171 private links
Sploitus is Đ° convenient central place for identifying the newest exploits and finding attacks that exploit known vulnerabilities.
HackerOne Bounty is a continuous security program in which trusted hackers are incentivized to find critical vulnerabilities before they fall into the wrong hands. A Bounty program can be run privately (invite-only) or publicly (open for all) and is perfect for organizations looking for a security solution that keeps pace with an agile software development lifecycle.
PwnWiki.io is a collection TTPs (tools, tactics, and procedures) for what to do after access has been gained.
We want/need your help! Please contribute to this project is via GitHub (https://github.com/pwnwiki/pwnwiki.github.io). That allows us to get your project-ready content incorporated into the wiki fast.
Find your smartphone or tablet on the right side and head over to download the Framaroot APK and root your device.
Using framaroot is very easy and you shouldn't encounter any problem with it.
If you want to unroot your device after you've rooted it, that's also possible. You will have to flash a stock ROM and your device will be instantly unrooted.
Inj3ct0r is the ultimate database of exploits and vulnerabilities and a great resource for vulnerability researchers and security professionals.
Our aim is to collect exploits from submittals and various mailing lists and concentrate them in one, easy-to-navigate database.
This was written solely for educational purposes. Use it at your own risk. The author will be not responsible for any damage. // r0073r
We are a group of people from various parts of the world, who like to experiment with computers. We hope that we can provide some information back to the public and support the ongoing process of learning. Our group is involved in various research and projects such as Hardware Hacking, BackTrack, Exploit Development, Online Information Security Training, and various other aspects of network security.
The two visualizations on this page are simple graphs which provide different views of how the assignment of vulnerability types has changed over time.
This is a list of data sources that may be useful to cyber security. We are documenting these sources as part of an ongoing project, Stucco.
This page shows the components of the CVSS score for example and allows you to refine the CVSS base score. Please read the CVSS standards guide to fully understand how to score CVSS vulnerabilities and to interpret CVSS scores.
In the last 12 months (2016/2017) our top researchers have published over 800 individual discovered vulnerabilities in popular famous manufacturer products. The discovered vulnerabilities are often disclosed and reused by monitoring systems, IPS, and publishers, we have decided to develop a vulnerability laboratory for the safe processing of our own zero-day security vulnerabilities.
'pwnable.kr' is a non-commercial wargame site which provides various pwn challenges regarding system exploitation. the main purpose of pwnable.kr is 'fun'. please consider each of the challenges as a game. while playing pwnable.kr, you could learn/improve system hacking skills but that shouldn't be your only purpose.
The successor to reDuh, pwn a bastion webserver and create SOCKS proxies through the DMZ. Pivot and pwn.
Commix (short for [comm]and [i]njection e[x]ploiter) has a simple environment and it can be used, from web developers, penetration testers or even security researchers to test web applications with the view to find bugs, errors or vulnerabilities related to command injection attacks. By using this tool, it is very easy to find and exploit a command injection vulnerability in a certain vulnerable parameter or string. Commix is written in Python programming language.
wiki de la communauté Zenk-Security
Repositories, Challenges, Writeups, Audit, Technique, ...
PowerSploit is a collection of Microsoft PowerShell modules that can be used to aid penetration testers during all phases of an assessment. PowerSploit is comprised of the following modules and scripts:
Nishang is a framework and collection of scripts and payloads which enables usage of PowerShell for offensive security, penetration testing and red teaming. Nishang is useful during all phases of penetration testing.
captf.com / capture.thefl.ag
This site is primarily the work of psifertex since he needed a dump site for a variety of CTF material and since many other public sites documenting the art and sport of Hacking Capture the Flag events have come and gone over the years.
Some contributions I’ve made to the community include the Brainpan challenges, and handful of exploits. I also participate in CTF events as a member of the VulnHub CTF Team.
Hackademics : Forum de hacking – hackers white hat – cours de securite informatique, apprendre langage python, tutoriels de reverse engineering