×
All
Videos 🎬
Audios 🎵
eBooks 📚
Mobile Apps 📱
Archives (ZIP/ISO) 💿
FILE
PURSUIT
Home
About
Contact
Discover
+
Submit
Lights ON
LIVRES
Home
/
Discover
/
178.17.170.13
/
LIVRES
/
Parent Folder
1510.07563.pdf
PDF
2 years ago
6.21 MB
Copy Link
1510.07563v1.pdf
PDF
2 years ago
6.18 MB
Copy Link
1604.06964.pdf
PDF
2 years ago
308.53 kB
Copy Link
2-The Shellcoder's Handbook.pdf
PDF
2 years ago
Get Size
Copy Link
24-DEADLY-SINS-OF-SOFTWARE-SECURITY-2010.pdf
PDF
2 years ago
2.77 MB
Copy Link
781.pdf
PDF
2 years ago
6.90 MB
Copy Link
A Bug Hunter's Diary - Tobias Klein.pdf
PDF
2 years ago
Get Size
Copy Link
A Journey to the Center of the Rustock.B Rootkit.pdf
PDF
2 years ago
5.35 MB
Copy Link
ANDROID.pdf
PDF
2 years ago
2.27 MB
Copy Link
ART OF EXPLOITATION, 2nd Edition.pdf
PDF
2 years ago
4.83 MB
Copy Link
AST2012.pdf
PDF
2 years ago
405.44 kB
Copy Link
Acquisition de preuves et analyse a froid d un systeme sous Windows.pdf
PDF
2 years ago
2.48 MB
Copy Link
Advanced.Bootkit.Techniques.On.Android.pdf
PDF
2 years ago
7.13 MB
Copy Link
Aide-memoire administrateur Linux.pdf
PDF
2 years ago
74.09 kB
Copy Link
Android Hacker's Handbook.pdf
PDF
2 years ago
Get Size
Copy Link
Antivirus hackers handbook.pdf
PDF
2 years ago
5.62 MB
Copy Link
Apress.Cryptography.In.C.And.C.Plus.Plus.2nd.Edition.Jul.2013.ISBN.1430250984.pdf
PDF
2 years ago
2.95 MB
Copy Link
Assembly Language Step-By-Step - Programming with Linux, 3rd edition (Wiley, 2009, 0470497025).pdf
PDF
2 years ago
5.77 MB
Copy Link
AttackingAndDefendingBIOS-RECon2015.pdf
PDF
2 years ago
2.40 MB
Copy Link
BH_US_12_Brossard_Backdoor_Hacking_Slides.pdf
PDF
2 years ago
1.62 MB
Copy Link
BP.New.Feb2016.ISBN.097528388X.pdf
PDF
2 years ago
3.39 MB
Copy Link
BlackHat_DC_2011_Perez-Pico_Mobile_Attacks-Slides.pdf
PDF
2 years ago
2.14 MB
Copy Link
BlackHat_DC_2011_Perez-Pico_Mobile_Attacks-wp.pdf
PDF
2 years ago
1.32 MB
Copy Link
Buffer Overflow Attacks on Linux Principles Analyzing and Protection.pdf
PDF
2 years ago
56.00 kB
Copy Link
Bypassing DEP with WPM & ROP.pdf
PDF
2 years ago
333.85 kB
Copy Link
Bypassing Stack Cookies, SafeSeh, HW DEP and ASLR.pdf
PDF
2 years ago
3.07 MB
Copy Link
CONFidence2009_bernardo_damele_guido_landi.pdf
PDF
2 years ago
744.87 kB
Copy Link
CRC.Press.Crypto.Nov.2014.ISBN.1482228890.pdf
PDF
2 years ago
2.37 MB
Copy Link
CRC.Press.Cyber.Mar.2016.ISBN.1498734731.pdf
PDF
2 years ago
6.30 MB
Copy Link
Cahier de maths 2de - _dition 2013.PDF
PDF
2 years ago
18.67 MB
Copy Link
Catalogue de stages CGI Business Consulting Security Risk Management 2017.pdf
PDF
2 years ago
902.49 kB
Copy Link
Computer Forensics, Investigating Data and Image Files.pdf
PDF
2 years ago
15.22 MB
Copy Link
Computer Forensics_ Investigating Networ - EC-Council.pdf
PDF
2 years ago
23.99 MB
Copy Link
Creating code obfuscation Virtual Machines.pdf
PDF
2 years ago
612.46 kB
Copy Link
D1T3 LABS - Anto Joseph - Droid-FF.pdf
PDF
2 years ago
30.17 MB
Copy Link
D2T2 - D. Mende & Enno Rey - Attacking 3G and 4G Networks.pdf
PDF
2 years ago
2.25 MB
Copy Link
DEFCON-24-Arnaud-Soullie-Workshop-Pentesting-ICS-101.pdf
PDF
2 years ago
4.12 MB
Copy Link
DEFCON-24-Hendrik-Schmidt-Brian-Butter-Attacking-BaseStations.pdf
PDF
2 years ago
1.56 MB
Copy Link
DEFCON-24-Mike-Rich-Use-Their-Machines-Against-Them.pdf
PDF
2 years ago
1.64 MB
Copy Link
Data Structures Using C, 2nd edition.pdf
PDF
2 years ago
18.35 MB
Copy Link
Deobfuscation of Virtualization-Obfuscated Software.pdf
PDF
2 years ago
191.91 kB
Copy Link
Deserialization - What Could Go Wrong.pdf
PDF
2 years ago
1.50 MB
Copy Link
Detecting and Removing Web Application Vulnerabilities with Static Analysis and Data Mining.pdf
PDF
2 years ago
1.47 MB
Copy Link
Developpement avance d un rootkit pour les modules du noyau.pdf
PDF
2 years ago
970.63 kB
Copy Link
EN - Hacking Blind - BROP - Bittau.pdf
PDF
2 years ago
470.85 kB
Copy Link
EN - Stack Bug - Stack Overflow ASLR bypass using ret2reg.pdf
PDF
2 years ago
761.83 kB
Copy Link
EN-SAP Penetration testing_Black-H_Europe.pdf
PDF
2 years ago
3.30 MB
Copy Link
Exploring the Blackhole Exploit Kit.pdf
PDF
2 years ago
534.01 kB
Copy Link
File_Format_Fuzzing_in_Android_-Alexandru_Blanda.pdf
PDF
2 years ago
604.90 kB
Copy Link
Firstov - Attacking MongoDB.pdf
PDF
2 years ago
1.99 MB
Copy Link
Join FilePursuit on
chat for discussions and more information.