
Y tech
Boulder, Colorado
Y tech's Library of Reference Documents and Other Information
Library Index2.6-Hacking
2.6-Hacking-The Art of Exploitation.pdf2.6-The Ultimate Anti-Debugging Reference.pdf
2.6-TheIDAProBook.pdf
2.6-Unix Assembly Codes Development for Vulnerabilities.pdf
2.6-Understanding SEH Exploitation.pdf
2.6-Fuzzing-Grammar-based Whitebox Fuzzing.pdf
2.6-Fuzzing Making Software Dumber.pdf
2.6-ROPdefender-A Detection Tool to Defend Against ROP Attacks.pdf
2.6-OpenBSD Remote Exploiting.pdf
2.6-RuntimeAttacks.pdf
2.6-ASLR-Address Space Layout Randomization.pdf
2.6-Return-oriented Programming without Returns (on the x86).pdf
2.6-WinDbg_A_to_Z_color.pdf
2.6-A Buffer Overflow Study Attacks - Defenses.pdf
2.6-Attacking the Windows Kernel.pdf
2.6-Exploiting Format String Vulnerabilities.pdf
2.6-Generic Anti Exploitation Technology for Windows.pdf
2.6-DEPinDepth.pdf
2.6-Stack Based Buffer Overflows and Protection Mechanisms.pdf
Library Index