Writing Security Tools and Exploits (Enhanced Edition) More Books Like This

Buffer Overflow Attacks Buffer Overflow Attacks
2005
The Shellcoder's Handbook The Shellcoder's Handbook
2011
The Linux Programming Interface The Linux Programming Interface
2010
Reversing Reversing
2011
Practical Binary Analysis Practical Binary Analysis
2018
Practical Reverse Engineering Practical Reverse Engineering
2014
LINUX C PROGRAMMING LINUX C PROGRAMMING
2015
Reverse Engineering: Questions and Answers (2020 Edition) Reverse Engineering: Questions and Answers (2020 Edition)
2019
Dive Into Systems Dive Into Systems
2022
The IDA Pro Book, 2nd Edition The IDA Pro Book, 2nd Edition
2008
The C, UNIX, and UNIX Commands Series The C, UNIX, and UNIX Commands Series
2017
Rust in Action Rust in Action
2021
C and UNIX C and UNIX
2013
Reverse Engineering: Questions and Answers Reverse Engineering: Questions and Answers
2018
Perl Cookbook Perl Cookbook
2003