Home
Contact us
Links
Disclaimer
Social Profiles
Popular Posts
The Volatility Framework: Volatile memory artifact extraction utility framework
The Volatility Framework is a completely open collection of tools, implemented in Python under the GNU General Public License, for the extr...
SjXjV 2.3 SQL Injection
# [+] SjXjV-2.3 (post tid) Remote SQL Injection Vulnerabilities # [+] Software : SjXjV-2.3 # [+] Download : http://www.shijiexuexi.cn # [+] ...
DNS Poisoning Via Port Exhaustion
Whitepaper called DNS Poisoning Via Port Exhaustion. It covers everything from how DNS poisoning works to various methods of performing ...
DEFCON 19: Hacking .Net Applications: The Black Arts
Speaker: Jon McCoy DigitalbodyGuard This presentation will cover the Black Arts of making Cracks, KeyGens, Malware, and more. The info...
A little guide for linux distros
Hi Security Explorers, Linux is growing really fast now a days and i believe it is the future of OS. Anyway there is still a lot of Linu...
Links