Welcome To Crax.Pro Forum!

Check our new Marketplace at Crax.Shop

   Login! SignUp Now!
  • We are in solidarity with our brothers and sisters in Palestine. Free Palestine. To learn more visit this Page

  • Crax.Pro domain has been taken down!

    Alternatives: Craxpro.io | Craxpro.com

  1. tronny

    BlackHat - ASSESSING AND EXPLOITING CONTROL SYSTEM AND IIOT 2020

    BlackHat - ASSESSING AND EXPLOITING CONTROL SYSTEM AND IIOT 2020 *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
  2. tronny

    HackSysInc - Windows Kernel Exploitation Fundamentals 2023

    HackSysInc - Windows Kernel Exploitation Fundamentals 2023 *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
  3. mtgox176

    Multi/Others  Fully Kernel CS2 Cheat [ESP/AIM/BHOP/NOFLASH/ETC]

    Fully Kernel CS2 Cheat [ESP/AIM/BHOP/NOFLASH/ETC] Download: Password = crax https://mega.nz/file/4EEElCAS#GKFlAy7zEptLPsbdDlppq-X51ZElTtYLSOSduzGA1BE
  4. tronny

    ScorpioSoftware - Advanced Windows Kernel Programming, by Pavel Yosifovich

    ScorpioSoftware - Advanced Windows Kernel Programming, by Pavel Yosifovich *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
  5. f3d0m43ver

    Practical reverse engineering x86, x64, ARM, Windows Kernel - PDF

    Practical reverse engineering x86, x64, ARM, Windows Kernel, reversing tools, and obfuscation by Bruce Dang, Alexandre Gazet, Elias Bachaalany, Sébastien Josse - PDF Analyzing how hacks are done, so as to stop them in the future Reverse engineering is the process of analyzing hardware or...
  6. myarena

    Book - "The Linux Command Line: A Complete Introduction"

    "The Linux Command Line: A Complete Introduction" Author: William Shotts Edition: 2nd Year: 2019 Free PDF url: https://dl.ebooksworld.ir/motoman/The.Linux.Command.Line.2nd.Edition.www.EBooksWorld.ir.pdf
  7. lidl58

    Practical reverse engineering

    Practical reverse engineering_ x86, x64, ARM, Windows Kernel, reversing tools, and obfuscation *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
  8. lidl58

    A Guide to Kernel Exploitation Attacking the Core

    A Guide to Kernel Exploitation Attacking the Core *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
  9. jain

    Course/Tutorial  Windows & Linux Privilege Escalation: Unauthorized access

    Link:https://teraboxapp.com/s/1BOvh--8KqIGxO0lFZtWSbw *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
  10. R

    Bug  Windows 11 22h2 - Kernel Privilege Elevation

    // Tested on: Windows/Linux // Category : webapps *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
Top Bottom