资源详情

返回首页 | 相关搜索
reverse-engineering-and-exploit-development
大小 1.14 GB
文件数 100
Info Hash: 6B7CD78E86B45FAFA6CB2FC49BB630A2C5E777D8
收录时间 2026-03-02 09:02:06
更新时间 2026-03-02 09:02:06
文件列表 (100)
01 Getting Started/001 Important - Download These First - Working Files.html
373 B
01 Getting Started/002 Introduction To Reversing.mp4
6.51 MB
01 Getting Started/003 About The Author.mp4
4.73 MB
01 Getting Started/004 Ethical Considerations.mp4
2.84 MB
01 Getting Started/005 Reversing Tools - Part 1.mp4
14.83 MB
01 Getting Started/006 Reversing Tools - Part 2.mp4
18.4 MB
01 Getting Started/007 Reversing Tools - Part 3.mp4
14.84 MB
01 Getting Started/008 Reversing Tools - Part 4.mp4
11.73 MB
01 Getting Started/009 Reversing Tools - Part 5.mp4
14.69 MB
01 Getting Started/010 Reversing Tools - Part 6.mp4
13.59 MB
01 Getting Started/011 How To Access Your Working Files.mp4
14.7 MB
01 Getting Started/attached_files/001 Important - Download These First - Working Files/Reverse-Engineering-And-Exploit-Development-Working-Files.zip
49.78 KB
01 Getting Started/attached_files/001 Important - Download These First - Working Files/Reverse-Engineering-And-Exploit-Development-Working-Files/Reverse Engineering and Exploit Development - Working Files/Chapter 1/No Work Files.rtf
346 B
01 Getting Started/attached_files/001 Important - Download These First - Working Files/Reverse-Engineering-And-Exploit-Development-Working-Files/Reverse Engineering and Exploit Development - Working Files/Chapter 10/No Work Files.rtf
346 B
01 Getting Started/attached_files/001 Important - Download These First - Working Files/Reverse-Engineering-And-Exploit-Development-Working-Files/Reverse Engineering and Exploit Development - Working Files/Chapter 11/No Work Files.rtf
346 B
01 Getting Started/attached_files/001 Important - Download These First - Working Files/Reverse-Engineering-And-Exploit-Development-Working-Files/Reverse Engineering and Exploit Development - Working Files/Chapter 12/No Work Files.rtf
346 B
01 Getting Started/attached_files/001 Important - Download These First - Working Files/Reverse-Engineering-And-Exploit-Development-Working-Files/Reverse Engineering and Exploit Development - Working Files/Chapter 2/BufferOverflow.exe
15.18 KB
01 Getting Started/attached_files/001 Important - Download These First - Working Files/Reverse-Engineering-And-Exploit-Development-Working-Files/Reverse Engineering and Exploit Development - Working Files/Chapter 2/check.sh
216 B
01 Getting Started/attached_files/001 Important - Download These First - Working Files/Reverse-Engineering-And-Exploit-Development-Working-Files/Reverse Engineering and Exploit Development - Working Files/Chapter 2/format-string.zip
5.02 KB
01 Getting Started/attached_files/001 Important - Download These First - Working Files/Reverse-Engineering-And-Exploit-Development-Working-Files/Reverse Engineering and Exploit Development - Working Files/Chapter 2/formatstring.c
258 B
01 Getting Started/attached_files/001 Important - Download These First - Working Files/Reverse-Engineering-And-Exploit-Development-Working-Files/Reverse Engineering and Exploit Development - Working Files/Chapter 2/fuzz.pl
421 B
01 Getting Started/attached_files/001 Important - Download These First - Working Files/Reverse-Engineering-And-Exploit-Development-Working-Files/Reverse Engineering and Exploit Development - Working Files/Chapter 2/fuzz.py
602 B
01 Getting Started/attached_files/001 Important - Download These First - Working Files/Reverse-Engineering-And-Exploit-Development-Working-Files/Reverse Engineering and Exploit Development - Working Files/Chapter 2/heap-overflows.zip
14.58 KB
01 Getting Started/attached_files/001 Important - Download These First - Working Files/Reverse-Engineering-And-Exploit-Development-Working-Files/Reverse Engineering and Exploit Development - Working Files/Chapter 2/heapbufferoverflow.c
212 B
01 Getting Started/attached_files/001 Important - Download These First - Working Files/Reverse-Engineering-And-Exploit-Development-Working-Files/Reverse Engineering and Exploit Development - Working Files/Chapter 2/stack-buffer-overflows.zip
5.25 KB
01 Getting Started/attached_files/001 Important - Download These First - Working Files/Reverse-Engineering-And-Exploit-Development-Working-Files/Reverse Engineering and Exploit Development - Working Files/Chapter 2/stackbufferoverflow.c
290 B
01 Getting Started/attached_files/001 Important - Download These First - Working Files/Reverse-Engineering-And-Exploit-Development-Working-Files/Reverse Engineering and Exploit Development - Working Files/Chapter 3/mac-heap.c
1016 B
01 Getting Started/attached_files/001 Important - Download These First - Working Files/Reverse-Engineering-And-Exploit-Development-Working-Files/Reverse Engineering and Exploit Development - Working Files/Chapter 3/mac-stack.c
157 B
01 Getting Started/attached_files/001 Important - Download These First - Working Files/Reverse-Engineering-And-Exploit-Development-Working-Files/Reverse Engineering and Exploit Development - Working Files/Chapter 4/linux-heap-not-vuln.c
169 B
01 Getting Started/attached_files/001 Important - Download These First - Working Files/Reverse-Engineering-And-Exploit-Development-Working-Files/Reverse Engineering and Exploit Development - Working Files/Chapter 4/linux-heap.c
335 B
01 Getting Started/attached_files/001 Important - Download These First - Working Files/Reverse-Engineering-And-Exploit-Development-Working-Files/Reverse Engineering and Exploit Development - Working Files/Chapter 4/linux-stack-fptr.c
365 B
01 Getting Started/attached_files/001 Important - Download These First - Working Files/Reverse-Engineering-And-Exploit-Development-Working-Files/Reverse Engineering and Exploit Development - Working Files/Chapter 4/linux-stack.c
210 B
01 Getting Started/attached_files/001 Important - Download These First - Working Files/Reverse-Engineering-And-Exploit-Development-Working-Files/Reverse Engineering and Exploit Development - Working Files/Chapter 4/simple.asm
753 B
01 Getting Started/attached_files/001 Important - Download These First - Working Files/Reverse-Engineering-And-Exploit-Development-Working-Files/Reverse Engineering and Exploit Development - Working Files/Chapter 4/simple32.asm
747 B
01 Getting Started/attached_files/001 Important - Download These First - Working Files/Reverse-Engineering-And-Exploit-Development-Working-Files/Reverse Engineering and Exploit Development - Working Files/Chapter 5/No Work Files.rtf
346 B
01 Getting Started/attached_files/001 Important - Download These First - Working Files/Reverse-Engineering-And-Exploit-Development-Working-Files/Reverse Engineering and Exploit Development - Working Files/Chapter 6/No Work Files.rtf
346 B
01 Getting Started/attached_files/001 Important - Download These First - Working Files/Reverse-Engineering-And-Exploit-Development-Working-Files/Reverse Engineering and Exploit Development - Working Files/Chapter 7/vulnserver.rb
2.02 KB
01 Getting Started/attached_files/001 Important - Download These First - Working Files/Reverse-Engineering-And-Exploit-Development-Working-Files/Reverse Engineering and Exploit Development - Working Files/Chapter 8/shellcode.zip
2.71 KB
01 Getting Started/attached_files/001 Important - Download These First - Working Files/Reverse-Engineering-And-Exploit-Development-Working-Files/Reverse Engineering and Exploit Development - Working Files/Chapter 9/enc.sh
398 B
01 Getting Started/attached_files/001 Important - Download These First - Working Files/Reverse-Engineering-And-Exploit-Development-Working-Files/Reverse Engineering and Exploit Development - Working Files/Chapter 9/sc.sh
512 B
01 Getting Started/attached_files/001 Important - Download These First - Working Files/Reverse-Engineering-And-Exploit-Development-Working-Files/Reverse Engineering and Exploit Development - Working Files/Working Files - README.txt
256 B
02 Reversing Compiled Windows Applications/012 Vulnerabilities - Part 1.mp4
9.04 MB
02 Reversing Compiled Windows Applications/013 Vulnerabilities - Part 2.mp4
9.39 MB
02 Reversing Compiled Windows Applications/014 Vulnerabilities - Part 3.mp4
8.11 MB
02 Reversing Compiled Windows Applications/015 Using Fuzzing - Part 1.mp4
11.84 MB
02 Reversing Compiled Windows Applications/016 Using Fuzzing - Part 2.mp4
9.15 MB
02 Reversing Compiled Windows Applications/017 Using Fuzzing - Part 3.mp4
75.39 MB
02 Reversing Compiled Windows Applications/018 Using Fuzzing - Part 4.mp4
15.24 MB
02 Reversing Compiled Windows Applications/019 Just Enough Assembly - Part 1.mp4
21.42 MB
02 Reversing Compiled Windows Applications/020 Just Enough Assembly - Part 2.mp4
32.32 MB
02 Reversing Compiled Windows Applications/021 Just Enough Assembly - Part 3.mp4
19.27 MB
02 Reversing Compiled Windows Applications/022 Stack Overflows - Part 1.mp4
6.17 MB
02 Reversing Compiled Windows Applications/023 Stack Overflows - Part 2.mp4
9.06 MB
02 Reversing Compiled Windows Applications/024 Stack Overflows - Part 3.mp4
33.81 MB
02 Reversing Compiled Windows Applications/025 Heap Overflows - Part 1.mp4
6.9 MB
02 Reversing Compiled Windows Applications/026 Heap Overflows - Part 2.mp4
31.58 MB
02 Reversing Compiled Windows Applications/027 Heap Overflows - Part 3.mp4
6.94 MB
02 Reversing Compiled Windows Applications/028 Heap Overflows - Part 4.mp4
39.53 MB
02 Reversing Compiled Windows Applications/029 Format String Bugs - Part 1.mp4
16.1 MB
02 Reversing Compiled Windows Applications/030 Format String Bugs - Part 2.mp4
45.05 MB
02 Reversing Compiled Windows Applications/031 Format String Bugs - Part 3.mp4
48.46 MB
02 Reversing Compiled Windows Applications/032 Format String Bugs - Part 4.mp4
7.09 MB
02 Reversing Compiled Windows Applications/033 Section Overflows.mp4
36.15 MB
02 Reversing Compiled Windows Applications/034 Windows Kernel Flaws.mp4
4.93 MB
02 Reversing Compiled Windows Applications/035 Decompilers.mp4
18 MB
02 Reversing Compiled Windows Applications/036 Automation - Part 1.mp4
12.26 MB
02 Reversing Compiled Windows Applications/037 Automation - Part 2.mp4
9.91 MB
03 Reversing Compiled OS X Applications/038 Where Are The Vulnerabilities.mp4
1.89 MB
03 Reversing Compiled OS X Applications/039 Locating Stack Overflows.mp4
3.6 MB
03 Reversing Compiled OS X Applications/040 Heap Overflows.mp4
14.83 MB
04 Reversing Compiled Linux Applications/041 Where Are The Vulnerabilities.mp4
4.61 MB
04 Reversing Compiled Linux Applications/042 Linux Stack Overflows - Part 1.mp4
6.58 MB
04 Reversing Compiled Linux Applications/043 Linux Stack Overflows - Part 2.mp4
21.3 MB
04 Reversing Compiled Linux Applications/044 Linux Stack Overflows - Part 3.mp4
26.79 MB
04 Reversing Compiled Linux Applications/045 Linux Stack Overflows - Part 4.mp4
27.54 MB
04 Reversing Compiled Linux Applications/046 Linux Stack Overflows - Part 5.mp4
25.83 MB
04 Reversing Compiled Linux Applications/047 Linux Heap Overflows - Part 1.mp4
27.57 MB
04 Reversing Compiled Linux Applications/048 Linux Heap Overflows - Part 2.mp4
25.53 MB
04 Reversing Compiled Linux Applications/049 Linux Heap Overflows - Part 3.mp4
35.49 MB
04 Reversing Compiled Linux Applications/050 Linux Heap Overflows - Part 4.mp4
25.31 MB
04 Reversing Compiled Linux Applications/051 Linux Kernel Flaws - Part 1.mp4
10.09 MB
04 Reversing Compiled Linux Applications/052 Linux Kernel Flaws - Part 2.mp4
5.1 MB
05 Reversing Android Applications/053 Introduction To Android And ARM.mp4
6.24 MB
05 Reversing Android Applications/054 Android Applications.mp4
8.33 MB
06 Finding Other Vulnerabilities/055 Web Site Vulnerabilities.mp4
7.65 MB
06 Finding Other Vulnerabilities/056 Database Vulnerabilities.mp4
13.46 MB
07 Simple Exploits/057 Going From Vulnerability To Exploit.mp4
6.97 MB
07 Simple Exploits/058 A Simple Exploit Script.mp4
21.71 MB
07 Simple Exploits/059 Creating A Metasploit Module For An Exploit - Part 1.mp4
13.25 MB
07 Simple Exploits/060 Creating A Metasploit Module For An Exploit - Part 2.mp4
18.36 MB
07 Simple Exploits/061 Creating A Metasploit Module For An Exploit - Part 3.mp4
27.46 MB
08 Exploit Payloads/062 Shellcode - Part 1.mp4
9.78 MB
08 Exploit Payloads/063 Shellcode - Part 2.mp4
10.83 MB
08 Exploit Payloads/064 Shellcode - Part 3.mp4
14.51 MB
08 Exploit Payloads/065 Shellcode - Part 4.mp4
12.26 MB
09 Making Exploits Harder To Detect/066 Encoding Shellcode - Part 1.mp4
16.35 MB
09 Making Exploits Harder To Detect/067 Encoding Shellcode - Part 2.mp4
18.28 MB
10 Web Exploitation/068 Web Exploits In Metasploit.mp4
16.75 MB
11 ARM Exploitation/069 Android Exploits In Metasploit.mp4
12.84 MB
12 Future Directions/070 Wrap Up And Suggestions For Further Study.mp4
6.09 MB

免责声明

本网站仅提供DHT网络磁力资源索引服务,不存储任何资源文件。所有资源均来自DHT网络,本站无法控制其内容。请遵守当地法律法规,合理使用网络资源。如涉及版权问题,请联系 lulutang@protonmail.com。