Magnetic link has been copied to the cutting board

Name Pentester Academy - Assembly Language and Shellcoding on Linux x86_64 (2013)

File Type video

Size 4.81GB

UpdateDate 2024-11-26

hash *****92FD13368C2BAFF44FAA0388671185F3E6

Hot 5

Files Module 2/039-metasploit-payloads.pdf | 627.33KB Module 2/025-helloworld-shellcode-jmp-call-pop.pdf | 443.53KB Module 2/Insertion-Encoder.zip | 5.98KB Module 2/RIP-Addressing.zip | 4.28KB Module 2/044-chaining-encoders-crypters.mp4 | 47.34MB Module 2/Polymorphic.zip | 4.33KB Module 2/035-not-encoder.mp4 | 76.52MB Module 2/035-not-encoder.pdf | 439.24KB Module 2/047-tcp-reverse-shell.mp4 | 66.28MB Module 2/026-helloworld-shellcode-jmp-call-pop-gdb-analysis.pdf | 584.59KB Module 2/TCP-Bind-Shell.zip | 2.56KB Module 2/028-rip-relative-addressing-hello-world-shellcode.pdf | 441.61KB Module 2/043-crypter.pdf | 444.54KB Module 2/036-not-encoder-gdb-analysis.mp4 | 53.99MB Module 2/023-shellcode-basics.mp4 | 122.70MB Module 2/043-crypter.mp4 | 74.97MB Module 2/Execve-JCP.zip | 4.52KB Module 2/038-insertion-encoder-gdb-analysis.pdf | 801.49KB Module 2/024-exit-shellcode.mp4 | 91.88MB Module 2/030-Execve-Stack-GDB-Analysis.mp4 | 54.59MB Module 2/028-rip-relative-addressing-hello-world-shellcode.mp4 | 46.46MB Module 2/033-xor-encoder.mp4 | 132.56MB Module 2/TCP-Reverse-Shell.zip | 5.38KB Module 2/XOR-Encoder.zip | 6.83KB Module 2/026-helloworld-shellcode-jmp-call-pop-gdb-analysis.mp4 | 56.38MB Module 2/Exit2.nasm | 113B Module 2/032-Execve-jmp-call-pop-shellcode-gdb-analysis.mp4 | 85.88MB Module 2/029-Execve-Stack-Method.pdf | 546.08KB Module 2/041-mmx-xor-decoder.mp4 | 134.17MB Module 2/046-tcp-bind-shell-II.pdf | 440.26KB Module 2/039-metasploit-payloads.mp4 | 23.77MB Module 2/HelloWorld-Stack.zip | 4.26KB Module 2/037-insertion-encoder.pdf | 615.51KB Module 2/030-Execve-Stack-GDB-Analysis.pdf | 576.88KB Module 2/027-helloworld-shellcode-stack-technique-GDB-analysis.mp4 | 49.94MB Module 2/033-xor-encoder.pdf | 598.84KB Module 2/HelloWorld.zip | 4.41KB Module 2/042-polymorphism.pdf | 527.19KB Module 2/Execve-Stack.zip | 4.25KB Module 2/031-Execve-Jmp-Call-Pop-Shellcode.mp4 | 101.10MB Module 2/024-exit-shellcode.pdf | 441.69KB Module 2/047-tcp-reverse-shell.pdf | 439.99KB Module 2/041-mmx-xor-decoder.pdf | 443.97KB Module 2/046-tcp-bind-shell-II.mp4 | 174.93MB Module 2/023-shellcode-basics.pdf | 485.55KB Module 2/034-xor-encoder-gdb-analysis.pdf | 584.38KB Module 2/040-custom-payload-with-metasploit-encoders.pdf | 642.06KB Module 2/MMX.zip | 6.53KB Module 2/029-Execve-Stack-Method .mp4 | 115.44MB Module 2/044-chaining-encoders-crypters.pdf | 439.71KB Module 2/shellcode.c | 290B Module 2/036-not-encoder-gdb-analysis.pdf | 440.76KB Module 2/034-xor-encoder-gdb-analysis.mp4 | 79.53MB Module 2/Crypter.zip | 12.60KB Module 2/042-polymorphism.mp4 | 103.86MB Module 2/028-rip-relative-addressing.mp4 | 87.89MB Module 2/040-custom-payload-with-metasploit-encoders.mp4 | 32.11MB Module 2/045-tcp-bind-shell-I.pdf | 439.00KB Module 2/027-helloworld-shellcode-stack-technique.pdf | 479.10KB Module 2/048-exam.pdf | 463.38KB Module 2/025-helloworld-shellcode-jmp-call-pop.mp4 | 117.93MB Module 2/Crypter-Encoder-Chain.zip | 12.77KB Module 2/032-Execve-jmp-call-pop-shellcode-gdb-analysis.pdf | 714.69KB Module 2/028-rip-relative-addressing.pdf | 440.72KB Module 2/027-helloworld-shellcode-stack-technique.mp4 | 89.36MB Module 2/RIP-Addressing-Shellcode.zip | 4.45KB Module 2/Exit.nasm | 99B Module 2/038-insertion-encoder-gdb-analysis.mp4 | 59.55MB Module 2/037-insertion-encoder.mp4 | 113.76MB Module 2/045-tcp-bind-shell-I.mp4 | 111.63MB Module 2/048-exam.mp4 | 85.80MB Module 2/027-helloworld-shellcode-stack-technique-GDB-analysis.pdf | 647.52KB Module 2/031-Execve-Jmp-Call-Pop-Shellcode.pdf | 735.75KB Module 1/002-What-is-Assembly-Language.pdf | 726.71KB Module 1/012-moving-data.pdf | 679.60KB Module 1/004-GDB-Test-Solution.pdf | 241.87KB Module 1/018-loops.pdf | 443.05KB Module 1/main.c | 137B Module 1/020-stack-frame-procedures.mp4 | 83.46MB Module 1/Strings-64.nasm | 793B Module 1/BitShifting-64.nasm | 636B Module 1/016-Bitshifting-operations.mp4 | 123.61MB Module 1/Procedure.nasm | 635B Module 1/015-Logical-Operations.pdf | 439.96KB Module 1/013-the-stack.mp4 | 128.65MB Module 1/001-Lab-Setup.pdf | 92.45KB Module 1/012-moving-data.mp4 | 176.60MB Module 1/005-module-1-cpu-registers.pdf | 780.75KB Module 1/011-GDB-tui-mode.pdf | 593.62KB Module 1/022-load-store-move-strings.pdf | 440.69KB Module 1/021-scan-compare-strings.mp4 | 88.91MB Module 1/022-load-store-move-strings.mp4 | 121.86MB Module 1/017-control-instructions.mp4 | 108.71MB Module 1/007-Hello-World-GDB.pdf | 1.06MB Module 1/018-loops.mp4 | 65.20MB Module 1/003-CPU-Information.pdf | 791.70KB Module 1/Procedure2.nasm | 704B Module 1/008-Reducing-instruction-size-removing-nulls.mp4 | 119.63MB Module 1/008-Reducing-instruction-size-removing-nulls.pdf | 724.07KB Module 1/gdbtest.zip | 3.13KB Module 1/scan-compare-strings.pdf | 440.65KB Module 1/010-Endianess.mp4 | 122.11MB Module 1/009-data-types.mp4 | 153.94MB Module 1/014-Arithmetic-Operations.pdf | 562.36KB Module 1/004-GDB-Test-Solution.mp4 | 64.64MB Module 1/010-Endianess.pdf | 471.81KB Module 1/001-Lab-Setup.mp4 | 101.58MB Module 1/011-GDB-tui-mode.mp4 | 77.82MB Module 1/019-Procedures.mp4 | 104.13MB Module 1/MovingData-64.nasm | 1.15KB Module 1/013-the-stack.pdf | 433.05KB Module 1/006-hello-world.pdf | 509.67KB Module 1/009-data-types.pdf | 603.58KB Module 1/Loop-64.nasm | 498B Module 1/019-Procedures.pdf | 442.01KB Module 1/002-What-is-assembly-language.mp4 | 156.64MB Module 1/014-Arithmetic-Operations.mp4 | 118.21MB Module 1/016-Bitshifting-operations.pdf | 665.07KB Module 1/Logical-64.nasm | 821B Module 1/015-Logical-Operations.mp4 | 122.64MB Module 1/Control-64.nasm | 573B Module 1/Arithmetic-64.nasm | 893B Module 1/006-Hello-World-64-asm.mp4 | 156.96MB Module 1/003-CPU-Information.mp4 | 109.86MB Module 1/Strings2-64.nasm | 638B Module 1/005-CPU-Registers.mp4 | 162.58MB Module 1/017-control-instructions.pdf | 442.24KB Module 1/Stack.nasm | 483B Course-Introduction.mp4 | 36.80MB

Recommend

Magnetic link has been copied to the cutting board