.:[Ivanlef0u's REPOSITORY]:.



Index of : todo


Name Last modified Size
[DIR] .. -
[DIR] codecave.aspx_fichiers 28-12-2009 3:10 -
[DIR] vista_x64_fichiers 28-12-2009 3:54 -
[FILE] A_Practice_of_Remote_Code_excution_using_cpu_bug - ARGOS passket.pdf 24-02-2010 0:31 596 Ko
[FILE] Attacking-the-Windows-Kernel.pdf 28-12-2009 2:52 290 Ko
[FILE] BH08-AlexIonescu.pdf 28-12-2009 2:53 1535 Ko
[FILE] BH_US_08_Royal_Malware_Analyst's_Blue_Pill_WhitePaper.pdf 28-12-2009 2:53 58 Ko
[FILE] Binary Literacy -- Static -- 6 -- Optimizations.ppt 12-07-2010 19:04 604 Ko
[FILE] BlackHat-DC-09-Krumheuer-Raber-QuietRIATT-Slides.pdf 28-12-2009 3:02 3575 Ko
[FILE] BlackHat-DC-09-Rutkowska-Attacking-Intel-TXT-slides.pdf 28-12-2009 3:07 4289 Ko
[FILE] BlackHat-Japan-08-Murakami-Hypervisor-IPS-whitepaper-en.pdf 28-12-2009 2:53 50 Ko
[FILE] CONFidence2009_moti_joseph.pdf 12-07-2010 19:45 896 Ko
[FILE] D1T2 - Jonathan Brossard - Breaking Virtualization by Switching to Virtual 8086 Mode.pdf 15-10-2010 15:14 2103 Ko
[FILE] D1T2 - Mark Dowd - Attacking Interoperability.pdf 28-12-2009 3:13 4629 Ko
[FILE] D2T2 - Vipin and Nitin Kumar - vbootkit 2.0.pdf 28-12-2009 3:14 1356 Ko
[FILE] D2T3 - Wes Brown - Advanced Malware Analysis Lab.pdf 15-10-2010 15:16 6260 Ko
[FILE] DisasmViewer_01.zip 28-12-2009 3:14 132 Ko
[FILE] EventPairsHandle.pdf 28-12-2009 3:14 100 Ko
[FILE] HS-P005_ReflectiveDllInjection.pdf 28-12-2009 3:21 162 Ko
[FILE] Hacking.The.Art.of.Exploitation.2nd.Edition.chm 28-12-2009 3:16 4785 Ko
[FILE] HeapCacheExploitation.pdf 28-12-2009 2:54 433 Ko
[FILE] HistoryofPackingTechnology.pdf 28-12-2009 2:55 405 Ko
[FILE] HyperVisorMalware.pdf 28-12-2009 2:55 247 Ko
[FILE] INSECURE-Mag-19.pdf 28-12-2009 3:21 9968 Ko
[FILE] Intro_NT_kernel_security_stuff.pdf 28-12-2009 3:22 3044 Ko
[FILE] Kasslin-Florio-VB2008.pdf 28-12-2009 3:24 3169 Ko
[FILE] LILXAM_SEHOP.zip 28-12-2009 3:24 740 Ko
[FILE] Microsoft patches little sister but forgets big brother.pdf 12-07-2010 19:44 760 Ko
[FILE] Microsoft.Press.Hunting.Security.Bugs.chm 28-12-2009 3:33 22881 Ko
[FILE] NX-bit.pdf 24-02-2010 0:31 883 Ko
[FILE] NtSetDebugFilterState.pdf 28-12-2009 3:34 99 Ko
[FILE] One safe hook handler - E8 Method.txt 28-12-2009 2:56 403 Ko
[FILE] Persistent_BIOS_Infection_CanSecWest09.pdf 28-12-2009 3:35 272 Ko
[FILE] SFCList.zip 28-12-2009 3:35 4 Ko
[FILE] Stephen A Ridley - Escaping The Sandbox.pdf 15-10-2010 15:17 3231 Ko
[FILE] Stuxnet_Under_the_Microscope.pdf 15-10-2010 15:35 2103 Ko
[FILE] Syngress.Google.Hacking.for.Penetration.Testers.Volume.2.Nov.2007.pdf 28-12-2009 3:07 15264 Ko
[FILE] The.Web.Application.Hackers.Handbook.pdf 28-12-2009 3:40 11234 Ko
[FILE] Virtualization_Without_Hardware_Final.pdf 28-12-2009 3:40 400 Ko
[FILE] WehnTrustInstaller.msi 28-12-2009 3:51 431 Ko
[FILE] Windows 7 and Windows Server 2008 R2 Kernel Changes.pptx 28-12-2009 3:53 3476 Ko
[FILE] Windows_Via_C_C_.chm 28-12-2009 3:45 3908 Ko
[FILE] Writing secure code (Vista).pdf 28-12-2009 3:51 15843 Ko
[FILE] X86IEE32.rar 28-12-2009 3:51 71 Ko
[FILE] alex.pdf 28-12-2009 2:58 178 Ko
[FILE] bh-usa-07-lindsay.pdf 28-12-2009 2:52 232 Ko
[FILE] bypassing-patchguard.aspx.htm 05-03-2010 13:28 197 Ko
[FILE] ccs09-HookSafe.pdf 28-12-2009 3:07 187 Ko
[FILE] ccs09_siggen.pdf 28-12-2009 3:08 330 Ko
[FILE] chpie_smm_keysniff_ENG.pdf 28-12-2009 3:07 389 Ko
[FILE] chpie_smm_sniff.zip 28-12-2009 3:08 305 Ko
[FILE] codecave.aspx.htm 28-12-2009 3:08 219 Ko
[FILE] cpumemory.pdf 28-12-2009 2:54 912 Ko
[FILE] crackstorage.com.pdf 28-12-2009 3:08 324 Ko
[FILE] creating_security_enhanced_vm.en.pdf 28-12-2009 3:08 276 Ko
[FILE] csw09-duflot.pdf 28-12-2009 3:11 3992 Ko
[FILE] device.tree.cmd.rar 28-12-2009 3:14 122 Ko
[FILE] dokan-0401223src.zip 28-12-2009 3:14 144 Ko
[FILE] eurosys09.pdf 28-12-2009 3:14 181 Ko
[FILE] frit08.pdf 28-12-2009 2:54 924 Ko
[FILE] geometry.pdf 28-12-2009 3:16 389 Ko
[FILE] hooking_techniques_in_kernelspace.pdf 28-12-2009 2:55 502 Ko
[FILE] hsiyf_02_report_final.pdf 12-07-2010 19:43 674 Ko
[FILE] hund.pdf 28-12-2009 3:16 362 Ko
[FILE] jt-to-virtualisation_security.pdf 28-12-2009 3:22 354 Ko
[FILE] lee-re-malware-emulators.pdf 12-07-2010 19:44 4089 Ko
[FILE] lnk.pdf 15-10-2010 15:35 47 Ko
[FILE] mathieu-ereteo.pdf 28-12-2009 3:34 455 Ko
[FILE] native_thread_injection.pdf 28-12-2009 3:34 285 Ko
[FILE] noret.pdf 05-03-2010 13:29 422 Ko
[FILE] pac346.pdf 01-02-2010 13:49 1244 Ko
[FILE] packer_unpacker_sysdream.pdf 28-12-2009 3:34 756 Ko
[FILE] pbania-dbi-unpacking2009.pdf 28-12-2009 3:34 285 Ko
[FILE] pbania-spiderpig2008.pdf 28-12-2009 3:34 615 Ko
[FILE] pseudonyms.zip 05-03-2010 13:29 597 Ko
[FILE] pwn2rm.pdf 28-12-2009 3:35 37 Ko
[FILE] pwn2rm_hacklu2009.pdf 28-12-2009 3:35 709 Ko
[FILE] rewolf_cmd_research.zip 05-03-2010 13:28 407 Ko
[FILE] rewolf_hc2007_phase1.zip 28-12-2009 3:35 313 Ko
[FILE] rewolf_hc2007_phase3.zip 28-12-2009 3:35 365 Ko
[FILE] search.htm 05-03-2010 13:28 95 Ko
[FILE] sehop_en.pdf 28-12-2009 3:35 195 Ko
[FILE] sosp079-seshadri.pdf 28-12-2009 2:56 213 Ko
[FILE] source10-linuxkernel-jonoberheide.pdf 12-07-2010 19:42 875 Ko
[FILE] tpm_chips.pdf 28-12-2009 2:57 610 Ko
[FILE] unpackers.pdf 28-12-2009 2:57 214 Ko
[FILE] virtualization.pdf 28-12-2009 3:42 3818 Ko
[FILE] vista_x64.htm 28-12-2009 3:53 228 Ko
[FILE] vm.pdf 05-03-2010 13:29 345 Ko
[FILE] vmm-detection-hotos07.pdf 28-12-2009 2:58 100 Ko
[FILE] w32_stuxnet_dossier.pdf 15-10-2010 15:37 3042 Ko
[FILE] wenger_M.pdf 28-12-2009 3:42 1051 Ko
[FILE] winappdbg-1.1.win32.exe 28-12-2009 3:51 220 Ko
[FILE] windows_kernel_malware.pdf 28-12-2009 3:43 1893 Ko
[FILE] zeus_king_of_bots.pdf 23-12-2010 19:49 2394 Ko


                                                  .mMMMMm.
                                               .mMMMMMMMMMMMm
          ....                               .mMMMMMMMMMMMMMM.
      .mMMMMMm.                           .mMMMMMMMMMMMMMMMM'
     .mMMMMMMMM)                          .MMMMMMMMMMMMMMM/'
   (MMMMMMMMMM/                          .MMMMMMMMMMMM"'
  mMMMMMMMMMM/                           (MMMMMMMMM"'
 /MMMMMMMMMM/                            |MMMMMMMM/
 MMMMMMMMMM/                             MMMMMMMM/
(MMMMMMMMMM(                            /MMMMMMM/
 MMMMMMMMMM|                            |MMMMMM"
 \MMMMMMMMM\              .mmmm..      |MMMMM`
  \MMMMMMMMMM.          .mMMMMMMMMm..mMMMm.MM/
   \MMMMMMMMM\.       mMMMMMMMMMMMMMMMMMMMMMm`
     \MMMMMMMMM.    .mMMMMMMMM"""MMMMMMMMMMMMMm
      `?MMMMMMMMm  mMMMMMMMM"'    "MMMMMMMMMMMMm.
        `"MMMMMMMm/MMMMMMM/'        \MMMMMMMMMMMM.
          `\MMMMM/MMMMMM"'           `MMMMMMM"""Mm.
            `\MM/MMMMMM/             `MMMM"'   '\M.
              ./MMMMMM/'               `"'        '\
              /MMMMMMM'                             \
             /MMMMMMM/                              `,
            /MMMMMMMM                                |
           .MMMMMMMMM                                )
           (MMMMMMMM|                                |
           |MMMMMMMM|.                               )
           |MMMMMMMMM|          oOo    oOo.         .'
           |MMMMMMMMM|         (OOOo   OOOO.        /
           (MMMMMMMMM\          OOOO.  OOOO).      '
           \MMMMMMMMMM         `OOOO   `OOO'      /
     x..   `\MMMMMMMMMm         `OO"    _"'__    ./Mm._______
     \MMMmm.MM"'     '\           ..**"""""***. <"""",MMMM/'  .
      \MMMMMM'                   .**"     ,'****        ')mMMMM'
       `\MMM(                    (**.__.******"'         )MMM/
      xmm>MMM\                   `********""'           )M/'
       `\MMMMMm,                    """                ,'M'
            `-"Mm.                                   ./"'
                  `\.                              ,/'
                     `\.                       _,/'
                        `.        /`     _,-/"'
                         M\      ( \   /'
                         MMm.     `'  /
                         MMMMm.     ,'
                         MMMMMMMmmmMM
                         MMMMMMMMMMMM