![]() |
BECAUSE of heavy processing requirements, we are currently using some of your unused brain capacity for backup processing. Please ignore any hallucinations, voices or unusual dreams you may experience. Avoid all concentration-intensive tasks until further notice. Thank You!~ |
| Name | Last modified | Size | Description | |
| Parent Directory | - | Agonizing Memories | ||
| archives | 30-Jul-2011 12:18 | - | ||
| heap_overflow | 03-Feb-2009 20:36 | - | ||
| bypassing-win32-nx.pdf | 03-Feb-2009 20:36 | 124.55K | Bypassing Windows Hardware-enforced Data Execution Prevention | |
| temporal.pdf | 03-Feb-2009 20:36 | 238.60K | Temporal Return Addresses | |
| Zero allocations vulnerabilities - CCC version.zip | 03-Mar-2011 13:05 | 263.71K | ||
| win32-shellcode.pdf | 03-Feb-2009 20:36 | 424.78K | Understanding Windows Shellcode | |
| seh-exploitation.pdf | 03-Feb-2009 20:36 | 921.97K | Practical SEH exploitation | |
| Defeating_DEP_and_ASLR_in_Windows.pdf | 30-Jul-2011 12:19 | 1.24M | ||
| Intro_to_Win32_Exploits.pdf | 03-Feb-2009 20:36 | 1.25M | ||
| bugs.pdf | 03-Feb-2009 20:36 | 3.02M | Bug hunting: Vulnerability finding methods in Windows 32 environments compared | |
Nous sommes tous également hommes, mais non membres égaux de la société. [Voltaire] |
(`.-,')
.-' ;
_.-' , `,-
_ _.-' .' /._
.' ` _.-. / ,'._;)
( . )-| (
)`,_ ,'_,' \_;)
('_ _,'.' (___,))
`-:;.-' |