(TXT) 1.txt - Introduction (by Phrack Staff)
 (TXT) 2.txt - Loopback (by Phrack Staff)
 (TXT) 3.txt - Linenoise (by Phrack Staff)
 (TXT) 4.txt - Handling the Interrupt Descriptor Table (kad)
 (TXT) 5.txt - Advances in kernel hacking II (by palmers)
 (TXT) 6.txt - Defeating Forensic Analysis on Unix (by the grugq)
 (TXT) 7.txt - Advances in format string exploiting (by gera & riq)
 (TXT) 8.txt - Runtime process infection (by anonymous author)
 (TXT) 9.txt - Bypassing PaX ASLR protection (by anonymous author)
 (TXT) 10.txt - Execution path analysis: finding kernel rk's (by J.K.Rutkowski)
 (TXT) 11.txt - Cuts like a knife, SSHarp (by stealth)
 (TXT) 12.txt - Building ptrace injecting shellcodes (by anonymous author)
 (TXT) 13.txt - Linux/390 shellcode development (by johnny cyberpunk)
 (TXT) 14.txt - Writing linux kernel keylogger (rd)
 (TXT) 15.txt - Cryptographic random number generators (DrMungkee)
 (TXT) 16.txt - Playing with windows /dev/(k)mem (crazylord)
 (TXT) 17.txt - Phrack World News (by Phrack Staff)
 (TXT) 18.txt - Phrack magazine extraction utility (by Phrack Staff)