finds you similar websites
auto-suggest    top sites

May 8th, 2024

16 Popular Sites Like Secdev

The team has explored the web and came across tons of striking security and python sites like Secdev. Come and uncover websites that are complementary to Secdev.

Displaying 11 to 20 of 500 alternatives to Secdev. (Updated: May 8th, 2024)     [about these results]
Advanced Options
? Sort by:
popularity similarity
? Must Include:
? Cannot Include:
? Look For


 
You're looking for other sites like Secdev:
  SecDev.org
I can give trainings on many subjects (Scapy, networks, shellcoding, exploit writing, etc.). Contact me directly: phil@secdev.org. Conferences ...
http://www.secdev.org/
popularity:
security
python
network
hacking
linux
tools
software
networking
scapy
unix
new search by a custom tag signature
  Nmap - Free Security Scanner For Network Exploration & Security Audits.
Nmap Free Security Scanner For Network Exploration & Hacking. Download open source software for Redhat Linux,Microsoft Windows,UNIX,FreeBSD,etc.
similarity:
popularity:
security
network
tools
software
nmap
networking
linux
opensource
utilities
sysadmin
  .:[ packet storm ]:. - http://packetstormsecurity.org/
Information and computer security full disclosure web site ... http://packetstormsecurity.org/0906-exploits/0906-exploits.tgz. June 29, 2009 ...
similarity:
popularity:
security
hacking
tools
exploits
news
network
software
hack
internet
exploit
  [lcamtuf.coredump.cx]
Click here for sample chapters, plenty of reviews, and other useful information. ... NEW Interesting vulnerabilities: exploitable DOM fuzzing crashes in multiple ...
similarity:
popularity:
security
hacking
programming
tools
network
software
people
blog
linux
geek
  Foundstone, a division of McAfee, Inc.
Providing vulnerability management and protection, a full suite of services, and a curriculum of education.
similarity:
popularity:
security
tools
software
network
hacking
networking
internet
utilities
forensics
web
  PORTKNOCKING - A system for stealthy authentication across closed ports. : ABOUT : summary
A system for stealthy authentication across closed ports.
similarity:
popularity:
security
firewall
portknocking
linux
network
networking
unix
sysadmin
tools
hacking
  TECH SOURCE FROM BOHOL: 10 Best Hacking and Security Software Tools for Linux
Hacks, News, Tutorials, Reviews about Linux, Open Source, Ubuntu, Google, Apple, Microsoft, Programming, Gadgets, and everything related to Digital Technology.
similarity:
popularity:
linux
security
tools
hacking
software
unix
sysadmin
hack
utilities
ubuntu
  Gray-World.net Team
GRAY-WORLD.NET TEAM. Unusual firewall bypassing techniques, network and computer security. ... IRC://irc.gray-world.net:6677/gray-world.net. CHANGELOG, MIRRORS, LEGAL ...
similarity:
popularity:
security
firewall
network
tunneling
tools
hacking
software
networking
linux
hack
  Welcome to DenyHosts
Denyhosts now has over 70,000 users contributing synchronization data and ... You can Download the latest version of DenyHosts or view the Changelog. ...
similarity:
popularity:
security
ssh
linux
sysadmin
tools
software
networking
unix
server
python
  Openwall Project - Information Security software for open environments
Information Security software for open computing environments, ... few other) packages are also available via FTP from ftp.openwall.com and its mirrors. ...
similarity:
popularity:
security
linux
software
tools
opensource
hacking
firewall
unix
windows
password
  Midnight Research Labs - Depant your network
... can email me at aaron {@t} midnightresearch.com if you have any feedback (which ... email me at aaron {@t} midnightresearch.com or join the irc channel at ...
similarity:
popularity:
security
tools
software
network
password
networking
scanner
linux
hacking
passwords
< prev ... 1 2 3 4 5 ... 50 next >
Sorting Results
  • This slider determines how the matched sites are sorted.
  • If you want to see the most popular sites that are somewhat related to your search, slide this more towards "popularity."
  • If you want to see the sites that best matched your search, regardless of popularity, slide this towards "similarity."
Must Include Tags
  • Matched sites will not be shown unless they have all of the tags on this list.
  • This feature is useful for when you require a site to have been tagged as something.
  • To add a tag to this list, click "add tag" or click on any tag in a result.
Must Not Include Tags
  • Matched sites that have any tag on this list will not be shown.
  • This feature is useful for filtering out results that have tags you are absolutely not interested in.
  • To add a tag to this list, click "add tag" or click on any tag in a result.
Types of Results
  • This option lets you specify the types of sites to show.
  • If you want to only see domains (www..com), select "domains only."
  • If you want to only see articles (www..com/something/here), select "articles only."
  • If you don't care, or care so much about both, select "Both".
About The Results
an example search result
How moreofit Searches
Each website has a unique tag signature -- a set of words that users have described the website as. Moreofit searches for websites that have similar tag signatures and displays the results.
1: Similarity
A site's "similarity" is determined by how well its tag signature matches the tag signature that is being searched for. A 100% match means that it has the exact same tags in the exact same order, while a 0% match means it has no tags in common.
2: Popularity
The popularity of a website is, well, pretty much self explanatory.
3: Tag Signature
The tag signatures show how a site is described. The deeper the color of the tag, the more frequently the website is tagged as this. Tags underlined blue denote a tag that is in common with the search's tag signature.