| lira.epac.to |
/DOCS-TECH/Hacking/Reversing and Exploiting/Exploiting/Exploit Writing Tutorial |
Exploit Writing Tutorial Part 8 - Win32 Egg Hunting.pdf | 5.6 MB | 2019-03-07 18:19 | Documents |
| lira.epac.to |
/DOCS-TECH/Forensics/Reverse Engineering |
Reverse Engineering Self-Modifying Code - Unpacker Extraction.pdf | 153.0 KB | 2019-03-07 18:18 | Documents |
| lira.epac.to |
/DOCS-TECH/Psychology and Communication |
Experiments With People - Revelations From Social Psychology.pdf | 20.0 MB | 2019-03-07 18:17 | Documents |
| lira.epac.to |
/DOCS-TECH/Sistemi Operativi/Mac OS |
Hacking Macs for Fun and Profit.pdf | 3.1 MB | 2019-03-07 18:17 | Documents |
| lira.epac.to |
/DOCS-TECH/Hacking/Attack |
Bypassing ASLR DEP.pdf | 344.0 KB | 2019-03-07 18:17 | Documents |
| lira.epac.to |
/DOCS-TECH/Hacking/Fuzzing |
Fuzzing Frameworks.pdf | 352.0 KB | 2019-03-07 18:17 | Documents |
| lira.epac.to |
/DOCS-TECH/Hacking/Fuzzing |
Fuzzing the Past, the Present and the Future.pdf | 117.0 KB | 2019-03-07 18:17 | Documents |
| lira.epac.to |
/DOCS-TECH/Security |
Gauss - Abnormal Distribution.pdf | 1.5 MB | 2019-03-07 18:17 | Documents |
| lira.epac.to |
/DOCS-TECH/Hacking/SSLStrip |
SECUINSIDE CTF Write-up - Plaid Parliament of Pwning (2011).pdf | 2.0 MB | 2019-03-07 18:16 | Documents |
| lira.epac.to |
/DOCS-TECH/Security |
A Binary Rewriting Defense against Format String Attack.pdf | 698.0 KB | 2019-03-07 18:16 | Documents |
| lira.epac.to |
/DOCS-TECH/Forensics/Malware |
Discovering the Secrets of RaDa.exe.pdf | 2.1 MB | 2019-03-07 18:15 | Documents |
| lira.epac.to |
/DOCS-TECH/Forensics/Reverse Engineering |
Cracking - The Anti.pdf | 91.0 KB | 2019-03-07 18:15 | Documents |
| lira.epac.to |
/DOCS-TECH/Security/Information Security |
Software Protection through Anti-Debugging.pdf | 186.0 KB | 2019-03-07 18:15 | Documents |
| lira.epac.to |
/DOCS-TECH/Forensics |
Windows Memory Forensics with Volatility.pdf | 10.0 MB | 2019-03-07 18:15 | Documents |
| lira.epac.to |
/DOCS-TECH/Forensics |
The Acquisition and Analysis of Random Access Memory.pdf | 156.0 KB | 2019-03-07 18:15 | Documents |
| lira.epac.to |
/DOCS-TECH/Programming/Python |
A Quick Tour of Python.pdf | 50.0 KB | 2019-03-07 18:14 | Documents |
| lira.epac.to |
/DOCS-TECH/Programming/Python |
Python Standard Library.pdf | 1.8 MB | 2019-03-07 18:14 | Documents |
| lira.epac.to |
/DOCS-TECH/Forensics/Malware |
Analyzing Malware.pdf | 938.0 KB | 2019-03-07 18:14 | Documents |
| lira.epac.to |
/DOCS-TECH/Forensics/Reports |
Analysis of 2007 DFRWS Forensic Carving Challenge.pdf | 3.3 MB | 2019-03-07 18:14 | Documents |
| lira.epac.to |
/DOCS-TECH/Programming/Python |
Python Essential Reference - 4th Edition.pdf | 2.4 MB | 2019-03-07 18:14 | Documents |
| lira.epac.to |
/DOCS-TECH/Programming/Python |
Python 3 for Absolute Beginners.pdf | 7.6 MB | 2019-03-07 18:14 | Documents |
| lira.epac.to |
/DOCS-TECH/Programming/Python/Django |
The Definitive Guide to Django.pdf | 4.1 MB | 2019-03-07 18:14 | Documents |
| lira.epac.to |
/DOCS-TECH/Sistemi Operativi/Linux |
ZFS and BTRFS.pdf | 1.9 MB | 2019-03-07 18:14 | Documents |
| lira.epac.to |
/DOCS-TECH/Programming/General Programming |
Learning to Program.pdf | 715.0 KB | 2019-03-07 18:14 | Documents |
| lira.epac.to |
/DOCS-TECH/Forensics |
Using Every Part of the Buffalo in Windows Memory Analysis.pdf | 480.0 KB | 2019-03-07 18:14 | Documents |