589689.xyz

- Hacking

  • 收录时间:2022-07-24 21:44:16
  • 文件大小:7GB
  • 下载次数:1
  • 最近下载:2022-07-24 21:44:16
  • 磁力链接:

文件列表

  1. Extra - CSE466/CSE 466 - Computer Systems Security - Extended Q&A - 12 2 2020.mp4 391MB
  2. Extra - CSE466/CSE 466 - Computer Systems Security - Extended Q&A - 11 25 2020.mp4 381MB
  3. Extra - CSE466/CSE 466 - Computer Systems Security - Extended Q&A 9 2 2020.mp4 376MB
  4. Extra - CSE466/CSE 466 - Computer Systems Security - Extended Q&A 10 7 2020.mp4 376MB
  5. Extra - CSE466/CSE 466 - Computer Systems Security - Extended Q&A 10 14 2020.mp4 375MB
  6. Extra - CSE466/CSE 466 - Computer Systems Security - Extended Q&A - 11 18 2020.mp4 359MB
  7. Extra - CSE466/CSE 466 - Computer Systems Security - Extended Q&A 9 9 2020.mp4 351MB
  8. Extra - CSE466/CSE 466 - Computer Systems Security - Yan's Office Hours 12 7 2020.mp4 192MB
  9. Extra - CSE466/CSE 466 - Computer Systems Security Lecture 1 Introduction.mp4 186MB
  10. Extra - CSE466/CSE 466 - Computer Systems Security - Office Hours 9 7 2020.mp4 174MB
  11. Extra - CSE466/CSE 466 - Computer Systems Security Office Hours 8 31 2020.mp4 152MB
  12. Extra - CSE466/CSE 466 - Computer Systems Security - Yan's Office Hours 11 23 2020.mp4 146MB
  13. Extra - CSE466/CSE 466 - Computer Systems Security - Yan's Office Hours 11 30 2020.mp4 135MB
  14. Extra - CSE466/CSE 466 - Computer Systems Security - Yan's Office Hours 9 14 2020.mp4 127MB
  15. Extra - CSE466/CSE 466 - Computer Systems Security - Yan's Office Hours 11 16 2020.mp4 115MB
  16. Videos/00 Fundamentals 4 Linux Process Loading.mp4 111MB
  17. Extra - CSE466/CSE 466 - Computer Systems Security - Connor's Office Hours 12 5 2020.mp4 111MB
  18. Extra - CSE466/CSE 466 - Computer Systems Security - Connor's Office Hours 11 20 2020.mp4 106MB
  19. Slides/State of the Course.pptx 101MB
  20. Extra - CSE466/CSE 466 - Computer Systems Security - Connor's Office Hours 11 27 2020.mp4 96MB
  21. Videos/11 Advanced Exploitation 4 Exploit Primitives.mp4 95MB
  22. Videos/02 Shellcoding 1 Introduction.mp4 86MB
  23. Videos/00 Fundamentals 5 Linux Process Execution.mp4 81MB
  24. Videos/00 Fundamentals 2 Assembly.mp4 76MB
  25. Videos/11 Advanced Exploitation 2 Heap Address Disclosure via Race.mp4 73MB
  26. Videos/01 Program Misuse 1 Program Misuse.mp4 65MB
  27. Extra - CSE466/CSE 466 - Computer Systems Security - Connor's Office Hours 9 8 2020.mp4 60MB
  28. Videos/08 Kernel 2 Environmental Setup.mp4 57MB
  29. Videos/08 Kernel 3 Kernel Modules.mp4 56MB
  30. Videos/08 Kernel 1 Introduction.mp4 56MB
  31. Videos/09 Heap 2 Dangers.mp4 51MB
  32. Videos/09 Heap 4 Chunks and Metadata.mp4 51MB
  33. Videos/00 Introduction 1 What is Computer Systems Security.mp4 51MB
  34. Videos/12 Automatic Vulnerability Discovery 4 Dynamic Symbolic Execution.mp4 50MB
  35. Videos/07 Return Oriented Programming 3 Techniques.mp4 49MB
  36. Videos/10 Race Conditions 2 Races in the Filesystem.mp4 48MB
  37. Videos/11 Advanced Exploitation 5 End-to-end Pwnage.mp4 45MB
  38. Videos/09 Heap 1 What is the Heap.mp4 44MB
  39. Videos/00 Fundamentals 3 Binary Files.mp4 43MB
  40. Videos/09 Heap 3 tcache.mp4 43MB
  41. Videos/05 Memory Errors 5 Causes of Corruption, Part 2.mp4 43MB
  42. Videos/05 Memory Errors 6 Stack Canaries.mp4 41MB
  43. Videos/03 Sandboxing 2 chroot.mp4 41MB
  44. Videos/12 Automatic Vulnerability Discovery 3 Fuzzing.mp4 41MB
  45. Videos/05 Memory Errors 7 Address Space Layout Randomization.mp4 40MB
  46. Videos/04 Reverse Engineering 5 Dynamic Tools.mp4 40MB
  47. Videos/07 Return Oriented Programming 2 Binary Lego.mp4 39MB
  48. Videos/11 Advanced Exploitation 6 Escaping seccomp (for real).mp4 37MB
  49. Videos/07 Return Oriented Programming 4 Complications.mp4 36MB
  50. Videos/02 Shellcoding 2 Common Challenges.mp4 35MB
  51. Videos/10 Race Conditions 4 Races in Memory.mp4 35MB
  52. Videos/11 Advanced Exploitation 3 In-Memory Forensics.mp4 35MB
  53. Videos/10 Race Conditions 3 Processes and Threads.mp4 34MB
  54. Videos/04 Reverse Engineering 3 Functions and Frames.mp4 34MB
  55. Videos/05 Memory Errors 8 Causes of Disclosure.mp4 34MB
  56. Videos/03 Sandboxing 4 Escaping seccomp.mp4 34MB
  57. Videos/05 Memory Errors 3 Smashing the Stack.mp4 33MB
  58. Videos/10 Race Conditions 5 Signals and Reentrancy.mp4 32MB
  59. Videos/09 Heap 5 Metadata Corruption.mp4 31MB
  60. Videos/10 Race Conditions 1 Introduction.mp4 31MB
  61. Videos/04 Reverse Engineering 4 Static Tools.mp4 30MB
  62. Videos/12 Automatic Vulnerability Discovery 2 Static Analysis.mp4 26MB
  63. Videos/12 Automatic Vulnerability Discovery 5 The Cyber Grand Challenge.mp4 26MB
  64. Videos/05 Memory Errors 4 Causes of Corruption, Part 1.mp4 25MB
  65. Videos/02 Shellcoding 3 Data Execution Prevention.mp4 25MB
  66. Videos/04 Reverse Engineering 1 Introduction.mp4 25MB
  67. Videos/08 Kernel 4 Privilege Escalation.mp4 25MB
  68. Videos/06 Exploitation 2 Hijacking to Shellcode.mp4 24MB
  69. Videos/11 Advanced Exploitation 7 Kernel Races.mp4 24MB
  70. Videos/03 Sandboxing 3 seccomp.mp4 23MB
  71. Videos/12 Automatic Vulnerability Discovery 1 Introduction.mp4 22MB
  72. Videos/05 Memory Errors 2 High-level Problems.mp4 22MB
  73. Videos/04 Reverse Engineering 6 Real-world Applications.mp4 22MB
  74. Videos/00 Fundamentals 1 Computer Architecture.mp4 21MB
  75. Videos/03 Sandboxing 1 Introduction.mp4 21MB
  76. Videos/11 Advanced Exploitation 1 Introduction.mp4 19MB
  77. Videos/05 Memory Errors 1 Introduction.mp4 18MB
  78. Videos/06 Exploitation 3 Side Effects.mp4 15MB
  79. Videos/07 Return Oriented Programming 1 Introduction.mp4 15MB
  80. Videos/06 Exploitation 4 JIT Spray.mp4 13MB
  81. Videos/06 Exploitation 1 Introduction.mp4 13MB
  82. Videos/04 Reverse Engineering 2 Data Acces.mp4 12MB
  83. Slides/12 Automatic Vulnerability Discovery/Automated Vulnerability Discovery 5_ The Cyber Grand Challenge.pptx 11MB
  84. Slides/05 Memory Errors/Memory Errors 1_ Introduction.pptx 8MB
  85. Slides/12 Automatic Vulnerability Discovery/Automated Vulnerability Discovery 4_ Dynamic Symbolic Execution.pptx 7MB
  86. Slides/07 Return Oriented Programming/ROP 2_ Binary Lego.pptx 7MB
  87. Slides/00 Introduction/Introduction 1_ Computer Systems Security.pptx 7MB
  88. Slides/02 Shellcoding/Shellcoding_ Introduction.pptx 6MB
  89. Slides/02 Shellcoding/Shellcoding 1_ Introduction (new).pptx 6MB
  90. Slides/06 Exploitation/Exploitation Scenarios_ Achieving Control.pptx 6MB
  91. Slides/00 Introduction/Introduction 2_ Computer Systems Security (new).pptx 5MB
  92. Slides/04 Reverse Engineering/Reversing 6_ Examples.pptx 5MB
  93. Slides/00 Introduction/Introduction 4_ Careers.pptx 4MB
  94. Slides/08 Dynamic Allocator Misuse/Heap 1_ Introduction.pptx 3MB
  95. Slides/03 Sandboxing/Sandboxing 1_ Introduction.pptx 3MB
  96. Slides/10 Kernel Exploitation/Kernel 1_ Introduction.pptx 3MB
  97. Slides/00 Fundamentals/The Secret Life of Hello World.pptx 3MB
  98. Slides/05 Memory Errors/Memory Errors 2_ High-level Problems.pptx 3MB
  99. Slides/02 Shellcoding/Shellcoding 6_ Data Execution Prevention.pptx 2MB
  100. Slides/05 Memory Errors/Memory Errors 5_ Stack Canaries.pptx 2MB
  101. Slides/07 Return Oriented Programming/ROP 1_ Introduction.pptx 2MB
  102. Slides/00 Fundamentals/Fundamentals_ Computer Architecture.pptx 2MB
  103. Slides/00 Introduction/Introduction 1_ Computer Systems and Security (new).pptx 2MB
  104. Slides/00 Fundamentals/Fundamentals_ Binary Files.pptx 2MB
  105. Slides/X Format String Vulnerabilities/Format Strings_ Writing Memory.pptx 2MB
  106. Slides/04 Reverse Engineering/Reversing 2_ Functions and Frames.pptx 2MB
  107. Slides/02 Shellcoding/Shellcoding 5_ Common Challenges.pptx 2MB
  108. Slides/12 Automatic Vulnerability Discovery/Automated Vulnerability Discovery 1_ Introduction.pptx 2MB
  109. Slides/05 Memory Errors/Memory Errors 3_ Smashing the Stack.pptx 2MB
  110. Slides/08 Dynamic Allocator Misuse/Heap 2_ Dangers.pptx 2MB
  111. Slides/00 Fundamentals/Fundamentals_ Assembly.pptx 2MB
  112. Slides/04 Reverse Engineering/Reversing 3_ Understanding Data Access.pptx 2MB
  113. Slides/01 Program Misuse/Program Misuse 1_ Introduction.pptx 2MB
  114. Slides/00 Fundamentals/Fundamentals_ Linux Processes Execution.pptx 1MB
  115. Slides/02 Shellcoding/Shellcoding 2_ Writing Shellcode (new).pptx 1MB
  116. Slides/02 Shellcoding/Shellcoding 3_ Debugging Shellcode (new).pptx 1MB
  117. Slides/09 Race Conditions/Race Conditions 1_ Introduction.pptx 1MB
  118. Slides/08 Dynamic Allocator Misuse/Heap 4_ Metadata and Chunks.pptx 1MB
  119. Slides/10 Kernel Exploitation/Kernel 4_ Privilege Escalation.pptx 1MB
  120. Slides/05 Memory Errors/Memory Errors 4_ Causes of Corruption.pptx 1MB
  121. Slides/07 Return Oriented Programming/ROP 4_ Complications.pptx 1MB
  122. Slides/04 Reverse Engineering/Reversing 1_ Introduction.pptx 1MB
  123. Slides/00 Fundamentals/Fundamentals_ Linux Process Loading.pptx 1MB
  124. Slides/08 Dynamic Allocator Misuse/Heap 5_ Metadata Corruption.pptx 1MB
  125. Slides/07 Return Oriented Programming/ROP 3_ Techniques.pptx 1MB
  126. Slides/X Format String Vulnerabilities/Format Strings_ Reading Memory.pptx 1MB
  127. Slides/11 Advanced Exploitation/Advanced Exploitation 8_ Escaping Seccomp (for real!).pptx 1MB
  128. Slides/08 Dynamic Allocator Misuse/Heap 3_ tcache.pptx 1MB
  129. Slides/02 Shellcoding/Shellcoding 4_ Cross-Architecture Shellcode (new).pptx 1MB
  130. Slides/05 Memory Errors/Memory Errors 6_ ASLR.pptx 1MB
  131. Slides/10 Kernel Exploitation/Kernel 3_ Kernel Modules.pptx 1MB
  132. Slides/03 Sandboxing/Sandboxing 4_ Escaping seccomp.pptx 1MB
  133. Slides/03 Sandboxing/Sandboxing 2_ chroot.pptx 1MB
  134. Slides/04 Reverse Engineering/Reversing 5_ Dynamic Reversing.pptx 1MB
  135. Slides/10 Kernel Exploitation/Kernel 2_ Environment Setup.pptx 1MB
  136. Slides/04 Reverse Engineering/Reversing 4_ Static Reversing.pptx 1MB
  137. Slides/05 Memory Errors/Memory Errors 7_ Causes of Disclosure.pptx 1MB
  138. Slides/01 Program Misuse/Program Misuse 2_ Mitigations (New).pptx 1MB
  139. Slides/03 Sandboxing/Sandboxing 3_ seccomp.pptx 1MB
  140. Slides/03 Sandboxing/Sandboxing 5_ Modern Jails (cgroups and namespaces).pptx 1MB
  141. Slides/11 Advanced Exploitation/Advanced Exploitation 1_ Introduction.pptx 1007KB
  142. Slides/09 Race Conditions/Race Conditions 5_ Signals and Reentrancy.pptx 873KB
  143. Slides/12 Automatic Vulnerability Discovery/Automated Vulnerability Discovery 3_ Fuzzing.pptx 822KB
  144. Slides/00 Introduction/Introduction 2_ This Course.pptx 811KB
  145. Slides/11 Advanced Exploitation/Advanced Exploitation 4_ Exploit Primitives.pptx 675KB
  146. Slides/12 Automatic Vulnerability Discovery/Automated Vulnerability Discovery 2_ Static Analysis.pptx 666KB
  147. Slides/09 Race Conditions/Race Conditions 2_ Races in the Filesystem.pptx 662KB
  148. Slides/11 Advanced Exploitation/Advanced Exploitation 2_ Heap Address Disclosure via Race Condition.pptx 660KB
  149. Slides/09 Race Conditions/Race Conditions 3_ Process and Threads.pptx 622KB
  150. Slides/09 Race Conditions/Race Conditions 4_ Races in Memory.pptx 622KB
  151. Slides/06 Exploitation/Exploitation Scenarios_ Control Flow Hijack to Shellcode.pptx 618KB
  152. Slides/11 Advanced Exploitation/Advanced Exploitation 5_ End-to-End.pptx 616KB
  153. Slides/11 Advanced Exploitation/Advanced Exploitation 7_ Kernel Races.pptx 615KB
  154. Slides/06 Exploitation/Exploitation Scenarios_ JIT Spraying!.pptx 615KB
  155. Slides/11 Advanced Exploitation/Advanced Exploitation 3_ Memory Forensics.pptx 612KB
  156. Slides/00 Introduction/Introduction 3_ Cybersecurity Ethics.pptx 611KB
  157. Slides/06 Exploitation/Exploitation Scenarios_ Vulnerability Side-Effects.pptx 611KB
  158. Slides/11 Advanced Exploitation/Advanced Exploitation 6_ Kernel Allocators.pptx 603KB
  159. Slides/11 Advanced Exploitation/Advanced Exploitation 9_ Kernel Mitigations.pptx 600KB
  160. Extra - CSE466/CSE 466 - Computer Systems Security - Extended Q&A - 12 2 2020.eng.srt 260KB
  161. Extra - CSE466/CSE 466 - Computer Systems Security - Extended Q&A 9 9 2020.eng.srt 223KB
  162. Extra - CSE466/CSE 466 - Computer Systems Security - Extended Q&A 10 14 2020.eng.srt 221KB
  163. Extra - CSE466/CSE 466 - Computer Systems Security - Extended Q&A 9 2 2020.eng.srt 214KB
  164. Extra - CSE466/CSE 466 - Computer Systems Security - Extended Q&A 10 7 2020.eng.srt 192KB
  165. Extra - CSE466/CSE 466 - Computer Systems Security - Extended Q&A - 11 18 2020.eng.srt 187KB
  166. Extra - CSE466/CSE 466 - Computer Systems Security Lecture 1 Introduction.eng.srt 167KB
  167. Extra - CSE466/CSE 466 - Computer Systems Security - Connor's Office Hours 11 27 2020.eng.srt 157KB
  168. Extra - CSE466/CSE 466 - Computer Systems Security - Connor's Office Hours 11 20 2020.eng.srt 135KB
  169. Extra - CSE466/CSE 466 - Computer Systems Security - Connor's Office Hours 12 5 2020.eng.srt 126KB
  170. Extra - CSE466/CSE 466 - Computer Systems Security - Yan's Office Hours 12 7 2020.eng.srt 114KB
  171. Extra - CSE466/CSE 466 - Computer Systems Security - Connor's Office Hours 9 8 2020.eng.srt 105KB
  172. Extra - CSE466/CSE 466 - Computer Systems Security - Office Hours 9 7 2020.eng.srt 101KB
  173. Extra - CSE466/CSE 466 - Computer Systems Security Office Hours 8 31 2020.eng.srt 84KB
  174. Extra - CSE466/CSE 466 - Computer Systems Security - Yan's Office Hours 9 14 2020.eng.srt 77KB
  175. Extra - CSE466/CSE 466 - Computer Systems Security - Yan's Office Hours 11 30 2020.eng.srt 68KB
  176. Extra - CSE466/CSE 466 - Computer Systems Security - Yan's Office Hours 11 23 2020.eng.srt 66KB
  177. Extra - CSE466/CSE 466 - Computer Systems Security - Yan's Office Hours 11 16 2020.eng.srt 65KB
  178. Welcome to pwn.college.html 14KB
  179. Welcome to pwn.college_files/style.css 4KB