Works best with JavaScript enabled!
Works best in
modern browsers
!
powered by h5ai
Name
Last modified
Size
Parent Directory
A Guide to Kernel Exploitation Attacking the Core - Enrico Perla B.Sc. Computer Science University of Torino M.Sc. Computer Science Trinity College Dublin, Massimiliano Oldani 2010.pdf
2022-02-22 06:10
5518 KB
Designing BSD Rootkits - An Introduction to Kernel Hacking - Joseph Kong 2007.pdf
2022-02-22 06:10
8786 KB
Designing BSD Rootkits_ An Introduction to Kernel Hacking - No Starch Press. Joseph Kong (2007).epub
2022-02-22 06:10
511 KB
Hacking Exposed_ Malware and Rootkits.pdf
2022-02-22 06:10
10910 KB
Kernel Level Vulnerabilities - Behind the Scenes of the 5th Argus Hacking Challenge - Last Stage of Delirium Research Group 2001.pdf
2022-02-22 06:10
447 KB
Managed Code Rootkits - Hooking Into Runtime Environments -Elsevier - Erez Metula (2010).pdf
2022-02-22 06:10
5829 KB
Rootkits_ Subverting the Windows Kernel - Addison-Wesley Professional. Greg Hoglund, Jamie Butler (2005).pdf
2022-02-22 06:10
2611 KB
The Rootkit Arsenal - Escape and Evasion in the Dark Corners of the System - Bill Blunden 2009.pdf
2022-02-22 06:10
85282 KB
Unreliable Guide to Hacking the Linux Kernel - Russell P.R.2000.pdf
2022-02-22 06:10
72 KB