Skip to content

Instantly share code, notes, and snippets.

Embed
What would you like to do?
http://www.amazon.com/Hacking-The-Art-Exploitation-Edition/dp/1593271441/ref=sr_1_1?ie=UTF8&qid=1375910776&sr=8-1&keywords=hacking+the+art+of+exploitation
http://www.amazon.com/Reversing-Secrets-Engineering-Eldad-Eilam/dp/0764574817/ref=sr_1_1?s=books&ie=UTF8&qid=1375910810&sr=1-1&keywords=reversing
http://www.amazon.com/Guide-Kernel-Exploitation-Attacking-Core/dp/1597494860/ref=sr_1_1?s=books&ie=UTF8&qid=1375910830&sr=1-1&keywords=kernel+exploitation
http://www.amazon.com/Practical-Malware-Analysis-Hands--Dissecting/dp/1593272901/ref=sr_1_1?s=books&ie=UTF8&qid=1375910868&sr=1-1&keywords=practical+malware+analysis
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
You can’t perform that action at this time.