Introduction
Introduction Statistics Contact Development Disclaimer Help
1.txt - Introduction (by Phrack Staff)
2.txt - Loopback (by Phrack Staff)
3.txt - Linenoise (by Phrack Staff)
4.txt - Handling the Interrupt Descriptor Table (kad)
5.txt - Advances in kernel hacking II (by palmers)
6.txt - Defeating Forensic Analysis on Unix (by the grugq)
7.txt - Advances in format string exploiting (by gera & riq)
8.txt - Runtime process infection (by anonymous author)
9.txt - Bypassing PaX ASLR protection (by anonymous author)
10.txt - Execution path analysis: finding kernel rk's (by J.K.Rutkowski)
11.txt - Cuts like a knife, SSHarp (by stealth)
12.txt - Building ptrace injecting shellcodes (by anonymous author)
13.txt - Linux/390 shellcode development (by johnny cyberpunk)
14.txt - Writing linux kernel keylogger (rd)
15.txt - Cryptographic random number generators (DrMungkee)
16.txt - Playing with windows /dev/(k)mem (crazylord)
17.txt - Phrack World News (by Phrack Staff)
18.txt - Phrack magazine extraction utility (by Phrack Staff)
You are viewing proxied material from gopher.fnord.one. The copyright of proxied material belongs to its original authors. Any comments or complaints in relation to proxied material should be directed to the original authors of the content concerned. Please see the disclaimer for more details.