ØMagnet

Pentester Academy - Exploiting Simple Buffer Overflows on Win32 (2014)

Torrent Hash :
f7868199a6403ae0445da4bf5fe4ec98166a1e69
Content Size :
3.9 GB
Date :
2018-05-09
Short Magnet :
Short Magnet
https://0mag.me/!Nj36KR QR code
Files ( 87 )size
002-the-stack.mp4257.85 MB
007-overwriting-stack-remotely.mp4205.74 MB
006-overwriting-the-stack.mp4201.24 MB
028-automating-bad-char-detection.mp4201.06 MB
003-stack-wind-unwind.mp4194.37 MB
013-bad-characters.mp4190.83 MB
016-bad-chracter-hunting-microp.mp4186.24 MB
009-ret-control-to-code-execution.mp4185.33 MB
011-exploiting-echo-server-v2.mp4178.91 MB
012-exploiting-echo-server-v3-part-1.mp4156.84 MB
026-exploiting-ftp-server-part-1.mp4152.53 MB
018-exploiting-dvd-professional.mp4151.69 MB
020-exploiting-digital-tv-player-part-1.mp4150.84 MB
005-returning-to-shellcode.mp4149.13 MB
014-strcpy-bad-characters.mp4147.65 MB
008-calculating-location-ret-overwrite.mp4140.7 MB
004-tampering-return-address.mp4136.1 MB
017-jmp-call-eac-microp.mp4118.72 MB
012-exploiting-echo-server-v3-part-2.mp4110.26 MB
024-exploiting-ssh-server-part-1.mp4104.71 MB
015-jmp-esp-technique.mp499.52 MB
022-exploiting-file-sharing-server-part-1.mp496.98 MB
023-exploiting-file-sharing-server-part-2.mp475.72 MB
019-exploiting-dvd-professional-part-2.mp470.26 MB
025-exploiting-ssh-server-part-2.mp463.99 MB
021-exploiting-digital-tv-player-part-2.mp457.97 MB
027-exploiting-ftp-server-part-2.mp457.93 MB
010-exploit-to-meterpreter.mp456.94 MB
001-course-introduction.mp452.36 MB
029-course-conclusion.mp421.58 MB
warftpd.zip1.46 MB
warftpd (1).zip1.46 MB
019-exploiting-dvd-professional-part-2.pdf1.23 MB
018-exploiting-dvd-professional.pdf1.23 MB
freesshd (1).zip665.72 KB
freesshd.zip665.72 KB
028-automating-bad-char-detection.pdf631.52 KB
microp.zip555.46 KB
microp (1).zip555.46 KB
022-exploiting-file-sharing-server-part-1.pdf532.25 KB
021-exploiting-digital-tv-player-part-2.pdf532.24 KB
020-exploiting-digital-tv-player-part-1.pdf532.24 KB
024-exploiting-ssh-server-part-1.pdf497.2 KB
025-exploiting-ssh-server-part-2.pdf497.17 KB
008-calculating-location-ret-overwrite.pdf471.74 KB
010-exploit-to-meterpreter.pdf471.62 KB
009-ret-control-to-code-execution.pdf470.68 KB
017-jmp-call-eac-microp.pdf451.23 KB
016-bad-chracter-hunting-microp.pdf450.58 KB
007-overwriting-stack-remotely.pdf449.03 KB

Related Torrents:

hunta-134.mp4271.97 MB
031512-968 加勒比 -身體感覺猥褻 後編 黒木麻衣802.63 MB
CESD-215-C170.37 MB
sw-565260.4 MB
RCT-606276.96 MB
pppd-087260.4 MB