background preloader


Facebook Twitter web application security lab. Hacker News. Welcome to Brownie! — Brownie v0.2+ documentation. Have you ever started a new project and implemented this little function foo or this datastructure bar you already implemented for another project?

Welcome to Brownie! — Brownie v0.2+ documentation

Ever wondered why a specific feature is not in the standard library already? Wanted to use that new datastructure but you are still stuck with this ancient Python version or are just not willing or able to switch to Python 3.x, yet? And most importantly were too lazy to implement this datastructure which would be more appropriate to use? Brownie wants to solve these problems by providing all these small things well documented, well tested and most importantly right now when you need it.

Take a look at the documentation for further information, visit Github for development or issue tracking or fetch the latest development version. Installation Brownie runs on Python 2.5-2.7 (tested on CPython and PyPy). If you really need to, you can also install the development version of Brownie with pip install brownie==dev. Anti-Forensics. List of Useful and Must-Have plugins! (100+) - Minecraft Forums. I'm going to update this soon!

List of Useful and Must-Have plugins! (100+) - Minecraft Forums

See post below. EDIT: Soon means tomorrow, 13 Dec 2010. EDIT2: Today is Dec 13th 2010, and here it is. In my lifetime career, I've used 144+ plugins. Join Application. Exploitation - it-sec-catalog - References to vulnerability exploitation stuff. - Project Hosting on Google Code. 1.

Exploitation - it-sec-catalog - References to vulnerability exploitation stuff. - Project Hosting on Google Code

Rubberhose cryptographically deniable transparent disk encryption system. Setting up your own SSL VPN. “All I want for Christmas is my own VPN…my own VPN, my own VPN” – Dustin I’ve been wanting to have access to my own secure VPN for quite some time so that when I’m away from home and only have access to insecure networks, I don’t have to use work’s VPN for personal use or worry about someone intercepting my traffic.

Setting up your own SSL VPN

I looked into a couple paid VPN solutions but none of them seem to guarantee your privacy as far as I’m concerned. I figured my best option was to setup and manage my own. I chose to do all my setup on Ubuntu Linux but you can easily port these instructions to an alternative Linux distribution with relative ease. Just a quick heads up before we dive in. About PlugBot - The PlugBot ~ The PlugBot is a small form factor computer used for Physical Penetration Testing. PlugBot is a research project and I plan to release the code for free under GPL license.

About PlugBot - The PlugBot ~ The PlugBot is a small form factor computer used for Physical Penetration Testing

Please help me fund this project by donating via PayPal! PlugBot is a hardware bot. Online storage re-imagined. Download CrunchBang Linux 10 "statler" r20101205. Welcome to the download page for CrunchBang Linux Waldorf.

Download CrunchBang Linux 10 "statler" r20101205

Please choose a flavour from below: 32-bit 64-bit This is the download page for the stable branch of CrunchBang. Waldorf is built from Debian Wheezy sources. Debian Wheezy is the current stable branch of Debian and therefore it should provide excellent stability and security. DEFT Linux - Computer Forensics live cd. GnackTrack - Gnome Based Penetration Distro. Welcome to KXStudio. I2P Anonymous Network.

Littleblackbox - Project Hosting on Google Code. LittleBlackBox is a collection of thousands of private SSL and SSH keys extracted from various embedded devices.

littleblackbox - Project Hosting on Google Code

These private keys are stored in a database where they are correlated with their public certificates as well as the hardware/firmware that are known to use those private keys. A command line utility is included to aid in the identification of devices or network traffic that use these known private keys. Given a public certificate, the utility will search the database to see if it has a corresponding private key; if so, the private key is displayed and can be used for traffic decryption or MITM attacks. Alternatively, it will also display a table of hardware and firmware that is known to use that private key. The Evil URL Shortener « Spare Clock Cycles.

I, like many people, have been closely following a lot of the chaos happening around the recent Wikileaks dump, and was particularly fascinated by the DDoS attacks by activists on either side. The Evil URL Shortener « Spare Clock Cycles

One tool specifically caught my eye in the midst of the attacks, however: the JS LOIC. The tool works simply by constantly altering an image file's source location, so that the browser is forced to continuously hammer the targeted server with HTTP requests. Not a sophisticated or technically interesting tool by any means, but conceptually interesting in that it only requires a browser to execute one's portion of a DoS attack. While the concept itself is not all that new, it got me thinking about the implications of such browser based DoS attacks. Bitcoin P2P Virtual Currency. Ubuntu Security. GNOME Shell: Getting prettier by the day. Gnome-Shell’s UI revamp continues apace and the ‘relayout’ version of GNOME-Shell, first shown off at GUADEC earlier this year, is getting ready to land.

GNOME Shell: Getting prettier by the day

With it containing so many visual changes MrMars dropped off screenshots of the ‘relayout’ GIT branch in the OMG! 10 things to do after installing Ubuntu 10.04 Lucid Lynx. If you’re going to be installing a freshly minted copy of Ubuntu 10.04 LTS later today or this weekend then the following list of 10 reader submitted post-install must-do’s will help ensure that you’re off to a flying start with your new OS. 1.

10 things to do after installing Ubuntu 10.04 Lucid Lynx

Run Update Manager Just because you’ve installed the latest version of Ubuntu doesn’t mean that there won’t already be a handful of bug fixes updates or patches waiting for you. Make sure you run the update manager (if it doesn’t update you first) so that you’re benefitting from the latest fixes and features. 2. Wirewatcher. Godzilla Haiku. Photo 21 Notes Godzilla Haiku turned 4 today! (Source: assets) Photo 83 Notes. Shedding Bikes: Programming Culture And Philosophy. By Zed A. Tf2 Items & Hats Pricing Guide. Index of /27c3-stream/releases/mkv. Dyko - A Lightweight Web Framework.


Programming. Wikileaks. High Yield Checking Account from ING DIRECT USA. Forums - Powered by vBulletin. OpenNIC. Open Letter to To Customer Service and Jeff Bezos, I’m disgusted by Amazon’s cowardice and servility in abruptly terminating its hosting of the Wikileaks website, in the face of threats from Senator Joe Lieberman and other Congressional right-wingers. I want no further association with any company that encourages legislative and executive officials to aspire to China’s control of information and deterrence of whistle-blowing. For the last several years, I’ve been spending over $100 a month on new and used books from Amazon.

That’s over. Human Bagel Web Services. 13 Steps To A Better Wordpress Install. Free Books. A lot of people keep asking about a good list of programming books. Hence, we are building this list to save your time and to spread the knowledge. Some of these books will definitely help us to evolve our coding skills and thought processes for developing better solutions. Allen's Weblog: Unicode in Python, and how to prevent it.

[UPDATE 16 Aug 2011] Armin Ronacher has written a nice module called unicode-nazi that provides the Unicode warnings I discuss at the end of this article. Though I can't use Python 3 for any of my projects, it does have a few nice things. One particular behaviour where it improves on Python 2 is forbidding implicit conversions between byte strings and Unicode strings. For example: Python 3.1.2 (release31-maint, Sep 17 2010, 20:34:23) [GCC 4.4.5] on linux2 Type "help", "copyright", "credits" or "license" for more information. >>> 'foo' + b'baz' Traceback (most recent call last): File "<stdin>", line 1, in <module> TypeError: Can't convert 'bytes' object to str implicitly If you do this in Python 2, it invokes the default encoding to convert between bytes and unicode, leading to manifold unhappinesses. Drupal site building tips - From These tips were written for Drupal6 and have not yet been edited for Drupal7 and therefore may not be accurate; this section is under construction.

Introduction. Living Off the Grid: Free Yourself. 10 Cool Ways to Use Nmap. Nmap (“Network Mapper”) is a free and open source (license) utility for network exploration or security auditing. Many systems and network administrators also find it useful for tasks such as network inventory, managing service upgrade schedules, and monitoring host or service uptime. - Tales of Team Fortress 2 pwnage and other hilarity. The Secret Life of Chaos Part (1 - 6) GPG Quick Start. Initial publication: July 7, 2004 Most recent revision: July 20, 2011 A quick gpg HOWTO for getting started with GnuPG. A colleague at work once asked me how to get started using gpg, the GNU Privacy Guard. He had no experience with it at all. Here’s a slightly expanded version of what I told him. GNUPG Windows Setup - Coresecure, Inc. Original version by Marco Di Folco (marco.difolco AT coresecure DOT com) Latest revision 0.2 on 05/22/2006.

Before it's News. PhilipBrennan.Net. HiR Information Report: Make your own lock picks - Part 1. Body Scanners (and Groping?) Coming To A Train Station Near You? The TSA and America's Turning Point. The recently-escalated battle between the American people and the TSA is far more important than it first appears. The final outcome of this argument will determine whether we still live in a nation "of the people, by the people, for the people", or whether we have become a soft tyranny where our democratic forms of elections and representatives have been reduced to a meaningless veneer as in the old Soviet Union or Red China.

The Consent of the Governed If America has a single founding principle, it is this: no government has any authority to take any action without the consent of the governed. I was just detained by the TSA. Today, I was detained by the TSA for about 30 minutes for taking pictures while going through security. Taking pictures is perfectly legal. I took pictures of the "advanced imaging" machines that see through your clothes – the machines that are the subject of so much controversy lately. 4thamendmentwear. 4th Amendment Wear. The Death Delusion. “Afraid of dying? Don’t be. How The TSA Legally Circumvents The Fourth Amendment. Ron Paul on ‘Opt-Out Day’: ‘If we tolerate’ the TSA, ‘there’s something wrong with us’

Anti-earmarker Jon Kyl slips $200 million earmark into bill. Big Sis Caught Lying To American People. Ty's Search for Truth. Jon and Eric's Blog. To promote flying with dignity. Search Tf2 Stats, Rankings, and Banners. On a long enough timeline, the survival rate for everyone drops to zero. A Majority Of Americans Believe The US Government No Longer Operates Within The Constitution. Overview for afrael. Google Translate. Fraps & VirtualDub: How to save disk space and enjoy good quality, small file size HD video clips.

View topic - Welcome! (What's all this TOSL stuff about...) Lockpicks by Open Locksport by Schuyler Towne. FreeRangeKids. Ugh fields. Making Your Twitter Followers A Little More Uneasy. I shed a 170-lb monkey off my back in 1.5 years using hardcore prescription drugs (380. The 2fort2furious Forum / Profile. What quote(s) do you live by? : AskReddit. Karmanaut's map of reddit. What are some good, active subreddits that maybe aren't very well known? : AskReddit. Population - Anno 1404 Wiki.

Post Your Farming Builds. Post #1197090. _l0qihvfywy1qb0g7zo1_500.jpg (JPEG Image, 500x294 pixels) 3QRji.jpg (JPEG Image, 500x408 pixels) 10 Things I Learned (Or Unlearned) When I Had Kids. Make a Simple and Slick Accordion Menu in Photoshop. Welcome to - World's Computer Graphics Community. 102 things guys need to know about girls.