BECAUSE of heavy processing requirements, we are currently using some of your unused brain capacity for backup processing. Please ignore any hallucinations, voices or unusual dreams you may experience. Avoid all concentration-intensive tasks until further notice. Thank You!~ |
Name | Last modified | Size | Description | |
Parent Directory | - | Agonizing Memories | ||
heap_overflow | 03-Feb-2009 20:36 | - | ||
archives | 30-Jul-2011 12:18 | - | ||
bugs.pdf | 03-Feb-2009 20:36 | 3.02M | Bug hunting: Vulnerability finding methods in Windows 32 environments compared | |
Intro_to_Win32_Exploits.pdf | 03-Feb-2009 20:36 | 1.25M | ||
Defeating_DEP_and_ASLR_in_Windows.pdf | 30-Jul-2011 12:19 | 1.24M | ||
seh-exploitation.pdf | 03-Feb-2009 20:36 | 921.97K | Practical SEH exploitation | |
win32-shellcode.pdf | 03-Feb-2009 20:36 | 424.78K | Understanding Windows Shellcode | |
Zero allocations vulnerabilities - CCC version.zip | 03-Mar-2011 13:05 | 263.71K | ||
temporal.pdf | 03-Feb-2009 20:36 | 238.60K | Temporal Return Addresses | |
bypassing-win32-nx.pdf | 03-Feb-2009 20:36 | 124.55K | Bypassing Windows Hardware-enforced Data Execution Prevention | |
A trop ramper dans l'ombre, on finirait par être aveugle. |
)\._.,--....,'``. /, _.. \ _\ ;`._ ,. `._.-(,_..'--(,_..'`-.;.' |