![]() | Name | Last modified | Size | Description |
---|---|---|---|---|
![]() | Parent Directory | - | ||
![]() | Attacking Mobile Phone Messaging by Luis Miras & Zane Lackey.pdf | 2011-12-17 15:04 | 490K | |
![]() | Behind the Curtains - explaining the processes of the Microsoft Security Response by Mike Reavey.pdf | 2011-12-17 15:02 | 7.5M | |
![]() | Combating Hybrids and The Modern Threatscape by Derek Manky.pdf | 2011-12-17 15:07 | 1.4M | |
![]() | Hacking the bathroom by Bruno Gonçalves de Oliveira.pdf | 2011-12-17 15:04 | 5.7M | |
![]() | How to Turn a cufflink in a cap by Eduardo VC Neves.pdf | 2011-12-17 15:03 | 4.6M | |
![]() | Leting fuzzer Knows about your target's internals by Rodrigo Rubira Branco.pdf | 2011-12-17 15:07 | 252K | |
![]() | Reversing Microsoft DirectShow by Aaron Portnoy.pdf | 2011-12-17 15:03 | 2.3M | |
![]() | Risks of RIA ( Rich Internet Applications ) by Kevin Stadmeyer & Jon Rose.pdf | 2011-12-17 15:07 | 3.6M | |
![]() | W3af - A Framework to dominate the Web (now with stable code) by Andres Riancho.pdf | 2011-12-17 15:06 | 14M |