BITCQ

Reverse Engineering and Exploit Development

Size: 1.1 GB
Magnet link

Name Size
Reverse Engineering and Exploit Development/02 Reversing Compiled Windows Applications/017 Using Fuzzing - Part 3.mp4 75.4 MB
Reverse Engineering and Exploit Development/01 Getting Started/001 Important - Download These First - Working Files.html 373 B
Reverse Engineering and Exploit Development/01 Getting Started/002 Introduction To Reversing.mp4 6.5 MB
Reverse Engineering and Exploit Development/01 Getting Started/003 About The Author.mp4 4.7 MB
Reverse Engineering and Exploit Development/01 Getting Started/004 Ethical Considerations.mp4 2.8 MB
Reverse Engineering and Exploit Development/01 Getting Started/005 Reversing Tools - Part 1.mp4 14.8 MB
Reverse Engineering and Exploit Development/01 Getting Started/006 Reversing Tools - Part 2.mp4 18.4 MB
Reverse Engineering and Exploit Development/01 Getting Started/007 Reversing Tools - Part 3.mp4 14.8 MB
Reverse Engineering and Exploit Development/01 Getting Started/008 Reversing Tools - Part 4.mp4 11.7 MB
Reverse Engineering and Exploit Development/01 Getting Started/009 Reversing Tools - Part 5.mp4 14.7 MB
Reverse Engineering and Exploit Development/01 Getting Started/010 Reversing Tools - Part 6.mp4 13.6 MB
Reverse Engineering and Exploit Development/01 Getting Started/011 How To Access Your Working Files.mp4 14.7 MB
Reverse Engineering and Exploit Development/02 Reversing Compiled Windows Applications/012 Vulnerabilities - Part 1.mp4 9 MB
Reverse Engineering and Exploit Development/02 Reversing Compiled Windows Applications/013 Vulnerabilities - Part 2.mp4 9.4 MB
Reverse Engineering and Exploit Development/02 Reversing Compiled Windows Applications/014 Vulnerabilities - Part 3.mp4 8.1 MB
Reverse Engineering and Exploit Development/02 Reversing Compiled Windows Applications/015 Using Fuzzing - Part 1.mp4 11.8 MB
Reverse Engineering and Exploit Development/02 Reversing Compiled Windows Applications/016 Using Fuzzing - Part 2.mp4 9.1 MB
Reverse Engineering and Exploit Development/01 Getting Started/6 Simple Memory Techniques.html 98 B
Reverse Engineering and Exploit Development/02 Reversing Compiled Windows Applications/018 Using Fuzzing - Part 4.mp4 15.2 MB
Reverse Engineering and Exploit Development/02 Reversing Compiled Windows Applications/019 Just Enough Assembly - Part 1.mp4 21.4 MB
Reverse Engineering and Exploit Development/02 Reversing Compiled Windows Applications/020 Just Enough Assembly - Part 2.mp4 32.3 MB
Reverse Engineering and Exploit Development/02 Reversing Compiled Windows Applications/021 Just Enough Assembly - Part 3.mp4 19.3 MB
Reverse Engineering and Exploit Development/02 Reversing Compiled Windows Applications/022 Stack Overflows - Part 1.mp4 6.2 MB
Reverse Engineering and Exploit Development/02 Reversing Compiled Windows Applications/023 Stack Overflows - Part 2.mp4 9.1 MB
Reverse Engineering and Exploit Development/02 Reversing Compiled Windows Applications/024 Stack Overflows - Part 3.mp4 33.8 MB
Reverse Engineering and Exploit Development/02 Reversing Compiled Windows Applications/025 Heap Overflows - Part 1.mp4 6.9 MB
Reverse Engineering and Exploit Development/02 Reversing Compiled Windows Applications/026 Heap Overflows - Part 2.mp4 31.6 MB
Reverse Engineering and Exploit Development/02 Reversing Compiled Windows Applications/027 Heap Overflows - Part 3.mp4 6.9 MB
Reverse Engineering and Exploit Development/02 Reversing Compiled Windows Applications/028 Heap Overflows - Part 4.mp4 39.5 MB
Reverse Engineering and Exploit Development/02 Reversing Compiled Windows Applications/029 Format String Bugs - Part 1.mp4 16.1 MB
Reverse Engineering and Exploit Development/02 Reversing Compiled Windows Applications/030 Format String Bugs - Part 2.mp4 45.1 MB
Reverse Engineering and Exploit Development/02 Reversing Compiled Windows Applications/031 Format String Bugs - Part 3.mp4 48.5 MB
Reverse Engineering and Exploit Development/02 Reversing Compiled Windows Applications/032 Format String Bugs - Part 4.mp4 7.1 MB
Reverse Engineering and Exploit Development/02 Reversing Compiled Windows Applications/033 Section Overflows.mp4 36.1 MB
Reverse Engineering and Exploit Development/02 Reversing Compiled Windows Applications/034 Windows Kernel Flaws.mp4 4.9 MB
Reverse Engineering and Exploit Development/02 Reversing Compiled Windows Applications/035 Decompilers.mp4 18 MB
Reverse Engineering and Exploit Development/02 Reversing Compiled Windows Applications/036 Automation - Part 1.mp4 12.3 MB
Reverse Engineering and Exploit Development/02 Reversing Compiled Windows Applications/037 Automation - Part 2.mp4 9.9 MB
Reverse Engineering and Exploit Development/03 Reversing Compiled OS X Applications/038 Where Are The Vulnerabilities.mp4 1.9 MB
Reverse Engineering and Exploit Development/03 Reversing Compiled OS X Applications/039 Locating Stack Overflows.mp4 3.6 MB
Reverse Engineering and Exploit Development/03 Reversing Compiled OS X Applications/040 Heap Overflows.mp4 14.8 MB
Reverse Engineering and Exploit Development/04 Reversing Compiled Linux Applications/041 Where Are The Vulnerabilities.mp4 4.6 MB
Reverse Engineering and Exploit Development/04 Reversing Compiled Linux Applications/042 Linux Stack Overflows - Part 1.mp4 6.6 MB
Reverse Engineering and Exploit Development/04 Reversing Compiled Linux Applications/043 Linux Stack Overflows - Part 2.mp4 21.3 MB
Reverse Engineering and Exploit Development/04 Reversing Compiled Linux Applications/044 Linux Stack Overflows - Part 3.mp4 26.8 MB
Reverse Engineering and Exploit Development/04 Reversing Compiled Linux Applications/045 Linux Stack Overflows - Part 4.mp4 27.5 MB
Reverse Engineering and Exploit Development/04 Reversing Compiled Linux Applications/046 Linux Stack Overflows - Part 5.mp4 25.8 MB
Reverse Engineering and Exploit Development/04 Reversing Compiled Linux Applications/047 Linux Heap Overflows - Part 1.mp4 27.6 MB
Reverse Engineering and Exploit Development/04 Reversing Compiled Linux Applications/048 Linux Heap Overflows - Part 2.mp4 25.5 MB
Reverse Engineering and Exploit Development/04 Reversing Compiled Linux Applications/049 Linux Heap Overflows - Part 3.mp4 35.5 MB
Reverse Engineering and Exploit Development/04 Reversing Compiled Linux Applications/050 Linux Heap Overflows - Part 4.mp4 25.3 MB
Reverse Engineering and Exploit Development/04 Reversing Compiled Linux Applications/051 Linux Kernel Flaws - Part 1.mp4 10.1 MB
Reverse Engineering and Exploit Development/04 Reversing Compiled Linux Applications/052 Linux Kernel Flaws - Part 2.mp4 5.1 MB
Reverse Engineering and Exploit Development/04 Reversing Compiled Linux Applications/Learn How to Use Linux, Linux Mint Cinnamon 20 Bootable 8GB USB Flash Drive.html 84 B
Reverse Engineering and Exploit Development/04 Reversing Compiled Linux Applications/Linux Tails Operating System.html 84 B
Reverse Engineering and Exploit Development/05 Reversing Android Applications/053 Introduction To Android And ARM.mp4 6.2 MB
Reverse Engineering and Exploit Development/05 Reversing Android Applications/054 Android Applications.mp4 8.3 MB
Reverse Engineering and Exploit Development/06 Finding Other Vulnerabilities/055 Web Site Vulnerabilities.mp4 7.6 MB
Reverse Engineering and Exploit Development/06 Finding Other Vulnerabilities/056 Database Vulnerabilities.mp4 13.5 MB
Reverse Engineering and Exploit Development/07 Simple Exploits/057 Going From Vulnerability To Exploit.mp4 7 MB
Reverse Engineering and Exploit Development/07 Simple Exploits/058 A Simple Exploit Script.mp4 21.7 MB
Reverse Engineering and Exploit Development/07 Simple Exploits/059 Creating A Metasploit Module For An Exploit - Part 1.mp4 13.2 MB
Reverse Engineering and Exploit Development/07 Simple Exploits/060 Creating A Metasploit Module For An Exploit - Part 2.mp4 18.4 MB
Reverse Engineering and Exploit Development/07 Simple Exploits/061 Creating A Metasploit Module For An Exploit - Part 3.mp4 27.5 MB
Reverse Engineering and Exploit Development/08 Exploit Payloads/062 Shellcode - Part 1.mp4 9.8 MB
Reverse Engineering and Exploit Development/08 Exploit Payloads/063 Shellcode - Part 2.mp4 10.8 MB
Reverse Engineering and Exploit Development/08 Exploit Payloads/064 Shellcode - Part 3.mp4 14.5 MB
Reverse Engineering and Exploit Development/08 Exploit Payloads/065 Shellcode - Part 4.mp4 12.3 MB
Reverse Engineering and Exploit Development/08 Exploit Payloads/digispark usb device.html 84 B
Reverse Engineering and Exploit Development/08 Exploit Payloads/USB Rubber Ducky Deluxe.html 84 B
Reverse Engineering and Exploit Development/09 Making Exploits Harder To Detect/066 Encoding Shellcode - Part 1.mp4 16.4 MB
Reverse Engineering and Exploit Development/09 Making Exploits Harder To Detect/067 Encoding Shellcode - Part 2.mp4 18.3 MB
Reverse Engineering and Exploit Development/10 Web Exploitation/068 Web Exploits In Metasploit.mp4 16.8 MB
Reverse Engineering and Exploit Development/11 ARM Exploitation/069 Android Exploits In Metasploit.mp4 12.8 MB
Reverse Engineering and Exploit Development/11 ARM Exploitation/LIFX 1100-Lumen.html 84 B
Reverse Engineering and Exploit Development/12 Future Directions/070 Wrap Up And Suggestions For Further Study.mp4 6.1 MB
Reverse Engineering and Exploit Development/12 Future Directions/Seagate Expansion Desktop 10TB External Hard Drive HDD - USB 3.0.html 84 B
Name
udp://tracker.coppersurfer.tk:6969/announce
udp://tracker.open-internet.nl:6969/announce
udp://tracker.leechers-paradise.org:6969/announce
udp://exodus.desync.com:6969/announce
udp://tracker.internetwarriors.net:1337/announce
udp://tracker.opentrackr.org:1337/announce
udp://9.rarbg.to:2710/announce
udp://9.rarbg.me:2710/announce
http://tracker3.itzmx.com:6961/announce
http://tracker1.itzmx.com:8080/announce
udp://thetracker.org:80/announce
udp://open.demonii.si:1337/announce
udp://bt.xxx-tracker.com:2710/announce
udp://tracker.torrent.eu.org:451/announce
udp://tracker.cyberia.is:6969/announce
udp://tracker.tiny-vps.com:6969/announce
udp://denis.stalker.upeer.me:6969/announce
http://open.acgnxtracker.com:80/announce
udp://ipv4.tracker.harry.lu:80/announce
udp://explodie.org:6969/announce
udp://tracker.opentrackr.org:1337/announce
udp://tracker.zer0day.to:1337/announce
udp://tracker.coppersurfer.tk:6969/announce
udp://tracker.leechers-paradise.org:6969/announce
udp://tracker.internetwarriors.net:1337/announce
udp://mgtracker.org:6969/announce
udp://explodie.org:6969/announce
Name Size Peers
Selander D. Advanced Apple Debugging and Reverse Engineering...3ed 2019 PDF Application 138 MB 5
Advanced Apple Debugging and Reverse Engineering by Derek Selander EPUB Ebook 81.1 MB 3
Gray Hat Python - Python Programming for Hackers and Reverse Engineers By Justin Seitz Application 3 MB 19
Reverse Engineering and Exploit Development Video 1.1 GB 33
[ FreeCourseWeb.com ] Udemy - Expert Malware Analysis and Reverse Engineering.zip Application 2.9 GB 40
[ FreeCourseWeb.com ] Udemy - Reverse engineering Android and IOS Apps - A practical guide.zip Application 638.8 MB 31
[ FreeCourseWeb.com ] Udemy - Reverse Engineering and Software Protection.zip Application 1.3 GB 24
[ FreeCourseWeb.com ] Functional Reverse Engineering of Machine Tools (Computers in Engineering Design and Manufacturing).zip Application 11.6 MB 19
Gray Hat Python - Python Programming for Hackers and Reverse Engineers Application 3.1 MB 8
InfinteSkills - Reverse Engineering and Exploit Development Video 1.4 GB 7
[ FreeCourseWeb.com ] Rubber Analysis - Characterisation, Failure Diagnosis and Reverse Engineering.zip Application 10.3 MB 7
reverse-engineering-and-exploit-development Video 1.1 GB 6
Syngress - Sockets, Shellcode, Porting & Coding - Reverse Engineering Exploits And Tool Coding For Security Professionals.pdf Application 112.3 MB 5
Reverse Engineering Questions and Answers 22 MB 4
Syngress - Sockets, Shellcode, Porting & Coding - Reverse Engineering Exploits And Tool Coding For Security Professionals.pdf Application 112.3 MB 4
Gray Hat Python - Python Programming for Hackers and Reverse Engineers Application 7.1 MB 3
[FreeTutorials.us] reverse-engineering-and-exploit-development Video 1.1 GB 2
Red Hat Linux Networking And System Administration (2002).pdf Reversing - Secrets Of Reverse Engineering (2005).pdf Application 16.2 MB 2
Covert Java Techniques for Decompiling, Patching, and Reverse Engineering~SANDY~ Application 3.8 MB 2
Covert Java Techniques for Decompiling, Patching,and Reverse Engineering.pdf O'Reilly - Essential SNMP.chm Application 5.2 MB 2

Loading...