cDc communications
No information avaiable
http://www.cultdeadcow.com/
popularity:
hacking
security
culture
underground
hacker
tech
technology
hack
blog
activism
|
Sploitcast
SploitCast will discuss a wide variety of topics; these include, but ... exploit code, security and technology news, and possibly even cute little bunny ...
similarity:
popularity:
security
podcast
hacking
podcasts
hack
tech
hacks
news
geek
programming
|
Hacking Videos from Shmoocon - good coders code, great reuse
No information avaiable
similarity:
popularity:
hacking
security
video
programming
videos
tutorial
hacker
learning
hack
hacks
|
Hacker Disables More Than 100 Cars Remotely | Threat Level | Wired.com
No information avaiable
similarity:
popularity:
security
hacking
cars
automotive
news
auto
austin
hacker
tech
remote
|
invisiblethings' blog
VM escapes, hypervisor compromises (via "classic" rootkits, as well as Bluepill ... The training offers quite a unique chance, I think, to absorb the results of 1 ...
similarity:
popularity:
security
blog
hacking
blogs
malware
rootkits
research
virtualization
hack
software
|
pOrtalHAcker.NET hacking, hackers, programas, codes, noticias, programacion y mucho mas.
No information avaiable
similarity:
popularity:
hacking
hacker
hack
seguridad
security
utilidades
underground
resources
forum
|
#!/bin/the hacker's choice - THC
http://freeworld.thc.org/thc-epassport/ Mon, Sep 29, 2008. 13:29:00 - MinistryOfTruth ... Copyright © 1997-2008 The (Freeworld) Hacker's Choice ...
similarity:
popularity:
security
hacking
network
hack
tools
howto
hacks
linux
exploits
opensource
|
0xdeadbeef dot info | raptor's labs
Extensive information about ethical hacking and vulnerability ... Send feedback to: Marco Ivaldi <raptor[at]0xdeadbeef.info> (PGP key). "Software is like sex. ...
similarity:
popularity:
security
hacking
exploits
pentest
tools
linux
hack
programming
hacker
reference
|
Penetration Test
... DBA_USERS WHERE US ERNAME='SYS')||'.vulnerabilityassessment.co.uk') FROM DUAL; ... DBA_USERS WHERE USERNAM E='SYS')||'.vulnerabilityassessment.co.uk') FROM DUAL ...
similarity:
popularity:
security
hacking
pentest
reference
penetration
tools
tutorial
howto
network
hack
|
PHENOELIT
No information avaiable
similarity:
popularity:
security
hacking
tools
network
networking
hack
hacks
cracking
cisco
software
|
Hack Forums
No information avaiable
similarity:
popularity:
hacking
forum
security
hack
forums
hacker
learning
hacks
tutorials
computer
|