background preloader

Exploit / Vulnerability Search Engine

Exploit / Vulnerability Search Engine

http://www.exploitsearch.net/

Related:  Hacking Tools / Downloads / Scripts & CodesTools: Security - Forensics - Pentesting - Ethical HackingHackingAbout Hacking

Cheat Engine Features[edit] Cheat Engine can inject code into other processes and as such most anti-virus programs mistake it for a virus. There are versions that avoid this false identification at the cost of many features (those which rely upon code injection). The most common reason for these false identifications is that Cheat Engine makes use of some techniques also used in trojan rootkits to gain access to parts of the system, and therefore gets flagged as suspicious, especially if heuristic scanning is enabled in the anti-virus program's settings. Newer versions of Cheat Engine are less likely to be blocked by anti-virus programs so features like code injection can be used without problems.

Top 15 Open Source. Free Security. Tools. 1. Nmap Nmap (“Network Mapper”) is a free and open source (license) utility for network discovery and security auditing. Nmap uses raw IP packets in novel ways to determine what hosts are available on the network, what services (application name and version) those hosts are offering, what operating systems (and OS versions) they are running, what type of packet filters/firewalls are in use, and dozens of other characteristics. Nmap homepage.

7 Most Notorious Computer Hacker Groups of All Time With the recent attack on PlayStation Network and a bunch of high-profile websites, computer hackers are back in the limelight again. Hackers and hacker groups were quite famous in the 80’s and 90’s but their popularity started fading since the Y2K days. Today, we are once again witnessing hackers threatening to take on giant corporations sending chills down everyone's spine. We have already featured here some of the most infamous black hat hackers of all time. 8 Things You Won't Believe Can Be Hacked If movies are to be believed, hackers are mostly kept busy fighting the man with CGI animations of smiley faces, or else dwelling in the darkest corners of their mothers' basements and doing purely nerdy stuff that never affects the real world. But neither assumption is true: Hacking does not look like a rad skateboarder busting a kickflip over an onyx tower, and hackers do gain access to things that can affect your daily life ... and sometimes, even end it. #8. Explode Your Genitals We think we have a pretty good idea of what hackers are capable of: stealing your personal information, crashing your computer, Rollerblading like a sonofabitch and making out with Angelina Jolie (back when she was hot, before her alien DNA kicked in and she started looking like a hawk-monster). But today's hackers have finally crossed a line, and must be terminated with extreme prejudice.

Jpg+FileBinder Free Download Protecting private information against unauthorized access is one of the problems that computer users encounter. In order to solve this issue, you can use various encryption methods, but there are also applications such as Jpg+FileBinder that can help you. This lightweight tool is simple, yet useful, as it allows you to hide important information in a picture carrier file.

Autopsy Forensic Easy to Use Autopsy was designed to be intuitive out of the box. Installation is easy and wizards guide you through every step. All results are found in a single tree. See the intuitive page for more details. Extensible How To Become A Hacker Copyright © 2001 Eric S. Raymond As editor of the Jargon File and author of a few other well-known documents of similar nature, I often get email requests from enthusiastic network newbies asking (in effect) "how can I learn to be a wizardly hacker?". Back in 1996 I noticed that there didn't seem to be any other FAQs or web documents that addressed this vital question, so I started this one. A lot of hackers now consider it definitive, and I suppose that means it is. Motion Activated Camera - Day of the New Dan December 20, 2009 I made a relatively simple attachment to my Canon SLR to create a motion activated camera using Arduino. A lot of this was based on and inspired by the intervalometer project at The Honey Jar.

Hidden iframe injection attacks [Updated on October 27, 2009 with new a version of the script] It is a shame that after all those posts about security, some of my websites were under attack today. Shoban and Anand emailed me about this today morning (Thanks guys) and I tried to understand what was going on. To my utter disbelief more than 10 websites hosted in the same server were affected by the attack. All the index.* files in the server were infected with a piece of code that loaded a hidden iframe in the page.

Related:  mayuragnihotribenny519