The Web Application Hackers Handbook - Discovering and Exploiting Security Flaws11.24 MB
Creat Time: 2016-01-20 16:37:52
Active Degree: 36
Last Active: 2016-11-14 02:47:17
File Size: 11.24 MB
PentesterAcademy Exploiting Simple Buffer Overflows on Win324.00 GB
Creat Time: 2016-01-12 23:33:16
Active Degree: 297
Last Active: 2024-08-02 05:10:00
File Size: 4.00 GB
Exploiting Bacteriophages to Tackle Clostridium difficile Infection.pdf4.00 MB
Creat Time: 2016-01-05 04:20:31
Active Degree: 30
Last Active: 2016-11-13 19:45:33
File Size: 4.00 MB
$$$ by exploiting Youtube.pdf1.37 MB
Creat Time: 2015-12-05 00:10:26
Active Degree: 28
Last Active: 2016-03-14 22:27:15
File Size: 1.37 MB
I Know Where you are and What You are Sharing - Exploiting P2P communications to invade users' privacy.pdf6.24 MB
Creat Time: 2015-11-02 22:20:48
Active Degree: 72
Last Active: 2024-06-14 05:44:16
File Size: 6.24 MB
[from SCRATCH] The Maid Lady Is Exploiting Me (Touhou Project) [ENG] [Troika]8.03 MB
Creat Time: 2015-10-20 06:06:22
Active Degree: 49
Last Active: 2024-11-22 19:28:20
File Size: 8.03 MB
The Shellcoder's Handbook - Discovering And Exploiting Security Holes (2004) - allbooksfree.tk2.15 MB
Creat Time: 2015-09-26 01:07:57
Active Degree: 52
Last Active: 2024-10-05 22:53:00
File Size: 2.15 MB
The Web Application Hackers Handbook - Discovering and Exploiting Security Flaws~tqw~_darksiderg10.97 MB
Creat Time: 2015-09-04 11:18:07
Active Degree: 112
Last Active: 2024-08-01 23:17:57
File Size: 10.97 MB
Exploiting Software - How To Break Code7.59 MB
Creat Time: 2015-08-24 19:36:57
Active Degree: 45
Last Active: 2024-11-10 13:50:13
File Size: 7.59 MB
[from SCRATCH] The Maid Lady Is Exploiting Me (Touhou Project) [ENG] [Troika].zip46.81 MB
Creat Time: 2015-08-20 23:41:07
Active Degree: 5
Last Active: 2016-05-06 14:11:35
File Size: 46.81 MB