Name | Last modified | Size | Description | |
---|---|---|---|---|
Parent Directory | - | |||
Attacking Mobile Phone Messaging by Luis Miras & Zane Lackey.pdf | 2011-12-17 15:04 | 490K | ||
Behind the Curtains - explaining the processes of the Microsoft Security Response by Mike Reavey.pdf | 2011-12-17 15:02 | 7.5M | ||
Combating Hybrids and The Modern Threatscape by Derek Manky.pdf | 2011-12-17 15:07 | 1.4M | ||
Hacking the bathroom by Bruno Gonçalves de Oliveira.pdf | 2011-12-17 15:04 | 5.7M | ||
How to Turn a cufflink in a cap by Eduardo VC Neves.pdf | 2011-12-17 15:03 | 4.6M | ||
Leting fuzzer Knows about your target's internals by Rodrigo Rubira Branco.pdf | 2011-12-17 15:07 | 252K | ||
Reversing Microsoft DirectShow by Aaron Portnoy.pdf | 2011-12-17 15:03 | 2.3M | ||
Risks of RIA ( Rich Internet Applications ) by Kevin Stadmeyer & Jon Rose.pdf | 2011-12-17 15:07 | 3.6M | ||
W3af - A Framework to dominate the Web (now with stable code) by Andres Riancho.pdf | 2011-12-17 15:06 | 14M |