Directory of D:\documents\Books
01/01/2015 12:22 AM <DIR> .
01/01/2015 12:22 AM <DIR> ..
07/09/2014 05:34 PM 99,028 0x01_local_linux_x86_shellcoding_without_any_high_level_language.pdf
07/09/2014 05:34 PM 112,888 0x02_bypassing_local_Linux_x86_ASLR_protection.pdf
07/09/2014 05:48 PM 866,969 1 Linux exploit writing tutorial part 1 - Stack overflow.pdf
07/09/2014 05:37 PM 3,224,622 1-Stack_Based_Overflows.pdf
07/09/2014 05:37 PM 6,217,632 10-Chaining_DEPwithROP.pdf
07/09/2014 05:38 PM 7,846,892 11-heap-spraying-demystified.pdf
05/24/2014 11:33 AM 9,576,960 123projectsFor124Sum09.doc
05/24/2014 11:33 AM 14,261,248 124LecturesSum09.doc
05/24/2014 11:33 AM 7,710,208 124ProjectsSum09.doc
07/12/2014 09:44 AM 840,846 1485_se-whitepaper-letter-scadaoverview-v005.pdf
05/23/2014 10:25 PM 133,275 1D barcode Encoding Guide 1 01.pdf
07/09/2014 05:49 PM 780,113 2 Linux exploit writing tutorial part 2 - Stack Overflow ASLR bypass usingret2reg.pdf
05/23/2014 10:19 PM 245,102 2011-2dbarcodeinfo.pdf
10/29/2014 02:10 AM <DIR> 2600 Collection
07/09/2014 05:49 PM 566,263 3 Linux exploit development part 3 - ret2libc.pdf
07/09/2014 05:38 PM 3,643,623 3-Writing_SEH_BasedExploits-A.pdf
07/09/2014 05:39 PM 1,386,538 3-Writing_SEH_BasedExploits-B.pdf
07/09/2014 05:39 PM 1,850,727 4-FromExploit_to_Metasploit_Basics.pdf
07/09/2014 05:49 PM 311,747 4a Linux exploit development part 3 (rev 2) - Real app demo.pdf
07/09/2014 05:49 PM 586,072 4b Linux exploit development part 2 (rev 2) - Real app demo (part 2).pdf
07/09/2014 05:49 PM 614,639 5 Linux exploit development part 4 - ASCII armor bypass + return-to-plt.pdf
07/09/2014 05:39 PM 2,585,775 5-Debugger modules_&_plugins_speedup.pdf
07/09/2014 05:39 PM 5,132,894 6-Bypassing_StackCookies_SafeSeh_SEHOP_HWDEP_ASLR.pdf
07/09/2014 05:39 PM 2,493,325 7-Unicode.pdf
10/29/2014 02:10 AM <DIR> 710 - Advanced Exploit Development
07/09/2014 05:39 PM 5,605,216 8-Win32_Egg_Hunting.pdf
07/09/2014 05:40 PM 5,137,479 9-Win32_shellcoding.pdf
07/09/2014 05:34 PM 496,484 A Buffer Overflow Study Attacks & Defenses.pdf
11/23/2014 11:58 PM 2,703,359 Accelerated C++ 2000.pdf
04/22/2014 05:34 PM 1,258,430 AcrosstheInternetSeas.pdf
10/29/2014 02:10 AM <DIR> Active Directory For Dummies
07/09/2014 05:35 PM 348,635 Advanced Windows Exploitation.pdf
07/02/2014 06:03 PM 47,381 Amazon_letter_FTC.pdf
07/09/2014 05:34 PM 264,886 ASLR - Address Space Layout Randomization.pdf
07/09/2014 05:34 PM 521,354 ASLR Smack_Reference.pdf
07/09/2014 05:35 PM 1,071,411 ASM_Language.pdf
10/29/2014 02:10 AM <DIR> Assembly_programming_book_collection
12/31/2014 11:42 AM 395,035 AStudio6_2sp1_1502-readme.pdf
07/09/2014 05:35 PM 300,717 Attacking the Windows Kernel.pdf
10/01/2014 02:28 PM 743,025 bgnet_USLetter.pdf
07/09/2014 05:35 PM 700,491 Bypassing Browser Memory Protections(BH08).pdf
07/09/2014 05:36 PM 341,862 Bypassing DEP with WPM & ROP.pdf
10/16/2014 05:28 AM 1,527,453 cacti.pdf
10/29/2014 02:10 AM <DIR> CCNA
10/29/2014 02:10 AM <DIR> CCNP
11/09/2014 09:39 PM 1,234,552 ClassifiedApplication7.30.13.pdf
10/29/2014 02:10 AM <DIR> Code The Hidden Language of Computer Hardware and Software by Ch
07/08/2014 03:53 PM 9,576,512 Code_The_Hidden_Language_of_Computer_Hardware_and_.pdf
11/19/2014 03:03 AM <DIR> CRYENGINE GAME PROGRAMMING WITH C++, Csharp, AND LUA-PACKT pdf-ke
07/10/2014 05:08 PM 129,815 CSE331-02.pdf
07/10/2014 05:31 PM 3,909,025 CSV7.0_Qs_eng.pdf
04/22/2014 05:34 PM 113,753 CS_Language_Basics.pdf
12/31/2014 05:49 AM 442,777 datasheet.pdf
07/09/2014 05:37 PM 1,096,207 Debugging with gdb.pdf
10/29/2014 02:10 AM <DIR> Defcon21
07/09/2014 05:37 PM 1,302,541 Defeating DEP and ASLR.pdf
07/09/2014 05:50 PM 2,070,794 Defeating DEP, the Immunity Debugger way.pdf
07/09/2014 05:36 PM 608,908 DEPinDepth.pdf
07/09/2014 05:37 PM 505,503 Detecting and exploiting integer overflows.pdf
10/01/2014 02:35 PM 1,076,136 Digital Credential Analysis.pdf
04/22/2014 05:35 PM 1,613,047 disassembly_deskto_201210261621.pdf
04/22/2014 05:35 PM 4,099,330 DIY-Cellular-IDS_2013-08-01.pdf
04/22/2014 05:35 PM 8,516,466 E7246_Sabertooth_Z77.pdf
04/22/2014 05:35 PM 7,927,431 EGO9-MANUAL-EN.pdf
10/04/2014 10:27 AM 152,347 ELF_Format.pdf
07/09/2014 05:37 PM 1,073,346 Ensamblador(SPA).pdf
07/09/2014 05:40 PM 234,388 Exploiting Format String Vulnerabilities.pdf
07/09/2014 05:40 PM 296,270 Exploiting Stack Overflows in the Linux Kernel.pdf
07/09/2014 05:40 PM 222,089 Format String Attacks.pdf
07/09/2014 05:40 PM 124,032 FormatStringAttack.pdf
04/22/2014 05:35 PM 1,939,168 forWeb_8.5inx11in_H100.pdf
04/22/2014 05:35 PM 8,495,114 Foundations of Circuits.pdf
05/31/2014 09:42 AM 788,701 free-tool-attachment-filtering-with-exchange-2007-custom-transport-agent.pdf
05/26/2014 09:26 PM 25,147,026 Fundamentals of Electric Circuits 5e.pdf
07/09/2014 05:41 PM 29,826,816 Fuzzing Brute Force Vulnerability Discovery.pdf
07/09/2014 05:41 PM 79,838 Fuzzing Making software Dumber.pdf
07/09/2014 05:42 PM 4,694,444 Fuzzing.pdf
07/09/2014 05:43 PM 175,871 Fuzzing_ Grammar-based Whitebox Fuzzing.pdf
07/09/2014 05:46 PM 5,871,627 Fuzzing_for_software_vulnerability_discovery.pdf
07/09/2014 05:46 PM 1,523,496 Generic Anti Exploitation Technology for Windows.pdf
04/22/2014 05:33 PM 103,511 Getting Started with Adobe Reader.pdf
04/22/2014 05:35 PM 311,657 geuvers.pdf
10/29/2014 02:10 AM <DIR> Gray Hat Python.epub
07/09/2014 05:46 PM 4,565,121 Hacking - The Art of Exploitation_2nd Ed.pdf
05/31/2014 09:12 AM 1,095,291 Hacking the Industry.pdf
06/17/2014 04:10 PM 18,625,251 HackingTheXbox_Free.pdf
07/09/2014 05:46 PM 209,401 Hacking_ The Art of Exploitation - 0x3 (Exploitation).pdf
10/29/2014 02:10 AM <DIR> Handbook of Applied Cryptography (Crc Press Series on Discrete M
10/29/2014 02:10 AM <DIR> Heard of the Dragon Queen
10/29/2014 02:10 AM <DIR> How to Cheat at Installing, Configuring and Troubleshooting ActiveDirectory and DNS
04/22/2014 05:35 PM 330,275 howto.pdf
07/10/2014 05:01 PM 738,191 https___www_ethicalhacker_net_columns_heffner_smashing-the-modern-stack-for-fun-and-profit.pdf
04/22/2014 06:39 PM 7,651,790 ICND2.pdf
10/29/2014 02:10 AM <DIR> Identifying.Malicious.Code.Through.Reverse.Engineering.PDF.2009-IPT
07/09/2014 05:20 PM 202,176 insecure_org_stf_smashstack_html.pdf
04/22/2014 05:35 PM 3,018,600 intel-pentium-m-processor-and-intel-855pm-ddr-333-266-200-mhz-chipset-platform-design-guide-update.pdf
07/09/2014 05:46 PM 2,550,384 Intel32-1-Basic Architecture.pdf
07/09/2014 05:47 PM 2,294,426 Intel32-2-Instruction Set ReferenceA.pdf
07/09/2014 05:47 PM 1,792,113 Intel32-2-Instruction Set ReferenceB.pdf
07/09/2014 05:48 PM 4,657,968 Intel32-3-System Programming Guide.pdf
07/09/2014 05:48 PM 482,419 Introduccion al Cracking en Linux 01 - Introduccion.pdf
07/09/2014 05:48 PM 351,371 Introduccion al Cracking en Linux 02 - GDB.pdf
07/09/2014 05:48 PM 290,818 Introduccion al Cracking en Linux 03 - Instalacion Radare.pdf
07/09/2014 05:48 PM 565,108 Introduccion-Explotacion-Software-Linux.pdf
10/29/2014 02:10 AM <DIR> Introduction to 64 Bit Intel Assembly Language Programming for Linux
12/31/2014 02:36 AM 60,534,386 Introduction to Computer Science Using Python.pdf
07/10/2014 05:17 PM 1,280,000 killerbee_1_0.tar
04/22/2014 05:35 PM 2,236,962 latitude-d600_user's guide_en-us.pdf
04/22/2014 06:32 PM 946,927 learn-c-the-hard-way.pdf
04/22/2014 06:34 PM 516,014 LearnPythonTheHardWay2ndEdition.pdf
05/24/2014 11:44 AM 1,710,200 LFS-BOOK-7.5.pdf
04/22/2014 05:34 PM 955,657 libpcapandc.pdf
07/09/2014 05:49 PM 5,112,178 Linux_Kernel_Crash_Book.pdf
11/18/2014 11:58 PM <DIR> m45
10/01/2014 06:44 PM 12,355,056 Matching Properties of Deep Sub-Micron MOS Transistors.pdf
10/29/2014 02:29 AM <DIR> Math.Tutor.DVD.Complete.Collection
11/18/2014 11:55 PM 12,800,340 Microsoft.Press.CLR.via.Csharp.4th.Edition.Oct.2012.pdf
07/09/2014 05:50 PM 235,771 Non-Executable Stack ARM Exploitation(def18).pdf
07/09/2014 05:49 PM 84,050 No_NX.pdf
04/22/2014 05:35 PM 2,908,625 nuvi350_owners-manual.pdf
10/29/2014 02:29 AM <DIR> Offensive Security - Advanced Windows Exploitation (AWE) v 1.1
05/27/2014 08:18 PM 3,664,834 Offensive Security - BackTrack to the Max Cracking the Perimeter V 1.0.pdf
05/27/2014 08:18 PM 15,188,752 Offensive Security - Wireless Attacks ( WiFu) v2.0.pdf
10/29/2014 02:29 AM <DIR> Offensive Security Labs
07/09/2014 05:50 PM 150,380 On the Effectiveness of Address-Space Randomization.pdf
07/09/2014 05:50 PM 262,615 OpenBSD Remote Exploiting.pdf
07/09/2014 05:52 PM 477,592 Packed, Printable, and Polymorphic Return-Oriented Programming.pdf
04/22/2014 05:35 PM 596,950 paper-twofish-paper.pdf
04/22/2014 05:35 PM 100,652 part9.pdf
07/09/2014 05:38 PM 221,103 perlref-5.004.1.pdf
07/09/2014 05:50 PM 826,331 Practical Windows XP-2003 Heap Exploitation BH09.pdf
10/15/2014 06:14 PM 5,630,471 progit.en.pdf
09/11/2014 07:59 PM 1,820,400 Programming in C (3rd Edition) True PDF.pdf
09/10/2014 10:36 PM 1,820,400 ProgrammingC.pdf
07/09/2014 05:50 PM 1,383,853 Programming_from_the_Ground_Up.pdf
10/29/2014 02:29 AM <DIR> Ready Player One
04/22/2014 05:35 PM 455,254 Request to Surrender Certificate.pdf
...