Facebook Twitter web application security lab Here we are, my friends. The 1000th post. Whew! It’s quite a load off to have finally made it. Hopefully this doesn’t come as a surprise to anyone since I’ve been announcing it for months, and if you have questions, hopefully the FAQ can answer them. I wrote and re-wrote this post several times. web application security lab
Hacker News | you hack - we laugh
Welcome to Brownie! — Brownie v0.2+ documentation Welcome to Brownie! — Brownie v0.2+ documentation Have you ever started a new project and implemented this little function foo or this datastructure bar you already implemented for another project?Ever wondered why a specific feature is not in the standard library already?Wanted to use that new datastructure but you are still stuck with this ancient Python version or are just not willing or able to switch to Python 3.x, yet?And most importantly were too lazy to implement this datastructure which would be more appropriate to use?
Disk Wiping with dcfldd Did you know that a real ninja was once employed by the Defense Computer Forensics Laboratory or DCFL for short? During Nick’s employment at DCFL, he coded “dcfldd”, an enhanced version of the “dd” program found in GNU Core Utilities (GNU coreutils). dcfldd is still used quite often when imaging digital evidence.Not only is it used by DCFL and other alphabet soup but by individuals working in the private sector. Browse | Anti-Forensics Browse | Anti-Forensics
List of Useful and Must-Have plugins! (100+) - Minecraft Forums I'm going to update this soon! See post below. EDIT: Soon means tomorrow, 13 Dec 2010. EDIT2: Today is Dec 13th 2010, and here it is. List of Useful and Must-Have plugins! (100+) - Minecraft Forums
Join Application
Exploitation - it-sec-catalog - References to vulnerability exploitation stuff. - Project Hosting on Google Code Exploitation - it-sec-catalog - References to vulnerability exploitation stuff. - Project Hosting on Google Code 1. How to use this wiki ... or several advices for beginners
Rubberhose transparently and deniably encrypts disk data, minimising the effectiveness of warrants, coersive interrogations and other compulsive mechanims, such as U.K RIP legislation. Rubberhose differs from conventional disk encryption systems in that it has an advanced modular architecture, self-test suite, is more secure, portable, utilises information hiding (steganography / deniable cryptography), works with any file system and has source freely available. Currently supported ciphers are DES, 3DES, IDEA, RC5, RC6, Blowfish, Twofish and CAST. Written by Julian Assange , Ralf P. Weinmann and Suelette Dreyfus, Rubberhose is currently available for Linux 2.2. Userland daemons and tools are highly portable. Rubberhose cryptographically deniable transparent disk encryption system Rubberhose cryptographically deniable transparent disk encryption system
Setting up your own SSL VPN | TheXploit | Security Blog “All I want for Christmas is my own VPN…my own VPN, my own VPN” – Dustin I’ve been wanting to have access to my own secure VPN for quite some time so that when I’m away from home and only have access to insecure networks, I don’t have to use work’s VPN for personal use or worry about someone intercepting my traffic. I looked into a couple paid VPN solutions but none of them seem to guarantee your privacy as far as I’m concerned. I figured my best option was to setup and manage my own. I chose to do all my setup on Ubuntu Linux but you can easily port these instructions to an alternative Linux distribution with relative ease. Setting up your own SSL VPN | TheXploit | Security Blog
About PlugBot - The PlugBot ~ The PlugBot is a small form factor computer used for Physical Penetration Testing About PlugBot - The PlugBot ~ The PlugBot is a small form factor computer used for Physical Penetration Testing PlugBot is a research project and I plan to release the code for free under GPL license. Please help me fund this project by donating via PayPal! PlugBot is a hardware bot.
online storage re-imagined
Welcome to the download page for CrunchBang Linux Waldorf. Please choose a flavour from below: 32-bit 64-bit This is the download page for the stable branch of CrunchBang. Waldorf is built from Debian Wheezy sources. Debian Wheezy is the current stable branch of Debian and therefore it should provide excellent stability and security. Download CrunchBang Linux 10 "statler" r20101205 Download CrunchBang Linux 10 "statler" r20101205
DEFT Linux - Computer Forensics live cd DEFT Linux - Computer Forensics live cd Hello Everybody, First of all, Happy New Year. It has been a very tough year, full of surprises, some positive, some others not. One of these, the premature death of my father, forced us to stop temporarily the development of DEFT 8.1 causing a delay in its release date. In this regard, the board of directors of DEFT Linux Association recently met to plan a new road-map in view of DEFTCON 2014. DEFT 8.1 will be released no later than the first week of April 2014, thus to be able to present the latest news at DEFTCON; the same day DEFT Zero, a micro live CD for forensic acquisition only, will be released.
GnackTrack - Gnome Based Penetration Distro
Welcome to KXStudio
I2P Anonymous Network The I2P network provides strong privacy protections for communication over the Internet. Many activities that would risk your privacy on the public Internet can be conducted anonymously inside I2P. Get I2P 0.9.12
LittleBlackBox is a collection of thousands of private SSL and SSH keys extracted from various embedded devices. These private keys are stored in a database where they are correlated with their public certificates as well as the hardware/firmware that are known to use those private keys. A command line utility is included to aid in the identification of devices or network traffic that use these known private keys. Given a public certificate, the utility will search the database to see if it has a corresponding private key; if so, the private key is displayed and can be used for traffic decryption or MITM attacks. Alternatively, it will also display a table of hardware and firmware that is known to use that private key. littleblackbox - Project Hosting on Google Code The Evil URL Shortener « Spare Clock Cycles I, like many people, have been closely following a lot of the chaos happening around the recent Wikileaks dump, and was particularly fascinated by the DDoS attacks by activists on either side. One tool specifically caught my eye in the midst of the attacks, however: the JS LOIC. The tool works simply by constantly altering an image file's source location, so that the browser is forced to continuously hammer the targeted server with HTTP requests.
Bitcoin P2P Virtual Currency | Bitcoin Bitcoin is an innovative payment network and a new kind of money. Instant peer-to-peertransactions Worldwidepayments Zero or lowprocessing fees Bitcoin uses peer-to-peer technology to operate with no central authority or banks; managing transactions and the issuing of bitcoins is carried out collectively by the network.
Ubuntu Security
GNOME Shell: Getting prettier by the day
10 things to do after installing Ubuntu 10.04 Lucid Lynx
Godzilla Haiku
redsn0w 0.9.7 Untethered iOS 4.2.1 jailbreak guide | Geekword - Technology Blog
Shedding Bikes: Programming Culture And Philosophy
Tf2 Items & Hats Pricing Guide
Index of /27c3-stream/releases/mkv
Dyko - A Lightweight Web Framework



High Yield Checking Account from ING DIRECT USA
forums - Powered by vBulletin
Hack This Site!
Open Letter to
Human Bagel Web Services
13 Steps To A Better Wordpress Install
Free Books
Allen's Weblog: Unicode in Python, and how to prevent it
Drupal site building tips -
Living Off the Grid: Free Yourself
10 Cool Ways to Use Nmap
BinPack | West Coast Hackers - Tales of Team Fortress 2 pwnage and other hilarity
The Secret Life of Chaos Part (1 - 6)
GPG Quick Start
GNUPG Windows Setup - Coresecure, Inc.
Before it's News
HiR Information Report: Make your own lock picks - Part 1
Body Scanners (and Groping?) Coming To A Train Station Near You?
The TSA and America's Turning Point | Scragged
I was just detained by the TSA
The Death Delusion
How The TSA Legally Circumvents The Fourth Amendment - Flying With Fish
Ron Paul on ‘Opt-Out Day’: ‘If we tolerate’ the TSA, ‘there’s something wrong with us’ | Raw Story
Anti-earmarker Jon Kyl slips $200 million earmark into bill
Big Sis Caught Lying To American People
Ty's Search for Truth
Jon and Eric's Blog
To promote flying with dignity
Team Fortress 2 Server List | Search Tf2 Stats, Rankings, and Banners - Game Tracker
zero hedge | on a long enough timeline, the survival rate for everyone drops to zero
A Majority Of Americans Believe The US Government No Longer Operates Within The Constitution | zero hedge
overview for afrael
Google Translate
Fraps & VirtualDub: How to save disk space and enjoy good quality, small file size HD video clips | The Don's Craptastic World
Lock Picking 101 • View topic - Welcome! (What's all this TOSL stuff about...)
Lockpicks by Open Locksport by Schuyler Towne
Ugh fields
Making Your Twitter Followers A Little More Uneasy
I shed a 170-lb monkey off my back in 1.5 years using hardcore prescription drugs (380 --> 210). AMA. : IAmA
The 2fort2furious Forum / Profile
what quote(s) do you live by? : AskReddit
Karmanaut's map of reddit
What are some good, active subreddits that maybe aren't very well known? : AskReddit
Population - Anno 1404 Wiki
Post Your Farming Builds
Post #1197090
_l0qihvfywy1qb0g7zo1_500.jpg (JPEG Image, 500x294 pixels)
3QRji.jpg (JPEG Image, 500x408 pixels)
10 Things I Learned (Or Unlearned) When I Had Kids | The Evolution of Dad
Make a Simple and Slick Accordion Menu in Photoshop
Welcome to - World's Computer Graphics Community
102 things guys need to know about girls