Introduction
Introduction Statistics Contact Development Disclaimer Help
1.txt - Introduction (by Phrack Staff)
2.txt - Phrack Prophile on FX (by Phrack Staff)
3.txt - Phrack World News (by TCLH)
4.txt - Linenoise (by various)
5.txt - Loopback (by Phrack Staff)
6.txt - Android Linux Kernel Rootkit (by dong-hoon you)
7.txt - Happy Hacking (by Anonymous)
8.txt - Practical cracking of white-box implementations (by SysK)
9.txt - Single Process Parasite (Crossbower)
10.txt - Pseudomonarchia jemallocum (by argp & huku)
11.txt - Infecting loadable kernel modules (by styx^)
12.txt - The Art of Exploitation: MS IIS 7.5 Remote Heap Overflow (by redpantz)
13.txt - The Art of Exploitation: Exploiting VLC, a jemalloc case study (by huk…
14.txt - Secure Function Evaluation vs. Deniability in OTR and similar protocol…
15.txt - Similarities for Fun and Profit (by Pouik & G0rfi3ld)
16.txt - Lines in the Sand: Which Side Are You On in the Hacker Class War (by A…
17.txt - Abusing Netlogon to steal an Active Directory's secrets (by the p1ckp0…
18.txt - 25 Years of SummerCon (by Shmeck)
19.txt - International Scenes (by various)
You are viewing proxied material from gopher.fnord.one. The copyright of proxied material belongs to its original authors. Any comments or complaints in relation to proxied material should be directed to the original authors of the content concerned. Please see the disclaimer for more details.