Archive of exploits and security advisories
A large and descriptive exploit archive organized by affected operating systems.
A group that develops as well as discloses software exploits on many of the security mailing lists. Mainly specializing with Microsoft Office and Internet Explorer Vulnerabilitys.
The Metasploit Project is an open source computer security project which provides information about security vulnerabilities and aids in penetration testing and IDS signature development. Its most well-known sub-project is the Metasploit Framework, a tool for developing and executing exploit code against a remote target machine. Other important sub-projects include the Opcode Database, shellcode archive, and security research.
Step by step guide to privilege escalation using shatter attacks. Shatter Attacks use flaws within the Windows API call SetWindowLong() as well as others.
Packet Storm is a non-profit organization comprising computer security professionals that are dedicated to providing the information necessary to secure the networks world-wide. It publishes new security information on a global network of websites. The organization offers an abundant resource of up-to-date and historical security tools, exploits, and advisories. It provides network security professionals, researchers, and all other interested individuals with the ability to analyze and learn from the tools, processes and mindsets of their opponents, as well as offering the tools needed to build and test defenses against them.
Custom built network tools designed to take advantage of the exploits within many network hardware systems. Also the home of the k0ld LDAP brute force utility. A must have for many professional penetration testers.
Commercial hacker training course on how to write and use exploits.
Series of papers on how to write exploits and discover vulnerabilities
A collection of mailing list archives dealing with exploits, vulnerability development and hacking
Computers /
Hacking /
Text_Archives
|