×
All
Videos 🎬
Audios 🎵
eBooks 📚
Mobile Apps 📱
Archives (ZIP/ISO) 💿
FILE
PURSUIT
Home
About
Contact
Discover
+
Submit
Lights ON
expl0it
Home
/
Discover
/
pirate-network.com
/
data
/
repo.palkeo.com
/
repositories
/
ivanlefou
/
expl0it
/
Parent Folder
khobe
1 files
seh
3 files
APT.pdf
PDF
4 years ago
571 bytes
Copy Link
BHDC-2010-Paper.pdf
PDF
4 years ago
571 bytes
Copy Link
BHUS10_Slides_Payload_already_inside_data_reuse_for_ROP_exploits_v1.pdf
PDF
4 years ago
571 bytes
Copy Link
BHUSA09-Oh-DiffingBinaries-PAPER.pdf
PDF
4 years ago
571 bytes
Copy Link
BlackHat-USA-2010-Meer-History-of-Memory-Corruption-Attacks-wp.pdf
PDF
4 years ago
571 bytes
Copy Link
Bypassing DEP with WPM & ROP Case Study Audio Converter by D.R Software Exploit and Document by Sud0.pdf
PDF
4 years ago
571 bytes
Copy Link
Confidence2010 ROP and JIT-Spray.pdf
PDF
4 years ago
571 bytes
Copy Link
D1T1 - Tavis Ormandy - Making Software Dumber.pdf
PDF
4 years ago
571 bytes
Copy Link
D1T2 - Mark Dowd - Attacking Interoperability.pdf
PDF
4 years ago
571 bytes
Copy Link
D2 - Gynvael Coldwind - Case Study of Recent Windows Vulnerabilities.pdf
PDF
4 years ago
571 bytes
Copy Link
DEPLIB.pdf
PDF
4 years ago
571 bytes
Copy Link
DEPLIB20_ekoparty.pdf
PDF
4 years ago
571 bytes
Copy Link
DEPinDepth.ppt
PPT
4 years ago
571 bytes
Copy Link
HES10-jvanegue_zero-allocations.pdf
PDF
4 years ago
571 bytes
Copy Link
HITB - JIT-Spray Attacks and Advanced Shellcode.pdf
PDF
4 years ago
571 bytes
Copy Link
KernelPool.pdf
PDF
4 years ago
571 bytes
Copy Link
LPC-ALPC-slides.pdf
PDF
4 years ago
571 bytes
Copy Link
Linux Memory Protection Mechanism Linux Memory Protection Mechanism.pdf
PDF
4 years ago
571 bytes
Copy Link
Memory Exploits & Defenses.pdf
PDF
4 years ago
571 bytes
Copy Link
OWASL_IL_2010_Jan_-_Moshe_Ben_Abu_-_Advanced_Heapspray.pdf
PDF
4 years ago
571 bytes
Copy Link
Pwn2Own-2010-Windows7-InternetExplorer8.pdf
PDF
4 years ago
571 bytes
Copy Link
ROP_Whitepaper.pdf
PDF
4 years ago
571 bytes
Copy Link
ROPdefender.pdf
PDF
4 years ago
571 bytes
Copy Link
SEH all-at-once attack.pdf
PDF
4 years ago
571 bytes
Copy Link
Secure Programing with GCC and GLbc.pdf
PDF
4 years ago
571 bytes
Copy Link
Surgically returning to randomized lib(c).pdf
PDF
4 years ago
571 bytes
Copy Link
Syscall Proxying - Simulating remote execution.pdf
PDF
4 years ago
571 bytes
Copy Link
There_s_a_Party_at_Ring0.pdf
PDF
4 years ago
571 bytes
Copy Link
XCon2010_win7.pdf
PDF
4 years ago
571 bytes
Copy Link
Xcon2005_SoBeIt.pdf
PDF
4 years ago
571 bytes
Copy Link
andrewg-ruxcon_2010.pdf
PDF
4 years ago
571 bytes
Copy Link
bh08sotirovdowd.pdf
PDF
4 years ago
571 bytes
Copy Link
confidence_slideshow.pdf
PDF
4 years ago
571 bytes
Copy Link
defeating-xpsp2-heap-protection.pdf
PDF
4 years ago
571 bytes
Copy Link
ferminjserna-exploitsmitigationsemet-100328034335-phpapp02.pdf
PDF
4 years ago
571 bytes
Copy Link
hawkes_ruxcon.pdf
PDF
4 years ago
571 bytes
Copy Link
ninjabof.pdf
PDF
4 years ago
571 bytes
Copy Link
owasp_201011.pdf
PDF
4 years ago
571 bytes
Copy Link
practical-rop.pdf
PDF
4 years ago
571 bytes
Copy Link
report.pdf
PDF
4 years ago
Get Size
Copy Link
return-to-libc.pdf
PDF
4 years ago
571 bytes
Copy Link
rootedcon_0day_english.pdf
PDF
4 years ago
571 bytes
Copy Link
rop.pdf
PDF
4 years ago
571 bytes
Copy Link
sean_ruxcon2010.pdf
PDF
4 years ago
571 bytes
Copy Link
stsi2010.pdf
PDF
4 years ago
571 bytes
Copy Link
to-jt-party-at-ring0.pdf
PDF
4 years ago
Get Size
Copy Link
win64_confidence2010.pdf
PDF
4 years ago
Get Size
Copy Link
Join FilePursuit on
chat for discussions and more information.