- DocumentImmuniWeb® Self-Fuzzer Firefox Extensionîncărcat deHigh-Tech Bridge
- DocumentWelcome in the World Wild Webîncărcat deHigh-Tech Bridge
- DocumentThe Sulley Fuzzing Frameworkîncărcat deHigh-Tech Bridge
- DocumentNovell GroupWise Untrusted Pointer Dereferenceîncărcat deHigh-Tech Bridge
- DocumentManipulating Memory for Fun and Profitîncărcat deHigh-Tech Bridge
- DocumentIn-Memory Fuzzing with Javaîncărcat deHigh-Tech Bridge
- DocumentCVE-2012-1535încărcat deHigh-Tech Bridge
- DocumentHow to use PyDbg as a powerful multitasking debuggerîncărcat deHigh-Tech Bridge
- DocumentCVE-2012-1889încărcat deHigh-Tech Bridge
- DocumentCVE 2012-1889 Microsoft XML core services uninitialized memory vulnerabilityîncărcat deHigh-Tech Bridge
- DocumentCyber Crime in Nowadays Businesses - A Real Case Study of Targeted Attackîncărcat deHigh-Tech Bridge
- DocumentInline Hooking Spying Internet Explorer 8.0încărcat deHigh-Tech Bridge
- DocumentFrontal Attacks-from Basic Compromise to Advanced Persistent Threatîncărcat deHigh-Tech Bridge
- DocumentInline Hooking in Windowsîncărcat deHigh-Tech Bridge
- DocumentUserland Hooking in Windowsîncărcat deHigh-Tech Bridge
- DocumentDefeating Data Execution Prevention and Aslr in Windows Xp Sp3încărcat deHigh-Tech Bridge
- DocumentStructured Exception Handler Exploitationîncărcat deHigh-Tech Bridge
- DocumentBecome Fully Aware of the Potential Dangers of Activex Attacksîncărcat deHigh-Tech Bridge
- DocumentClient Side Threats Anatomy of Reverse Trojan Attacksîncărcat deHigh-Tech Bridge