root labs rdist
This is possible because Android doesn't place any restrictions on native code ... The only limitation is that the code runs as the app's unprivileged UID, but ...
http://rdist.root.org/
popularity:
security
blog
blogs
crypto
cryptography
linux
software
research
computers
opensource
|
[lcamtuf.coredump.cx]
Click here for sample chapters, plenty of reviews, and other useful information. ... NEW Interesting vulnerabilities: exploitable DOM fuzzing crashes in multiple ...
similarity:
popularity:
security
hacking
programming
tools
network
software
people
blog
linux
geek
|
Snort - the de facto standard for intrusion detection/prevention
Download for Snort, an open source network intrusion prevention and detection ... Click the rules button for more information on the rulesets available on Snort.org ...
similarity:
popularity:
security
network
opensource
software
linux
tools
ids
snort
networking
sysadmin
|
invisiblethings.org
At this year's Black Hat conference Rafal, Alex and I will be ... Probably the coolest thing I've ever been involved in. Read more ... invisiblethings.org has been ...
similarity:
popularity:
security
hacking
rootkit
blog
infosec
windows
rootkits
linux
people
malware
|
David A. Wheeler's Personal Home Page
You are viewing http://www.dwheeler.com; the mark is attached to my most popular ... The terms dwheeler.com (TM) and www.dwheeler.com (TM) are trademarks of David ...
similarity:
popularity:
security
programming
opensource
software
linux
people
blog
development
technology
oss
|
PaulDotCom's Web Site
PaulDotCom Security Weekly - Episode 159 - July 9, 2009. Metasploit OWC ActiveX Exploit ... The PaulDotCom/i-Hacked DEFCON Party ...
similarity:
popularity:
security
podcast
hacking
blog
infosec
podcasts
network
blogs
technology
networking
|
FreeOTFE
FreeOTFE: A free 'on-the-fly' transparent disk encryption program for PCs and PDAs. ... portable - Not only does FreeOTFE offer "portable mode", eliminating ...
similarity:
popularity:
encryption
security
windows
software
opensource
crypto
cryptography
linux
tools
free
|
Matasano Security LLC - Chargen
Helping developers and enterprises secure their code is what we do. ... To learn more about Playbook, check out the site, or get in touch with us via ...
similarity:
popularity:
security
blog
programming
networking
documentation
matasano
blogs
privacy
reverse-engineering
work
|
Midnight Research Labs
Zach's also been busy working on the new boston.midnightresearch.com site that will have other information regarding the MRLB hacker space as it ...
similarity:
popularity:
security
hacking
blog
tools
wifi
research
wireless
blogs
hack
software
|
The Honeynet Project
Group of security professionals dedicated to learning the tools, tactics, and motives of the blackhat community and sharing those lessons learned.
similarity:
popularity:
security
honeypot
network
hacking
tools
honeynet
research
software
opensource
forensics
|
Wiretapped - Computer Security Software etc.
No information avaiable
similarity:
popularity:
security
hacking
software
tools
networking
internet
linux
network
cryptography
reference
|