Home
TEXT 1.txt - Introduction (by Phrack Staff) TEXT 2.txt - Loopback (by Phrack Staff) TEXT 3.txt - Linenoise (by Phrack Staff) TEXT 4.txt - Handling the Interrupt Descriptor Table (kad) TEXT 5.txt - Advances in kernel hacking II (by palmers) TEXT 6.txt - Defeating Forensic Analysis on Unix (by the grugq) TEXT 7.txt - Advances in format string exploiting (by gera & riq) TEXT 8.txt - Runtime process infection (by anonymous author) TEXT 9.txt - Bypassing PaX ASLR protection (by anonymous author) TEXT 10.txt - Execution path analysis: finding kernel rk's (by J.K.Rutkowski) TEXT 11.txt - Cuts like a knife, SSHarp (by stealth) TEXT 12.txt - Building ptrace injecting shellcodes (by anonymous author) TEXT 13.txt - Linux/390 shellcode development (by johnny cyberpunk) TEXT 14.txt - Writing linux kernel keylogger (rd) TEXT 15.txt - Cryptographic random number generators (DrMungkee) TEXT 16.txt - Playing with windows /dev/(k)mem (crazylord) TEXT 17.txt - Phrack World News (by Phrack Staff) TEXT 18.txt - Phrack magazine extraction utility (by Phrack Staff)