Welcome![Sign In][Sign Up]
Location:
Search - the shellcoder handbook

Search list

[Other resourceThe.Shellcoder.s.Handbook.Discovering.And.Exploiti

Description: Every day, patches are created to cover up security holes in software applications and operating systems. But by the time you download a patch, it could be too late. A hacker may have already taken advantage of the hole and wreaked havoc on your system. This innovative book will help you stay one step ahead. It gives you the tools to discover vulnerabilities in C-language-based software, exploit the vulnerabilities you find, and prevent new security holes from occurring.-Every day, patches are created to cover up security holes i n software applications and operating systems . But by the time you download a patch, it could be too late. A hacker may have already ta ken advantage of the hole and wreaked havoc on yo ur system. This innovative book will help you st ay one step ahead. It gives you the tools to disco ver vulnerabilities in C-language-based soft ware, exploit the vulnerabilities you find, and prevent new security holes from occurring.
Platform: | Size: 2196067 | Author: 静水 | Hits:

[Other resourceWiley.The.Shellcoders.Handbook.2nd.Edition.Aug.200

Description: 这是shellcoders handbook的第二版,07年8月份出版的,其第一版深受大量shellcoder的欢迎,是初学者的宝典
Platform: | Size: 3125451 | Author: anzhihun | Hits:

[OS programShellcodersHandbook

Description: 此为The Shellcoders Handbook一书中的源代码-this as a book Shellcoders Handbook source code
Platform: | Size: 169984 | Author: fff | Hits:

[OtherThe.Shellcoder.s.Handbook.Discovering.And.Exploiti

Description: Every day, patches are created to cover up security holes in software applications and operating systems. But by the time you download a patch, it could be too late. A hacker may have already taken advantage of the hole and wreaked havoc on your system. This innovative book will help you stay one step ahead. It gives you the tools to discover vulnerabilities in C-language-based software, exploit the vulnerabilities you find, and prevent new security holes from occurring.-Every day, patches are created to cover up security holes i n software applications and operating systems . But by the time you download a patch, it could be too late. A hacker may have already ta ken advantage of the hole and wreaked havoc on yo ur system. This innovative book will help you st ay one step ahead. It gives you the tools to disco ver vulnerabilities in C-language-based soft ware, exploit the vulnerabilities you find, and prevent new security holes from occurring.
Platform: | Size: 2195456 | Author: 静水 | Hits:

[OtherWiley.The.Shellcoders.Handbook.2nd.Edition.Aug.200

Description: 这是shellcoders handbook的第二版,07年8月份出版的,其第一版深受大量shellcoder的欢迎,是初学者的宝典-This is the second edition of shellcoders handbook, published in August 2007, and its first edition was welcomed by a large number of shellcoder is a beginner s book
Platform: | Size: 3125248 | Author: anzhihun | Hits:

[Windows DevelopThe_Shellcoders_Handbook[2Ed]

Description: The Shellcoder’s Handbook -- Discovering and Exploiting Security Holes Second Edition
Platform: | Size: 3265536 | Author: 李明 | Hits:

[Hook apiShellcod

Description: Shellcode tutorial named - The Shellcoder s Handbook
Platform: | Size: 2190336 | Author: d3m | Hits:

[Shell apiThe-Shellcoders-Handbook

Description: The Shellcoder s handbook 源代码-The Shellcoder s handbook source code
Platform: | Size: 135168 | Author: ar | Hits:

[Exploitthe-shellcoder-handbook-1-2

Description: shellcoder 黑客手册:wiNdows linux主流系统的栈缓冲区、格式化、内核、 浏览器等漏洞的利用-shellcoder Hacker s Handbook: stack buffer wiNdows linux mainstream system, formatting, core, Use browser vulnerabilities, etc.
Platform: | Size: 4840448 | Author: 隔壁王 | Hits:

[Otherthe_shellcoders_handbook.pdf

Description: The Shellcoder's Handbook - 2nd Edition
Platform: | Size: 3364864 | Author: white_bob | Hits:

CodeBus www.codebus.net