Index of:

Icon  Name                                                                                                                Last modified      Size  
[PARENTDIR] Parent Directory - [   ] Assessing and Exploiting Web Applications with Samurai WTF.pdf 2019-03-07 15:31 1.6M [   ] Attacking RFID System.pdf 2019-03-07 13:45 382K [   ] Automated Credit Card Fraud.pdf 2011-05-28 04:07 248K [   ] Bluepilling the Xen Hypervisor.pdf 2012-01-17 23:46 2.6M [   ] Brute Force - Cracking the Data Encryption Standard.pdf 2019-03-07 15:41 2.1M [   ] Buffer Overflow (Root on Server II).pdf 2019-03-07 15:37 700K [   ] Building Trojan Hardware at Home.pdf 2019-03-07 16:48 7.9M [   ] Bypassing ASLR DEP.pdf 2019-03-07 18:17 344K [   ] CD Cracking Uncovered - Protection Against Unsanctioned CD Copying.chm 2019-03-07 15:42 9.0M [   ] Chapter 3 - Footprinting and Scanning.pdf 2019-03-07 15:30 802K [   ] Cracking Drupal - A Drop in the Bucket (2009).pdf 2019-03-07 17:37 10M [   ] Cracking Passwords Guide.pdf 2011-11-25 18:05 272K [   ] Cracking Veneta Insipid Crackme v.2.pdf 2021-04-02 10:35 39K [   ] Data Retrieval over DNS in SQL Injection Attacks.pdf 2018-11-06 23:26 436K [   ] Demystifying Authentication Attacks.pdf 2019-03-07 15:30 344K [   ] Disabling the MacBook Webcam Indicator LED.pdf 2013-12-20 23:22 4.4M [   ] Dns Cache Poisoning.pdf 2019-03-07 15:38 321K [   ] Firewalls And Networks - How To Hack Into Remote Computers - Part Two - Gaining Access and Securing the Gateway.pdf 2019-03-07 15:33 2.4M [   ] Format String Vulnerability.pdf 2020-04-12 19:32 109K [   ] GRE - Attacking Generic Routing Encapsulation.pdf 2019-03-07 18:26 583K [   ] Hack Attacks Revealed.pdf 2018-08-04 16:56 8.2M [   ] Hack Attacks Testing.pdf 2019-03-07 15:33 9.6M [   ] Hackback - A DIY Guide for those without the patience to wait for whistleblowers.pdf 2019-03-07 15:39 82K [   ] KeyGening X3CHUN Crypto KeygenMe #2.pdf 2021-04-02 10:35 18K [TXT] LES - Linux privilege escalation auditing tool.html 2020-05-05 09:45 15K [DIR] LES: Linux privilege escalation auditing tool_files/ 2020-05-05 09:46 - [   ] Lena151 KeygenMe 1 Solution.chm 2019-03-07 18:18 102K [TXT] Linux - Elevation of Privileges.html 2020-05-07 09:51 26K [   ] Linux - Format String Exploitation.pdf 2020-04-12 19:21 483K [   ] Man in the Middle.pdf 2018-08-04 16:57 320K [   ] Network Attacks and Exploitation.pdf 2018-08-04 16:54 25M [   ] Next Generation Web Attacks - HTML 5, DOM(L3) and XHR(L2).pdf 2018-08-04 16:59 735K [   ] Password Cracking Techniques.pdf 2019-03-07 15:36 433K [   ] Python Web Hacking Essentials (2015).pdf 2019-03-07 18:06 2.9M [   ] Root on Server.pdf 2019-03-07 15:37 716K [   ] Scapy Documentation.pdf 2019-03-07 18:26 244K [   ] Security Flaws in Universal Plug and Play (2013).pdf 2019-03-07 16:10 1.1M [   ] Solution for elfZ Crackme 2.pdf 2021-04-02 10:37 419K [   ] Stack Smashing.pdf 2008-10-16 17:02 399K [   ] Stealing the Network - How to Own a Shadow.pdf 2019-03-07 16:00 9.1M [   ] Syngress - Buffer Overflow Attacks - Dec 2004.pdf 2021-04-02 10:37 5.4M [   ] The Art of Invisibility 2017.pdf 2018-08-04 16:49 1.4M [   ] The New Ways to Attack Applications on Operating Systems under ExecShield.pdf 2021-04-20 10:49 658K [   ] The Twelve Most Common Application Level Hack Attacks.pdf 2019-03-07 15:33 102K [   ] The Web Application Hackers Handbook - Discovering & Exploiting Security Flaws.pdf 2019-03-07 16:01 11M [   ] Top Web App Attack Methods and How to Combat Them.pdf 2019-03-07 15:30 2.3M [   ] Using VBReFormer to Reverse a VB SN Checker and Creating a KeyGen.pdf 2021-04-02 10:37 438K [   ] WAP, Bluetooth & 3G Programming - Cracking the Code.pdf 2019-03-07 16:02 7.5M [   ] WINDOWX IT - Attacco a Router Alice Gate 2 Plus.pdf 2012-03-20 22:40 621K [   ] Windows Services - All roads lead to SYSTEM.pdf 2018-08-04 17:00 700K [   ] XBiohazardx's Easy Crackme.pdf 2021-04-02 10:37 124K [TXT] nBaUrD0V.txt 2018-01-14 18:06 4.7K [   ] w3af User Guide (2012).pdf 2019-03-07 16:10 384K