Index of /LIVRES

[ICO]NameLast modifiedSizeDescription

[DIR]Parent Directory  -  
[   ]2-The Shellcoder's Handbook.pdf26-Jul-2016 19:21 8.7M 
[   ]24-DEADLY-SINS-OF-SOFTWARE-SECURITY-2010.pdf13-Jun-2016 02:48 2.8M 
[   ]781.pdf13-Jun-2016 02:33 6.9M 
[   ]1510.07563.pdf14-Oct-2016 01:50 6.2M 
[   ]1510.07563v1.pdf14-Oct-2016 01:53 6.2M 
[   ]1604.06964.pdf14-Oct-2016 01:50 309K 
[   ]A Bug Hunter's Diary - Tobias Klein.pdf13-Jun-2016 02:35 5.2M 
[   ]A Journey to the Center of the Rustock.B Rootkit.pdf13-Jun-2016 02:36 5.3M 
[   ]ANDROID.pdf16-Sep-2016 18:37 2.3M 
[   ]ART OF EXPLOITATION, 2nd Edition.pdf29-Jun-2015 00:35 4.8M 
[   ]AST2012.pdf14-Oct-2016 01:50 405K 
[   ]Acquisition de preuves et analyse a froid d un systeme sous Windows.pdf13-Jun-2016 02:52 2.5M 
[   ]Advanced.Bootkit.Techniques.On.Android.pdf13-Jun-2016 02:36 7.1M 
[   ]Aide-memoire administrateur Linux.pdf13-Jun-2016 18:04 74K 
[   ]Android Hacker's Handbook.pdf13-Jun-2016 02:56 9.0M 
[   ]Antivirus hackers handbook.pdf13-Jun-2016 03:13 5.6M 
[   ]Apress.Cryptography.In.C.And.C.Plus.Plus.2nd.Edition.Jul.2013.ISBN.1430250984.pdf28-Jan-2017 04:26 3.0M 
[   ]Assembly Language Step-By-Step - Programming with Linux, 3rd edition (Wiley, 2009, 0470497025).pdf31-Jul-2016 00:10 5.8M 
[   ]AttackingAndDefendingBIOS-RECon2015.pdf22-Jul-2015 03:04 2.4M 
[   ]BH_US_12_Brossard_Backdoor_Hacking_Slides.pdf09-Aug-2015 12:02 1.6M 
[   ]BP.New.Feb2016.ISBN.097528388X.pdf28-Jan-2017 04:28 3.4M 
[   ]BlackHat_DC_2011_Perez-Pico_Mobile_Attacks-Slides.pdf14-Oct-2016 01:50 2.1M 
[   ]BlackHat_DC_2011_Perez-Pico_Mobile_Attacks-wp.pdf25-Sep-2016 16:17 1.3M 
[   ]Buffer Overflow Attacks on Linux Principles Analyzing and Protection.pdf13-Jun-2016 02:36 56K 
[   ]Bypassing DEP with WPM & ROP.pdf13-Jun-2016 02:37 334K 
[   ]Bypassing Stack Cookies, SafeSeh, HW DEP and ASLR.pdf13-Jun-2016 03:01 3.1M 
[   ]CONFidence2009_bernardo_damele_guido_landi.pdf20-Jul-2016 00:56 745K 
[   ]CRC.Press.Crypto.Nov.2014.ISBN.1482228890.pdf28-Jan-2017 04:19 2.4M 
[   ]CRC.Press.Cyber.Mar.2016.ISBN.1498734731.pdf28-Jan-2017 04:38 6.3M 
[   ]Cahier de maths 2de - _dition 2013.PDF23-Jan-2017 18:33 19M 
[   ]Catalogue de stages CGI Business Consulting Security Risk Management 2017.pdf21-Oct-2016 13:01 902K 
[   ]Computer Forensics, Investigating Data and Image Files.pdf29-Jun-2015 02:43 15M 
[   ]Computer Forensics_ Investigating Networ - EC-Council.pdf29-Jun-2015 02:45 24M 
[   ]Creating code obfuscation Virtual Machines.pdf13-Jun-2016 03:39 612K 
[   ]D1T3 LABS - Anto Joseph - Droid-FF.pdf10-Oct-2016 13:01 30M 
[   ]D2T2 - D. Mende & Enno Rey - Attacking 3G and 4G Networks.pdf14-Oct-2016 01:50 2.2M 
[   ]DEFCON-24-Arnaud-Soullie-Workshop-Pentesting-ICS-101.pdf01-Feb-2017 23:08 4.1M 
[   ]DEFCON-24-Hendrik-Schmidt-Brian-Butter-Attacking-BaseStations.pdf14-Oct-2016 01:50 1.6M 
[   ]DEFCON-24-Mike-Rich-Use-Their-Machines-Against-Them.pdf01-Feb-2017 23:09 1.6M 
[   ]Data Structures Using C, 2nd edition.pdf31-Jul-2016 00:09 18M 
[   ]Deobfuscation of Virtualization-Obfuscated Software.pdf13-Jun-2016 03:39 192K 
[   ]Deserialization - What Could Go Wrong.pdf02-Feb-2017 23:18 1.5M 
[   ]Detecting and Removing Web Application Vulnerabilities with Static Analysis and Data Mining.pdf15-Aug-2016 00:25 1.5M 
[   ]Developpement avance d un rootkit pour les modules du noyau.pdf13-Jun-2016 17:46 971K 
[   ]EN - Hacking Blind - BROP - Bittau.pdf06-Dec-2016 14:31 471K 
[   ]EN-SAP Penetration testing_Black-H_Europe.pdf13-Jun-2016 02:54 3.3M 
[   ]EN - Stack Bug - Stack Overflow ASLR bypass using ret2reg.pdf04-Dec-2016 19:17 762K 
[   ]Exploring the Blackhole Exploit Kit.pdf13-Jun-2016 03:24 534K 
[   ]File_Format_Fuzzing_in_Android_-Alexandru_Blanda.pdf10-Oct-2016 12:45 605K 
[   ]Firstov - Attacking MongoDB.pdf13-Feb-2017 00:10 2.0M 
[   ]Forristal_Hardware_Involved_Software_Attacks.pdf09-Aug-2015 11:57 1.3M 
[   ]Fuzzing Brute Force Vulnerability Discovery.pdf21-Jun-2015 17:33 56M 
[   ]Fuzzing Brute Force Vulnerability Discovery.pdf17-Feb-2017 04:20 28M 
[   ]Fuzzing for Software Security Testing and Quality Assurance Artech House Information Security and Privacy .pdf21-Jun-2015 17:28 4.5M 
[   ]GLIBCGhostVulnExploit.pdf10-Jul-2015 12:51 497K 
[   ]GregorioCours3eme.pdf23-Jan-2017 18:29 4.2M 
[   ]Guide_to_Assembly_Language_Programming_in_Linux_(Springer-2005).pdf31-Jul-2016 00:10 31M 
[   ]Hacking Exposed - Linux 3rd Edition.pdf31-Jul-2016 00:10 10M 
[   ]Hacking Exposed Mobile Security Secrets & Solutions - Neil Bergman.pdf13-Jun-2016 02:37 6.3M 
[   ]Hi GDB, this is python.pdf13-Jun-2016 03:37 242K 
[   ]HowManyMillionBIOSWouldYouLikeToInfect_Full2.pdf09-Aug-2015 12:04 47M 
[   ]How To Backdoor Diffie-Hellman.pdf17-Jul-2016 15:24 2.2M 
[   ]How_Do_I_Crack_Satellite_and_Cable_Pay_TV_slides.pdf27-Dec-2016 23:53 29M 
[   ]IDA L usine a Gaz.pdf13-Jun-2016 03:36 532K 
[   ]IDA Pro Book.pdf29-Jun-2015 03:15 8.7M 
[   ]IDA Pro Book_ The Unofficial Guide to the World's Most Popular Disassembler, The - Eagle, Chris.pdf13-Jun-2016 02:38 7.8M 
[   ]Intro Reverse et Patch Android.pdf13-Jun-2016 03:36 1.8M 
[   ]IntroToCellularSecurity-20140121.pdf23-Sep-2016 14:20 1.8M 
[   ]Introduction aux methodes d.exploitation de failles applicatives.pdf13-Jun-2016 03:27 132K 
[   ]Introduction to various file infection techniques.pdf13-Jun-2016 03:18 469K 
[   ]JMD2015-ECCWS.pdf28-Sep-2016 13:35 836K 
[   ]Jones.And.Bartlett.Rootkit.2nd.Edition.Mar.2012.ISBN.144962636X.pdf28-Jan-2017 04:42 106M 
[   ]Langage C L essentiel.pdf13-Jun-2016 17:48 1.9M 
[   ]La securite des cartes a bande magnetique.pdf13-Jun-2016 03:32 1.1M 
[   ]La topologie des reseaux.pdf13-Jun-2016 17:49 1.0M 
[   ]Le Reseau Industriel - LE BUS CAN.pdf13-Jun-2016 03:47 433K 
[   ]Learning Linux Binary Analysis.pdf31-Jul-2016 00:09 14M 
[   ]Les failles Format String.pdf13-Jun-2016 03:04 526K 
[   ]MIPS EXPLOIT TO HACK ROUTEURS.pdf04-Jul-2015 20:27 1.1M 
[   ]Malware Analyst's Cookbook.pdf13-Jun-2016 03:10 8.9M 
[   ]Managed Code Rootkits.pdf29-Jun-2015 00:21 5.6M 
[   ]Media_Fuzzing_defcamp.pdf14-Oct-2016 01:50 1.3M 
[   ]Memo de la programmation Shell.pdf13-Jun-2016 17:50 70K 
[   ]Multi-stage Binary Code Obfuscation using Improved Virtual Machine.pdf13-Jun-2016 03:36 485K 
[   ]My Hash Is My Passport- Understanding Web and Mobile Authentication (1).pdf14-Jul-2016 14:17 958K 
[   ]NorthBit-Metaphor.pdf21-Sep-2016 14:06 1.0M 
[   ]Optimisation des shellcodes sous Linux.pdf21-Jul-2016 01:42 1.5M 
[   ]Packt.Android.Dec.2013.ISBN.1782167161.pdf28-Jan-2017 04:25 19M 
[   ]Packt.Binary.Feb.2016.ISBN.1782167102.pdf28-Jan-2017 04:31 2.0M 
[   ]Packt.Citrix.3rd.Edition.Nov.2015.ISBN.1782175172.pdf28-Jan-2017 04:48 35M 
[   ]Packt.GUI.Dec.2015.ISBN.1785283758.pdf28-Jan-2017 06:59 9.0M 
[   ]Packt.RPI.Jan.2015.ISBN.1784396435.pdf28-Jan-2017 04:28 9.9M 
[   ]Pass-the-Hash attacks - Tools and Mitigation.pdf13-Jun-2016 03:04 2.0M 
[   ]Pearson.Secure.2nd.Edition.Oct.2013.ISBN.0321822137.pdf28-Jan-2017 04:26 21M 
[   ]PenTestIT_Advanced_Training.pdf13-Jun-2016 02:40 2.4M 
[   ]PenTestMagazine_06_2013.pdf13-Jun-2016 02:41 8.6M 
[   ]PenTestMagazine_07_2013.pdf13-Jun-2016 02:41 9.2M 
[   ]PenTestMagazine_08_2013.pdf13-Jun-2016 02:41 5.8M 
[   ]Pinnacle.Tor.Mar.2016.ISBN.0692674446.pdf28-Jan-2017 04:34 682K 
[   ]Practical Malware Analysis.pdf07-Jul-2015 02:30 9.4M 
[   ]Practical Packet Analysis.pdf21-Jun-2012 12:25 16M 
[   ]Practical Reverse Engineering.pdf13-Jun-2016 02:17 5.2M 
[   ]Prentice.Hall.Java.6th.Edition.Mar.2015.ISBN.0133957055.pdf28-Jan-2017 04:24 11M 
[   ]Programming in C, 2nd Edition.pdf31-Jul-2016 00:08 13M 
[   ]Quelques astuces avec LD_PRELOAD.pdf13-Jun-2016 03:06 764K 
[   ]RAPTOR: Routing Attacks on Privacy in Tor.pdf04-Jul-2016 13:52 1.6M 
[   ]RECON_2015_OoOE.pdf21-Jul-2015 20:34 12M 
[   ]RE_for_beginners-en.pdf28-Jun-2015 18:28 3.8M 
[   ]ROP_course_lecture_jonathan_salwan_2014.pdf21-Feb-2017 22:29 380K 
[   ]Reverse Engineering avec LD PRELOAD.pdf13-Jun-2016 03:06 68K 
[   ]Reversing, Secrets of Reverse Engineering.pdf29-Jun-2015 00:20 8.4M 
[   ]RookSecurity_RealSecurityIsDirty.pdf23-Jul-2015 14:05 1.3M 
[   ]Rootkit Arsenal.PDF29-Jun-2015 03:13 94M 
[   ]Scapy en pratique.pdf13-Jun-2016 03:07 424K 
[   ]SecurIMAG_2001_05_19_Smashing_the_stack_for_fun_and_fun_Memory_protections_and_bypass_methods.pdf01-Aug-2016 15:33 2.2M 
[   ]Secure Systems and Pwning Popular Platforms (2).pdf13-Jun-2016 03:16 2.9M 
[   ]Secure Systems and Pwning Popular Platforms.pdf13-Jun-2016 03:11 2.9M 
[   ]Social Engineeing with SET.pdf23-Aug-2016 20:16 519K 
[   ]Sockets Shellcode Porting and Coding Reverse Engineering Exploits and Tool Coding for Security Professionals.pdf21-Jun-2015 17:33 112M 
[   ]StruxureWare Data Center Operation 7.2 Server Configuration Guide.pdf12-Dec-2016 22:57 392K 
[   ]Synesthesia-SlidesWithNotes.pdf09-Nov-2016 21:47 1.4M 
[   ]Syngress.Cyber.May.2014.ISBN.0128007435.pdf28-Jan-2017 04:22 5.7M 
[   ]Syngress.Hacking.Web.Apps.Sep.2012.ISBN.159749951X.pdf28-Jan-2017 04:12 22M 
[   ]Techniques utilisees par les rootkits.pdf13-Jun-2016 03:13 1.0M 
[   ]The.Rootkit.Arsenal.Escape.and.Evasion.in.the.Dark.Corners.of.the.System,Second.Edition.pdf13-Jul-2015 01:32 94M 
[   ]The Art of Memory Forensics.pdf13-Jun-2016 03:10 7.2M 
[   ]The CTF Toolbox- CTF Tools of the Trade.pdf13-Jun-2016 03:08 960K 
[   ]The Shellcoder's Handbook.pdf29-Jun-2015 00:16 8.7M 
[   ]Tools and Basic Reverse Engineering.pdf13-Jun-2016 03:13 399K 
[IMG]Tux.png08-Jul-2016 14:55 12K 
[   ]Understanding and Using C Pointers.pdf31-Jul-2016 00:08 7.6M 
[   ]Une courte introduction a LaTeX.pdf13-Jun-2016 17:58 2.5M 
[   ]UniverDesign.pdf01-Oct-2016 14:52 4.3M 
[   ]Unix malwares Myth or reality.pdf13-Jun-2016 03:13 1.0M 
[   ]User_Manual.pdf25-Aug-2016 03:02 1.1M 
[   ]Utilizing-Code-Reuse-Or-Return-Oriented-Programming-In-PHP-Application-Exploits.pdf11-Aug-2016 01:37 1.3M 
[   ]Virtual Deobfuscator - A DARPA Cyber Fast Track Funded Effort.pdf13-Jun-2016 03:34 891K 
[   ]WFUZZ for Penetration Testers.pdf13-Jun-2016 03:31 9.0M 
[   ]Wiley.GSM.2nd.Edition.Oct.2014.ISBN.1118861957.pdf28-Jan-2017 04:15 4.2M 
[   ]Wiley.Mobile.Jan.2012.ISBN.1848213336.pdf28-Jan-2017 04:15 6.0M 
[   ]Wiley.NoSQL.Mar.2015.ISBN.1118905741.pdf28-Jan-2017 07:01 3.3M 
[   ]Wiley Build Your Own Security Lab A Field Guide for Network Testing.pdf13-Jun-2016 02:50 8.1M 
[   ]Windows 10 x64 edge 0day and exploit.pdf06-Aug-2016 20:21 24M 
[   ]X86_Disassembly.pdf13-Jun-2016 02:42 2.1M 
[   ]YOUR SECRET STINGRAY‚ÄôS NO SECRET ANYMORE:THE VANISHING GOVERNMENT MONOPOLY OVER CELL PHONE SURVEILLANCE.pdf14-Oct-2016 01:53 1.0M 
[   ]ZZUF-MultiPurposeFuzzer.pdf19-Oct-2016 11:54 607K 
[   ]anti-reverse-engineering-linux.pdf25-Dec-2016 19:23 935K 
[   ]bh-eu-12-Jarmoc-SSL_TLS_Interception-Slides.pdf14-Oct-2016 01:51 1.0M 
[   ]blackhat2012_brossard_hardware_backdooring.pdf09-Aug-2015 12:03 455K 
[   ]ccs15.pdf14-Oct-2016 01:53 574K 
[   ]cellphonespying.pdf24-Sep-2016 13:33 110K 
[   ]chen-kbugs.pdf08-Dec-2016 04:43 146K 
[   ]cisco_ios_rootkits.pdf11-Oct-2015 02:47 1.2M 
[   ]discovre-efficient-cross-architecture-identification-bugs-binary-code.pdf13-Dec-2016 03:14 1.8M 
[   ]dowser_usenixsec13 (1).pdf28-Oct-2016 12:46 2.3M 
[   ]dowser_usenixsec13.pdf27-Oct-2016 11:03 2.3M 
[   ]femtocell.pdf22-Sep-2016 02:12 2.4M 
[   ]formatstring-1.2.pdf04-Dec-2016 18:50 229K 
[   ]fp170.pdf22-Dec-2016 19:55 225K 
[   ]fuzzing-frameworks.pdf23-Oct-2016 13:17 352K 
[   ]hackpra09_fu_esser_php_exploits1.pdf11-Aug-2016 01:37 666K 
[   ]hotnets-XIII-final80.pdf04-Jul-2016 03:24 1.0M 
[   ]introduction-linux-based-malware-36097.pdf03-Aug-2015 01:47 2.4M 
[   ]linux_shellcodes.pdf21-Jul-2016 01:42 126K 
[IMG]maldoc-content.png13-Jul-2016 01:02 17K 
[   ]minemu_raid11.pdf27-Oct-2016 11:04 427K 
[   ]mwri-drozer-user-guide-2015-03-23.pdf15-Jun-2016 18:20 850K 
[   ]ndss-2015.pdf27-Oct-2016 11:02 648K 
[   ]not-only-frogs-can-hop.pdf26-Nov-2016 13:53 5.1M 
[   ]part1.pdf09-Aug-2015 11:57 858K 
[   ]part2.pdf09-Aug-2015 11:57 3.1M 
[   ]part3.pdf09-Aug-2015 11:57 2.6M 
[   ]pas-a-pas-vers-l-assembleur-par-lord-noteworthy.pdf13-Jun-2016 03:35 2.1M 
[   ]pegasus-exploits-technical-details.pdf05-Nov-2016 21:01 422K 
[IMG]r8jdek2.jpg11-Jul-2016 23:01 675K 
[   ]radare2book.pdf16-Aug-2015 15:42 2.0M 
[   ]reverse-engineering-and-exploit-development.pdf16-Aug-2015 15:44 239K 
[   ]rr631gv1_stuwrk_withdraw_cash_use-case_spec.doc31-Jan-2017 06:23 190K 
[   ]ruxcon2016-Vitaly.pdf11-Dec-2016 15:16 889K 
[   ]scriptie-brinio-final-brinio_hond (1).pdf25-Sep-2016 16:17 5.5M 
[   ]scriptie-brinio-final-brinio_hond.pdf21-Sep-2016 16:25 5.5M 
[   ]sec-2016.pdf27-Oct-2016 11:01 444K 
[   ]shellcode_polymorphiques.pdf21-Jul-2016 01:41 1.7M 
[   ]ssl-mitm.pdf14-Oct-2016 01:51 593K 
[   ]state_harmful.pdf12-Jul-2016 19:12 272K 
[   ]text.pdf26-Nov-2016 03:46 366K 
[   ]the-art-of-software-security-assessment.pdf13-Jun-2016 02:12 13M 
[   ]the-mac-hackers-handbook.pdf20-Aug-2016 13:06 7.1M 
[   ]tordecoys.raid11.pdf04-Jul-2016 13:52 866K 
[   ]tu15-cns.pdf14-Oct-2016 01:53 244K 
[   ]uncovering-zerodays-and-advanced-fuzzing.pdf24-May-2012 18:17 930K 
[IMG]wallpaper-fonds-decran-Hippopotamus in Water.jpg21-Feb-2017 23:02 1.1M 
[   ]web-hacking-101.pdf18-Feb-2017 20:18 9.3M 
[   ]x86_Considered_harmful.pdf10-Jul-2016 13:46 345K 
[   ]x86_harmful.pdf26-Jul-2016 17:43 345K 

Apache/2.2.22 (Debian) Server at lepointdeau.fr Port 80