Web Directory

  Exploits (19)

Submit a Featured Link: [$19.00] Submit a Regular Link: [$9.00]  

Nomoz Sub Categories

See Also - Related Categories
Regular Websites in this category

0-Day Exploits and Tutorials Open in a new windowLink Details
- DataStroghold.com Unveils how exploits and other hacking techniques are performed, in a clear and concise method. Frequently updated and always interesting.
- http://www.datastronghold.com

Lock this listing - So it can't be removedLock this listing - and upgrade it to FeaturedReport this listing
PullThePlug WarGames Open in a new windowLink Details
- Place for Programmers and Hackers to hone their technical skills by completing challenging wargames and Programming Challenges. Including Network Programming, Defeating PaX, Buffer/Heap Overflows, Format Strings etc.
- http://www.pulltheplug.org/

Lock this listing - So it can't be removedLock this listing - and upgrade it to FeaturedReport this listing
SecWatch Open in a new windowLink Details
- A site dedicated to the latest in security - all the latest and archived exploits and vulnerabilities.
- http://www.secwatch.org

Lock this listing - So it can't be removedLock this listing - and upgrade it to FeaturedReport this listing
Hack A Day Open in a new windowLink Details
- A hardware hack every day.
- http://www.hackaday.com/

Lock this listing - So it can't be removedLock this listing - and upgrade it to FeaturedReport this listing
Rosiello Security Open in a new windowLink Details
- Advisories, exploits, shellcodes, whitepapers, free software.
- http://www.rosiello.org

Lock this listing - So it can't be removedLock this listing - and upgrade it to FeaturedReport this listing
Security Focus Open in a new windowLink Details
- SecurityFocus is the most comprehensive and trusted source of security information on the Internet. SecurityFocus is a vendor-neutral site that provides objective, timely and comprehensive security information to all members of the security community, fro
- http://www.securityfocus.com

Lock this listing - So it can't be removedLock this listing - and upgrade it to FeaturedReport this listing
Security-Protocols Exploit News Open in a new windowLink Details
- A up to date security and exploit portal, provides commentary on many popular exploits as they develop in the wild.
- http://www.security-protocols.com

Lock this listing - So it can't be removedLock this listing - and upgrade it to FeaturedReport this listing
Ill Mob Open in a new windowLink Details
- Home of a number of 0-day exploit authors. Many creative Trojan droppers and methods are released here.
- http://www.illmob.org/

Lock this listing - So it can't be removedLock this listing - and upgrade it to FeaturedReport this listing
Canvas Exploit Platform Open in a new windowLink Details
- A commercial exploit platform similar to metasploit. Has built in memory resident shells that are cleared when the machine is rebooted. Perfect for cleaning up after a penetration test.
- http://www.immunitysec.com/index.shtml

Lock this listing - So it can't be removedLock this listing - and upgrade it to FeaturedReport this listing
Exploiting Caller ID Open in a new windowLink Details
- The Software Orange Box is a free proof-of-concept tool which can spoof most forms of North American Caller ID.
- http://www.artofhacking.com/orange.htm

Lock this listing - So it can't be removedLock this listing - and upgrade it to FeaturedReport this listing
FrSIRT Exploits Archive Open in a new windowLink Details
- Archive of current 0day exploits from European and Asian sources. French and English language content provided.
- http://www.frsirt.com/exploits/

Lock this listing - So it can't be removedLock this listing - and upgrade it to FeaturedReport this listing
milw0rm.com Open in a new windowLink Details
- Exploit database separated by exploit type (local, remote, DoS, etc.)
- http://www.milw0rm.com

Lock this listing - So it can't be removedLock this listing - and upgrade it to FeaturedReport this listing
Ethical Hacking Course Open in a new windowLink Details
- Commercial hacker training course on how to write and use exploits.
- http://www.infosecinstitute.com/courses/ethical_hacking_training.html

Lock this listing - So it can't be removedLock this listing - and upgrade it to FeaturedReport this listing
Phenoelit Open in a new windowLink Details
- Custom built network tools designed to take advantage of the exploits within many network hardware systems. Also the home of the k0ld LDAP brute force utility. A must have for many professional penetration testers.
- http://phenoelit.de/fr/tools.html

Lock this listing - So it can't be removedLock this listing - and upgrade it to FeaturedReport this listing
Security Tracker Open in a new windowLink Details
- Archive of exploits and security advisories
- http://www.securitytracker.com

Lock this listing - So it can't be removedLock this listing - and upgrade it to FeaturedReport this listing
PacketStorm Security Open in a new windowLink Details
- Packet Storm is a non-profit organization comprising computer security professionals that are dedicated to providing the information necessary to secure the networks world-wide. It publishes new security information on a global network of websites. The or
- http://www.packetstormsecurity.org/

Lock this listing - So it can't be removedLock this listing - and upgrade it to FeaturedReport this listing
Metasploit Project Open in a new windowLink Details
- The Metasploit Project is an open source computer security project which provides information about security vulnerabilities and aids in penetration testing and IDS signature development. Its most well-known sub-project is the Metasploit Framework, a tool
- http://metasploit.org

Lock this listing - So it can't be removedLock this listing - and upgrade it to FeaturedReport this listing
malware.com Open in a new windowLink Details
- A group that develops as well as discloses software exploits on many of the security mailing lists. Mainly specializing with Microsoft Office and Internet Explorer Vulnerabilitys.
- http://www.malware.com/

Lock this listing - So it can't be removedLock this listing - and upgrade it to FeaturedReport this listing
Fyodor's Exploit World Open in a new windowLink Details
- A large and descriptive exploit archive organized by affected operating systems.
- http://insecure.org/sploits.html

Lock this listing - So it can't be removedLock this listing - and upgrade it to FeaturedReport this listing

Submit a Featured Link: [$19.00]  Submit a Regular Link: [$9.00]