Y Technologies and Development, LLC

Links

Y technologies and development, llc

Y tech

Boulder, Colorado


At Y tech our approach and philosophy is based within a culture of inventiveness.

Y tech's Library of Reference Documents and Other Information

Library Index

2.6-Hacking

2.6-Hacking-The Art of Exploitation.pdf
2.6-The Ultimate Anti-Debugging Reference.pdf
2.6-TheIDAProBook.pdf
2.6-Unix Assembly Codes Development for Vulnerabilities.pdf
2.6-Understanding SEH Exploitation.pdf
2.6-Fuzzing-Grammar-based Whitebox Fuzzing.pdf
2.6-Fuzzing Making Software Dumber.pdf
2.6-ROPdefender-A Detection Tool to Defend Against ROP Attacks.pdf
2.6-OpenBSD Remote Exploiting.pdf
2.6-RuntimeAttacks.pdf
2.6-ASLR-Address Space Layout Randomization.pdf
2.6-Return-oriented Programming without Returns (on the x86).pdf
2.6-WinDbg_A_to_Z_color.pdf
2.6-A Buffer Overflow Study Attacks - Defenses.pdf
2.6-Attacking the Windows Kernel.pdf
2.6-Exploiting Format String Vulnerabilities.pdf
2.6-Generic Anti Exploitation Technology for Windows.pdf
2.6-DEPinDepth.pdf
2.6-Stack Based Buffer Overflows and Protection Mechanisms.pdf


Library Index