| lira.epac.to |
/DOCS-TECH/Hacking/Reversing and Exploiting/Reversing |
Visualization and Analysis of Assembly Code in an Integrated Comprehension Environment.pdf | 3.0 MB | 2019-03-07 18:20 | Documents |
| lira.epac.to |
/DOCS-TECH/Hacking/Reversing and Exploiting/Exploiting |
Non-Executable Stack ARM Exploitation.pdf | 230.0 KB | 2019-03-07 18:20 | Documents |
| lira.epac.to |
/DOCS-TECH/Hacking/Reversing and Exploiting/Exploiting/Exploit Writing Tutorial |
Exploit Writing Tutorial Part 7 - Unicode - From 0×00410041 to Calc.pdf | 2.5 MB | 2019-03-07 18:19 | Documents |
| lira.epac.to |
/DOCS-TECH/Hacking/Reversing and Exploiting/Reversing |
Reversing Basics – A Practical Approach.pdf | 741.0 KB | 2019-03-07 18:19 | Documents |
| lira.epac.to |
/DOCS-TECH/Electronics/Microprocessori |
AMD64 Architecture Programmers Manual Volume 3 - General-Purpose and System Instructions.pdf | 2.0 MB | 2019-03-07 18:19 | Documents |
| lira.epac.to |
/DOCS-TECH/Hacking/Reversing and Exploiting/Exploiting/Exploit Writing Tutorial |
Exploit Writing Tutorial Part 8 - Win32 Egg Hunting.pdf | 5.6 MB | 2019-03-07 18:19 | Documents |
| lira.epac.to |
/DOCS-TECH/Hacking/Reversing and Exploiting/Exploiting/Exploit Writing Tutorial |
Exploit Writing Tutorial Part 9 - Introduction to Win32 ShellCoding.pdf | 5.1 MB | 2019-03-07 18:19 | Documents |
| lira.epac.to |
/DOCS-TECH/Hacking/Reversing and Exploiting/Exploiting/Exploit Writing Tutorial |
Exploit Writing Tutorial Part 1 - Stack Based Overflows.pdf | 3.3 MB | 2019-03-07 18:19 | Documents |
| lira.epac.to |
/DOCS-TECH/Hacking/Reversing and Exploiting/Exploiting/Exploit Writing Tutorial |
Exploit Writing Tutorial Part 2 - Stack Based Overflows - Jumping to Shellcode.pdf | 2.1 MB | 2019-03-07 18:19 | Documents |
| lira.epac.to |
/DOCS-TECH/Hacking/Reversing and Exploiting/Exploiting/Exploit Writing Tutorial |
Exploit Writing Tutorial Part 11 - Heap Spraying Demystified.pdf | 7.9 MB | 2019-03-07 18:19 | Documents |
| lira.epac.to |
/DOCS-TECH/Hacking/Reversing and Exploiting/Exploiting/Exploit Writing Tutorial |
Exploit Writing Tutorial Part 10 - Chaining DEP with ROP - The Rubik Cube.pdf | 6.2 MB | 2019-03-07 18:19 | Documents |
| lira.epac.to |
/DOCS-TECH/Hacking/Reversing and Exploiting/Exploiting |
Advanced Windows Exploitation.pdf | 340.0 KB | 2019-03-07 18:19 | Documents |
| lira.epac.to |
/DOCS-TECH/Hacking/Reversing and Exploiting/Exploiting/Exploit Writing Tutorial |
Exploit Writing Tutorial Part 3a - SEH Based Exploits.pdf | 3.7 MB | 2019-03-07 18:19 | Documents |
| lira.epac.to |
/DOCS-TECH/Hacking/Reversing and Exploiting/Exploiting/Exploit Writing Tutorial |
Exploit Writing Tutorial Part 5 - How Debugger Modules and Plugins can Speed up Basic Exploit Development.pdf | 2.6 MB | 2019-03-07 18:19 | Documents |
| lira.epac.to |
/DOCS-TECH/Hacking/Reversing and Exploiting/Exploiting/Exploit Writing Tutorial |
Exploit Writing Tutorial Part 6 - Bypassing Stack Cookies, SafeSeh, SEHOP, HW DEP and ASLR.pdf | 5.1 MB | 2019-03-07 18:19 | Documents |
| lira.epac.to |
/DOCS-TECH/Hacking/Reversing and Exploiting/Exploiting/Linux Exploit Development |
Linux Exploit Development Part 2 (rev 2) - Real App Demo (part 2).pdf | 585.7 KB | 2019-03-07 18:19 | Documents |
| lira.epac.to |
/DOCS-TECH/Hacking/Reversing and Exploiting/Exploiting |
Writing Manual - Shellcode by Hand.pdf | 1.3 MB | 2019-03-07 18:19 | Documents |
| lira.epac.to |
/DOCS-TECH/Hacking/Reversing and Exploiting/Reversing |
Tools and Basic Reverse Engineering.pdf | 538.0 KB | 2019-03-07 18:19 | Documents |
| lira.epac.to |
/DOCS-TECH/Forensics/Reverse Engineering |
Win32 Flamer - Reverse Engineering and Framwork Reconstruction.pdf | 3.3 MB | 2019-03-07 18:19 | Documents |
| lira.epac.to |
/DOCS-TECH/Hacking/Reversing and Exploiting/Exploiting/Exploit Writing Tutorial |
Exploit Writing Tutorial Part 3b - SEH Based Exploits - Just Another Example.pdf | 1.4 MB | 2019-03-07 18:19 | Documents |
| lira.epac.to |
/DOCS-TECH/Hacking/Reversing and Exploiting/Exploiting |
Access Denied - Guide for Code Breakers.pdf | 5.1 MB | 2019-03-07 18:19 | Documents |
| lira.epac.to |
/DOCS-TECH/Hacking/Reversing and Exploiting/Exploiting/Linux Exploit Development |
Linux Exploit Development Part 3 (rev 2) - Real App Demo.pdf | 311.3 KB | 2019-03-07 18:19 | Documents |
| lira.epac.to |
/DOCS-TECH/Hacking/Reversing and Exploiting/Exploiting/Linux Exploit Development |
Linux Exploit Development Part 4 - ASCII Armor Bypass and return-to-plt.pdf | 614.4 KB | 2019-03-07 18:19 | Documents |
| lira.epac.to |
/DOCS-TECH/Hacking/Reversing and Exploiting/Exploiting/Linux Exploit Development |
Linux Exploit Writing Tutorial Part 1 - Stack Overflow.pdf | 867.3 KB | 2019-03-07 18:19 | Documents |
| lira.epac.to |
/DOCS-TECH/Hacking/Reversing and Exploiting/Exploiting/Exploit Writing Tutorial |
Exploit Writing Tutorial Part 4 - From Exploit to Metasploit - The Basics.pdf | 1.9 MB | 2019-03-07 18:19 | Documents |