souvenir
Tag cloud
Picture wall
Daily
RSS Feed
  • RSS Feed
  • Daily Feed
Filters

Links per page

  • 20 links
  • 50 links
  • 100 links

Filters

Untagged links
3 results tagged hack  ✕   ✕
Inj3ct0r 1337day.com http://1337day.com
10/06/2008 cluster icon
  • textfiles.com : What this site offers is a glimpse into the history of writers and artists bound by the 128 characters that the American Standard Code for Information...
  • API Security Checklist : Checklist of the most important security countermeasures when designing, testing, and releasing your API.
  • The SaaS CTO Security Checklist : This is a basic checklist that all SaaS CTOs (and anyone else) can use to harden their security. Security shouldn’t feel like a chore. Select your sta...
  • CWE/SANS Top 25 Most Dangerous Programming Errors : The CWE/SANS Top 25 Most Dangerous Software Errors is a list of the most widespread and critical errors that can lead to serious vulnerabilities in so...
  • The Big List of Naughty Strings : The Big List of Naughty Strings is a list of strings which have a high probability of causing issues when used as user-input data.

Exploit database separated by exploit type (local, remote, DoS, Poc, etc.)

security code reference hack
textfiles.com http://www.textfiles.com
14/09/2007 cluster icon
  • Inj3ct0r 1337day.com : Exploit database separated by exploit type (local, remote, DoS, Poc, etc.)
  • 2016 Guide to User Data Security : This guide is for the software developer, architect or system administrator who doesn't want to spend a lifetime wading through cryptographic algorith...
  • Learn Go with test-driven development : Learn Go with test-driven development
  • &what: Discover Unicode & HTML Character Entities : amp-what is a quick, interactive reference of 14,500 HTML character entities* and common Unicode characters, 8859-1 characters, quotation marks, punct...
  • idiomatic.js : Principles of Writing Consistent, Idiomatic JavaScript

What this site offers is a glimpse into the history of writers and artists bound by the 128 characters that the American Standard Code for Information Interchange (ASCII) allowed them. The focus is on mid-1980's textfiles and the world as it was then, but even these files are sometime retooled 1960s and 1970s works, and offshoots of this culture exist to this day.

writing reference hack
Hack a Day http://hackaday.com/
24/05/2007 cluster icon
  • Arduino : Arduino is an open-source electronics prototyping platform based on flexible, easy-to-use hardware and software. It's intended for artists, designers,...
  • Hackable-devices : The hackable-devices project is coming from the willingness to make available to hackers and makers materials that correspond to them. Much more than ...
  • Tessel 2 : Tessel 2 is a development platform you can embed in a product. Build fast with Node.js/io.js, then optimize the hardware and build thousands.
  • The Hype Machine : The Hype Machine follows music blog discussions
  • textfiles.com : What this site offers is a glimpse into the history of writers and artists bound by the 128 characters that the American Standard Code for Information...
thumbnail

Hackaday serves up Fresh Hacks Every Day from around the Internet.

blog hack diy hardware
1642 links
Shaarli - The personal, minimalist, super-fast, database free, bookmarking service by the Shaarli community - Theme by kalvn