Hot Search : Source embeded web remote control p2p game More...
Location : Home Search - code hacking
Search - code hacking - List
DL : 0
This text shows how to analyze programs without its source code, using a debugger and a disassembler, and covers hacking methods including virtual functions, local and global variables, branching, loops, objects and their hierarchy, and more.
Date : 2026-01-09 Size : 4.72mb User : wf

The Shellcoders Handbook 来自看雪论坛的一本讲解shellcode的好书 目录 1 在开始之前 2 栈溢出 3 Shellcode 4 格式化串漏洞 5 堆溢出 6 Windows的广阔原野 7 Windows Shellcode. 8 Windows 溢出 9 战胜过滤器 10 Solaris破解入门 11 高级Solaris破解 . 12 破解HP Tru64 Unix 13 建立工作环境 14 故障注入 15 Fuzzing的技巧 16 源码审计:在 C-Based 语言里寻找漏洞 17 Instrumented Investigation: 手工的方法 18 跟踪漏洞 19 二进制审计:Hacking不公开源码的软件 20 Alternative Payload Strategies 21 编写在野外运行的代码 22 攻击数据库软件 23 内核溢出 24 破解内核漏洞 25 附录 -The Shellcoders Handbook to see the snow from the forum a good book to explain shellcode Contents 1 Before you begin 2 stack overflow 3 Shellcode 4 Format String Vulnerability 5 heap overflow 6 Windows of the vast wilderness 7 Windows Shellcode. 8 Windows spill over nine filters 10 Solaris Senior Solaris crack crack entry 11. 12 crack HP Tru64 Unix 13 establish a working environment 14 Fault Injection 15 Fuzzing techniques 16 source code audit: In the C-Based Language in search of holes 17 Instrumented Investigation: manual methods to track 18 holes 19 binary audit : Hacking is not open source software 20 Alternative Payload Strategies 21 write the code in the wild, running 22 attacks on the database software 23 crack kernel kernel overflow vulnerability 25 Appendix 24
Date : 2026-01-09 Size : 2.66mb User : 孙锋
CodeBus is one of the largest source code repositories on the Internet!
Contact us :
1999-2046 CodeBus All Rights Reserved.