Search
Results
Payloads All The Things
[https://swisskyrepo.github.io/PayloadsAllTheThings/] - - public:realjck
A list of useful payloads and bypasses for Web Application Security.
microsoft/Security-101: 7 Lessons, Kick-start Your Cybersecurity Learning.
What is CORS? | SimpleLocalize
Refined Blog
Search Engine for Source Code - PublicWWW.com
[https://publicwww.com/] - - public:drbrandus
Search engine for source code - ultimate solution for digital marketing and affiliate marketing research.
xss game tutorial by google
IP Camera CGI Application Guide
[http://www.inkovideo.de/uploads/inkovideo/ckeditor/APEXIS%20MJPEG%20IP%20Camera%20CGI%20-English%20Version1.27.pdf] - - public:mepage
Netwave IP Camera API
Luhn algorithm - Wikipedia, the free encyclopedia
Writing Secure Code
Detecting Firefox Extensions | Primate Brow Flash
Digital Whisper :: מגזין אבטחת מידע וטכנולוגיה
JavaRanch - How Can An Applet Read Files On The Local File System
Simple Techniques to Lock Down your Website - Nettuts+
Windows XP x86 (32-bit) Service Pack 3 Service Configurations by Black Viper
Gimpel Software Home Page for PC-lint and FlexeLint for C/C++
SANS Institute - CWE/SANS TOP 25 Most Dangerous Programming Errors
XSS (Cross Site Scripting) Cheat Sheet
Web Application Security Consortium - Web hacking Incidents Database (WHID) - The Web Hacking Incidents Database
Security Docs : Articles, Tutorials and Security Whitepapers
Lutz Roeder's Programming.NET C# VB CLR
We Are Morons: a quick look at the Win2k source || kuro5hin.org
Top 15 free SQL Injection Scanners - Security-Hacks.com
אתר אבטחת מידע ממשלתי
Suppware - TCP/IP Ports
BuildSecurityIn
iDefense Labs
Windows rootkits of 2005, part three
Trap CtrlAltDel; Hide Application in Task List on Win2000/XP - The Code Project - System
WINDOWS ROOTKITS FREE COUNTERMEASURES Part 1: Introduction to Rootkits - SECURITY OVERFLOW
WindowsXP Tips
How to hide your application from the Windows process list
Nikto - sniffer for valunerabilities
HijackThis Log file - online analysis
The Ethical Hacker Network - Essential Wireless Hacking Tools
Class based linux Kernel Resource Management
The ELF Virus Writing HOWTO
[http://www.lwfug.org/~abartoli/virus-writing-HOWTO/_html/] - - public:zhesto
write parasitic file viruses infecting ELF executables