DISCLAIMER
The creator of THIS PAGE or the ISP(s) hosting any content on this site take NO responsibility for the way you use the information provided on this site.
These files and anything else on this site are here for private purposes only and SHOULD NOT BE DOWNLOADED OR VIEWED WHATSOEVER!
If you are affiliated with any government, or ANTI-Piracy group or any other related group or were formally a worker of one you CANNOT enter this web site, cannot access any of its files and you cannot view any of the HTML files.
All the objects on this site are PRIVATE property and are not meant for viewing or any other purposes other then bandwidth space.
DO NOT ENTER whatsoever!
If you enter this site you are not agreeing to these terms and you are violating code 431.322.12 of the Internet Privacy Act signed by Bill Clinton in 1995 and that means that you CANNOT threaten our ISP(s) or any person(s) or company storing these files, cannot prosecute any person(s) affiliated with this page which includes family, friends or individuals who run or enter this web site.
IF YOU DO NOT AGREE TO THESE TERMS THEN LEAVE.

Programming

Program Description
Open source search engine external link
Reverse-Engineering Malware by Lenny Zeltser
The Decompilation Wiki external link
process hiding for NT in asm by Aphex
Stealth DLL Injection by Aphex
Tutor DLL Injection (assembler tutorial included) by Nasser Remy Rowhani
Dropper Source Generator 0.1 Tool
Vulnerabilities in your code (pdf) Tutorial
Reverse Engineering Malware Tool
A Buffer Overflow Study Attacks&Defenses (PDF). by Pierre-Alain Fayolle, Vincent Glaume
Writing Buffer Overflow Exploits a Tutorial for Beginners
BUFFER OVERFLOWS DEMYSTIFIED by murat@enderunix.org
How To Write an NT Service in VB5 Tutorial
DESIGNING SHELLCODE DEMYSTIFIED by murat
Fravia Reverse Engineering Malware
How to code sockets under windows using asm. Tutorial
Code Red II disasembly Tutorial
How to make a Dropper in C by Stan. Tutorial
How to make a Dropper in C, ASM, and Delphiby Tutorial
Top Hackzone Lot of Programming Sites
The Compilers resources page Compilers with Sources
Open Source For Linux
Open Source For Perl
Optimize Optimise your code
Using Internet Sockets Beej's Guide to Network Programming
Raw sockets Tutorial A brief programming tutorial in C for raw sockets
Winsock Programmer's FAQ Winsock Programmer's FAQ. How can I open a raw data socket?
Assembler Beginners Tutorial
Assembler Beginners Tutorial II
Backdooring Backdooring binaries
Win32 Asm Lord Lucifer
Delphi Knowlege base Chuck's Delphi Knowledgebase
Delphi Borland Delphi
Delphi Positron Delphi Page
Delphi The Delphi Super Page
Delphi Torry`s Delphi Page
Delphi Top Sites TOP 219 DELPHI SITES
Pebundle PEBundle physically attaches DLL(s) to an executable
ProTools Programmer Tools
Sources Trojan Sources
Hostile Java Hostile Java
Earth Web Developer
Programming Tools Lot of Tools
Programms Heaven It is all here
SoftIce/WinIce For Newbies Tutorial
Assembly Assembly for Beginners
How to build a Trojan by Wax
How to build a Trojan Part 2 by Wax
VB auto update support by Senna Spy
Windows Registry structure explanation by B.D.
Win32ASM Community Bulletin Board

Statistiche sito,contatore visite, counter web invisibile