BECAUSE of heavy processing requirements, we
are currently using some of your unused brain capacity for
backup processing. Please ignore any hallucinations, voices
or unusual dreams you may experience. Avoid all
concentration-intensive tasks until further notice.
Thank You!~ 
Icon Name Last modified Size Description

[FOLDER] Parent Directory   - Agonizing Memories
[DIR]heap_overflow03-Feb-2009 20:36 -  
[DIR]archives30-Jul-2011 12:18 -  
[DIR]bugs.pdf03-Feb-2009 20:363.02MBug hunting: Vulnerability finding methods in Windows 32 environments compared
[DIR]Intro_to_Win32_Exploits.pdf03-Feb-2009 20:361.25M 
[DIR]Defeating_DEP_and_ASLR_in_Windows.pdf30-Jul-2011 12:191.24M 
[DIR]seh-exploitation.pdf03-Feb-2009 20:36921.97KPractical SEH exploitation
[DIR]win32-shellcode.pdf03-Feb-2009 20:36424.78KUnderstanding Windows Shellcode
[DIR]Zero allocations vulnerabilities - CCC version.zip03-Mar-2011 13:05263.71K 
[DIR]temporal.pdf03-Feb-2009 20:36238.60KTemporal Return Addresses
[DIR]bypassing-win32-nx.pdf03-Feb-2009 20:36124.55KBypassing Windows Hardware-enforced Data Execution Prevention

A trop ramper dans l'ombre, on finirait par être aveugle.
   )\._.,--....,'``.
  /,   _.. \   _\  ;`._ ,.
 `._.-(,_..'--(,_..'`-.;.'