Home
  TEXT 1.txt - Introduction (by Phrack Staff)
  TEXT 2.txt - Phrack Loopback (by Phrack Staff)
  TEXT 3.txt - Phrack Line Noise (various)
  TEXT 4.txt - Phrack Prophile (Phrack Staff)
  TEXT 5.txt - Bypassing StackGuard and StackShield (by Bulba and Kil3r)
  TEXT 6.txt - Project Area52 (by Jitsu-Disk...)
  TEXT 7.txt - Shared Library Redirection via ELF PLT Infection (by Silvio)
  TEXT 8.txt - Smashing C++ VPTRs (by rix)
  TEXT 9.txt - Backdooring binary objects (by klog)
  TEXT 10.txt - Things To Do in Cisco Land When You're Dead (by gaius)
  TEXT 11.txt - A Strict Anomaly Detection Model for IDS (by sasha / beetle)
  TEXT 12.txt - Distributed Tools (by sasha / lifeline)
  TEXT 13.txt - Introduction to PAM (by Bryan Ericson)
  TEXT 14.txt - Exploiting Non-adjacent Memory Spaces (by twitch)
  TEXT 15.txt - Writing MIPS/Irix shellcode (by scut)
  TEXT 16.txt - Phrack Magazine Extraction Utility (by Phrack Staff)