×
Log in
Upload File
Most Popular
Study
Business
Design
Technology
Travel
Explore all categories
The top documents of abuadzkasalafy
SafeSEH SEHOP Principles
33 views
p18_0x03_An Introduction to Packet Switched Networks_by_Epsilon
215 views
p67_0x0d_Scraps of Notes on Remote Stack Overflow Exploitation_by_pi3
224 views
p67_0x08_The House of Lore_ Reloaded Ptmalloc v2 & v3_ Analysis & Corruption_by_blackngel
222 views
p67 0x06 Kernel Instrumentation Using Kprobes by ElfMaster
234 views
p67 0x07 ProFTPD With Mod SQL Authentication, Remote Root by Feline Menace
223 views
p66_0x0f_Linux Kernel Heap Tampering Detection_by_Larry H
228 views
p66 0x0b a Real SMM Rootkit by Core Collapse
228 views
p66 0x09 Exploiting TCP Persist Timer Infiniteness by Ithilgore
222 views
p66 0x06 Exploiting DLmalloc Frees in 2009 by Huku
218 views
p65 0x0d the Underground Myth by Anonymous
220 views
p65_0x06_The Only Laws on Internet Are Assembly and RFCs_by_Julia
214 views
p65_0x04_Stealth Hooking_ Another Way to Subvert the Windows Kernel_by_Mxatone and IvanLeFou
250 views
p64 0x0f Remote Blind TCP IP Spoofing by Klm
216 views
p64 0x0c Hacking Deeper in the System by Scythale
221 views
p64 0x0a Crypt Analysis of DPA-128 by Sysk
240 views
p63 0x13 Breaking Through a Firewall by Kotkrye
216 views
p63_0x12_Process Hiding & the Linux Scheduler_by_ubra
219 views
p63 0x11 Hacking With Embedded Systems by Cawan
217 views
p63 0x0f NT Shellcode Prevention Demystified by Piotr
223 views
Next >