RAR-files |
psfhaded-xqzt.rar |
50,000,000 |
16DFD132 |
psfhaded-xqzt.r00 |
50,000,000 |
EBBD181D |
psfhaded-xqzt.r01 |
50,000,000 |
9FAB1DF6 |
psfhaded-xqzt.r02 |
50,000,000 |
5BAFBE56 |
psfhaded-xqzt.r03 |
50,000,000 |
6E7E0135 |
psfhaded-xqzt.r04 |
50,000,000 |
7FEA75B9 |
psfhaded-xqzt.r05 |
50,000,000 |
C1AE7912 |
psfhaded-xqzt.r06 |
20,151,426 |
48034CF1 |
|
Total size: |
370,151,426 |
|
|
Archived
files |
Security for Hackers and Developers - Exploit Development\5.Exploiting a Basic Browser Bug\14.Demo a Heap Spray Exploit.mp4
[834fb41aae89412d]
|
34,098,614 |
F5B84F23 |
Security for Hackers and Developers - Exploit Development\5.Exploiting a Basic Browser Bug\15.Discussing Mitigations and Summary.mp4
[59072d81f1ee5197]
|
4,549,760 |
902F3501 |
Security for Hackers and Developers - Exploit Development\5.Exploiting a Basic Browser Bug\13.Exploiting Browsers with Heap Sprays.mp4
[adbb104c9986a124]
|
16,106,332 |
A53588E3 |
Security for Hackers and Developers - Exploit Development\3.Understanding a Function Pointer Overwrite\07.Lab and Summary.mp4
[5857943fd7b50572]
|
1,277,467 |
13318C1B |
Security for Hackers and Developers - Exploit Development\3.Understanding a Function Pointer Overwrite\05.Stack and Function Pointer Overwrites.mp4
[d391a87fc5f63773]
|
8,723,631 |
784E59A0 |
Security for Hackers and Developers - Exploit Development\3.Understanding a Function Pointer Overwrite\06.Function Pointer Exploit Demo.mp4
[6d47411de387f3da]
|
25,281,526 |
A5F5AD9D |
Security for Hackers and Developers - Exploit Development\1.Course Overview\01.Course Overview.mp4
[968ecbb6348ae27d]
|
4,996,412 |
34C2BCF4 |
Security for Hackers and Developers - Exploit Development\4.Exploiting a Windows Server Using Shellcode\09.Shellcoding Demo.mp4
[f50056018bc0ebb6]
|
28,274,509 |
E67853E4 |
Security for Hackers and Developers - Exploit Development\4.Exploiting a Windows Server Using Shellcode\10.More on Shellcoding and Its Use in the Coming Demo.mp4
[f0603d75795cb1c]
|
4,867,907 |
C48CB773 |
Security for Hackers and Developers - Exploit Development\4.Exploiting a Windows Server Using Shellcode\08.Shellcoding.mp4
[9902c65fdea99414]
|
15,625,798 |
2DBCA124 |
Security for Hackers and Developers - Exploit Development\4.Exploiting a Windows Server Using Shellcode\12.Defenses and Summary.mp4
[7ea51168aae89ef1]
|
6,949,115 |
79B1E09A |
Security for Hackers and Developers - Exploit Development\4.Exploiting a Windows Server Using Shellcode\11.Windows Server Exploit Demo.mp4
[bac41ee90ba08199]
|
77,733,257 |
24735F2F |
Security for Hackers and Developers - Exploit Development\6.Applying Return-oriented Programming\18.Future Exploit Learning and Summary.mp4
[330d541b47536ecb]
|
4,321,921 |
878ACA97 |
Security for Hackers and Developers - Exploit Development\6.Applying Return-oriented Programming\17.Demo Bypassing ASLR, Pivot, and ROP.mp4
[c7a34e041fa18b8d]
|
39,340,889 |
57CB7971 |
Security for Hackers and Developers - Exploit Development\6.Applying Return-oriented Programming\16.Bypass ASLR, Pivot, and ROP.mp4
[137c33217c5b4fa1]
|
18,112,080 |
D8DCF4D8 |
Security for Hackers and Developers - Exploit Development\2.Auditing, Debugging, and Vulnerabilities\03.Bug Hunting and Debugging Demo.mp4
[9d0873f70cbe533a]
|
62,867,041 |
BF78CE9C |
Security for Hackers and Developers - Exploit Development\2.Auditing, Debugging, and Vulnerabilities\02.Introduction to Exploitation.mp4
[7aa79e170fc8de]
|
15,630,175 |
FB7CA0E2 |
Security for Hackers and Developers - Exploit Development\2.Auditing, Debugging, and Vulnerabilities\04.Lab Assignment and Module Summary.mp4
[af031876b8438eb0]
|
1,389,655 |
FDD651DB |
Security for Hackers and Developers - Exploit Development\5.Exploiting a Basic Browser Bug |
0 |
00000000 |
Security for Hackers and Developers - Exploit Development\3.Understanding a Function Pointer Overwrite |
0 |
00000000 |
Security for Hackers and Developers - Exploit Development\1.Course Overview |
0 |
00000000 |
Security for Hackers and Developers - Exploit Development\4.Exploiting a Windows Server Using Shellcode |
0 |
00000000 |
Security for Hackers and Developers - Exploit Development\6.Applying Return-oriented Programming |
0 |
00000000 |
Security for Hackers and Developers - Exploit Development\2.Auditing, Debugging, and Vulnerabilities |
0 |
00000000 |
Security for Hackers and Developers - Exploit Development |
0 |
00000000 |
|
Total size: |
370,146,089 |
|
|