souvenir
Tag cloud
Picture wall
Daily
RSS Feed
  • RSS Feed
  • Daily Feed
Filters

Links per page

  • 20 links
  • 50 links
  • 100 links

Filters

Untagged links
Web Application Exploits and Defenses http://google-gruyere.appspot.com
24/09/2010 cluster icon
  • Kali Linux : Penetration Testing Linux OS containing tools to test the security of system or a network.
  • The Big List of Naughty Strings : The Big List of Naughty Strings is a list of strings which have a high probability of causing issues when used as user-input data.
  • domsnitch : A passive reconnaissance tool inside the DOM (experimental)
  • radare : Radare is a portable reversing framework that can... Disassemble (and assemble for) many different architectures Debug with local native and remote de...
  • Infection Monkey : The Infection Monkey is an open source security tool for testing a data center's resiliency to perimeter breaches and internal server infection. The M...
security knowledge tutorial
1627 links
Shaarli - The personal, minimalist, super-fast, database free, bookmarking service by the Shaarli community - Theme by kalvn