搜索资源列表
Linux_Kernel_Hacking
- Linux kernel hacking
Infecting
- 描述分析怎样通过模块感染linux文件、linux hacking。-Descr iption of how the infection through module linux file, linux hacking.
BOOK
- William von Hagen (Bill) has been a UNIX system administrator for over 20 years and a Linux fanatic since the early 1990s. He has worked as a systems programmer, system administrator, writer, applications developer, drummer, and documentation man
Linux-Kernel-Development
- Unix 内核开发, 目录如下: Contents at a Glance 1 Introduction to the Linux Kernel 1 2 Getting Started with the Kernel 11 3 Process Management 23 4 Process Scheduling 41 5 System Calls 69 6 Kernel Data Structures 85 7 Interrupts and Interrupt H
cerom-0.1
- cerom - nav hacking software for linux
Linux-and-unix-security-manual
- Linux与unix安全手册,黑客札记。Linux与unix安全手册,黑客札记-Linux and unix security manual, hacking notes. Linux and unix security manual, hacking notes
Hacking-Ubuntu-Serious-Hacks-Mods-and-Customizati
- a book for linux hacking
b374k-mini-shell
- b374k mini shell for hacking linux
Learning-_IT
- 该文档积累了本人最近的学习笔记,包括相关黑客技术,Linux下字符驱动编程,Linux下通信程序设计要点。-The documents I have accumulated a recent study notes, including related hacking, Linux under the character-driven programming, Linux programming under the communication points.
Hacking-the-Linux-Kernel-
- 本文将描述如何利用Linux网络堆栈的窍门(不一定都是漏洞)来达到一些目的,或者是恶意的,或者是出于其它意图的。文中会就后门通讯对Netfilter钩子进行讨论,并在本地机器上实现将这个传输从基于Libpcap的嗅探器(sniffer)中隐藏-Hacking the Linux Kernel Network Stack
Hacking_the_art_of_exploiting
- 黑客之道—漏洞利用的艺术,随书附带源代码,C语言,实验环境为linux-source code of Hacking:the art of exploiting,used in Linux OS and windows is the second choice