【资源目录】:

├──0x01 经典栈溢出(上)
| └──经典栈溢出(上).mp4 158.26M
├──0x02 经典栈溢出(下)
| └──经典栈溢出(下).mp4 123.79M
├──0x03 经典栈溢出实例之EasyRM2MP3
| └──经典栈溢出实例之EasyRM2MP3.mp4 190.30M
├──0x04 经典栈溢出实例之DNSTracer
| └──经典栈溢出实例之DNSTracer.mp4 181.30M
├──0x05 探索stack cookie
| └──探索stack cookie.mp4 78.60M
├──0x06 另辟蹊径之覆盖SEH
| └──另辟蹊径之覆盖SEH.mp4 118.05M
├──0x07 一次失败的栈溢出(SEH)之GetGo Download Manager
| └──一次失败的栈溢出(SEH)之GetGo Download Manager.mp4 75.85M
├──0x08 DEP与ASLR简述
| └──DEP与ASLR简述.mp4 85.96M
├──0x09 Linux环境下的ROP(上)
| └──Linux环境下的ROP(上).mp4 144.65M
├──0x0A Linux环境下的ROP(下)
| └──Linux环境下的ROP(下).mp4 144.01M
├──0x0B Linux下ROP练习之r0pbaby[CTF-2015-defcon]
| └──Linux下ROP练习之r0pbaby[CTF-2015-defcon].mp4 109.20M
├──0x0C Windows环境下的ROP(上)
| └──Windows环境下的ROP(上).mp4 169.42M
├──0x0D Windows环境下的ROP(下)
| └──Windows环境下的ROP(下).mp4 151.40M
├──0x0E 探索上古Windows用户堆
| └──探索上古Windows用户堆.mp4 191.84M
├──0x0F 【特别篇】Windows上古-近代堆详述
| └──【特别篇】Windows上古-近代堆详述.mp4 210.56M
├──0x10 近代Windows用户堆的利用基础
| └──近代Windows用户堆的利用基础.mp4 210.32M
├──0x11 【特别篇】深入理解LFH
| └──【特别篇】深入理解LFH.mp4 230.58M
├──0x12 浅析Linux堆内存管理
| └──浅析Linux堆内存管理.mp4 194.17M
├──slides
| ├──DEP & ASLR简述.pptx 1.84M
| ├──Linux环境下的ROP.pptx 2.78M
| ├──Windows环境下的ROP.pptx 1.12M
| ├──近代Windows用户堆的利用基础.pptx 1.01M
| ├──经典栈溢出.pptx 1.64M
| ├──另辟蹊径之覆盖SEH.pptx 1.01M
| ├──浅析Linux堆内存管理.pptx 1.61M
| ├──探索Stack Cookie.pptx 996.17kb
| └──探索上古Windows用户堆.pptx 997.81kb
└──二进制安全(国外)
| └──Binary_Hacking_Course
| | ├──A simple Format String exploit example – bin 0x11-0WvrSfcdq1I.mkv 45.40M
| | ├──Adapting the 32bit exploit to 64bit for format4 – bin 0x27-_lO_rwaK_pY.mkv 25.51M
| | ├──Bruteforce 32bit Stack Cookie. stack0 – part 3 – bin 0x23-KGzHcqJV-QM.mkv 52.31M
| | ├──Buffer Overflows can Redirect Program Execution – bin 0x0D-8QzOC8HfOqU.mkv 25.53M
| | ├──Developing an intuition for binary exploitation – bin 0x20-akCce7vSSfw.mkv 22.59M
| | ├──Doing ret2libc with a Buffer Overflow because of restricted return pointer – bin 0x0F-m17mV24TgwY.mkv 101.51M
| | ├──Explaining Dirty COW local root exploit – CVE-2016-5195-kEsshExn7aE.mkv 46.09M
| | ├──First Exploit! Buffer Overflow with Shellcode – bin 0x0E-HSlhY4Uy8SA.mkv 49.50M
| | ├──First remote root exploit – bin 0x1D-HAN8Qun26cQ.mkv 32.94M
| | ├──First Stack Buffer Overflow to modify Variable – bin 0x0C-T03idxny9jE.mkv 37.03M
| | ├──Format String Exploit and overwrite the Global Offset Table – bin 0x13-t1LH9D5cuK4.mkv 39.60M
| | ├──Global Offset Table (GOT) and Procedure Linkage Table (PLT) – bin 0x12-kUk5pw4w0h4.mkv 68.54M
| | ├──How a CPU works and Introduction to Assembler – bin 0x04-6jSKldt7Eqs.mkv 72.90M
| | ├──Introduction to Linux – Installation and the Terminal – bin 0x01-navuBR4aJSs.mkv 46.18M
| | ├──Linux signals and core dumps – bin 0x1C-_shKdU7mGxs.mkv 42.39M
| | ├──LiveOverflow Channel Introduction and Backstory – bin 0x00-iyAyN3GFM7A.mkv 27.54M
| | ├──Playing around with a Format String vulnerability and ASLR. format0 – bin 0x24-CyazDp-Kkr0.mkv 86.84M
| | ├──Remote format string exploit in syslog() – bin 0x1E-MBz5C9Wa6KM.mkv 75.34M
| | ├──Reverse engineering C programs – bin 0x10-vXWHmucgZW0.mkv 53.65M
| | ├──Reversing and Cracking first simple Program – bin 0x05-VroEiMOJPm8.mkv 98.56M
| | ├──Simple Tools and Techniques for Reversing a binary – bin 0x06-3NTXFUxcKPc.mkv 61.86M
| | ├──Smashing the Stack for Fun and Profit – setuid, ssh and exploit.education – bin 0x0B-Y-4WHf0of6Y.mkv 44.38M
| | ├──Socket programming in python and Integer Overflow – bin 0x1B-d6BU8DWxb3c.mp4 47.54M
| | ├──Stack grooming and 100% reliable exploit for format0 – bin 0x25-AahpiYxKR2c.mkv 26.13M
| | ├──Syscalls, Kernel vs. User Mode and Linux Kernel Source Code – bin 0x09-fLS99zJDHOc.mkv 63.75M
| | ├──TCP Protocol introduction – bin 0x1A-0EHo0HsTKJw.mkv 71.77M
| | ├──The deal with numbers – hexadecimal, binary and decimals – bin 0x0A-mT1V7IL2FHY.mkv 32.37M
| | ├──The Heap – dlmalloc unlink() exploit – bin 0x18-HWhzH–89UQ.mkv 35.64M
| | ├──The Heap – How do use-after-free exploits work – bin 0x16-ZHghwsTRyzQ.mp4 48.57M
| | ├──The Heap – How to exploit a Heap Overflow – bin 0x15-TfJrU95q1J4.mp4 75.50M
| | ├──The Heap – Once upon a free() – bin 0x17-gL45bjQvZSU.mp4 96.48M
| | ├──The Heap – what does malloc() do – bin 0x14-HPDBOhiKaD8.mkv 31.38M
| | ├──Uncrackable Program Finding a Parser Differential in loading ELF – Part 2_2 – bin 0x08-OZvc-c1OLnM.mkv 34.86M
| | ├──Uncrackable Programs Key validation with Algorithm and creating a Keygen – Part 1_2 – bin 0x07-qS4VWL5R_OM.mkv 37.82M
| | ├──Writing a simple Program in C – bin 0x02-JGoUaCmMNpE.mkv 34.05M
| | └──Writing a simple Program in Python – bin 0x03-ajy1PHWYeyQ.mkv 37.66M

本站所有资源版权均属于原作者所有,这里所提供资源均只能用于参考学习用,请勿直接商用。若由于商用引起版权纠纷,一切责任均由使用者承担。更多说明请参考 VIP介绍。

最常见的情况是下载不完整: 可对比下载完压缩包的与网盘上的容量,若小于网盘提示的容量则是这个原因。这是浏览器下载的bug,建议用百度网盘软件或迅雷下载。 若排除这种情况,可在对应资源底部留言,或联络我们。

对于会员专享、整站源码、程序插件、网站模板、网页模版等类型的素材,文章内用于介绍的图片通常并不包含在对应可供下载素材包内。这些相关商业图片需另外购买,且本站不负责(也没有办法)找到出处。 同样地一些字体文件也是这种情况,但部分素材会在素材包内有一份字体下载链接清单。

如果您已经成功付款但是网站没有弹出成功提示,请联系站长提供付款信息为您处理

源码素材属于虚拟商品,具有可复制性,可传播性,一旦授予,不接受任何形式的退款、换货要求。请您在购买获取之前确认好 是您所需要的资源