Web Application Exploits and Defenses
No information avaiable
http://jarlsberg.appspot.com/
popularity:
security
google
tutorial
hacking
programming
web
development
exploits
webdev
hack
|
One-way Web Hacking
No information avaiable
similarity:
popularity:
hacking
security
web
tutorial
howto
hack
http
pentest
tutorials
apache
|
.:: Phrack Magazine ::.
Hacker magazine by the community, for the community.
similarity:
popularity:
security
hacking
magazine
hack
programming
news
hacker
hacks
phrack
computer
|
.:[ packet storm ]:. - http://packetstormsecurity.org/
Information and computer security full disclosure web site ... http://packetstormsecurity.org/0906-exploits/0906-exploits.tgz. June 29, 2009 ...
similarity:
popularity:
security
hacking
tools
exploits
news
network
software
hack
internet
exploit
|
CWE - 2010 CWE/SANS Top 25 Most Dangerous Programming Errors
http://cwe.mitre.org/top25. 2009 CWE/SANS Top 25 Most Dangerous Programming Errors ... (CWE) (http://cwe.mitre.org/). MITRE maintains the CWE web site, with the ...
similarity:
popularity:
security
programming
software
development
vulnerabilities
reference
errors
testing
web
vulnerability
|
Progenic.com - Top 100 underground computer technology websites
Security advice and exploits.
similarity:
popularity:
security
hacking
hacks
computer
technology
hack
reference
web
underground
programming
|
Goolag
Naint.Ru Новый портал про Интернет. На нашем сайте Вы можете узнать много нового и ...
similarity:
popularity:
security
google
hacking
search
tool
scanning
hacks
tools
hack
activism
|
Hacking Videos from Shmoocon - good coders code, great reuse
No information avaiable
similarity:
popularity:
hacking
security
video
programming
videos
tutorial
hacker
learning
hack
hacks
|
Zero Day Initiative
No information avaiable
similarity:
popularity:
security
hacking
research
vulnerability
exploits
exploit
hacks
reference
programming
web
|
The Metasploit Project
The Metasploit Framework is the open source penetration testing framework with the world's largest database of public, tested exploits.
similarity:
popularity:
security
hacking
tools
exploit
software
network
opensource
hack
exploits
linux
|
Penetration Test
... DBA_USERS WHERE US ERNAME='SYS')||'.vulnerabilityassessment.co.uk') FROM DUAL; ... DBA_USERS WHERE USERNAM E='SYS')||'.vulnerabilityassessment.co.uk') FROM DUAL ...
similarity:
popularity:
security
hacking
pentest
reference
penetration
tools
tutorial
howto
network
hack
|