• 35M_CompteGmail.pdf
  • aDvens_avis_securite_php.pdf
  • apn.pdf
  • arm_asm.pdf
  • asterisk.pdf
  • BHUSA09-Oh-DiffingBinaries.pdf
  • dd_copie.pdf
  • defcon_fuzzing.pdf
  • Detecting Attacks on Web App from LogFiles.pdf
  • detec_contre_Ddos_FRnOG_24-6.pdf
  • Enquete._suspect_past_Mr_Pokemon_Go_Courrier_international.pdf
  • facebook_csrf.pdf
  • Full_SQL_Injection_tutorial.pdf
  • gdb.pdf
  • guide_autodef_num_tome1.pdf
  • guide_autodef_num_tome2.pdf
  • http_digest_reloaded.pdf
  • lettre_hadopi.pdf
  • malloc_tutorial.pdf
  • Memento shell.pdf
  • memento_html_css.pdf
  • Metasploit - The Penetration Tester's Guide [SucaX].pdf
  • outils_sniff.pdf
  • Performance-Analysis-and-Security-Provisions-for-VoIP-Servers.pdf
  • PT-devteev-CC-WAF-ENG.pdf
  • python201.pdf
  • Securite-Cryptographie1cour.pdf
  • SEHOP demystified.pdf
  • SummerCon_2012_CVE-2012-0769.pdf
  • TAZ Hakim Bay.pdf
  • Transactions avec MySql et PDO.pdf
  • us-15-Silvanovich-Attacking-ECMA-Script-Engines-With-Redefinition-wp.pdf
  • Utilizing-Code-Reuse-Or-Return-Oriented-Programming-In-PHP-Application-Exploits.pdf
  • voip_wp.pdf
  • WinDbg_A_to_Z_bw2.pdf
  • wireshark_debug.pdf