589689.xyz

reverse-engineering-and-exploit-development

  • 收录时间:2019-05-15 18:29:08
  • 文件大小:1GB
  • 下载次数:82
  • 最近下载:2021-01-23 00:29:04
  • 磁力链接:

文件列表

  1. 02 Reversing Compiled Windows Applications/017 Using Fuzzing - Part 3.mp4 75MB
  2. 02 Reversing Compiled Windows Applications/031 Format String Bugs - Part 3.mp4 48MB
  3. 02 Reversing Compiled Windows Applications/030 Format String Bugs - Part 2.mp4 45MB
  4. 02 Reversing Compiled Windows Applications/028 Heap Overflows - Part 4.mp4 40MB
  5. 02 Reversing Compiled Windows Applications/033 Section Overflows.mp4 36MB
  6. 04 Reversing Compiled Linux Applications/049 Linux Heap Overflows - Part 3.mp4 35MB
  7. 02 Reversing Compiled Windows Applications/024 Stack Overflows - Part 3.mp4 34MB
  8. 02 Reversing Compiled Windows Applications/020 Just Enough Assembly - Part 2.mp4 32MB
  9. 02 Reversing Compiled Windows Applications/026 Heap Overflows - Part 2.mp4 32MB
  10. 04 Reversing Compiled Linux Applications/047 Linux Heap Overflows - Part 1.mp4 28MB
  11. 04 Reversing Compiled Linux Applications/045 Linux Stack Overflows - Part 4.mp4 28MB
  12. 07 Simple Exploits/061 Creating A Metasploit Module For An Exploit - Part 3.mp4 27MB
  13. 04 Reversing Compiled Linux Applications/044 Linux Stack Overflows - Part 3.mp4 27MB
  14. 04 Reversing Compiled Linux Applications/046 Linux Stack Overflows - Part 5.mp4 26MB
  15. 04 Reversing Compiled Linux Applications/048 Linux Heap Overflows - Part 2.mp4 26MB
  16. 04 Reversing Compiled Linux Applications/050 Linux Heap Overflows - Part 4.mp4 25MB
  17. 07 Simple Exploits/058 A Simple Exploit Script.mp4 22MB
  18. 02 Reversing Compiled Windows Applications/019 Just Enough Assembly - Part 1.mp4 21MB
  19. 04 Reversing Compiled Linux Applications/043 Linux Stack Overflows - Part 2.mp4 21MB
  20. 02 Reversing Compiled Windows Applications/021 Just Enough Assembly - Part 3.mp4 19MB
  21. 01 Getting Started/006 Reversing Tools - Part 2.mp4 18MB
  22. 07 Simple Exploits/060 Creating A Metasploit Module For An Exploit - Part 2.mp4 18MB
  23. 09 Making Exploits Harder To Detect/067 Encoding Shellcode - Part 2.mp4 18MB
  24. 02 Reversing Compiled Windows Applications/035 Decompilers.mp4 18MB
  25. 10 Web Exploitation/068 Web Exploits In Metasploit.mp4 17MB
  26. 09 Making Exploits Harder To Detect/066 Encoding Shellcode - Part 1.mp4 16MB
  27. 02 Reversing Compiled Windows Applications/029 Format String Bugs - Part 1.mp4 16MB
  28. 02 Reversing Compiled Windows Applications/018 Using Fuzzing - Part 4.mp4 15MB
  29. 01 Getting Started/007 Reversing Tools - Part 3.mp4 15MB
  30. 03 Reversing Compiled OS X Applications/040 Heap Overflows.mp4 15MB
  31. 01 Getting Started/005 Reversing Tools - Part 1.mp4 15MB
  32. 01 Getting Started/011 How To Access Your Working Files.mp4 15MB
  33. 01 Getting Started/009 Reversing Tools - Part 5.mp4 15MB
  34. 08 Exploit Payloads/064 Shellcode - Part 3.mp4 15MB
  35. 01 Getting Started/010 Reversing Tools - Part 6.mp4 14MB
  36. 06 Finding Other Vulnerabilities/056 Database Vulnerabilities.mp4 13MB
  37. 07 Simple Exploits/059 Creating A Metasploit Module For An Exploit - Part 1.mp4 13MB
  38. 11 ARM Exploitation/069 Android Exploits In Metasploit.mp4 13MB
  39. 08 Exploit Payloads/065 Shellcode - Part 4.mp4 12MB
  40. 02 Reversing Compiled Windows Applications/036 Automation - Part 1.mp4 12MB
  41. 02 Reversing Compiled Windows Applications/015 Using Fuzzing - Part 1.mp4 12MB
  42. 01 Getting Started/008 Reversing Tools - Part 4.mp4 12MB
  43. 08 Exploit Payloads/063 Shellcode - Part 2.mp4 11MB
  44. 04 Reversing Compiled Linux Applications/051 Linux Kernel Flaws - Part 1.mp4 10MB
  45. 02 Reversing Compiled Windows Applications/037 Automation - Part 2.mp4 10MB
  46. 08 Exploit Payloads/062 Shellcode - Part 1.mp4 10MB
  47. 02 Reversing Compiled Windows Applications/013 Vulnerabilities - Part 2.mp4 9MB
  48. 02 Reversing Compiled Windows Applications/016 Using Fuzzing - Part 2.mp4 9MB
  49. 02 Reversing Compiled Windows Applications/023 Stack Overflows - Part 2.mp4 9MB
  50. 02 Reversing Compiled Windows Applications/012 Vulnerabilities - Part 1.mp4 9MB
  51. 05 Reversing Android Applications/054 Android Applications.mp4 8MB
  52. 02 Reversing Compiled Windows Applications/014 Vulnerabilities - Part 3.mp4 8MB
  53. 06 Finding Other Vulnerabilities/055 Web Site Vulnerabilities.mp4 8MB
  54. 02 Reversing Compiled Windows Applications/032 Format String Bugs - Part 4.mp4 7MB
  55. 07 Simple Exploits/057 Going From Vulnerability To Exploit.mp4 7MB
  56. 02 Reversing Compiled Windows Applications/027 Heap Overflows - Part 3.mp4 7MB
  57. 02 Reversing Compiled Windows Applications/025 Heap Overflows - Part 1.mp4 7MB
  58. 04 Reversing Compiled Linux Applications/042 Linux Stack Overflows - Part 1.mp4 7MB
  59. 01 Getting Started/002 Introduction To Reversing.mp4 7MB
  60. 05 Reversing Android Applications/053 Introduction To Android And ARM.mp4 6MB
  61. 02 Reversing Compiled Windows Applications/022 Stack Overflows - Part 1.mp4 6MB
  62. 12 Future Directions/070 Wrap Up And Suggestions For Further Study.mp4 6MB
  63. 04 Reversing Compiled Linux Applications/052 Linux Kernel Flaws - Part 2.mp4 5MB
  64. 02 Reversing Compiled Windows Applications/034 Windows Kernel Flaws.mp4 5MB
  65. 01 Getting Started/003 About The Author.mp4 5MB
  66. 04 Reversing Compiled Linux Applications/041 Where Are The Vulnerabilities.mp4 5MB
  67. 03 Reversing Compiled OS X Applications/039 Locating Stack Overflows.mp4 4MB
  68. 01 Getting Started/004 Ethical Considerations.mp4 3MB
  69. 03 Reversing Compiled OS X Applications/038 Where Are The Vulnerabilities.mp4 2MB
  70. 01 Getting Started/attached_files/001 Important - Download These First - Working Files/Reverse-Engineering-And-Exploit-Development-Working-Files.zip 50KB
  71. 01 Getting Started/attached_files/001 Important - Download These First - Working Files/Reverse-Engineering-And-Exploit-Development-Working-Files/Reverse Engineering and Exploit Development - Working Files/Chapter 2/BufferOverflow.exe 15KB
  72. 01 Getting Started/attached_files/001 Important - Download These First - Working Files/Reverse-Engineering-And-Exploit-Development-Working-Files/Reverse Engineering and Exploit Development - Working Files/Chapter 2/heap-overflows.zip 15KB
  73. 01 Getting Started/attached_files/001 Important - Download These First - Working Files/Reverse-Engineering-And-Exploit-Development-Working-Files/Reverse Engineering and Exploit Development - Working Files/Chapter 2/stack-buffer-overflows.zip 5KB
  74. 01 Getting Started/attached_files/001 Important - Download These First - Working Files/Reverse-Engineering-And-Exploit-Development-Working-Files/Reverse Engineering and Exploit Development - Working Files/Chapter 2/format-string.zip 5KB
  75. 01 Getting Started/attached_files/001 Important - Download These First - Working Files/Reverse-Engineering-And-Exploit-Development-Working-Files/Reverse Engineering and Exploit Development - Working Files/Chapter 8/shellcode.zip 3KB
  76. 01 Getting Started/attached_files/001 Important - Download These First - Working Files/Reverse-Engineering-And-Exploit-Development-Working-Files/Reverse Engineering and Exploit Development - Working Files/Chapter 7/vulnserver.rb 2KB
  77. 01 Getting Started/attached_files/001 Important - Download These First - Working Files/Reverse-Engineering-And-Exploit-Development-Working-Files/Reverse Engineering and Exploit Development - Working Files/Chapter 3/mac-heap.c 1016B
  78. 01 Getting Started/attached_files/001 Important - Download These First - Working Files/Reverse-Engineering-And-Exploit-Development-Working-Files/Reverse Engineering and Exploit Development - Working Files/Chapter 4/simple.asm 753B
  79. 01 Getting Started/attached_files/001 Important - Download These First - Working Files/Reverse-Engineering-And-Exploit-Development-Working-Files/Reverse Engineering and Exploit Development - Working Files/Chapter 4/simple32.asm 747B
  80. 01 Getting Started/attached_files/001 Important - Download These First - Working Files/Reverse-Engineering-And-Exploit-Development-Working-Files/Reverse Engineering and Exploit Development - Working Files/Chapter 2/fuzz.py 602B
  81. 01 Getting Started/attached_files/001 Important - Download These First - Working Files/Reverse-Engineering-And-Exploit-Development-Working-Files/Reverse Engineering and Exploit Development - Working Files/Chapter 9/sc.sh 512B
  82. 01 Getting Started/attached_files/001 Important - Download These First - Working Files/Reverse-Engineering-And-Exploit-Development-Working-Files/Reverse Engineering and Exploit Development - Working Files/Chapter 2/fuzz.pl 421B
  83. 01 Getting Started/attached_files/001 Important - Download These First - Working Files/Reverse-Engineering-And-Exploit-Development-Working-Files/Reverse Engineering and Exploit Development - Working Files/Chapter 9/enc.sh 398B
  84. 01 Getting Started/001 Important - Download These First - Working Files.html 373B
  85. 01 Getting Started/attached_files/001 Important - Download These First - Working Files/Reverse-Engineering-And-Exploit-Development-Working-Files/Reverse Engineering and Exploit Development - Working Files/Chapter 4/linux-stack-fptr.c 365B
  86. 01 Getting Started/attached_files/001 Important - Download These First - Working Files/Reverse-Engineering-And-Exploit-Development-Working-Files/Reverse Engineering and Exploit Development - Working Files/Chapter 1/No Work Files.rtf 346B
  87. 01 Getting Started/attached_files/001 Important - Download These First - Working Files/Reverse-Engineering-And-Exploit-Development-Working-Files/Reverse Engineering and Exploit Development - Working Files/Chapter 10/No Work Files.rtf 346B
  88. 01 Getting Started/attached_files/001 Important - Download These First - Working Files/Reverse-Engineering-And-Exploit-Development-Working-Files/Reverse Engineering and Exploit Development - Working Files/Chapter 11/No Work Files.rtf 346B
  89. 01 Getting Started/attached_files/001 Important - Download These First - Working Files/Reverse-Engineering-And-Exploit-Development-Working-Files/Reverse Engineering and Exploit Development - Working Files/Chapter 12/No Work Files.rtf 346B
  90. 01 Getting Started/attached_files/001 Important - Download These First - Working Files/Reverse-Engineering-And-Exploit-Development-Working-Files/Reverse Engineering and Exploit Development - Working Files/Chapter 5/No Work Files.rtf 346B
  91. 01 Getting Started/attached_files/001 Important - Download These First - Working Files/Reverse-Engineering-And-Exploit-Development-Working-Files/Reverse Engineering and Exploit Development - Working Files/Chapter 6/No Work Files.rtf 346B
  92. 01 Getting Started/attached_files/001 Important - Download These First - Working Files/Reverse-Engineering-And-Exploit-Development-Working-Files/Reverse Engineering and Exploit Development - Working Files/Chapter 4/linux-heap.c 335B
  93. 01 Getting Started/attached_files/001 Important - Download These First - Working Files/Reverse-Engineering-And-Exploit-Development-Working-Files/Reverse Engineering and Exploit Development - Working Files/Chapter 2/stackbufferoverflow.c 290B
  94. 01 Getting Started/attached_files/001 Important - Download These First - Working Files/Reverse-Engineering-And-Exploit-Development-Working-Files/Reverse Engineering and Exploit Development - Working Files/Chapter 2/formatstring.c 258B
  95. 01 Getting Started/attached_files/001 Important - Download These First - Working Files/Reverse-Engineering-And-Exploit-Development-Working-Files/Reverse Engineering and Exploit Development - Working Files/Working Files - README.txt 256B
  96. 01 Getting Started/attached_files/001 Important - Download These First - Working Files/Reverse-Engineering-And-Exploit-Development-Working-Files/Reverse Engineering and Exploit Development - Working Files/Chapter 2/check.sh 216B
  97. 01 Getting Started/attached_files/001 Important - Download These First - Working Files/Reverse-Engineering-And-Exploit-Development-Working-Files/Reverse Engineering and Exploit Development - Working Files/Chapter 2/heapbufferoverflow.c 212B
  98. 01 Getting Started/attached_files/001 Important - Download These First - Working Files/Reverse-Engineering-And-Exploit-Development-Working-Files/Reverse Engineering and Exploit Development - Working Files/Chapter 4/linux-stack.c 210B
  99. 01 Getting Started/attached_files/001 Important - Download These First - Working Files/Reverse-Engineering-And-Exploit-Development-Working-Files/Reverse Engineering and Exploit Development - Working Files/Chapter 4/linux-heap-not-vuln.c 169B
  100. 01 Getting Started/attached_files/001 Important - Download These First - Working Files/Reverse-Engineering-And-Exploit-Development-Working-Files/Reverse Engineering and Exploit Development - Working Files/Chapter 3/mac-stack.c 157B