Англоязычная серия книг Hacking exposed от авторов Stuart McClure, Joel Scambray and George Kurtz
В паке представлены книги:
+ Hacking exposed malware & rootkits
+ Hacking Exposed Web applications
+ Hacking Exposed Computer Forensic
+ Hacking Exposed Windows, 3rd Edition
+ Hacking Exposed Linux
#book #linux #windows #pentest
В паке представлены книги:
+ Hacking exposed malware & rootkits
+ Hacking Exposed Web applications
+ Hacking Exposed Computer Forensic
+ Hacking Exposed Windows, 3rd Edition
+ Hacking Exposed Linux
#book #linux #windows #pentest
System Calls Using Go
In this chapter, you will explore writing applications that perform system-level operations using system calls. The operating system provides a lot of ways for applications to extract information and perform operations. You will look at the different ways to extract system-level information and use both the Go standard library and system files.
#book , #Go , #introduction
In this chapter, you will explore writing applications that perform system-level operations using system calls. The operating system provides a lot of ways for applications to extract information and perform operations. You will look at the different ways to extract system-level information and use both the Go standard library and system files.
#book , #Go , #introduction
❤🔥1👍1
malwild.pdf
83.9 MB
❤🔥8
Forwarded from Art of Engineering (Mohsen)
Name: Shellcoder's Handbook
Requirements: C, C++, Assembly
Level: Basics to Intermediate
Authors: Chris Anley, John Heasman, Felix "FX" Lindner, Gerardo Richarte
Chapters:
1- Before You Begin
2- Stack Overflows
3- Shellcode
4- Introduction to Format String Bugs
5- Introduction to Heap Overflows
6- The Wild World of Windows
7- Windows Shellcode
8- Windows Overflows
9- Overcoming Filters
10- Introduction to Solaris Exploitation
11- Advanced Solaris Exploitation
12- OS X Shellcode
13- Cisco IOS Exploitation
14- Protection Mechanisms
15- Establishing a Working Environment
16- Fault Injection
17- The Art of Fuzzing
18- Source Code Auditing
19- Instrumented Investigation: A Manual Approach
20- Tracing for Vulnerabilities
21- Binary Auditing
22- Alternative Payload Strategies
23- Writing Exploits that Work in the Wild
24- Attacking Database Software
25- Unix Kernel Overflows
26- Exploiting Unix Kernel Vulnerabilities
27- Hacking the Windows Kernel
#binary #exploitation #book #resource
Requirements: C, C++, Assembly
Level: Basics to Intermediate
Authors: Chris Anley, John Heasman, Felix "FX" Lindner, Gerardo Richarte
Chapters:
1- Before You Begin
2- Stack Overflows
3- Shellcode
4- Introduction to Format String Bugs
5- Introduction to Heap Overflows
6- The Wild World of Windows
7- Windows Shellcode
8- Windows Overflows
9- Overcoming Filters
10- Introduction to Solaris Exploitation
11- Advanced Solaris Exploitation
12- OS X Shellcode
13- Cisco IOS Exploitation
14- Protection Mechanisms
15- Establishing a Working Environment
16- Fault Injection
17- The Art of Fuzzing
18- Source Code Auditing
19- Instrumented Investigation: A Manual Approach
20- Tracing for Vulnerabilities
21- Binary Auditing
22- Alternative Payload Strategies
23- Writing Exploits that Work in the Wild
24- Attacking Database Software
25- Unix Kernel Overflows
26- Exploiting Unix Kernel Vulnerabilities
27- Hacking the Windows Kernel
#binary #exploitation #book #resource
Data_Types_and_Variables_Operators_and_control_structures_in_C_2023.pdf
1.1 MB
📚Data Types and Variables, Operators and Control Structures in C++: Introduction to C++ Programming (2023)
✍️Din Asotić
#book
------
@islemolecule_source
✍️Din Asotić
#book
------
@islemolecule_source
🔥3
CryptoCrime_Rep_2024.pdf
20.8 MB
#book
"The 2024 Crypto Crime Report:
The latest trends in ransomware, scams, hacking and more", Feb. 2024.
"The 2024 Crypto Crime Report:
The latest trends in ransomware, scams, hacking and more", Feb. 2024.
🔥5