| lira.epac.to |
/DOCS-TECH/Hacking/Reversing and Exploiting/Tools |
Debugging with GDB.pdf | 1000.0 KB | 2019-03-07 18:20 | Documents |
| lira.epac.to |
/DOCS-TECH/Hacking/Reversing and Exploiting/Exploiting |
Linux Kernel Crash Book - Everything you need to know.pdf | 4.9 MB | 2019-03-07 18:20 | Documents |
| lira.epac.to |
/DOCS-TECH/Hacking/Reversing and Exploiting/Exploiting |
OpenBSD Remote Exploiting.pdf | 256.0 KB | 2019-03-07 18:20 | Documents |
| lira.epac.to |
/DOCS-TECH/Hacking/Reversing and Exploiting/Exploiting |
Defeating DEP and ASLR.pdf | 1.2 MB | 2019-03-07 18:20 | Documents |
| lira.epac.to |
/DOCS-TECH/Hacking/Reversing and Exploiting/Exploiting |
Return Oriented Programming Exploitation without Code Injection.pdf | 4.0 MB | 2019-03-07 18:20 | Documents |
| lira.epac.to |
/DOCS-TECH/Hacking/Reversing and Exploiting/Reversing |
Reversing - Secrets of Reverse Engineering.pdf | 8.6 MB | 2019-03-07 18:20 | Documents |
| lira.epac.to |
/DOCS-TECH/Hacking/Reversing and Exploiting/Reversing |
Reverse Engineering.pdf | 3.9 MB | 2019-03-07 18:20 | Documents |
| lira.epac.to |
/DOCS-TECH/Hacking/Reversing and Exploiting/Reversing |
Reversing a Simple Virtual Machine.pdf | 260.0 KB | 2019-03-07 18:20 | Documents |
| lira.epac.to |
/DOCS-TECH/Hacking/Reversing and Exploiting/Exploiting |
DEP in Depth.pdf | 595.0 KB | 2019-03-07 18:20 | Documents |
| lira.epac.to |
/DOCS-TECH/Hacking/Reversing and Exploiting/Reversing |
Binary Obfuscation from the Top Down - How to Make your Compiler do your Dirty Work.pdf | 7.5 MB | 2019-03-07 18:20 | Documents |
| lira.epac.to |
/DOCS-TECH/Hacking/Reversing and Exploiting/Reversing |
64-bit Imports Rebuilding and Unpacking.pdf | 1000.0 KB | 2019-03-07 18:20 | Documents |
| lira.epac.to |
/DOCS-TECH/Hacking/Reversing and Exploiting/Exploiting |
Runtime Attacks - Buffer Overflow and Return-Oriented-Programming.pdf | 6.6 MB | 2019-03-07 18:20 | Documents |
| lira.epac.to |
/DOCS-TECH/Hacking/Reversing and Exploiting/Exploiting |
Return into libc without Function Calls.pdf | 398.0 KB | 2019-03-07 18:20 | Documents |
| lira.epac.to |
/DOCS-TECH/Hacking/Reversing and Exploiting/Exploiting |
Overcoming Trial Version Software Cracking Using a Hybridized Self-Modifying Technique.pdf | 453.0 KB | 2019-03-07 18:20 | Documents |
| lira.epac.to |
/DOCS-TECH/Hacking/Reversing and Exploiting/Tools |
The IDA Pro Book.pdf | 26.0 MB | 2019-03-07 18:20 | Documents |
| lira.epac.to |
/DOCS-TECH/Hacking/Reversing and Exploiting/Exploiting |
Understanding the Low Fragmentation Heap.pdf | 1.1 MB | 2019-03-07 18:20 | Documents |
| lira.epac.to |
/DOCS-TECH/Hacking/Reversing and Exploiting/Reversing |
Visualization and Analysis of Assembly Code in an Integrated Comprehension Environment.pdf | 3.0 MB | 2019-03-07 18:20 | Documents |
| lira.epac.to |
/DOCS-TECH/Hacking/Reversing and Exploiting/Tools |
Insight Interactive Inspector.pdf | 482.0 KB | 2019-03-07 18:20 | Documents |
| lira.epac.to |
/DOCS-TECH/Hacking/Reversing and Exploiting/Exploiting |
Unix ASM Codes Development for Vulnerabilities.pdf | 274.0 KB | 2019-03-07 18:20 | Documents |
| lira.epac.to |
/DOCS-TECH/Hacking/Reversing and Exploiting/Exploiting |
Packed, Printable, and Polymorphic Return-Oriented Programming.pdf | 466.0 KB | 2019-03-07 18:20 | Documents |
| lira.epac.to |
/DOCS-TECH/Hacking/Reversing and Exploiting/Exploiting |
Practical Windows XP - 2003 Heap Exploitation.pdf | 807.0 KB | 2019-03-07 18:20 | Documents |
| lira.epac.to |
/DOCS-TECH/Programming/Assembly |
PC Assembly Language (2005).pdf | 1000.0 KB | 2019-03-07 18:20 | Documents |
| lira.epac.to |
/DOCS-TECH/Hacking/Reversing and Exploiting/Exploiting |
Understanding SEH (Structured Exception Handler) Exploitation.pdf | 1.1 MB | 2019-03-07 18:20 | Documents |
| lira.epac.to |
/DOCS-TECH/Hacking/Reversing and Exploiting/Exploiting |
Smashing The Stack For Fun And Profit.pdf | 178.0 KB | 2019-03-07 18:20 | Documents |
| lira.epac.to |
/DOCS-TECH/Hacking/Reversing and Exploiting/Exploiting |
SEH Exploitation.pdf | 380.0 KB | 2019-03-07 18:20 | Documents |