15 - EN-Detecting Hidden Messages Using Higher-Order Statistics and Support Vector Machines.pdf 494.59
16 - EN-Detecting Steganographic Content on the Internet.pdf 821.16
17 - EN-Detecting Steganographic Messages in Digital Images.pdf 602.32
18 - EN-Exploring Steganography- Seeing the Unseen.pdf 2330.40
19 - EN-On The Limits of Steganography.pdf 155.76
20 - EN-Securing applications.pdf 954.76
21 - EN-Syndrome Decoding in the Non-Standard Cases.pdf 236.98
22 - EN-Weaknesses in the Key Scheduling Algorithm of RC4.pdf 297.10
23 - Fundamentals of Cryptography.pdf 339.04
24 - FUNDAMENTALS OF CRYPTOLOGY.pdf 2923.71
25 - Fundamentals_Cryptography_Encryption.pdf 736.75
26 - How to Break MD5 and Other Hash Functions.pdf 239.86
27 - Improved Collision Attack on MD5.pdf 160.07
28 - Information Hiding A Survey.pdf 3369.47
29 - MD5 Collisions.pdf 217.38
30 - Monoalphabetic Unilateral Subtition System.pdf 135.69
31 - Substitution Ciphers.txt 4.14
32 - The MD5 Message-Digest Algorithm.pdf 44.46
33 - 11_TheWeb Application Hackers Handbook.pdf 13839.53
34 - 15_Profesional_PenetrationA.pdf 9071.07
35 - 61812819-beginning-C-for-hackers.pdf 17687.28
36 - A.LIST.Publishing.Hacker.Disassembling.Uncovered.eBook-LiB.chm 4834.64
37 - Addison.Wesley.Advanced.Windows.Debugging.Nov.2007.pdf 9680.65
38 - Addison.Wesley.Advanced.Windows.Debugging.Nov.2007.rar 8240.54
39 - Addison.Wesley.Professional.Rootkits.Subverting.the.Windows.Kernel.Jul.2005.eBook-DDU.chm 1640.38
40 - An Introduction To Keylogger, RATS And Malware.pdf 2241.40
41 - api-native.pdf 332.21
42 - Art.of.Software.Security.Assessment.chm 4608.40
43 - BackTrack 5 Wireless Penetration Testing (1849515581).pdf 16990.79
44 - BackTrack-4-Assuring-Security-by-Penetration-Testing.pdf 6331.73
45 - Beej_Guide_To_C_Programming_RECOMMENDED_MEH.pdf 385.99
46 - Bertrand Russell - Introduction To Mathematical Philosophy.pdf 12389.59
47 - brucon-agnitio-110922061051-phpapp02.pdf 7139.21
48 - BSD UNIX Toolbox 1000+ Commands for FreeBSD, OpenBSD and NetBSD.pdf 3021.34
49 - bypassing-av.pdf 1045.65
50 - DRIVERS_Windows2k_Device_Driver_Book_A_Guide_for_Programmers.chm 1845.59
51 - EN-Hacking The Frozen WASTE For Cool Objects.pdf 64.72
52 - EN-Linux Networking And Network Devices APIs.pdf 2484.34
53 - ERayomd_How_To_Become_A_Hacker.pdf 466.97
54 - Ethical Hacking and Countermeasures- Web Applications and Data Servers - EC-Council.pdf 13770.31
55 - Extreme_Exploits_-_Advanced_Defenses_Against_Hardcore_Hacks__2005_.chm 10874.29
56 - footprinting.pdf 4594.25
57 - Ghacking-Jun2005.pdf 624.88
58 - GhostintheWiresByKevinMitnick.pdf 3969.71
59 - gmail hacking.pdf 5870.40
60 - Hackers Blackbook-Eng.pdf 262.72
61 - Hacking Exposed-Linux - Linux Security Secrets & Solutions.pdf 99349.55
62 - Hacking Exposed-Network Security - Secrets & Solutions, 2nd Ed..pdf 8240.96
63 - Hacking Exposed-Network Security - Secrets & Solutions, 3rd Ed..pdf 5991.93
64 - Hacking Exposed-Web 2.0 - Web 2.0 Security Secrets & Solutions.pdf 6438.74
65 - Hacking Exposed-Web Applications - Web Application Security Secrets & Solutions.pdf 7783.15
66 - Hacking Exposed-Windows - Windows Security Secrets & Solutions, 3rd Ed..pdf 9277.07
67 - Hacking-The Art of Exploitation.chm 1433.57
68 - Hacking1.7z 7016.00
69 - Hacking_Terminology.pdf 49.94
70 - Handbook_FreeBSD.pdf 10754.43
71 - Hardware Hacking Have Fun While Voiding Your Warranty.pdf 15302.73
72 - How-to-Get-Your-Message-Out.pdf 1050.40
73 - idaprobook_www.softarchive.net.zip 32954.28
74 - intro-linux.pdf 1562.86
75 - iphoneappprogrammingguide.pdf 2200.42
76 - Linux-101-Hacks.pdf 1587.30
77 - Linux-From-Scratch.pdf 716.71
78 - Lockpicking Guide.pdf 316.35
79 - magazine-01-low.pdf 11163.86
80 - may-2011.pdf 7247.40
81 - McGraw Hill Gray Hat Hacking 2nd Edition.pdf 12854.66
82 - McGraw.Hill.Hacking.Exposed.Windows.3rd.Edition.Dec.2007.pdf 9277.07
83 - Microsoft.Press.Developing.Drivers.with.the.Windows.Driver.Foundation.Apr.2007.chm 6633.42
84 - Microsoft.Press.Hunting.Security.Bugs.chm 22881.24
85 - Microsoft.Press.Microsoft.Windows.Internals.Fourth.Edition.Dec.2004.internal.Fixed.eBook-DDU.chm 10735.12
86 - mobile malware.zip 5204.34
87 - Network Programming for Microsoft Windows, Second Edition.chm 1764.51
88 - Networking.7z 22660.57
89 - new_linux_course_modules.pdf 370.04
90 - Ninja Hacking - Unconventional Penetration Testing Tactics and Techniques.pdf 10091.03
91 - nt_internals.pdf 477.29
92 - O'Reilly - MySQL Cookbook.pdf 4809.73
93 - O'Reilly - MySQL Pocket Reference 2nd Edition Jul 2007.pdf 977.14
94 - O'Reilly - Understanding The Linux Kernel.pdf 3203.65
95 - O'Reilly - Windows NT File System Internals, A Developer's Guide.pdf 15524.21
96 - Operating Systems Design & Implementation 3rd Edition(1).pdf 8674.80
97 - Oreilly.Hacking.The.Next.Generation.Sep.2009.pdf 8825.22
98 - Oreilly.Windows.XP.Hacks.2nd.edition.Feb.2005.LiB.chm 12914.24
99 - Professional Rootkits Code 2-2-07.zip 18142.60
100 - puppet_types_and_providers.pdf 5017.55
101 - Security.7z 3999.02
102 - shellcoder.chm 11853.03
103 - SQL Injection Attacks and Defense.pdf 6700.26
104 - stack_smashing.pdf 399.02
105 - Stealing_the_Network_-_How_to_Own_the_Box_(Syngress-2003).pdf 4698.78
106 - Syngress,.Stealing.the.Network.How.to.Own.a.continent.(2004).LiB.ShareConnector.chm 2802.00
107 - Syngress.Google.Hacking.for.Penetration.Testers.Volume.2.Nov.2007.pdf 15264.10
108 - Syngress_ACTA.rar 12077.55
109 - The Rookit ARSENAL.zip 8755.54
110 - the-little-black-book-of-computer-viruses.pdf 1420.65
111 - The.Hacker.Handbook.The.Strategy.Behind.Breaking.into.and.Defending.Networks.rar 12337.65
112 - The_C_Programming_Language.pdf 896.64
113 - The_Hacker_s_Underground_Handbook.pdf 2570.81
114 - the_shellcoders_handbook.pdf 8944.79
115 - THN-june2011.pdf 8081.58
116 - THN-nov2011.pdf 5423.40
117 - THN-oct2011.pdf 5061.12
118 - THN-Sep2011.pdf 6749.21
119 - Undocumented Windows 2000 Secrets - Source Code.rar 691.63
120 - Undocumented.Windows.2000.Secrets.-.The.Programmers.Cookbook.pdf 43235.60
121 - Virtual Honeypots From Botnet Tracking to Intrusion Detection.chm 4161.42
122 - Web and Programming.7z 29646.34
123 - Wiley, The Shellcoder's Handbook Discovering and Exploiting Security (2004) spy LotB.chm 2152.83
124 - Wiley.The.Shellcoders.Handbook.2nd.Edition.Aug.2007.pdf 8944.79
125 - Windows 2000 native API reference.pdf 2290.61
126 - Windows Graphics Programming Win32 GDI and DirectDraw.chm 9265.76
127 - Windows-F_A.pdf 4424.46
128 - Windows.System.Programming.Third.Edition.chm 2336.32
129 - WindowsDriverModel2nd.zip 3829.33
130 - Windows_Via_C_C_.chm 3907.60
131 - Wordware.The.Rootkit.Arsenal.May.2009.pdf 83284.14
132 - Writing secure code (Vista).pdf 15842.87
133 - Wrox.Beginning.SQL.Feb.2005.pdf 9150.00
134 - Wrox.Professional.Rootkits.Mar.2007.chm 8025.43
135 - youtube.pdf 2532.84
136 - _ebook__Modern_Operating_Systems_2Nd_Ed_By_Tanenbaum__Prentice_Hall_.chm 4663.45
137 - Admin_system_unix.pdf 4005.42
138 - alp-ch01-advanced-unix-programming-with-linux.pdf 230.31
139 - collect.gif 0.03
140 - The-Unix-Programming-Environment.pdf 1099.70
141 - Unix-Text-Processing.pdf 27314.00
142 - unix_5.html 4.27
143 - A brief tutorial on GCC inline asm (x86 biased).pdf 69.98
144 - A Buffer Overflow Study Attacks & Defenses.pdf 484.85
145 - A Practical Dynamic Buffer Overflow Detector.pdf 138.16
146 - A Signature-free Buffer Overflow Attack Blocker.pdf 309.37
147 - A Useful Approach to Finding Bugs.pdf 233.04
148 - Access Through Access.pdf 553.59
149 - Accurate analysis of heap and stack overflows by means of age stamps.pdf 257.44
150 - ActiveX - Active Exploitation.pdf 172.48
151 - Advanced_Buffer_Overflow_Methods_[Izik].pdf 18.76
152 - Alternative Java Threading Designs for Real-Time Environments.pdf 202.87
153 - Analysis of ANI anih Header Stack Overflow Vulnerability.pdf 131.32
154 - Analyzing local privilege escalations in win32k.pdf 192.04
155 - Anatomy of a Malware.pdf 47.35
156 - andrewg-ruxcon_2010.pdf 342.21
157 - Anti-Debugging 8211 A Developers View.pdf 207.89
158 - APT.pdf 2519.87
159 - ARM Addressing Modes Quick Reference Card.pdf 209.65
160 - ARM Developer Suite - Assembler Guide.pdf 1606.78
161 - ARM IAR Assembler - Reference Guide - for Advanced RISC Machines Ltd - ARM Cores.pdf 1315.62
162 - ASLR & Smack & Laugh Reference.pdf 509.13
163 - ASLR - Address Space Layout Randomization.pdf 258.68
164 - ASLRpaper.pdf 509.13
165 - Assault on PHP Applications.pdf 2969.00
166 - Attacking the core.pdf 5388.85
167 - BH08-AlexIonescu.pdf 1534.51
168 - bh08sotirovdowd.pdf 684.07
169 - BHDC-2010-Paper.pdf 259.52
170 - BHUS10_Slides_Payload_already_inside_data_reuse_for_ROP_exploits_v1.pdf 206.74
171 - BHUSA09-Oh-DiffingBinaries-PAPER.pdf 601.33
172 - BlackHat-USA-2010-Meer-History-of-Memory-Corruption-Attacks-wp.pdf 3883.02
173 - Blended attacks exploits, Vulnerabilities and Buffer-Overlow Techinques.pdf 780.77
174 - Blind Exploitation of Stack Overflow Vulnerabilities.pdf 161.29
175 - Browser Vulnerability Analysis.pdf 444.17
176 - Buffer Overflow Attacks on Linux Principles Analyzing and Protection.pdf 56.00
177 - Buffer Overflows- Attacks and Defenses for the Vulnerability of the Decade.pdf 72.24
178 - Building A Simple Stack Abstraction.pdf 8.03
179 - Bypassing DEP with WPM & ROP Case Study Audio Converter by D.R Software Exploit and Document by Sud0.pdf 333.85
180 - Bypassing DEP with WPM & ROP.pdf 333.85
181 - Bypassing Hardware Based Data Execution Prevention (DEP) On Windows 2003 SP2.pdf 496.71
182 - Bypassing non-executable-stack during exploitation using return-to-libc.pdf 14.57
183 - Bypassing SEHOP.pdf 194.71
184 - Bypassing Web Application Firewalls with HTTP Parameter Pollution.pdf 102.97
185 - Bypassing Windows heap protections.pdf 87.82
186 - Calling conventions for different C++ compilers and operating systems.pdf 357.57
187 - Common Control System Vulnerability.pdf 311.42
188 - Compile-time stack requirements analysis with GCC.pdf 50.90
189 - Compression Plus and Tumbleweed EMF Stack Overflow Security Advisory.pdf 114.08
190 - Confidence2010 ROP and JIT-Spray.pdf 917.55
191 - confidence_slideshow.pdf 1684.05
192 - Cracking the basics.pdf 196.12
193 - Cyclic Redundancy Check (CRC).pdf 64.48
194 - D1T1 - Tavis Ormandy - Making Software Dumber.pdf 77.97
195 - D1T2 - Alexey Sintsov - JIT Spray Attacks and Advanced Shellcode.pdf 1170.96
196 - D1T2 - Mark Dowd - Attacking Interoperability.pdf 4628.53
197 - D2 - Gynvael Coldwind - Case Study of Recent Windows Vulnerabilities.pdf 1307.61
198 - Debugging multi-threaded applications with RTOS-aware tools.pdf 180.65
199 - Decimalisation Table Attacks for PIN Cracking.pdf 131.86
200 - Defeating compiler-level buffer overflow protection.pdf 354.67
201 - Defeating DEP through a mapped file.pdf 532.90
202 - Defeating the Stack Based Buffer Overflow Prevention Mechanism of Microsoft Windows 2003 Server.pdf 110.04
203 - defeating-xpsp2-heap-protection.pdf 89.58
204 - Defending Embedded Systems Against Buffer Overflow via Hardware-Software.pdf 74.29
205 - DEPinDepth.ppt 2945.50
206 - DEPLIB.pdf 2022.26
207 - DEPLIB20_ekoparty.pdf 419.34
208 - Developing StrongARM Linux shellcode.pdf 95.27
209 - DNS Cache Poisoning Vulnerability.pdf 2097.44
210 - Dynamic Buffer Overflow Detection.pdf 244.05
211 - Elementary Structures.pdf 193.41
212 - Eliminating stack overflow by abstract interpretation.pdf 100.85
213 - Eliminating the Threat of Kernel Stack Overflows.pdf 155.70
214 - EN-Advanced SQL Injection In SQL Server Applications.pdf 291.03
215 - EN-ASLR Smack _ Laugh Reference.pdf 509.13
216 - EN-ASLR.pdf 258.68
217 - EN-Bypass windows server 2008.pdf 217.06
218 - EN-Bypassing SEHOP.pdf 194.71
219 - EN-Exploit writing tutorial part 4 - From Exploit to Metasploit �-80-93 The basics.pdf 35.48
220 - EN-Exploiting Format String Vulnerabilities.pdf 228.89
221 - EN-Game Hacking.pdf 1671.73
222 - EN-NOx86-64 buffer overflow exploits and the borrowed code chunks exploitation technique -NX.pdf 82.08
223 - Engineering Heap Overflow Exploits with JavaScript.pdf 136.05
224 - Evolving Shell Code (Symantec).pdf 156.79
225 - Evolving Successful Stack Overflow Attacks for Vulnerability Testing.pdf 473.20
226 - Experiencing Enhanced Emulation Debugging.pdf 873.29
227 - expl0it_5.html 69.52
228 - Exploit writing tutorial part 1 - Stack Based Overflows.pdf 705.80
229 - Exploit writing tutorial part 2 - Stack Based Overflows - jumping to shellcode.pdf 522.38
230 - Exploit writing tutorial part 3 - SEH Based Exploits.pdf 1694.69
231 - Exploit writing tutorial part 3b - SEH Based Exploits - just another example.pdf 73.19
232 - Exploit writing tutorial part 4 - From Exploit to Metasploit - The basics.pdf 33.87
233 - Exploit writing tutorial part 5 - How debugger modules & plugins can speed up basic exploit development.pdf 1028.23
234 - Exploit writing tutorial part 6 - Bypassing Stack Cookies, SafeSeh, HW DEP and ASLR.pdf 3137.51
235 - Exploit writing tutorial part 7 - Unicode - from 0x00410041 to calc.pdf 618.79
236 - Exploit writing tutorial part 8 - Win32 Egg Hunting.pdf 3608.68
237 - Exploiting ARM Linux Systems.pdf 666.80
238 - Exploiting Format String Vulnerabilities.pdf 228.89
239 - Exploiting Stack Overflows in the Linux Kernel.pdf 289.33
240 - Exploiting the iOS Kernel.pdf 201.30
241 - exploits.pdf 630.42
242 - Exploring Windows CE Shellcode.pdf 241.91
243 - ferminjserna-exploitsmitigationsemet-100328034335-phpapp02.pdf 474.80
244 - Finding_and_Understanding_Bugs_in_C_Compilers.pdf 308.75
245 - Format String Attacks.pdf 216.88
246 - Fuzzing_for_software_vulnerability_discovery.pdf 5734.01
247 - GDT and LDT in Windows kernel vulnerability exploitation.pdf 681.68
248 - hawkes_ruxcon.pdf 1164.72
249 - Heap Feng Shui in JavaScript.pdf 163.86
250 - HES10-jvanegue_zero-allocations.pdf 822.78
251 - HITB - JIT-Spray Attacks and Advanced Shellcode.pdf 1170.96
252 - How Conficker makes use of MS08-067.pdf 193.46
253 - HTTP Parameter Pollution.pdf 1246.48
254 - Hybrid Engine for Polymorphic Shellcode Detection.pdf 924.29
255 - Implementing a Soft Stack in Data Memory on the MAXQ2000.pdf 34.92
256 - InsecurityofPoorlyDesignedRemoteFileInclusionPayloads-Part2.pdf 348.63
257 - Intel Assembler CodeTable 80x86.pdf 146.90
258 - KernelPool.pdf 402.50
259 - kernel_modules.pdf 52.24
260 - Lateral SQL Injection- A ew Class of Vulnerability in Oracle.pdf 153.78
261 - Learn Information Gathering By Example.pdf 1121.54
262 - Linker&Loaders.pdf 3601.63
263 - Linux Memory Protection Mechanism Linux Memory Protection Mechanism.pdf 35.02
264 - Linux Security HOWTO.pdf 427.75
265 - Linux Security Quick Reference Guide.pdf 69.49
266 - LINUX System Call Quick Reference.pdf 55.47
267 - LPC-ALPC-slides.pdf 2789.25
268 - Mac OS X PPC Shellcode Tricks.pdf 141.98
269 - makassarhack.htm 186.67
270 - Memory Exploits & Defenses.pdf 630.42
271 - Metasploit.pdf 7067.57
272 - MPI and Password Cracking.pdf 96.48
273 - NetWare Kernel Stack Overflow Exploitation.pdf 291.43
274 - Network-Level Polymorphic Shellcode Detection Using Emulation.pdf 109.84
275 - ninjabof.pdf 484.85
276 - Non-Executable Stack ARM Exploitation Research Paper.pdf 345.80
277 - Non-Executable Stack ARM Exploitation.pdf 224.69
278 - OCHOA-2010-0209.txt 58.24
279 - On Evolving Buffer Overflow Attacks Using Genetic Programming.pdf 294.16
280 - On the Infeasibility of Modeling Polymorphic Shellcode.pdf 359.57
281 - Online Stack Overflow Detection on the TMS320C28x DSP.pdf 407.29
282 - Optimal Register Reassignment for Register Stack Overflow Minimization.pdf 571.19
283 - OWASL_IL_2010_Jan_-_Moshe_Ben_Abu_-_Advanced_Heapspray.pdf 193.91
284 - owasp_201011.pdf 900.67
285 - Paper_Payload_already_inside_data_reuse_for_ROP_exploits.pdf 205.16
286 - Path Optimization in Programs and its Application to Debugging.pdf 167.93
287 - Payload Already Inside- Data re-use for ROP Exploits WhitePaper.pdf 208.75
288 - Payload Already Inside- Data re-use for ROP Exploits-slide.pdf 206.04
289 - PBX Vulnerability Analysis.pdf 224.10
290 - PE Infection - How to Inject a dll.pdf 707.00
291 - php_fuzzing_auditing.pdf 279.63
292 - Polymorphic Shellcodes vs. Application IDSs.pdf 27.19
293 - PowerPC-OS X (Darwin) Shellcode Assembly.pdf 282.09
294 - Practical Return Oriented Programming.pdf 1753.12
295 - practical-rop.pdf 1753.12
296 - Pratical Linux Shellcode.pdf 125.67
297 - Pwn2Own-2010-Windows7-InternetExplorer8.pdf 303.57
298 - RARLab's WinRAR Local Stack Overflow.pdf 66.94
299 - Recent Shellcode Developments.pdf 195.35
300 - Recovering the Toolchain Provenance of Binary Code.pdf 362.21
301 - Repairing Return Address Stack for Buffer Overflow Protection.pdf 193.26
302 - report.pdf 1772.29
303 - Return Oriented Programming for the ARM Architecture.pdf 852.91
304 - Return Oriented Programming.pdf 1043.08
305 - Return-oriented Programming without Returns (on the x86).pdf 429.88
306 - Return-Oriented Programming-Systems Languages and Applications.pdf 611.84
307 - return-to-libc.pdf 14.57
308 - Reverse Code Engineering (RCE).pdf 234.10
309 - Reverse Engineer's Cookbook.pdf 174.13
310 - Reverse Engineering and Program Understanding.pdf 1149.79
311 - Reverse Engineering MAC Protocol.pdf 288.65
312 - Reverse Engineering MAC- A Non-Cooperative Game Model 2.pdf 145.67
313 - REVERSE ENGINEERING UNDER SIEGE.pdf 23.54
314 - Reverse Engineering- Anti-Cracking Techniques.pdf 331.15
315 - Reverse Engineering- Memory Analysis.pdf 755.63
316 - Reverse Engineering- Smashing the Signature.pdf 923.90
317 - Reverse-Engineering a Cryptographic RFID Tag.pdf 245.83
318 - Reverse-engineering transcription control networks.pdf 1281.57
319 - Reversing C++.pdf 601.89
320 - rootedcon_0day_english.pdf 316.85
321 - rop.pdf 1017.28
322 - ROPdefender.pdf 422.81
323 - roplinks.txt 1.10
324 - ROP_Whitepaper.pdf 472.32
325 - Safely Searching Process Virtual Address Space.pdf 168.71
326 - SAP security- attacking sap client.pdf 581.05
327 - sean_ruxcon2010.pdf 5695.16
328 - Secure_Programing_with_GCC_and_GLbc.pdf 366.33
329 - Securing & Hardening Linux v1.0.pdf 118.88
330 - Security Implications of Windows Access Tokens.pdf 1182.66
331 - SEH all-at-once attack a New technique to bypass SafeSEH+SEHOP protections.pdf 1236.39
332 - SEH all-at-once attack.pdf 1236.39
333 - SEH Overwrites Simplified v1.01.pdf 349.42
334 - seh.html 2.95
335 - Session Fixation Vulnerability in Web-based Applications.pdf 404.60
336 - SH-4 CPU Core Architecture.pdf 1864.71
337 - Shellcoding for Linux and Windows Tutorial.pdf 107.47
338 - Smashing the stack in 2010.pdf 1772.29
339 - Sockets, Shellcode , Porting and Codeing - Reverse Engineering Exploits and Tool Coding for Security Professionals.pdf 115030.61
340 - Stack Based Buffer Overflows and Protection Mechanisms.pdf 502.37
341 - Stack Overflow Detection Using The ST9 TIMER-WATCHDOG.pdf 59.19
342 - Stack Overflow Exploitation Explained.pdf 1566.28
343 - Stack overflow on Windows Vista.pdf 147.69
344 - Stack overflow on Windows XP SP2.pdf 152.58
345 - Stack Overflow- A Great Place for Answers.pdf 25.61
346 - Stack Smashing Protector (slides - NDH 2010).pdf 116.46
347 - StackFences- a run-time approach for detecting stack overflows.pdf 68.20
348 - Statically Detecting Likely Buffer Overflow Vulnerabilities.pdf 118.65
349 - Steganography FAQ.pdf 316.31
350 - stsi2010.pdf 2170.35
351 - Surgically returning to randomized lib(c).pdf 202.59
352 - Symantec Altiris Deployment Solution Elevation of Privileges Vulnerabilities.pdf 799.01
353 - Syscall Proxying - Simulating remote execution.pdf 100.55
354 - System Call Sequence (_chmod example).pdf 46.21
355 - Testing C Programs for Buffer Overflow Vulnerabilities.pdf 97.19
356 - The ARM Instruction Set.pdf 683.26
357 - The cross-page overwrite and it's application in heap overflows.pdf 32.12
358 - The Geometry of Innocent Flesh on the Bone- Return-into-libc without Function Calls on the x86.pdf 280.66
359 - The Law and Economics of Reverse Engineering.pdf 1333.47
360 - The Legitimate Vulnerability Market.pdf 331.95
361 - The Linux Kernel Module Programming Guide.pdf 538.60
362 - The unbearable lightness of PIN cracking.pdf 173.98
363 - The.Shellcoder's.Handbook.Discovering.and.Exploiting.Security.Holes.2nd.Edition.pdf 8944.79
364 - There_s_a_Party_at_Ring0.pdf 389.55
365 - TippingPoint IPS Signature Evasion through Packet Fragmentation.pdf 76.46
366 - to-jt-party-at-ring0.pdf 389.55
367 - Towards the Reverse Engineering of Denormalized Relational Databases.pdf 925.74
368 - Tupni- Automatic Reverse Engineering of Input Formats.pdf 327.53
369 - UCPy- Reverse-Engineering Python.pdf 133.07
370 - Understanding Windows Shellcode.pdf 424.78
371 - understanding_Linux_virtual_memory_manager.pdf 632.82
372 - Using (ShoutBoxes) to control malicious software.pdf 83.01
373 - Using dual-mappings to evade automated unpackers.pdf 102.23
374 - Vulnerability Scanning for Buffer Overflow.pdf 77.30
375 - Web Application Security - Buffer Overflows- Are you really at risk.pdf 129.51
376 - Win32 Stack BufferOverFlow Real Life Vuln-Dev Process.pdf 1280.72
377 - win64_confidence2010.pdf 206.07
378 - Windows Assembly Programming Tutorial.pdf 120.60
379 - Wireless Security and Buffer Overflows.pdf 44.20
380 - WPAD TECHNOLOGY WEAKNESSES.pdf 342.98
381 - Writing MIPS-IRIX shellcode.pdf 157.28
382 - Writing shellcode exploits for VoIP phones.pdf 176.85
383 - Writing shellcode for Linux and BSD.pdf 233.21
384 - Writing Small Shellcode.pdf 141.02
385 - x86 Assembly Language Reference Manual.pdf 787.18
386 - x86-64 buffer overflow exploits and the borrowed code chunks exploitation technique.pdf 82.08
387 - Xcon2005_SoBeIt.pdf 200.08
388 - XCon2010_win7.pdf 468.43
389 - Advanced Software Vulnerability Assessment.pdf 154.57
390 - AFF - A New Format for Storing Hard Drive Images.pdf 62.50
391 - AFF - Advanced Forensic Format.pdf 354.92
392 - Analyse_forensique_d_un_systeme_Windows.pdf 2535.68
393 - ARTIFICAL IGNORANCE How To Implement Artifical Ignorance Log Analysis.pdf 17.00
394 - collect.gif 0.03
395 - Computer and Network Forensics.pdf 486.02
396 - Digital Forensics of the Digital Memory.pdf 293.37
397 - EXE File Format.pdf 14.11
398 - Forensic Analysis of Microsoft Internet Explorer Cookie Files.pdf 211.76
399 - Forensic Disk Imaging Step-by-Step.pdf 21.62
400 - How to Make a Forensic Copy Through the Network.pdf 24.05
401 - Jess_Garcia-Web_Forensics.pdf 580.53
402 - O'Reilly - Internet Forensics.chm 843.52
403 - Syngress.Digital.Forensics.for.Network.Internet.and.Cloud.Computing.pdf 13184.60
404 - Syslog Notes.pdf 73.58
405 - Viewing ELF Binary Signatures.pdf 28.05
406 - Volume and File Structure of CDROM for Information Interchange.pdf 320.12
407 - 0071776168_Securit.pdf 61689.07
408 - 09hakin9_09_2012_EN_ebook.pdf 7980.96
409 - Assembly Language for Intel-based Computers by Kip Irvine.pdf 85089.92
410 - ccna_sec (1).pdf 32659.02
411 - Cisco.Press.CCNA.Security.640-554.Official.Cert.Guide.Jul.2012.zip 19334.10
412 - Computer Networks A System Approach.pdf 10691.04
413 - Day1-SANS 560-2012.pdf 8828.62
414 - Day2-SANS 560-2012.pdf 12057.99
415 - Day3-SANS 560-2012.pdf 9505.52
416 - Day4-SANS 560-2012.pdf 8704.77
417 - Day5-SANS 560-2012.pdf 8925.67
418 - Defense_against_the_Black_Arts.pdf 50864.71
419 - EDU_DATASHEET_vSphereOptimizeScale_V5_BETA2.pdf 120.38
420 - Gray Hat Python.pdf 3117.72
421 - Hakin9 - 201201.pdf 4319.18
422 - Hakin9 - 201202.pdf 4446.29
423 - Hakin9 - 201203.pdf 5141.89
424 - Hakin9 - 201204.pdf 6993.09
425 - Hakin9 - 201205.pdf 7829.35
426 - Hakin9 - 201206.pdf 6019.07
427 - Hakin9 - June 2011 (True PDF).pdf 5022.17
428 - Hakin9 - May 2011 (True PDF).pdf 5861.20
429 - Hakin9 Bible - 201201.pdf 23438.35
430 - Hakin9 Exploiting Software - 201201.pdf 4913.08
431 - Hakin9 Exploiting Software - 201202.pdf 6954.21
432 - Hakin9 Exploiting Software - 201203.pdf 6000.65
433 - Hakin9 Exploiting Software - 201204.pdf 8861.95
434 - Hakin9 Exploiting Software - 201205.pdf 10672.22
435 - Hakin9 Extra - 201201.pdf 2489.83
436 - Hakin9 Extra - 201202.pdf 6565.10
437 - Hakin9 Extra - 201203.pdf 7154.25
438 - Hakin9 Extra - 201204.pdf 9630.73
439 - Hakin9 Extra - 201205.pdf 8903.41
440 - Hakin9 Extra 2011 �-80-93 Exploiting Software (True PDF).pdf 4599.78
441 - Hakin9 Issue 01 - January 2011 (US) (True PDF).pdf 5261.01
442 - Hakin9 Issue 04 - April 2011 (True PDF).pdf 5382.72
443 - Hakin9 Mobile Security - 201201.pdf 2978.50
444 - Hakin9 Mobile Security - 201202.pdf 5769.83
445 - Hakin9 Mobile Security - 201203.pdf 6298.99
446 - Hakin9 On Demand - 201201.pdf 2875.46
447 - Hakin9 On Demand - 201202.pdf 5005.92
448 - Hakin9 On Demand - 201202_Hakin9 SQL Injection.pdf 2875.46
449 - Hakin9 On Demand - 201202_Trojan-izing USB Stics.pdf 5005.92
450 - Hakin9 On Demand - 201203.pdf 15170.10
451 - Hakin9 On Demand - 201203_The Guide to Backtrack.pdf 15170.10
452 - Hakin9_09_2012_Network Security.pdf 6805.38
453 - ipsysctl-tutorial.pdf 446.81
454 - Manipulation.pdf 4323.58
455 - OSXInternals.pdf 35852.50
456 - Packtpub.Citrix.XenServer.6.0.Administration.Essential.Guide.Jun.2012.pdf 15528.58
457 - Packtpub.Java.EE.6.Cookbook.for.Securing.Tuning.and.Extending.Enterprise.Applications.Jun.2012.pdf 12425.79
458 - Packtpub.Metasploit.Penetration.Testing.Cookbook.Jun.2012.pdf 5033.87
459 - Packtpub.Oracle.WebLogic.Server.12c.First.Look.Jun.2012.pdf 4059.53
460 - PenTest__TBO_01_2012.pdf 30474.46
461 - Practical_Malware_Analysis.pdf 9672.68
462 - Prentice.Hall.Network.Forensics.Jun.2012.pdf 20280.04
463 - SANS 610.1.pdf 31641.68
464 - SANS 610.2.pdf 10856.25
465 - SANS 610.3.pdf 15686.06
466 - SANS 610.4.pdf 13375.88
467 - SANS 610.5.pdf 15496.57
468 - sans-710.pdf 141067.83
469 - ScapyGuide.pdf 481.69
470 - sec580.pdf 73733.84
471 - sec617.pdf 44689.27
472 - snort_course.pdf 457951.00
473 - The Rootkit Arsenal Escape and Evasion in the Dark Corners of the System - Second Edition.pdf 96429.52
474 - The Tagled Web A Guide to Securing Modern Web Applications.pdf 4080.52
475 - the-rootkit-arsenal-escape-and-evasion-in-the-dark-corners-o.pdf 83284.14
476 - The.Rootkit.Arsenal.Escape.and.Evasion.in.the.Dark.Corners.of.the.System,Second.Edition.pdf 96429.52
477 - vol1-no1-June2012-Pentestmag-web-app-bible.pdf 18648.20
478 - VS5OS_LAB_STU_PR.pdf 5085.51
479 - VS5OS_LECT1_STU_PR.pdf 11646.11
480 - VS5OS_LECT2_STU_PR.pdf 12226.45
481 - Windows NT File System Internals - A Developer's Guide (1997).pdf 12111.42
482 - Windows System Programming (4th Edition).pdf 10921.56
483 - WindowsInternals_5ED.pdf 19190.53
484 - collect_2.gif 0.03
485 - EN-Lockpicking - How Lock Picking Works by Tom Harris & Marshall Brain.pdf 1121.29
486 - EN-MTI Guide To Lockpicking.pdf 508.86
487 - EN-SECRETS OF LOCK PICKING.pdf 193.33
488 - EN-secrets of lockpicking.pdf 156.32
489 - EN-The Complete Guide To Lockpicking - Eddie the Wire - Loompanics.pdf 3697.76
490 - EN-Unreliable Guide To Locking.pdf 247.28
491 - ID - Lockpicking MR.pick.odt 7025.63
492 - Banking-Security-Magazine-2_20112.pdf 7538.69
493 - Banking-Security-Magazine.pdf 13361.10
494 - Cloud-Computing-Security_Enterprise-IT-Security_01_2011.pdf 6330.12
495 - Enterprise-IT-Security-2_20111.pdf 2302.22
496 - Hackin9.zip 133523.73
497 - magazine-01-low.pdf 11163.86
498 - mag_asm.zip 1572.52
499 - may-2011.pdf 7247.40
500 - Mobile_Security_Hakin9_04_2011.pdf 4205.47
501 - Password is 123456.pdf 2990.97
502 - the_magpi_ezine_1-6.tar.bz2 42952.34
503 - virus_bulletin-2012.tar.bz2 48324.53
504 - 7 Layers of the OSI Model.pdf 601.35
505 - Apache Cookbook.pdf 2345.89
506 - Apache Security.chm 1646.62
507 - Attacking The DNS Protocol.pdf 322.42
508 - Bug Hunter Diary.pdf 5281.95
509 - collect.gif 0.03
510 - Complete-guide-IPv6-attack-defense.pdf 1664.53
511 - DNS and BIND 5th Edition May 2006.chm 2412.33
512 - EN-A Technique for Counting NATted Hosts.pdf 640.89
513 - EN-An Introduction to Arp Spoofing.pdf 28.71
514 - EN-Attacking The DNS Protocol - Security Paper v2.pdf 322.42
515 - EN-Detection of Promiscuous Nodes Using ARP Packets.pdf 93.63
516 - EN-Hacking The Invisible Network.pdf 328.31
517 - EN-HITB-LDaP Injection -Attack and Defence Techniques.pdf 2999.64
518 - EN-IPv6 Network Mobility - usage and demonstration.pdf 181.84
519 - EN-Open-Source Security Testing Methodology Manual.pdf 2145.36
520 - EN-Penetration Testing with IPv6 .pdf 125.29
521 - EN-Performance Modeling of TCP-IP.pdf 57.57
522 - EN-Thinking about Firewalls.pdf 59.92
523 - EN-WLAN.pdf 288.08
524 - Internetworking with TCP-IP (Principles, protocols and architecture) vol1 4ed - Comer.pdf 10052.15
525 - ipsec-howto.pdf 246.01
526 - IPSEC-Linux.pdf 225.58
527 - IPTABLES_book.pdf 272.08
528 - IPTABLES_linux_Firewall_Administration.pdf 215.41
529 - IPv6 Essentials.pdf 2694.94
530 - John Wiley & Sons - VSAT Networks.pdf 4277.12
531 - LinuxKernelNetwork.pdf 673.54
532 - MOD SECURITY handbook.pdf 13084.95
533 - Network Administration FreeBSD.pdf 6760.61
534 - Network security guide.pdf 12841.33
535 - Nmap_cookbook-the-fat-free-guide-to-network-scanning.pdf 6404.68
536 - O'Reilly - Internet Core Protocols The Definitive Guide.chm 11463.84
537 - O'Reilly - IPv6 Network Administration.chm 817.31
538 - O'Reilly - Network Programming with Perl.pdf 301.02
539 - O'Reilly - Network Security Assessment 2nd Edition Nov 2007.pdf 6190.11
540 - O'Reilly - Network Security Assessment.chm 1724.46
541 - O'Reilly - Network Security Hacks.chm 1666.00
542 - O'Reilly - Network Security with OpenSSL.pdf 2467.28
543 - O'Reilly - Network Warrior.pdf 6464.78
544 - Server Load Balancing.pdf 3195.92
545 - Snort IDS and IPS Toolkit.pdf 12531.02
546 - Squid The Definitive Guide.pdf 4253.46
547 - Syngress - Snort2 Intrusion Detection.pdf 7210.83
548 - TCP IP Network Administration.pdf 5190.96
549 - TCP-IP_Hacking.pdf 1607.35
550 - Using Linux As A Router.pdf 30.24
551 - alex.pdf 177.66
552 - Attacking-the-Windows-Kernel.pdf 290.11
553 - A_Practice_of_Remote_Code_excution_using_cpu_bug - ARGOS passket.pdf 596.14
554 - bh-usa-07-lindsay.pdf 231.93
555 - BH08-AlexIonescu_2.pdf 1534.51
556 - BH_US_08_Royal_Malware_Analyst's_Blue_Pill_WhitePaper.pdf 58.41
557 - BlackHat-DC-09-Krumheuer-Raber-QuietRIATT-Slides.pdf 3574.98
558 - BlackHat-DC-09-Rutkowska-Attacking-Intel-TXT-slides.pdf 4288.99
559 - BlackHat-Japan-08-Murakami-Hypervisor-IPS-whitepaper-en.pdf 49.57
560 - ccs09-HookSafe.pdf 187.45
561 - ccs09_siggen.pdf 330.39
562 - chpie_smm_keysniff_ENG.pdf 388.51
563 - chpie_smm_sniff.zip 304.83
564 - collect.gif 0.03
565 - CONFidence2009_moti_joseph.pdf 895.69
566 - Countermeasure against Timing Attack on SSH Using Random Delay.pdf 375.98
567 - cpumemory.pdf 912.16
568 - crackstorage.com.pdf 323.88
569 - creating_security_enhanced_vm.en.pdf 275.74
570 - csw09-duflot.pdf 3991.81
571 - D1T2 - Jonathan Brossard - Breaking Virtualization by Switching to Virtual 8086 Mode.pdf 2103.29
572 - D1T2 - Mark Dowd - Attacking Interoperability_2.pdf 4628.53
573 - D2T2 - Vipin and Nitin Kumar - vbootkit 2.0.pdf 1356.30
574 - D2T3 - Wes Brown - Advanced Malware Analysis Lab.pdf 6260.20
575 - device.tree.cmd.rar 121.80
576 - DisasmViewer_01.zip 131.63
577 - dokan-0401223src.zip 144.49
578 - eurosys09.pdf 181.33
579 - EventPairsHandle.pdf 100.49
580 - frit08.pdf 923.65
581 - geometry.pdf 388.77
582 - Hacking.The.Art.of.Exploitation.2nd.Edition.chm 4785.18
583 - HeapCacheExploitation.pdf 433.19
584 - HistoryofPackingTechnology.pdf 404.91
585 - hitb-2k12.tar.bz2 184049.28
586 - hooking_techniques_in_kernelspace.pdf 501.86
587 - HS-P005_ReflectiveDllInjection.pdf 162.03
588 - hsiyf_02_report_final.pdf 673.52
589 - hund.pdf 361.75
590 - HyperVisorMalware.pdf 247.01
591 - INSECURE-Mag-19.pdf 9968.14
592 - Intro_NT_kernel_security_stuff.pdf 3044.48
593 - jt-to-virtualisation_security.pdf 354.07
594 - Kasslin-Florio-VB2008.pdf 3169.37
595 - lee-re-malware-emulators.pdf 4089.44
596 - LILXAM_SEHOP.zip 740.21
597 - lnk.pdf 47.21
598 - makassarhack.htm 186.67
599 - mathieu-ereteo.pdf 455.07
600 - Microsoft patches little sister but forgets big brother.pdf 759.63
601 - Microsoft.Press.Hunting.Security.Bugs.chm 22881.24
602 - native_thread_injection.pdf 285.05
603 - noret.pdf 421.53
604 - NtSetDebugFilterState.pdf 99.03
605 - NX-bit.pdf 882.50
606 - pac346.pdf 1243.60
607 - packer_unpacker_sysdream.pdf 756.43
608 - paper_idseconf_secure_sms.pdf 219.93
609 - pbania-dbi-unpacking2009.pdf 284.65
610 - pbania-spiderpig2008.pdf 615.25
611 - pengujian keamanan aplikasi mobile versi 1.1 - za.pdf 2832.95
612 - Persistent_BIOS_Infection_CanSecWest09.pdf 271.70
613 - pseudonyms.zip 596.67
614 - pwn2rm.pdf 36.86
615 - pwn2rm_hacklu2009.pdf 708.95
616 - rewolf_cmd_research.zip 406.67
617 - rewolf_hc2007_phase1.zip 312.91
618 - rewolf_hc2007_phase3.zip 365.05
619 - sehop_en.pdf 194.71
620 - SFCList.zip 4.23
621 - sosp079-seshadri.pdf 213.45
622 - source10-linuxkernel-jonoberheide.pdf 874.75
623 - Stephen A Ridley - Escaping The Sandbox.pdf 3230.95
624 - Stuxnet_Under_the_Microscope.pdf 2103.18
625 - Syngress.Google.Hacking.for.Penetration.Testers.Volume.2.Nov.2007.pdf 15264.10
626 - The.Web.Application.Hackers.Handbook.pdf 11233.64
627 - Todo_5.html 23.60
628 - tpm_chips.pdf 610.38
629 - unpackers.pdf 213.93
630 - virtualization.pdf 3817.61
631 - Virtualization_Without_Hardware_Final.pdf 400.19
632 - vm.pdf 345.09
633 - vmm-detection-hotos07.pdf 99.50
634 - w32_stuxnet_dossier.pdf 3041.83
635 - wenger_M.pdf 1050.84
636 - windows_kernel_malware.pdf 1893.16
637 - Windows_Via_C_C_.chm 3907.60
638 - Writing secure code (Vista).pdf 15842.87
639 - X86IEE32.rar 71.32
640 - zeus_king_of_bots.pdf 2394.05
641 - Acheron_code.rar 207.16
642 - against.py 11.63
643 - ak922.rar 59.26
644 - AntiDebug.rar 154.00
645 - APC.rar 13.95
646 - Callgate.rar 6.72
647 - collect.gif 0.03
648 - CreateProcess.rar 15.13
649 - CreateRemoteThread7.rar 18.88
650 - DebugControl.rar 27.76
651 - DKOM.rar 236.22
652 - DynamoRio.rar 5130.62
653 - Exploitation_noyau.rar 1882.52
654 - exploitme.rar 3.22
655 - fortimon.rar 2.63
656 - found.txt 0.00
657 - FRN.rar 33.04
658 - GDI-MS07-017.rar 15.47
659 - Handle.rar 63.69
660 - HideFromDebugger.rar 1.04
661 - HideInObjDir.rar 152.39
662 - HideKey.rar 55.88
663 - HookSsdtMdl.rar 53.00
664 - htaccess_bruter.pl 1.75
665 - hydra-7.3.tar.gz 645.38
666 - InlineHook.rar 31.77
667 - IRP.rar 51.72
668 - john-1.7.9-jumbo-6.tar.gz 1891.25
669 - joomscan-latest.zip 133.08
670 - kbd-leds.rar 5.00
671 - KBOF.rar 40.15
672 - kldbg.rar 4.63
673 - Klog-fr-enhanced.rar 333.93
674 - labo_windbg_script.zip 58.00
675 - LdrpHashTable.rar 8.78
676 - LoadDriver.rar 83.63
677 - loki-0.2.7.exe 10827.81
678 - loki_0.2.7-1_amd64.deb 289.47
679 - loki_0.2.7-1_i386.deb 284.14
680 - MSR.rar 17.41
681 - MyGetConsoleTitle.rar 2.72
682 - ObjectDir.rar 3.70
683 - Output.rar 2.65
684 - PagefileAttack.rar 68.49
685 - patator_v0.3.py 92.95
686 - pipes.rar 39.39
687 - Preempt.rar 12.59
688 - ProcessIoPortHandlers.rar 135.92
689 - putty.exe 472.00
690 - pylibpcap_0.6.2-1_amd64.deb 26.95
691 - pylibpcap_0.6.2-1_i386.deb 24.29
692 - pyloris-3.2.zip 21.72
693 - qemu-1.3.0.tar 65540.00
694 - smm_attack.rar 68.92
695 - smram.rar 3.41
696 - sshbrute.py 1.30
697 - ssh_decoder-1.0.tar.bz2 16.05
698 - ssh_decoder.rb 12.46
699 - Stacker.rar 504.93
700 - StackWatcher.rar 500.73
701 - sudami_KillMe.rar 169.20
702 - t4pZ.rar 20.84
703 - TaskPwdDmp.rar 124.76
704 - TaskPwdDmp.zip 156.03
705 - TaskPwdDmpSymbols.rar 552.99
706 - thc-ipv6-1.9.tar.gz 142.71
707 - themole-0.3-lin-src.tar.gz 192.20
708 - ThreadHijack.rar 16.29
709 - TLB.rar 123.20
710 - UserlandPaxLdt.rar 52.40
711 - wmi.rar 35.19
712 - Wordlists.rar 424978.06
713 - yersinia-0.7.1.tar.gz 310.93
714 - BobCat_Alpha_v0.4.zip 2038.34
715 - bsqlbfv2.zip 7.44
716 - HackproofingMySQL.pdf 262.84
717 - MySqlShell.zip 691.40
718 - MySQL_5.html 1.18
719 - oscanner_bin_1_0_6.zip 1681.02
720 - SSEUtilSetup.EXE.nfo 1.08
721 - WinSQLRaw.zip 17237.29
722 - leviathan.zip 842.52
723 - MFC42D.EXE 908.05
724 - MFCO42D.EXE 780.05
725 - ads.txt 15.65
726 - Advanced Windows Exploitation.ppt 829.50
727 - Advapi32_EAT.txt 30.31
728 - Attacking-the-Windows-Kernel.pdf 290.11
729 - attacks2.pdf 314.34
730 - bh-eu-07-sotirov-apr19.pdf 207.96
731 - bh-us-05-jack-update.pdf 670.94
732 - bh-usa-07-baker.pdf 999.00
733 - bh-usa-07-bulygin.pdf 1004.57
734 - bh-usa-07-lindsay-WP.pdf 293.67
735 - bh-usa-07-quist_and_valsmith.pdf 906.05
736 - BH08-AlexIonescu.pdf 1534.51
737 - BlackHat-DC-2010-Picod-DPAPI-slides.pdf 8077.62
738 - Bypassing Windows Hardware-enforced DEP.pdf 124.99
739 - call_gate_exploitation.pdf 681.73
740 - collect.gif 0.03
741 - compil_small.txt 0.30
742 - csw06-sotirov.ppt 218.00
743 - dbgk-1.pdf 293.51
744 - dbgk-2.pdf 275.64
745 - dbgk-3.pdf 397.85
746 - defeating-w2k3-stack-protection.pdf 110.04
747 - dimva2010-dAnubis.pdf 178.98
748 - DLL-Preload_Attack.pdf 438.04
749 - Generic Anti Exploitation Technology for Windows.pdf 1487.79
750 - hidingen.txt 56.42
751 - hidingfr.txt 53.60
752 - hitb04-sk-chong.pdf 965.38
753 - hookingen.txt 47.54
754 - insideparite.zip 2122.42
755 - Intro_NT_kernel_security_stuff.pdf 3044.48
756 - JulAug2010.pdf 1455.10
757 - Kernel XP_nb.pdf 994.86
758 - Kernel32_EAT.txt 39.99
759 - KeserviceDescriptorTable.System_7.txt 17.30
760 - KeserviceDescriptorTable.System_xp.txt 11.79
761 - KeserviceDescriptorTable.Win32_7.txt 40.68
762 - KeserviceDescriptorTable.Win32_xp.txt 31.32
763 - live-forensics.ppt 5130.50
764 - mrxsmb-ring0-advisory.pdf 419.26
765 - Ndis_EAT.txt 13.44
766 - Ntdll_EAT.txt 57.05
767 - Ntoskrnl_EAT.txt 66.25
768 - ntstatus.txt 201.13
769 - ntundoc.chm 222.94
770 - NT_Cour.doc 540.00
771 - NT_PRIVILEGES.txt 52.57
772 - Nt_vs_Zw.txt 20.11
773 - p59-0x10.txt 66.16
774 - PRE07_Solomon.ppt 2379.50
775 - ring3.txt 61.99
776 - rtlzeromemory_vs_memset.txt 3.61
777 - sehop_en.pdf 194.71
778 - TokenKidnapping.pdf 181.95
779 - traditional-forensics.ppt 6043.50
780 - Usercode et Kernelcode sous Windows.zip 1093.37
781 - win-error.txt 252.12
782 - WinDBG_A_to_Z_color.pdf 1606.30
783 - Windows Access Control Demystified.pdf 228.15
784 - Windows Memory Layout, User-Kernel Address Spaces-1.pdf 258.17
785 - Windows Memory Layout, User-Kernel Address Spaces.pdf 258.17
786 - win_net_srv.pdf 1727.18
787 - [MS-SHLLINK].pdf 1385.11
788 - advbof.pdf 281.91
789 - ASM_icz-tuts_fr.zip 239.29
790 - bh-eu-06-Cerrudo-up.pdf 7474.62
791 - bh-eu-06-spoonm-skape.pdf 200.45
792 - bh-eu-07-kortchinsky.pdf 274.18
793 - evolving.shell.code.pdf 156.79
794 - Hijack.zip 13.46
795 - Intro_bof_win.pdf 315.18
796 - pas-a-pas-vers-l-assembleur-par-lord-noteworthy.pdf 1708.27
797 - Stack Overflow Exploitation Explained.pdf 1449.48
798 - stealth_shellcodes.pdf 251.25
799 - win32-shellcode.pdf 424.78
800 - winasm-1.0.1.pdf 256.94
801 - windows_dll_programming_fr.pdf 374.50
802 - wintypes.txt 7.16
803 - WritingSmallShellcode.pdf 141.02
804 - AdvVirtualMemory.pdf 228.77
805 - CacheManager.pdf 245.76
806 - IOArchitecture.pdf 154.50
807 - LPC.pdf 210.63
808 - NTFS.pdf 168.24
809 - ObjectManager.pdf 299.56
810 - Processes.pdf 224.30
811 - Registry.pdf 238.50
812 - Synchronization.pdf 525.25
813 - ThreadScheduling.pdf 207.66
814 - TrapsInterruptsExceptions.pdf 365.36
815 - UserModeHeapManager.pdf 370.59
816 - VirtualMemory.pdf 433.47
817 - Win32K.pdf 171.12
818 - WindowsKernelOverview.pdf 426.85
819 - WindowsServices.pdf 148.09