Introduction
Statistics
Contact
Development
Disclaimer
Help
1.txt - Introduction (by Phrack Staff)
2.txt - Loopback (by Phrack Staff)
3.txt - Linenoise (by Phrack Staff)
4.txt - Handling the Interrupt Descriptor Table (kad)
5.txt - Advances in kernel hacking II (by palmers)
6.txt - Defeating Forensic Analysis on Unix (by the grugq)
7.txt - Advances in format string exploiting (by gera & riq)
8.txt - Runtime process infection (by anonymous author)
9.txt - Bypassing PaX ASLR protection (by anonymous author)
10.txt - Execution path analysis: finding kernel rk's (by J.K.Rutkowski)
11.txt - Cuts like a knife, SSHarp (by stealth)
12.txt - Building ptrace injecting shellcodes (by anonymous author)
13.txt - Linux/390 shellcode development (by johnny cyberpunk)
14.txt - Writing linux kernel keylogger (rd)
15.txt - Cryptographic random number generators (DrMungkee)
16.txt - Playing with windows /dev/(k)mem (crazylord)
17.txt - Phrack World News (by Phrack Staff)
18.txt - Phrack magazine extraction utility (by Phrack Staff)