PwnWiki.io. GIAC Certification. 2600 News. IT Security Magazine about hacking & hackers techniques - Hakin9. The Penetration Testing Execution Standard. Hackery - Open Penetration Testing Bookmarks Collection : OWASP Mantra - Free and Open Source Browser based Security Framework. Pentest-bookmarks - Open Penetration Testing Bookmarks Collection. ...is just that, a collection of handy bookmarks I initially collected that aid me in my day to day work or I find in the course of research.
They are not all inclusive and some sections need to be parsed but they are all good reference materials. I find having this Hackery folder in Firefox an easy way to reference syntax, tricks, methods, and generally facilitate and organize research. Opening it up to everyone will facilitate a knowledge transfer. Hopefully the initial set will grow and expand. Who? Started by Jason Haddix, Director of Penetration Testing at HP Fortify. Work and contributions also by: David Shaw of Redspin Penetration Testing @ownpile Rob Fuller of Rapid7 @mubix Nathan Drier of Trustwave SpiderLabs division James Fitts of Strategic Security How it's working atm: First off, we need help.
The whole bookmarks html file is ready for import to firefox off of the downloads section. How to submit your bookmarks: Not all links submitted will be added. Well, we don’t really like them. Nullsecurity team. SHODAN - Computer Search Engine. S Password Cracking Dictionary (Pay what you want!) I am releasing CrackStation's main password cracking dictionary (1,493,677,782 words, 15GB) for download.
What's in the list? The list contains every wordlist, dictionary, and password database leak that I could find on the internet (and I spent a LOT of time looking). It also contains every word in the Wikipedia databases (pages-articles, retrieved 2010, all languages) as well as lots of books from Project Gutenberg. It also includes the passwords from some low-profile database breaches that were being sold in the underground years ago.
The format of the list is a standard text file sorted in non-case-sensitive alphabetical order. You can test the list without downloading it by giving SHA256 hashes to the free hash cracker or to @PlzCrack on twitter. Step 1: Pay what you want. The wordlist is being sold using a "pay what you want" model. How much should I pay? Think about the following points when deciding how much to pay: If I wasn't doing a "pay what want" I would set the price at $5.
Certifications | IT Security. Training/Learning | IT Security. Tools | IT Security. Hackables/CTF/Games/Etc | IT Security. Forensics | IT Security. Reverse Engineering/Etc | IT Security. Malware/Malware Analysis/Etc | IT Security.
Exploits/Etc | IT Security. Web/Web Services/Etc | IT Security. SAP/Etc | IT Security. Wireless | IT Security. Mobile/iOS/Android/Etc | IT Security. OSINT/Open Source Intelligence | IT Security. Blogs/Podcasts/Etc | IT Security. IT Security | Books. Security/Authentication | Technology Topics. Penetration Testing/Ethical Hacking/Etc | Jobs/Etc. Backtrack/Metasploit.