Index of /repositories/www.lepointdeau.fr/


../
CONF SLIDES AND PAPER/                             27-Feb-2017 15:30       -
LIVRES/                                            27-Feb-2017 14:21       -
1510.07563.pdf                                     13-Oct-2016 22:50      6M
1510.07563v1.pdf                                   13-Oct-2016 22:53      6M
1604.06964.pdf                                     13-Oct-2016 22:50    309K
2-The Shellcoder's Handbook.pdf                    26-Jul-2016 16:21      9M
24-DEADLY-SINS-OF-SOFTWARE-SECURITY-2010.pdf       12-Jun-2016 23:48      3M
781.pdf                                            12-Jun-2016 23:33      7M
A Bug Hunter's Diary - Tobias Klein.pdf            12-Jun-2016 23:35      5M
A Journey to the Center of the Rustock.B Rootki..> 12-Jun-2016 23:36      5M
ANDROID.pdf                                        16-Sep-2016 15:37      2M
ART OF EXPLOITATION, 2nd Edition.pdf               28-Jun-2015 21:35      5M
AST2012.pdf                                        13-Oct-2016 22:50    405K
Acquisition de preuves et analyse a froid d un ..> 12-Jun-2016 23:52      2M
Advanced.Bootkit.Techniques.On.Android.pdf         12-Jun-2016 23:36      7M
Aide-memoire administrateur Linux.pdf              13-Jun-2016 15:04     74K
Android Hacker's Handbook.pdf                      12-Jun-2016 23:56      9M
Antivirus hackers handbook.pdf                     13-Jun-2016 00:13      6M
Apress.Cryptography.In.C.And.C.Plus.Plus.2nd.Ed..> 28-Jan-2017 02:26      3M
Assembly Language Step-By-Step - Programming wi..> 30-Jul-2016 21:10      6M
AttackingAndDefendingBIOS-RECon2015.pdf            22-Jul-2015 00:04      2M
BH_US_12_Brossard_Backdoor_Hacking_Slides.pdf      09-Aug-2015 09:02      2M
BP.New.Feb2016.ISBN.097528388X.pdf                 28-Jan-2017 02:28      3M
BlackHat_DC_2011_Perez-Pico_Mobile_Attacks-Slid..> 13-Oct-2016 22:50      2M
BlackHat_DC_2011_Perez-Pico_Mobile_Attacks-wp.pdf  25-Sep-2016 13:17      1M
Buffer Overflow Attacks on Linux Principles Ana..> 12-Jun-2016 23:36     56K
Bypassing DEP with WPM & ROP.pdf                   12-Jun-2016 23:37    334K
Bypassing Stack Cookies, SafeSeh, HW DEP and AS..> 13-Jun-2016 00:01      3M
CONFidence2009_bernardo_damele_guido_landi.pdf     19-Jul-2016 21:56    745K
CRC.Press.Crypto.Nov.2014.ISBN.1482228890.pdf      28-Jan-2017 02:19      2M
CRC.Press.Cyber.Mar.2016.ISBN.1498734731.pdf       28-Jan-2017 02:38      6M
Cahier de maths 2de - _dition 2013.PDF             23-Jan-2017 16:33     19M
Catalogue de stages CGI Business Consulting Sec..> 21-Oct-2016 10:01    902K
Computer Forensics, Investigating Data and Imag..> 28-Jun-2015 23:43     15M
Computer Forensics_ Investigating Networ - EC-C..> 28-Jun-2015 23:45     24M
Creating code obfuscation Virtual Machines.pdf     13-Jun-2016 00:39    612K
D1T3 LABS - Anto Joseph - Droid-FF.pdf             10-Oct-2016 10:01     30M
D2T2 - D. Mende & Enno Rey - Attacking 3G and 4..> 13-Oct-2016 22:50      2M
DEFCON-24-Arnaud-Soullie-Workshop-Pentesting-IC..> 01-Feb-2017 21:08      4M
DEFCON-24-Hendrik-Schmidt-Brian-Butter-Attackin..> 13-Oct-2016 22:50      2M
DEFCON-24-Mike-Rich-Use-Their-Machines-Against-..> 01-Feb-2017 21:09      2M
Data Structures Using C, 2nd edition.pdf           30-Jul-2016 21:09     18M
Deobfuscation of Virtualization-Obfuscated Soft..> 13-Jun-2016 00:39    192K
Deserialization -  What Could Go Wrong.pdf         02-Feb-2017 21:18      1M
Detecting and Removing Web Application Vulnerab..> 14-Aug-2016 21:25      1M
Developpement avance d un rootkit pour les modu..> 13-Jun-2016 14:46    971K
EN - Hacking Blind - BROP - Bittau.pdf             06-Dec-2016 12:31    471K
EN - Stack Bug - Stack Overflow ASLR bypass usi..> 04-Dec-2016 17:17    762K
EN-SAP Penetration testing_Black-H_Europe.pdf      12-Jun-2016 23:54      3M
Exploring the Blackhole Exploit Kit.pdf            13-Jun-2016 00:24    534K
File_Format_Fuzzing_in_Android_-Alexandru_Bland..> 10-Oct-2016 09:45    605K
Firstov - Attacking MongoDB.pdf                    12-Feb-2017 22:10      2M
Forristal_Hardware_Involved_Software_Attacks.pdf   09-Aug-2015 08:57      1M
Fuzzing  Brute Force Vulnerability Discovery.pdf   21-Jun-2015 14:33     56M
Fuzzing Brute Force Vulnerability Discovery.pdf    17-Feb-2017 02:20     28M
Fuzzing for Software Security Testing and Quali..> 21-Jun-2015 14:28      4M
GLIBCGhostVulnExploit.pdf                          10-Jul-2015 09:51    497K
GregorioCours3eme.pdf                              23-Jan-2017 16:29      4M
Guide_to_Assembly_Language_Programming_in_Linux..> 30-Jul-2016 21:10     31M
Hacking Exposed - Linux 3rd Edition.pdf            30-Jul-2016 21:10     10M
Hacking Exposed Mobile Security Secrets & Solut..> 12-Jun-2016 23:37      6M
Hi GDB, this is python.pdf                         13-Jun-2016 00:37    242K
How To Backdoor Diffie-Hellman.pdf                 17-Jul-2016 12:24      2M
HowManyMillionBIOSWouldYouLikeToInfect_Full2.pdf   09-Aug-2015 09:04     47M
How_Do_I_Crack_Satellite_and_Cable_Pay_TV_slide..> 27-Dec-2016 21:53     29M
IDA L usine a Gaz.pdf                              13-Jun-2016 00:36    532K
IDA Pro Book.pdf                                   29-Jun-2015 00:15      9M
IDA Pro Book_ The Unofficial Guide to the World..> 12-Jun-2016 23:38      8M
Intro Reverse et Patch Android.pdf                 13-Jun-2016 00:36      2M
IntroToCellularSecurity-20140121.pdf               23-Sep-2016 11:20      2M
Introduction aux methodes d.exploitation de fai..> 13-Jun-2016 00:27    132K
Introduction to various file infection techniqu..> 13-Jun-2016 00:18    469K
JMD2015-ECCWS.pdf                                  28-Sep-2016 10:35    836K
Jones.And.Bartlett.Rootkit.2nd.Edition.Mar.2012..> 28-Jan-2017 02:42    106M
La securite des cartes a bande magnetique.pdf      13-Jun-2016 00:32      1M
La topologie des reseaux.pdf                       13-Jun-2016 14:49      1M
Langage C  L essentiel.pdf                         13-Jun-2016 14:48      2M
Le Reseau Industriel - LE BUS CAN.pdf              13-Jun-2016 00:47    433K
Learning Linux Binary Analysis.pdf                 30-Jul-2016 21:09     14M
Les failles Format String.pdf                      13-Jun-2016 00:04    526K
MIPS EXPLOIT TO HACK ROUTEURS.pdf                  04-Jul-2015 17:27      1M
Malware Analyst's Cookbook.pdf                     13-Jun-2016 00:10      9M
Managed Code Rootkits.pdf                          28-Jun-2015 21:21      6M
Media_Fuzzing_defcamp.pdf                          13-Oct-2016 22:50      1M
Memo de la programmation Shell.pdf                 13-Jun-2016 14:50     70K
Multi-stage Binary Code Obfuscation using Impro..> 13-Jun-2016 00:36    485K
My Hash Is My Passport- Understanding Web and M..> 14-Jul-2016 11:17    958K
NorthBit-Metaphor.pdf                              21-Sep-2016 11:06      1M
Optimisation des shellcodes sous Linux.pdf         20-Jul-2016 22:42      2M
Packt.Android.Dec.2013.ISBN.1782167161.pdf         28-Jan-2017 02:25     19M
Packt.Binary.Feb.2016.ISBN.1782167102.pdf          28-Jan-2017 02:31      2M
Packt.Citrix.3rd.Edition.Nov.2015.ISBN.17821751..> 28-Jan-2017 02:48     35M
Packt.GUI.Dec.2015.ISBN.1785283758.pdf             28-Jan-2017 04:59      9M
Packt.RPI.Jan.2015.ISBN.1784396435.pdf             28-Jan-2017 02:28     10M
Pass-the-Hash attacks - Tools and Mitigation.pdf   13-Jun-2016 00:04      2M
Pearson.Secure.2nd.Edition.Oct.2013.ISBN.032182..> 28-Jan-2017 02:26     21M
PenTestIT_Advanced_Training.pdf                    12-Jun-2016 23:40      2M
PenTestMagazine_06_2013.pdf                        12-Jun-2016 23:41      9M
PenTestMagazine_07_2013.pdf                        12-Jun-2016 23:41      9M
PenTestMagazine_08_2013.pdf                        12-Jun-2016 23:41      6M
Pinnacle.Tor.Mar.2016.ISBN.0692674446.pdf          28-Jan-2017 02:34    682K
Practical Malware Analysis.pdf                     06-Jul-2015 23:30      9M
Practical Packet Analysis.pdf                      21-Jun-2012 09:25     16M
Practical Reverse Engineering.pdf                  12-Jun-2016 23:17      5M
Prentice.Hall.Java.6th.Edition.Mar.2015.ISBN.01..> 28-Jan-2017 02:24     11M
Programming in C, 2nd Edition.pdf                  30-Jul-2016 21:08     13M