pretraga knjiga
knjige
Donirati
Prijaviti se
Prijaviti se
prijavljenim korisnicima su dostupni:
lične preporuke
Telegram bot
istorija preuzimanja
poslati na Email ili Kindle
upravljanje zbirkama
sačuvanje u izabrano
Lično
Upite za knjige
Proučavanje
Z-Recommend
Spiskovi knjiga
Najpopularnije
Kategorije
Učešće
Donirati
Otpremanja
Litera Library
Donirati papirne knjige
Dodati papirne knjige
Search paper books
Moj LITERA Point
Pretraga ključnih reči
Main
Pretraga ključnih reči
search
1
EXP-301 : Windows User Mode Exploit Development [OSED] 2022
offensive security
exploit
listing
eax
stack
function
buf
security
exp
offensive
figure
reserved
v1.0
pack
memory
buffer
ecx
shellcode
esp
fastbackserver
edx
ebp
offset
dword
eip
ebx
push
instruction
execution
exercises
shown
event
windbg
memcpy
bytes
mov
module
0x100
001b
003b
efl
iopl
reverse
arguments
microsoft
aslr
server
previous
exception
pointer
dep
Godina:
2022
Jezik:
english
Fajl:
PDF, 97.11 MB
Vaši tagovi:
5.0
/
5.0
english, 2022
2
Offensive Security - BackTrack to the Max Cracking the Perimeter V
Offensive Security
reserved
aharoni
blackhat
vegas
x4f
x41
shellcode
x49
x42
x4e
buffer
x43
x4b
x50
x4d
x4a
x55
x45
x46
bytes
x4c
x48
x30
execution
x32
eax
x31
x58
server
x47
x44
x35
exploit
x6b
egghunter
x38
x6f
shell
x2d
x5a
byte
mysql
x56
crash
php
x90
myfile
fuzzing
original
spike
Godina:
2008
Jezik:
english
Fajl:
PDF, 7.24 MB
Vaši tagovi:
5.0
/
5.0
english, 2008
3
BackTrack to the Max: Cracking the Perimeter
Offensive Security
Mati Aharoni
reserved
aharoni
blackhat
vegas
x4f
x41
shellcode
x49
x42
x4e
buffer
x43
x4b
x50
x4d
x4a
x55
x45
x46
bytes
x4c
x48
x30
execution
x32
eax
x31
x58
server
x47
x44
x35
exploit
x6b
egghunter
x38
x6f
shell
x2d
x5a
byte
mysql
x56
crash
php
x90
myfile
fuzzing
original
spike
Jezik:
english
Fajl:
PDF, 7.24 MB
Vaši tagovi:
0
/
4.0
english
4
BackTrackToTheMaxCrackingThePerimeter
Offensive Security
Mati Aharoni
reserved
aharoni
blackhat
vegas
x4f
x41
shellcode
x49
x42
x4e
buffer
x43
x4b
x50
x4d
x4a
x55
x45
x46
bytes
x4c
x48
x30
execution
x32
eax
x31
x58
server
x47
x44
x35
exploit
x6b
egghunter
x38
x6f
shell
x2d
x5a
byte
mysql
x56
crash
php
x90
myfile
fuzzing
original
spike
Fajl:
PDF, 3.50 MB
Vaši tagovi:
0
/
0
5
Launching Exploits ONE SMALL VULNERABILITY FOR A COMPANY, ONE GIANT HEAP FOR PORT BIND
Independently published
Richard Medlin
,
Vishal Belbase
,
Frederico Ferreira
,
Mossaraf Kha
,
Ambadi MP
,
LaShanda Edwards
,
,
Megan Blackwell
,
Kevin Hermosa
,
Carlyle Collins
,
Jeremy Martin
command
network
scan
nmap
buffer
security
port
script
server
linux
systems
install
users
malware
target
virus
python
exploit
vulnerability
download
password
privilege
vulnerabilities
packet
openvas
ics
boofuzz
figure
gmon
operating
steganography
escalation
attackers
immunity
execute
version
hunter
overflow
commands
attacks
sudo
path
tcp
bytes
debugger
malicious
shell
scanning
vulnserver
passwords
Godina:
2020
Jezik:
english
Fajl:
PDF, 21.05 MB
Vaši tagovi:
0
/
5.0
english, 2020
1
Idite na
ovaj link
ili potražite bota „@BotFather“ u Telegramu
2
Pošaljite komandu /newbot
3
Navedite ime za svog bota
4
Navedite korisničko ime za bota
5
Kopirajte poslednju poruku od BotFather i ubacite je ovde
×
×