SecurityXploit

WiFite v2 - linux
“WiFite is an automated wireless attack tool. It’s purpose is to attack multiple WEP and WPA encrypted networks at the same time. This tool is customizable to be automated with only a few arguments. It can be trusted to run without supervision. It was designed for use with pentesting distributions of Linux, such as Backtrack 5 R1, BlackBuntu, BackBox; any Linux distributions with wireless drivers patched for injection. The script appears to also operate with Ubuntu 11/10, Debian 6, and...

Automatic Backup Manager
Automatic Backup Manager supports backing up from local as well as portable devices including external hard drives, USB devices, network, or any other storage device that is compatible with Windows. Automatic Backup Manager tool can be used by everyone no special sklls is required to run this tool. Download full version FREE http://www.algologic.in/dailysoftwaregiveaway/automatic-backup-manager-dsg.zip

Micro Niche Websites - Make $100-$5000/mo in Autopilot
Creation of micro niche websites helps in building residual amounts and the process of creation is also simple. Latest trend in earning money online is integrating Google AdSense with micro niche websites. The difficulty in creation of AdSense with Micro niche is moderate. Start with collecting the keywords and you can take the assistance of keyword search tools to find out the most often searched keywords which have a count lesser than 1000 searches per day and which can yield lesser than 55000...

web-sorrow - Linux
A perl based tool used for checking a Web server for misconfiguration, version detection, enumeration, and server information. I will build more Functionality in the future. what is's NOT: Vulnerably scanner, inspection proxy, DDoS tool, exploitation framework. It's entirely focused on Enumeration and collecting Info on the target server EXAMPLES: basic: perl Wsorrow.pl -host scanme.nmap.org -S look for login pages: perl Wsorrow.pl -host 192.168.1.1 -auth CMS intense scan: perl Wsorrow.pl -host...

ClubHACK Magazine May 2012
Contents: Tech Gyan: Steganography over converted channels Security and privacy have been a concern for people for centuries. Whether it is private citizens, governments, military, or business, it seems everyone has information that needs to be kept private and out of the hands of unintended third parties. Information wants to be free but it is necessary to keep information private. That need has come about because governments have sensitive information, corporations send confidential financial...

Codes für deine Homepage