ร
All
Videos ๐ฌ
Audios ๐ต
eBooks ๐
Mobile Apps ๐ฑ
Archives (ZIP/ISO) ๐ฟ
FILE
PURSUIT
Home
About
Contact
Discover
+
Submit
Lights ON
expl0it
Home
/
Discover
/
pirate-network.com
/
data
/
repo.palkeo.com
/
repositories
/
mirror7.meh.or.id
/
expl0it
/
Parent Folder
D1T2 - Alexey Sintsov - JIT Spray Attacks and Advanced Shellcode.pdf
PDF
4 years ago
571 bytes
Copy Link
D1T2 - Mark Dowd - Attacking Interoperability.pdf
PDF
4 years ago
571 bytes
Copy Link
D2 - Gynvael Coldwind - Case Study of Recent Windows Vulnerabilities.pdf
PDF
4 years ago
571 bytes
Copy Link
DEPLIB.pdf
PDF
4 years ago
571 bytes
Copy Link
DEPLIB20_ekoparty.pdf
PDF
4 years ago
571 bytes
Copy Link
DEPinDepth.ppt
PPT
4 years ago
571 bytes
Copy Link
DNS Cache Poisoning Vulnerability.pdf
PDF
4 years ago
571 bytes
Copy Link
Debugging multi-threaded applications with RTOS-aware tools.pdf
PDF
4 years ago
571 bytes
Copy Link
Decimalisation Table Attacks for PIN Cracking.pdf
PDF
4 years ago
571 bytes
Copy Link
Defeating DEP through a mapped file.pdf
PDF
4 years ago
571 bytes
Copy Link
Defeating compiler-level buffer overflow protection.pdf
PDF
4 years ago
571 bytes
Copy Link
Defeating the Stack Based Buffer Overflow Prevention Mechanism of Microsoft Windows 2003 Server.pdf
PDF
4 years ago
571 bytes
Copy Link
Defending Embedded Systems Against Buffer Overflow via Hardware-Software.pdf
PDF
4 years ago
571 bytes
Copy Link
Developing StrongARM Linux shellcode.pdf
PDF
4 years ago
571 bytes
Copy Link
Dynamic Buffer Overflow Detection.pdf
PDF
4 years ago
571 bytes
Copy Link
EN-ASLR Smack _ Laugh Reference.pdf
PDF
4 years ago
571 bytes
Copy Link
EN-ASLR.pdf
PDF
4 years ago
571 bytes
Copy Link
EN-Advanced SQL Injection In SQL Server Applications.pdf
PDF
4 years ago
571 bytes
Copy Link
EN-Bypass windows server 2008.pdf
PDF
4 years ago
571 bytes
Copy Link
EN-Bypassing SEHOP.pdf
PDF
4 years ago
571 bytes
Copy Link
EN-Exploit writing tutorial part 4 : From Exploit to Metasploit รข%80%93 The basics.pdf
PDF
4 years ago
571 bytes
Copy Link
EN-Exploiting Format String Vulnerabilities.pdf
PDF
4 years ago
571 bytes
Copy Link
EN-Game Hacking.pdf
PDF
4 years ago
571 bytes
Copy Link
EN-NOx86-64 buffer overflow exploits and the borrowed code chunks exploitation technique -NX.pdf
PDF
4 years ago
571 bytes
Copy Link
Elementary Structures.pdf
PDF
4 years ago
Get Size
Copy Link
Eliminating stack overflow by abstract interpretation.pdf
PDF
4 years ago
571 bytes
Copy Link
Eliminating the Threat of Kernel Stack Overflows.pdf
PDF
4 years ago
571 bytes
Copy Link
Engineering Heap Overflow Exploits with JavaScript.pdf
PDF
4 years ago
571 bytes
Copy Link
Evolving Shell Code (Symantec).pdf
PDF
4 years ago
571 bytes
Copy Link
Evolving Successful Stack Overflow Attacks for Vulnerability Testing.pdf
PDF
4 years ago
571 bytes
Copy Link
Experiencing Enhanced Emulation Debugging.pdf
PDF
4 years ago
571 bytes
Copy Link
Exploit writing tutorial part 1 : Stack Based Overflows.pdf
PDF
4 years ago
571 bytes
Copy Link
Exploit writing tutorial part 2 : Stack Based Overflows - jumping to shellcode.pdf
PDF
4 years ago
571 bytes
Copy Link
Exploit writing tutorial part 3 : SEH Based Exploits.pdf
PDF
4 years ago
571 bytes
Copy Link
Exploit writing tutorial part 3b : SEH Based Exploits - just another example.pdf
PDF
4 years ago
571 bytes
Copy Link
Exploit writing tutorial part 4 : From Exploit to Metasploit - The basics.pdf
PDF
4 years ago
571 bytes
Copy Link
Exploit writing tutorial part 5 : How debugger modules & plugins can speed up basic exploit development.pdf
PDF
4 years ago
571 bytes
Copy Link
Exploit writing tutorial part 6 : Bypassing Stack Cookies, SafeSeh, HW DEP and ASLR.pdf
PDF
4 years ago
571 bytes
Copy Link
Exploit writing tutorial part 7 : Unicode - from 0x00410041 to calc.pdf
PDF
4 years ago
571 bytes
Copy Link
Exploit writing tutorial part 8 : Win32 Egg Hunting.pdf
PDF
4 years ago
571 bytes
Copy Link
Exploiting ARM Linux Systems.pdf
PDF
4 years ago
571 bytes
Copy Link
Exploiting Format String Vulnerabilities.pdf
PDF
4 years ago
571 bytes
Copy Link
Exploiting Stack Overflows in the Linux Kernel.pdf
PDF
4 years ago
571 bytes
Copy Link
Exploiting the iOS Kernel.pdf
PDF
4 years ago
571 bytes
Copy Link
Exploring Windows CE Shellcode.pdf
PDF
4 years ago
571 bytes
Copy Link
Finding_and_Understanding_Bugs_in_C_Compilers.pdf
PDF
4 years ago
571 bytes
Copy Link
Format String Attacks.pdf
PDF
4 years ago
571 bytes
Copy Link
Fuzzing_for_software_vulnerability_discovery.pdf
PDF
4 years ago
571 bytes
Copy Link
GDT and LDT in Windows kernel vulnerability exploitation.pdf
PDF
4 years ago
571 bytes
Copy Link
HES10-jvanegue_zero-allocations.pdf
PDF
4 years ago
571 bytes
Copy Link
Join FilePursuit on
chat for discussions and more information.