Aircrack-ng 1.2 Beta 1 released
May 27th, 2013 | by NJ Ouchn
Aircrack-ng is an 802.11 WEP and WPA-PSK keys cracking program that can recover keys once enough data packets have been [&hellipMay 27th, 2013 | by NJ Ouchn
Aircrack-ng is an 802.11 WEP and WPA-PSK keys cracking program that can recover keys once enough data packets have been [&hellipMay 2nd, 2013 | by NJ Ouchn
(Article by Sumit “Sid” Siddharth) Read other Sid’s posts at www.notsosecure.com) So, you found a SQL Injection in Oracle Database. [&hellipFebruary 22nd, 2013 | by NJ Ouchn
[Cross-Posted by mutual agreement with InfoSec Institute] Cross Site Scripting is one of the top 10 OWASP security threats. [&hellipAugust 9th, 2012 | by NJ Ouchn
LittleBlackBox is a collection of thousands of private SSL and SSH keys extracted from various embedded devices. These private keys [&hellipAugust 7th, 2012 | by NJ Ouchn
The scale and variety of Amazon Web Servers (AWS) has created a constantly changing landscape. What was previously managed by [&hellipAugust 7th, 2012 | by NJ Ouchn
peepdf is a Python tool to explore PDF files in order to find out if the file can be harmful [&hellipAugust 4th, 2012 | by NJ Ouchn
OData is a new data access protocol that is being adopted by many major software manufacturers such as Microsoft, IBM, [&hellipAugust 4th, 2012 | by NJ Ouchn
zCore IPS™ is our comprehensive Mobile Intrusion Prevention System designed specifically for smartphones.Modern smartphones are not as safe as you [&hellipAugust 2nd, 2012 | by NJ Ouchn
HTExploit (HiperText access Exploit) is an open-source tool written in Python that exploits a weakness in the way that .htaccess [&hellipAugust 2nd, 2012 | by NJ Ouchn
The smartphone penetration testing framework, the result of a DARPA Cyber Fast Track project, aims to provide an open source [&hellip