background preloader


Facebook Twitter web application security lab. Hacker News. Welcome to Brownie! — Brownie v0.2+ documentation. Anti-Forensics. List of Useful and Must-Have plugins! (100+) - Minecraft Forums. I'm going to update this soon!

List of Useful and Must-Have plugins! (100+) - Minecraft Forums

See post below. EDIT: Soon means tomorrow, 13 Dec 2010. EDIT2: Today is Dec 13th 2010, and here it is. In my lifetime career, I've used 144+ plugins. Join Application. Exploitation - it-sec-catalog - References to vulnerability exploitation stuff. - Project Hosting on Google Code. Rubberhose cryptographically deniable transparent disk encryption system.

Setting up your own SSL VPN. About PlugBot - The PlugBot ~ The PlugBot is a small form factor computer used for Physical Penetration Testing. PlugBot is a research project and I plan to release the code for free under GPL license.

About PlugBot - The PlugBot ~ The PlugBot is a small form factor computer used for Physical Penetration Testing

Please help me fund this project by donating via PayPal! PlugBot is a hardware bot. Online storage re-imagined. Download CrunchBang Linux 10 "statler" r20101205. Welcome to the download page for CrunchBang Linux Waldorf.

Download CrunchBang Linux 10 "statler" r20101205

Please choose a flavour from below: 32-bit 64-bit This is the download page for the stable branch of CrunchBang. Waldorf is built from Debian Wheezy sources. Debian Wheezy is the current stable branch of Debian and therefore it should provide excellent stability and security. DEFT Linux - Computer Forensics live cd. GnackTrack - Gnome Based Penetration Distro. Welcome to KXStudio. I2P Anonymous Network. Littleblackbox - Project Hosting on Google Code. LittleBlackBox is a collection of thousands of private SSL and SSH keys extracted from various embedded devices.

littleblackbox - Project Hosting on Google Code

These private keys are stored in a database where they are correlated with their public certificates as well as the hardware/firmware that are known to use those private keys. A command line utility is included to aid in the identification of devices or network traffic that use these known private keys. Given a public certificate, the utility will search the database to see if it has a corresponding private key; if so, the private key is displayed and can be used for traffic decryption or MITM attacks.

Alternatively, it will also display a table of hardware and firmware that is known to use that private key. The utility can obtain a public certificate several different ways: You may give it the path to a public SSL certificate file. The Evil URL Shortener « Spare Clock Cycles. I, like many people, have been closely following a lot of the chaos happening around the recent Wikileaks dump, and was particularly fascinated by the DDoS attacks by activists on either side. The Evil URL Shortener « Spare Clock Cycles

One tool specifically caught my eye in the midst of the attacks, however: the JS LOIC. The tool works simply by constantly altering an image file's source location, so that the browser is forced to continuously hammer the targeted server with HTTP requests. Bitcoin P2P Virtual Currency. Ubuntu Security. GNOME Shell: Getting prettier by the day. Gnome-Shell’s UI revamp continues apace and the ‘relayout’ version of GNOME-Shell, first shown off at GUADEC earlier this year, is getting ready to land.

GNOME Shell: Getting prettier by the day

With it containing so many visual changes MrMars dropped off screenshots of the ‘relayout’ GIT branch in the OMG! Inbox! And a link to his Italian Ubuntu forum post touching on them. 10 things to do after installing Ubuntu 10.04 Lucid Lynx. If you’re going to be installing a freshly minted copy of Ubuntu 10.04 LTS later today or this weekend then the following list of 10 reader submitted post-install must-do’s will help ensure that you’re off to a flying start with your new OS. 1.

10 things to do after installing Ubuntu 10.04 Lucid Lynx

Run Update Manager Just because you’ve installed the latest version of Ubuntu doesn’t mean that there won’t already be a handful of bug fixes updates or patches waiting for you. Make sure you run the update manager (if it doesn’t update you first) so that you’re benefitting from the latest fixes and features. 2.

Wirewatcher. Godzilla Haiku. Photo 21 Notes Godzilla Haiku turned 4 today!

Godzilla Haiku

(Source: assets) Photo 83 Notes. Shedding Bikes: Programming Culture And Philosophy. By Zed A. Tf2 Items & Hats Pricing Guide. Index of /27c3-stream/releases/mkv. Dyko - A Lightweight Web Framework.


Programming. Wikileaks. High Yield Checking Account from ING DIRECT USA. Forums - Powered by vBulletin. Hack This Site! OpenNIC. Open Letter to To Customer Service and Jeff Bezos, I’m disgusted by Amazon’s cowardice and servility in abruptly terminating its hosting of the Wikileaks website, in the face of threats from Senator Joe Lieberman and other Congressional right-wingers.

Open Letter to

I want no further association with any company that encourages legislative and executive officials to aspire to China’s control of information and deterrence of whistle-blowing. For the last several years, I’ve been spending over $100 a month on new and used books from Amazon. That’s over. I have contacted Customer Service to ask Amazon to terminate immediately my membership in Amazon Prime and my Amazon credit card and account, to delete my contact and credit information from their files and to send me no more notices.

I understand that many other regular customers feel as I do and are responding the same way. So far Amazon has spared itself the further embarrassment of trying to explain its action openly. Human Bagel Web Services. 13 Steps To A Better Wordpress Install. Free Books. A lot of people keep asking about a good list of programming books.

Free Books

Hence, we are building this list to save your time and to spread the knowledge. Some of these books will definitely help us to evolve our coding skills and thought processes for developing better solutions. Allen's Weblog: Unicode in Python, and how to prevent it. [UPDATE 16 Aug 2011] Armin Ronacher has written a nice module called unicode-nazi that provides the Unicode warnings I discuss at the end of this article. Though I can't use Python 3 for any of my projects, it does have a few nice things. One particular behaviour where it improves on Python 2 is forbidding implicit conversions between byte strings and Unicode strings.

For example: Drupal site building tips - Living Off the Grid: Free Yourself. 10 Cool Ways to Use Nmap. Nmap (“Network Mapper”) is a free and open source (license) utility for network exploration or security auditing. Many systems and network administrators also find it useful for tasks such as network inventory, managing service upgrade schedules, and monitoring host or service uptime. - Tales of Team Fortress 2 pwnage and other hilarity. The Secret Life of Chaos Part (1 - 6) GPG Quick Start. Initial publication: July 7, 2004 Most recent revision: July 20, 2011. GNUPG Windows Setup - Coresecure, Inc. Original version by Marco Di Folco (marco.difolco AT coresecure DOT com) Latest revision 0.2 on 05/22/2006. Before it's News.

PhilipBrennan.Net. HiR Information Report: Make your own lock picks - Part 1. Body Scanners (and Groping?) Coming To A Train Station Near You? The TSA and America's Turning Point. The recently-escalated battle between the American people and the TSA is far more important than it first appears. The final outcome of this argument will determine whether we still live in a nation "of the people, by the people, for the people", or whether we have become a soft tyranny where our democratic forms of elections and representatives have been reduced to a meaningless veneer as in the old Soviet Union or Red China.

The Consent of the Governed. I was just detained by the TSA. 4thamendmentwear. The Death Delusion. “Afraid of dying? How The TSA Legally Circumvents The Fourth Amendment. Ron Paul on ‘Opt-Out Day’: ‘If we tolerate’ the TSA, ‘there’s something wrong with us’ Anti-earmarker Jon Kyl slips $200 million earmark into bill. Big Sis Caught Lying To American People. Ty's Search for Truth. Jon and Eric's Blog. To promote flying with dignity. Search Tf2 Stats, Rankings, and Banners. On a long enough timeline, the survival rate for everyone drops to zero.

A Majority Of Americans Believe The US Government No Longer Operates Within The Constitution. Overview for afrael. Google Translate. Fraps & VirtualDub: How to save disk space and enjoy good quality, small file size HD video clips. View topic - Welcome! (What's all this TOSL stuff about...) Lockpicks by Open Locksport by Schuyler Towne. FreeRangeKids. Ugh fields. Making Your Twitter Followers A Little More Uneasy. I shed a 170-lb monkey off my back in 1.5 years using hardcore prescription drugs (380. The 2fort2furious Forum / Profile. What quote(s) do you live by? : AskReddit. Karmanaut's map of reddit. What are some good, active subreddits that maybe aren't very well known? : AskReddit. Population - Anno 1404 Wiki. Post Your Farming Builds. Post #1197090. _l0qihvfywy1qb0g7zo1_500.jpg (JPEG Image, 500x294 pixels) 3QRji.jpg (JPEG Image, 500x408 pixels) 10 Things I Learned (Or Unlearned) When I Had Kids. Make a Simple and Slick Accordion Menu in Photoshop.

Welcome to - World's Computer Graphics Community. 102 things guys need to know about girls.