课程
站点
文章
书籍
Intro to Computer Systems, Summer 2017arrow-up-right
Modern Binary Exploitation Spring 2015arrow-up-right
OpenSecurityTrainingarrow-up-right
Stanford Computer Security Laboratoryarrow-up-right
CS642 Fall 2014: Computer Securityarrow-up-right
Offensive Computer Security Spring 2014arrow-up-right
System Security and Binary Code Analysisarrow-up-right
SATSMT Summer School 2011arrow-up-right
CS 161 : Computer Security Spring 2017arrow-up-right
Introduction to Computer Security Fall 2015arrow-up-right
格式化字符串blind pwn详细教程arrow-up-right
软件分析技术arrow-up-right
Compiler Designarrow-up-right
Optimizing Compilersarrow-up-right
Principles of Program Analysisarrow-up-right
Static Program Analysisarrow-up-right
CS 252r: Advanced Topics in Programming Languagesarrow-up-right
Advanced Digital Forensics and Data Reverse Engineeringarrow-up-right
CS261: Security in Computer Systemsarrow-up-right
CS 161 : Computer Security Spring 2015arrow-up-right
Secure Software Systems Spring 2017arrow-up-right
CS 576 Secure Systems Fall 2014arrow-up-right
CS 577 Cybersecurity Lab Fall 2014arrow-up-right
sec-wikiarrow-up-right
Shellcodes database for study casesarrow-up-right
Corelan Team Articlesarrow-up-right
LOW-LEVEL ATTACKS AND DEFENSESarrow-up-right
FuzzySecurityarrow-up-right
LiveOverflowarrow-up-right
Debugging Fundamentals for Exploit Developmentarrow-up-right
Introduction to return oriented programming (ROP)arrow-up-right
Smashing The Stack For Fun And Profitarrow-up-right
Understanding DEP as a mitigation technology part 1arrow-up-right
Tricks for Exploit Developmentarrow-up-right
Preventing the Exploitation of Structured Exception Handler (SEH) Overwrites with SEHOParrow-up-right
From 0x90 to 0x4c454554, a journey into exploitation.arrow-up-right
Checking the boundaries of static analysisarrow-up-right
Deep Wizardry: Stack Unwindingarrow-up-right
Linux (x86) Exploit Development Seriesarrow-up-right
Hack The Virtual Memoryarrow-up-right
Hacking: The Art of Exploitation, 2nd Edition by Jon Ericksonarrow-up-right
The Shellcoder's Handbook: Discovering and Exploiting Security Holes, 2nd Edition by Chris Anley et alarrow-up-right
The IDA Pro Book: The Unofficial Guide to the World's Most Popular Disassembler 2nd Editionarrow-up-right
Practical Malware Analysis by Michael Sikorski and Andrew Honigarrow-up-right
Practical Reverse Engineering by Dang, Gazet, Bachaalanyarrow-up-right
Fuzzing: Brute Force Vulnerability Discoveryarrow-up-right
Last updated 4 years ago