Introduction
Introduction Statistics Contact Development Disclaimer Help
1.txt - Introduction (by The Circle of Lost Hackers)
2.txt - Phrack Prophile of the new editors (by The Circle of Lost Hackers)
3.txt - Phrack World News (by The Circle of Lost Hackers)
4.txt - A brief history of the Underground scene (by The Circle of Lost Hackers)
5.txt - Hijacking RDS TMC traffic information signal (by lcars and danbia)
6.txt - Attacking the Core: Kernel Exploitation Notes (by sgrakkyu & twiz)
7.txt - The revolution will be on YouTube (by gladio)
8.txt - Automated vulnerability auditing in machine code (by Tyler Durden)
9.txt - The use of set_head to defeat the wilderness (by g463)
10.txt - Cryptanalysis of DPA-128 (by sysk)
11.txt - Mac OS X Wars - A XNU Hope (by nemo)
12.txt - Hacking deeper in the system (by ankhara)
13.txt - The art of exploitation: Autopsy of cvsxpl (by Ac1dB1tch3z)
14.txt - Facing the cops (by Lance)
15.txt - Remote blind TCP/IP spoofing (by Lkm)
16.txt - Hacking your brain: The projection of consciousness (by keptune)
17.txt - International scenes (by Various)
You are viewing proxied material from gopher.fnord.one. The copyright of proxied material belongs to its original authors. Any comments or complaints in relation to proxied material should be directed to the original authors of the content concerned. Please see the disclaimer for more details.