background preloader


Facebook Twitter web application security lab. Hacker News. Welcome to Brownie! — Brownie v0.2+ documentation. Anti-Forensics. List of Useful and Must-Have plugins! (100+) - Minecraft Forums. I'm going to update this soon!

List of Useful and Must-Have plugins! (100+) - Minecraft Forums

See post below. EDIT: Soon means tomorrow, 13 Dec 2010. EDIT2: Today is Dec 13th 2010, and here it is. Join Application. Exploitation - it-sec-catalog - References to vulnerability exploitation stuff. - Project Hosting on Google Code. 1.

Exploitation - it-sec-catalog - References to vulnerability exploitation stuff. - Project Hosting on Google Code

How to use this wiki ... or several advices for beginners. Rubberhose cryptographically deniable transparent disk encryption system. Rubberhose transparently and deniably encrypts disk data, minimising the effectiveness of warrants, coersive interrogations and other compulsive mechanims, such as U.K RIP legislation. Rubberhose differs from conventional disk encryption systems in that it has an advanced modular architecture, self-test suite, is more secure, portable, utilises information hiding (steganography / deniable cryptography), works with any file system and has source freely available. Currently supported ciphers are DES, 3DES, IDEA, RC5, RC6, Blowfish, Twofish and CAST.

Written by Julian Assange , Ralf P. Weinmann and Suelette Dreyfus, Rubberhose is currently available for Linux 2.2. Userland daemons and tools are highly portable. Setting up your own SSL VPN. “All I want for Christmas is my own VPN…my own VPN, my own VPN” – Dustin.

Setting up your own SSL VPN

About PlugBot - The PlugBot ~ The PlugBot is a small form factor computer used for Physical Penetration Testing. PlugBot is a research project and I plan to release the code for free under GPL license.

About PlugBot - The PlugBot ~ The PlugBot is a small form factor computer used for Physical Penetration Testing

Please help me fund this project by donating via PayPal! PlugBot is a hardware bot. Online storage re-imagined. Download CrunchBang Linux 10 "statler" r20101205. Welcome to the download page for CrunchBang Linux Waldorf.

Download CrunchBang Linux 10 "statler" r20101205

Please choose a flavour from below: 32-bit 64-bit This is the download page for the stable branch of CrunchBang. Waldorf is built from Debian Wheezy sources. Debian Wheezy is the current stable branch of Debian and therefore it should provide excellent stability and security. DEFT Linux - Computer Forensics live cd. GnackTrack - Gnome Based Penetration Distro. Welcome to KXStudio. I2P Anonymous Network.

Littleblackbox - Project Hosting on Google Code. LittleBlackBox is a collection of thousands of private SSL and SSH keys extracted from various embedded devices.

littleblackbox - Project Hosting on Google Code

These private keys are stored in a database where they are correlated with their public certificates as well as the hardware/firmware that are known to use those private keys. A command line utility is included to aid in the identification of devices or network traffic that use these known private keys. Given a public certificate, the utility will search the database to see if it has a corresponding private key; if so, the private key is displayed and can be used for traffic decryption or MITM attacks. Alternatively, it will also display a table of hardware and firmware that is known to use that private key. The Evil URL Shortener « Spare Clock Cycles.

I, like many people, have been closely following a lot of the chaos happening around the recent Wikileaks dump, and was particularly fascinated by the DDoS attacks by activists on either side. The Evil URL Shortener « Spare Clock Cycles

One tool specifically caught my eye in the midst of the attacks, however: the JS LOIC. The tool works simply by constantly altering an image file's source location, so that the browser is forced to continuously hammer the targeted server with HTTP requests. Not a sophisticated or technically interesting tool by any means, but conceptually interesting in that it only requires a browser to execute one's portion of a DoS attack. While the concept itself is not all that new, it got me thinking about the implications of such browser based DoS attacks. Clearly, it opens the door for the creation of a DDoS botnet without ever having to actually exploit the hosts participating in the network; all that is required is to get some Javascript to run in the participants' browsers. Bitcoin P2P Virtual Currency.

Ubuntu Security. GNOME Shell: Getting prettier by the day. 10 things to do after installing Ubuntu 10.04 Lucid Lynx. If you’re going to be installing a freshly minted copy of Ubuntu 10.04 LTS later today or this weekend then the following list of 10 reader submitted post-install must-do’s will help ensure that you’re off to a flying start with your new OS. 1.

10 things to do after installing Ubuntu 10.04 Lucid Lynx

Run Update Manager Just because you’ve installed the latest version of Ubuntu doesn’t mean that there won’t already be a handful of bug fixes updates or patches waiting for you. Make sure you run the update manager (if it doesn’t update you first) so that you’re benefitting from the latest fixes and features. Wirewatcher. Godzilla Haiku. Shedding Bikes: Programming Culture And Philosophy. By Zed A. Shaw. Tf2 Items & Hats Pricing Guide. Index of /27c3-stream/releases/mkv. Dyko - A Lightweight Web Framework.


Programming. Wikileaks. High Yield Checking Account from ING DIRECT USA. Forums - Powered by vBulletin. Hack This Site! OpenNIC. Open Letter to To Customer Service and Jeff Bezos, I’m disgusted by Amazon’s cowardice and servility in abruptly terminating its hosting of the Wikileaks website, in the face of threats from Senator Joe Lieberman and other Congressional right-wingers.

Open Letter to

I want no further association with any company that encourages legislative and executive officials to aspire to China’s control of information and deterrence of whistle-blowing. For the last several years, I’ve been spending over $100 a month on new and used books from Amazon. Human Bagel Web Services. 13 Steps To A Better Wordpress Install. Free Books. A lot of people keep asking about a good list of programming books.

Free Books

Hence, we are building this list to save your time and to spread the knowledge. Some of these books will definitely help us to evolve our coding skills and thought processes for developing better solutions. We will do our best to keep updating this list, hope you find this list useful, here we go. Allen's Weblog: Unicode in Python, and how to prevent it. [UPDATE 16 Aug 2011] Armin Ronacher has written a nice module called unicode-nazi that provides the Unicode warnings I discuss at the end of this article. Though I can't use Python 3 for any of my projects, it does have a few nice things. One particular behaviour where it improves on Python 2 is forbidding implicit conversions between byte strings and Unicode strings.

For example: Drupal site building tips - Living Off the Grid: Free Yourself. 10 Cool Ways to Use Nmap. Nmap (“Network Mapper”) is a free and open source (license) utility for network exploration or security auditing. Many systems and network administrators also find it useful for tasks such as network inventory, managing service upgrade schedules, and monitoring host or service uptime. - Tales of Team Fortress 2 pwnage and other hilarity. The Secret Life of Chaos Part (1 - 6) GPG Quick Start. Initial publication: July 7, 2004 Most recent revision: July 20, 2011 A quick gpg HOWTO for getting started with GnuPG. A colleague at work once asked me how to get started using gpg, the GNU Privacy Guard. He had no experience with it at all. Here’s a slightly expanded version of what I told him. Private and public keys are at the heart of gpg’s encryption and decryption processes.

Generate a private key. gpg --gen-key You’ll have to answer a bunch of questions: What kind and size of key you want; the defaults are probably good enough. GNUPG Windows Setup - Coresecure, Inc. Before it's News. PhilipBrennan.Net. HiR Information Report: Make your own lock picks - Part 1. Body Scanners (and Groping?) Coming To A Train Station Near You?

The TSA and America's Turning Point. I was just detained by the TSA. 4thamendmentwear. The Death Delusion. “Afraid of dying? How The TSA Legally Circumvents The Fourth Amendment. Ron Paul on ‘Opt-Out Day’: ‘If we tolerate’ the TSA, ‘there’s something wrong with us’ Anti-earmarker Jon Kyl slips $200 million earmark into bill. Big Sis Caught Lying To American People. Ty's Search for Truth. Jon and Eric's Blog. To promote flying with dignity. Search Tf2 Stats, Rankings, and Banners.

On a long enough timeline, the survival rate for everyone drops to zero. A Majority Of Americans Believe The US Government No Longer Operates Within The Constitution. Overview for afrael. Google Translate. Fraps & VirtualDub: How to save disk space and enjoy good quality, small file size HD video clips. View topic - Welcome! (What's all this TOSL stuff about...) Lockpicks by Open Locksport by Schuyler Towne. FreeRangeKids. Ugh fields. Making Your Twitter Followers A Little More Uneasy. I shed a 170-lb monkey off my back in 1.5 years using hardcore prescription drugs (380. The 2fort2furious Forum / Profile. What quote(s) do you live by? : AskReddit. Karmanaut's map of reddit.

What are some good, active subreddits that maybe aren't very well known? : AskReddit. Population - Anno 1404 Wiki. Post Your Farming Builds. Post #1197090. _l0qihvfywy1qb0g7zo1_500.jpg (JPEG Image, 500x294 pixels) 3QRji.jpg (JPEG Image, 500x408 pixels) 10 Things I Learned (Or Unlearned) When I Had Kids. Make a Simple and Slick Accordion Menu in Photoshop. Welcome to - World's Computer Graphics Community. 102 things guys need to know about girls.