TEXT 1.txt - Introduction (by The Phrack Staff) TEXT 2.txt - Phrack Prophile on BSDaemon (by The Phrack Staff) TEXT 3.txt - Linenoise (by The Phrack Staff) TEXT 4.txt - Loopback (by The Phrack Staff) TEXT 5.txt - Phrack World News (by The Phrack Staff) TEXT 6.txt - MPEG-CENC: Defective by Specification (by David "retr0id" Buchanan) TEXT 7.txt - Bypassing CET & BTI With Functional Oriented Programming (by LMS) TEXT 8.txt - World of SELECT-only PostgreSQL Injections (by Maksym Vatsyk) TEXT 9.txt - A VX Adventure in Build Systems and Oldschool Techniques (by Amethyst Basilisk) TEXT 10.txt - Allocating new exploits (by r3tr074) TEXT 11.txt - Reversing Dart AOT snapshots (by cryptax) TEXT 12.txt - Finding hidden kernel modules (extrem way reborn) (by g1inko) TEXT 13.txt - A novel page-UAF exploit strategy (by Jinmeng Zhou, Jiayi Hu, Wenbo Shen, Zhiyun Qian) TEXT 14.txt - Stealth Shell: A Fully Virtualized Attack Toolchain (by Ryan Petrich) TEXT 15.txt - Evasion by De-optimization (by Ege BALCI) TEXT 16.txt - Long Live Format Strings (by Mark Remarkable) TEXT 17.txt - Calling All Hackers (by cts)