Index of /Books/Informatics/Exploiting/


../
A Guide to Kernel Exploitation.pdf                 24-Mar-2024 11:23             5518186
A Practical Dynamic Buffer Overflow Detector.pdf   24-Mar-2024 11:23              141477
A Signature-free Buffer Overflow Attack Blocker..> 24-Mar-2024 11:23              316797
BTL.pdf                                            24-Mar-2024 11:23              325232
Buffer Overflow - an exploit anatomy.pdf           24-Mar-2024 11:23              239681
Buffer Overflow Attacks.pdf                        24-Mar-2024 11:23             5639419
Fuzzing_for_software_vulnerability_discovery.pdf   24-Mar-2024 11:23             5871627
No_Starch_Press_-_Hacking_-_The_Art_of_Exploita..> 24-Mar-2024 11:23             4565121
ROPdefender.pdf                                    24-Mar-2024 11:23              432954
Return-Oriented Programming-Systems Languages a..> 24-Mar-2024 11:23              626522
Wiley.The.Antivirus.Hackers.Handbook.pdf           24-Mar-2024 11:23             5929751
formatstring-1.2.pdf                               24-Mar-2024 11:23              234388
geometry.pdf                                       24-Mar-2024 11:23              407559
stack_smashing.pdf                                 24-Mar-2024 11:23              408599
stsi2010.pdf                                       24-Mar-2024 11:23             2222435