Works best with JavaScript enabled!Works best in modern browsers!powered by h5ai
NameLast modifiedSize
folder-parentParent Directory
fileA Guide to Kernel Exploitation Attacking the Core - Enrico Perla B.Sc. Computer Science University of Torino M.Sc. Computer Science Trinity College Dublin, Massimiliano Oldani 2010.pdf2022-02-22 06:105518 KB
fileDesigning BSD Rootkits - An Introduction to Kernel Hacking - Joseph Kong 2007.pdf2022-02-22 06:108786 KB
fileDesigning BSD Rootkits_ An Introduction to Kernel Hacking - No Starch Press. Joseph Kong (2007).epub2022-02-22 06:10511 KB
fileHacking Exposed_ Malware and Rootkits.pdf2022-02-22 06:1010910 KB
fileKernel Level Vulnerabilities - Behind the Scenes of the 5th Argus Hacking Challenge - Last Stage of Delirium Research Group 2001.pdf2022-02-22 06:10447 KB
fileManaged Code Rootkits - Hooking Into Runtime Environments -Elsevier - Erez Metula (2010).pdf2022-02-22 06:105829 KB
fileRootkits_ Subverting the Windows Kernel - Addison-Wesley Professional. Greg Hoglund, Jamie Butler (2005).pdf2022-02-22 06:102611 KB
fileThe Rootkit Arsenal - Escape and Evasion in the Dark Corners of the System - Bill Blunden 2009.pdf2022-02-22 06:1085282 KB
fileUnreliable Guide to Hacking the Linux Kernel - Russell P.R.2000.pdf2022-02-22 06:1072 KB