URI: 
  TEXT 1.txt - Introduction (The Phrack Staff)
  TEXT 2.txt - Phrack Prophile on xerub (The Phrack Staff)
  TEXT 3.txt - The Art of Exploitation: Attacking JavaScript Engines. A case study of JavaScriptCore and CVE-2016-4622 (by saelo)
  TEXT 4.txt - Cyber Grand Shellphish (by Team Shellphish)
  TEXT 5.txt - VM escape: QEMU case study (by Mehdi Talbi, Paul Fariello)
  TEXT 6.txt - .NET Instrumentation via MSIL bytecode injection (by Antonio "s4tan" Parata)
  TEXT 7.txt - Twenty years of Escaping the Java Sandbox (by Ieu Eauvidoum and disk noise)
  TEXT 8.txt - Viewer Discretion Advised: (De)coding an iOS Kernel Vulnerability (by Adam Donenfeld)
  TEXT 9.txt - The Art of Exploitation: Compile Your Own Type Confusions. Exploiting Logic Bugs in JavaScript JIT Engines. (by saelo)
  TEXT 10.txt - Hypervisor Necromancy: Reanimating Kernel Protectors - or: On emulating hypervisors; a Samsung RKP case study. (by Aris Thallas)
  TEXT 11.txt - Tale of two hypervisor bugs - Escaping from FreeBSD bhyve (by Reno Robert)
  TEXT 12.txt - The Bear in the Arena (by xerub)
  TEXT 13.txt - Exploiting a Format String Bug in Solaris CDE (by Marco Ivaldi)
  TEXT 14.txt - Segfault.net eulogy (by skyper)
  TEXT 15.txt - YouTube Security Scene (by LiveOverflow)