II: Modifying and Hacking Security Tools
Chapter 7: Fun with Linux Kernel Modules
Chapter 8: Developing Web Assessment Tools and Scripts
Chapter 9: Automated Exploit Tools
Chapter 10: Writing Network Sniffers
Chapter 11: Writing Packet-Injection Tools
 |