http://iexploit.org/index.php?p=/categories/all
Related: Need to OrganizeEssential Wireless Hacking Tools By Daniel V. Hoffman, CISSP, CWNA, CEH Anyone interested in gaining a deeper knowledge of wireless security and exploiting vulnerabilities will need a good set of base tools with which to work. Fortunately, there are an abundance of free tools available on the Internet. This list is not meant to be comprehensive in nature but rather to provide some general guidance on recommended tools to build your toolkit.
Malicious Linux Commands - From (This article was originally published in Ubuntu Forums but was removed there. Ubuntuguide feels that knowledge about these risks is more important than any misguided attempts to "protect the public" by hiding their potential dangers or protect the (K)Ubuntu/Linux image. Vote Now! Top Ten Web Hacking Techniques of 2011 Every year the Web security community produces a stunning amount of new hacking techniques published in various white papers, blog posts, magazine articles, mailing list emails, etc. Within the thousands of pages are the latest ways to attack websites, Web browsers, Web proxies, and so on. Beyond individual vulnerability instances with CVE numbers or system compromises, we’re talking about actual new and creative methods of Web-based attack. The Top Ten Web Hacking Techniques list encourages information sharing, provides a centralized knowledge-base, and recognizes researchers who contribute excellent work. How the winners were selected… Phase 1: Open community voting (Ballot) [COMPLETE]
Inset Typography (inset text) with GIMP - Freshpage Web Design The GIMP (GNU Image Manipulation Program) is an extremely feature rich alternative to Adobe Photoshop. With a bit of effort it is possible to create some quite advanced effects. This tutorial explains how to create the effect of inset (or indented) typography using the GMP.
Google Dorks cache: If you include other words in the query, Google will highlight those words within the cached document. For instance, [cache:www.google.com web] will show the cached content with the word “web” highlighted. This functionality is also accessible by clicking on the “Cached” link on Google’s main results page. The query [cache:] will show the version of the web page that Google has in its cache. For instance, [cache:www.google.com] will show Google’s cache of the Google homepage. How To Become A Hacker Copyright © 2001 Eric S. Raymond As editor of the Jargon File and author of a few other well-known documents of similar nature, I often get email requests from enthusiastic network newbies asking (in effect) "how can I learn to be a wizardly hacker?". Back in 1996 I noticed that there didn't seem to be any other FAQs or web documents that addressed this vital question, so I started this one. A lot of hackers now consider it definitive, and I suppose that means it is. Still, I don't claim to be the exclusive authority on this topic; if you don't like what you read here, write your own.
Coloring pages : 11020 free online coloring printables for kids The Hellokids printables is not only fun but has many benefits too. Coloring will aid your child with holding a writing tool the right way which helps the development of their finger, hand and wrist muscles. Children learn hand-eye coordination, helping them color with in the lines. The Hellokids printable coloring pages will help your child to focus on details while being relaxed and comfortable. Coloring teaches children how to plan by choosing what colors they will use and how they will start and finish coloring their picture. Pre-reading and pre-math skills can also be learned when they see and recognize patterns.
Google hacking Basics[edit] The following search query will locate all websites that have the words "admbook" and "version" in the title of the website. It also checks to ensure that the web page being accessed is a PHP file. intitle:admbook intitle:version filetype:php One can even retrieve the username and password list from Microsoft FrontPage servers by inputting the given microscript in Google search field:
The Open Organisation Of Lockpickers This is a repository of the most up-to-date versions of Deviant's lock diagrams and animations. Seen in all of the TOOOL educational materials and slide decks, these files are all released under the Creative Commons license. You are free to use any of them for non-commercial purposes, as long as they are properly attributed and the same freedom for others is maintained in all derivative works. Please note that these diagrams have evolved and developed over time.
10+ Unusual Ways To Make Easy Money On The Internet If You Love Writing. Are you wondering how to make easy money online? Here are some easy ways to make money, if you like writing. (I probably should have said simple ways to make money, rather than easy ways to make money, because there is a difference between simple and easy. But who cares, this is about how to make easy money quickly).
Password crackers SecTools.Org: Top 125 Network Security Tools For more than a decade, the Nmap Project has been cataloguing the network security community's favorite tools. In 2011 this site became much more dynamic, offering ratings, reviews, searching, sorting, and a new tool suggestion form . This site allows open source and commercial tools on any platform, except those tools that we maintain (such as the Nmap Security Scanner , Ncat network connector , and Nping packet manipulator ). We're very impressed by the collective smarts of the security community and we highly recommend reading the whole list and investigating any tools you are unfamiliar with. NEW!!!! Destroy someone's Computer! : OFF Topic vampyre is right.1. LIL DEVIL IS AN A-HOLE2. THAT IS HACKING WHICH IS ILLEGAL3. LIL DEVIL IS AN A-HOLE X10= ASSHOLE ASSHOLE ASSHOLE ASSHOLE ASSHOLE ASSHOLE ASSHOLE ASSHOLE ASSHOLE ASSHOLE 4.
25+ Tutorials For The Web Minded There is a huge selection of free tutorials on the web for just about everything you can think of. We've put together 25+ sites that should help give you a good start on learning about the web itself and web-related tools you wish you knew more about. General 999Tutorials.com - Features free tutorials on PHP, general web stuff, Google AdSense and more. CommunityMX.com - Over 2,000 tutorials for Flash, Fireworks, ColdFusion, Dreamweaver and more.
Short Film of the Day: Stuxnet: Anatomy of a Computer Virus Why Watch? Because we should challenge how we define a film. Most of the shorts featured in this column are either easy to spot as stories or completely experimental. Even when a documentary short is in the spotlight, it tells a clear tale of people doing things. This short, is none of those things. Stuxnet: Anatomy of a Computer Virus is an informational film made entirely of voice over narration and motion graphics.