background preloader

Exploit/Vulnerability Search Engine

Exploit/Vulnerability Search Engine

http://www.exploitsearch.net/

Motion Activated Camera - Day of the New Dan December 20, 2009 I made a relatively simple attachment to my Canon SLR to create a motion activated camera using Arduino. A lot of this was based on and inspired by the intervalometer project at The Honey Jar. Dr.Web - innovation anti-virus security technologies. Comprehensive protection from Internet threats. Everyone knows that once you are on malicious or fraudulent websites, your PC can easily become infected, especially if your computer or mobile device does not have anti-virus software installed. But could this be avoided? Yes, and it’s as simple as this: if a website looks suspicious, you check it on this web page before clicking on the unknown link. Attention! New threat! Getting infected by browsing websites with a mobile device

ActivePerl is Perl for Windows, Mac, Linux, AIX, HP-UX & Solaris ActivePerl Business and Enterprise Editions feature our precompiled, supported, quality-assured Perl distribution used by millions of developers around the world for easy Perl installation and quality-assured code. When you're using Perl on production servers or mission-critical applications, ActivePerl Business and Enterprise Editions offer significant time savings over open source Perl for installing, managing, and standardizing your Perl . If you are using ActivePerl for production, redistribution, on terminal servers, for thin client for app deployment (i.e. on MS Terminal Services, Citrix XenApp or File Servers), or for use on HP-UX/AIX/Solaris then ActivePerl Community Edition is not the right license for you. Please contact us for Business Edition or Enterprise Edition options. Not sure which edition is right for you? Check the Compare Editions chart.

Play And Convert Any Multimedia File In this post I will list some problems many people have with multimedia formats and one solution. But let's start with the problems: * I have a video file and I want to extract the audio part.* I have an AVI video and I want to put it on my web page in a format optimized for the web.* How can I transfer videos from my PC to my mobile phone that supports only 3gp format? Programmable HID USB Keystroke Dongle: Using the Teensy as a pen testing device Programmable HID USB Keystroke Dongle: Using the Teensy as a pen testing device Quick Links To Sections: Introduction So, why would a pen-tester want one?

Reverse IP Lookup - Find Other Web Sites Hosted on a Web Server Find other sites hosted on a web server by entering a domain or IP address above. Note: For those of you interested, as of May 2014, my database has grown to over 100 million domain names. I am now offering this domain list for purchase. A reverse IP domain check takes a domain name or IP address pointing to a web server and searches for other sites known to be hosted on that same web server.

Hidden iframe injection attacks [Updated on October 27, 2009 with new a version of the script] It is a shame that after all those posts about security, some of my websites were under attack today. Shoban and Anand emailed me about this today morning (Thanks guys) and I tried to understand what was going on. To my utter disbelief more than 10 websites hosted in the same server were affected by the attack. All the index.* files in the server were infected with a piece of code that loaded a hidden iframe in the page. Top 15 Open Source/Free Security/Hacking Tools 1. Nmap Nmap (“Network Mapper”) is a free and open source (license) utility for network discovery and security auditing. Nmap uses raw IP packets in novel ways to determine what hosts are available on the network, what services (application name and version) those hosts are offering, what operating systems (and OS versions) they are running, what type of packet filters/firewalls are in use, and dozens of other characteristics. Nmap homepage.

How To Hack Into Someones Webcam Updated Instructions Working! (Hd) Description: In this video i'll show how to "hack" into someones webcam using the Social engineering Toolkit + Java Exploit ;) what gains the attacker a meterpreter shell with this shell it is possbile to take a snapshot Song - Face the Wolf - Well hello there, mothership Zeta Tags: meterpreter , metasploit , webcam , Disclaimer: We are a infosec video aggregator and this video is linked from an external website.

Related: