Home
TEXT 1.txt - Introduction (by TCLH) TEXT 2.txt - Phrack Prophile of The UNIX Terrorist (by TCLH) TEXT 3.txt - Phrack World News (by TCLH) TEXT 4.txt - Stealth Hooking: another way to subvert the Windows kernel (by mxatone & ivanlefou) TEXT 5.txt - Clawing holes in NAT with UPnP (by felinemenace) TEXT 6.txt - The only laws on Internet are assembly and RFCs (by Julia) TEXT 7.txt - Hacking the System Management Mode (by BSDaemon, coideloko, d0nand0n) TEXT 8.txt - Mystifying the debugger for ultimate stealthness (by halfdead) TEXT 9.txt - Australian Restricted Defense Networks and FISSO (by The Finn) TEXT 10.txt - Phook - The PEB Hooker (by shearer & dreg) TEXT 11.txt - Hacking the $49 Wifi Finder (by openschemes) TEXT 12.txt - The art of exploitation: Samba WINS stack overflow (by max_packetz) TEXT 13.txt - The Underground Myth (by anonymous) TEXT 14.txt - Hacking your brain: Artificial Conciousness (by -C) TEXT 15.txt - International scenes (by various)