- DocumentFuzzing Brute Force Vulnerability Discoveryuploaded byRoberto
- DocumentCrash Analysisuploaded byRoberto
- DocumentAccess Denied - Code Breakers Guideuploaded byRoberto
- DocumentFuzzing for software vulnerabilitydiscoveryuploaded byRoberto
- DocumentExploiting 9-Win32 shellcoding (by corelanc0d3r)uploaded byRoberto
- DocumentExploiting 8-Win32 Egg Hunting (by corelanc0d3r)uploaded byRoberto
- DocumentExploiting 7-Unicode (by corelanc0d3r)uploaded byRoberto
- DocumentExploiting 6-Bypassing Stack Cookies SafeSeh SEHOP HWDEP ASLR (by corelanc0d3r)uploaded byRoberto
- DocumentExploiting 5-Debugger Modules & Plugins Speedup (by corelanc0d3r)uploaded byRoberto
- DocumentExploiting 4-FromExploit to it Basics by corelanc0d3r)uploaded byRoberto
- DocumentExploiting 3 Writing SEH Based Exploits B (by corelanc0d3r)uploaded byRoberto
- DocumentExploiting 3-Writing SEH Based Exploit (by corelanc0d3r)suploaded byRoberto
- DocumentExploiting 2-Writing Buffer Overflow Exploits (by corelanc0d3r)uploaded byRoberto
- DocumentExploiting 1-Stack Based Overflows (by corelanc0d3r)uploaded byRoberto
- DocumentExploiting 10 Chaining DEP with ROP (by corelanc0d3r)uploaded byRoberto
- DocumentXSS_for_fun_and_profit_SCG09uploaded byRoberto
- DocumentXSS for Fun and Profit SCG09uploaded byRoberto