co4ie Posted November 2, 2011 Report Posted November 2, 2011 I was cleaning out my bookmarks, de-cluttering twitter favourites and closing a few tabs.Coding:http://hyperpolyglot.org/scripting http://linuxreviews.org/beginner/bash_GNU_Bourne-Again_SHell_Reference/http://steve-parker.org/sh/sh.shtml http://tldp.org/LDP/abs/html/Pentesting With BackTrack (PWB) :http://www.corelan.behttp://goog.lihttp://www.md5decrypter.co.uk/ntlm-decrypt.aspxhttp://www.pentest-standard.org/index.php/Main_PageTunnelling:http://pauldotcom.com/2010/03/ssh-gymnastics-with-proxychain.htmlhttp://www.digininja.org/blog/nessus_over_sock4a_over_msf.phpWarGames / Online Challenges:http://xss.progphp.comhttp://xss-quiz.int21h.jphttp://smashthestack.orghttp://net-force.nlhttp://www.hackquest.comhttp://securityoverride.com/news.phphttp://intruded.nethttp://www.honeynet.org/challenges/2011_7_compromised_serverhttp://bailey.st/blog/2010/09/14/pentest-lab-vulnerable-servers-applications-list/http://www.felipemartins.info/2011/05/pentesting-vulnerable-study-frameworks-complete-list/http://dftt.sourceforge.nethttp://sourceforge.net/projects/virtualhacking/files/os/http://sourceforge.net/projects/lampsecurity/files/http://sourceforge.net/projects/ctfd/http://sourceforge.net/projects/guerillatactics/http://blogs.oracle.com/ksplice/Misc :https://code.google.com/p/pentest-bookmarks/downloads/listhttp://insidetrust.blogspot.com/2010/12/data-mining-backtrack-4-for-buffer.htmlhttp://www.strangehorizons.com/2004/20040405/badger.shtmlhttp://www.instructables.com/id/Repair-a-Broken-Ethernet-Plug/step5/Make-its-Head-Thin/http://ubuntuforums.org/showthread.php?t=510812http://vx.netlux.org/lib/vsp05.htmlExploit Development :http://www.corelan.behttp://myne-us.blogspot.com/2010/08/from-0x90-to-0x4c454554-journey-into.htmlhttp://resources.infosecinstitute.com/intro-to-fuzzing/http://www.woodmann.com/TiGa/idaseries.htmlhttp://labs.snort.org/awbo/http://grey-corner.blogspot.com/2010/01/beginning-stack-based-buffer-overflow.htmlhttp://grey-corner.blogspot.com/2010/01/seh-stack-based-windows-buffer-overflow.htmlhttp://grey-corner.blogspot.com/2010/01/windows-buffer-overflow-tutorial.htmlhttp://grey-corner.blogspot.com/2010/01/heap-spray-exploit-tutorial-internet.htmlhttp://grey-corner.blogspot.com/2010/02/windows-buffer-overflow-tutorial.htmlhttp://sickness.tor.hu/?p=363http://sickness.tor.hu/?p=365http://sickness.tor.hu/?p=368http://sickness.tor.hu/?p=378Exploit Development (Case Studies/Walkthroughs):http://www.exploit-db.com/finding-0days-in-web-applications/http://www.corelan.be/index.php/2010/11/13/offensive-security-exploit-weekend/http://0entropy.blogspot.com/2011/02/from-vulnerability-to-exploit-under-5.htmlExploit Development (Patch Analysis):http://www.skullsecurity.org/blog/2011/a-deeper-look-at-ms11-058 https://www.net-security.org/article.php?id=1613http://j00ru.vexillium.org/?p=893http://www.cio.com/article/688548/Hackers_Could_Reverse_Engineer_Microsoft_Patches_to_Create_DoS_Attacks https://community.qualys.com/blogs/securitylabs/2011/08/23/patch-analysis-for-ms11-058Exploit Development (Metasploit Wishlist):http://esploit.blogspot.com/2011/03/metasploit-exploits-wishlist.htmlhttp://www.securitytube.net/video/2118Passwords & Rainbow Tables (WPA):http://www.offensive-security.com/wpa-tables/https://www.grc.com/passwords.htmhttp://insidetrust.blogspot.com/2010/07/creating-effective-dictionaries-for.htmlhttp://www.dragonjar.org/diccionarios-con-passwords-de-sitios-expuestos.xhtmlhttp://svn.isdpodcast.com/wordlists/http://www.sven-slootweg.nl/downloads/download.php?id=3http://lab.lonerunners.net/blog/using-wikipedia-as-brute-forcing-dictionaryhttp://www.digininja.org/projects/cewl.phphttp://www.aircrack-ng.org/doku.php?id=faqhttp://www.skullsecurity.org/wiki/index.php/PasswordsBlogs:http://www.secmaniac.comCheat-Sheets:http://bhami.com/rosetta.htmlhttp://www.stumbleupon.com/su/1ODUyK/www.wirelessdefence.org/Contents/Wireless%20Pen%20Test%20Framework.htmlAnti-Virus:http://schierlm.users.sourceforge.net/avevasion.htmlhttp://compsec.org/security/index.php/anti-virus/283-anti-virus-central-methods-of-bypassing-anti-virus-av-detection.htmlPrivilege Escalation:http://www.dankalia.com/tutor/01005/0100501004.htmhttp://www.pretentiousname.com/misc/win7_uac_whitelist2.htmlMetasploit:http://www.room362.com/blog/2011/6/27/fxsstdll-persistence-the-evil-fax-machine.htmlhttp://www.scriptjunkie.us/2011/08/custom-payloads-in-metasploit-4/http://www.offensive-security.com/metasploit-unleashed/Metasploit_Unleashed_Information_Security_Traininghttp://www.securitytube.net/video/1175Default Generators:http://websec.ca/blog/view/mac2wepkey_huaweihttp://www.backtrack-linux.org/forums/backtrack-5-experts-section/42137-bthomehub2-default-router-algorithm.htmlhttp://sec.jetlib.com/BackTrack_Linux_Forums/2011/01/12/Generator:_Attacking_SKY_default_router_passwordStatistics:http://www.zone-h.orghttp://exploitkit.ex.ohost.de/CVE%20Exploit%20Kit%20List.htmCross Site Scripting (XSS):http://www.exploit-db.com/vbseo-from-xss-to-reverse-php-shell/Podcasts:http://pauldotcom.com/podcast/psw.xmlhttp://socialengineer.podbean.com/feed/Blogs:http://carnal0wnage.attackresearch.comhttp://console-cowboys.blogspot.comhttp://thehackernews.comhttp://packetstormsecurity.orghttp://pentestmonkey.nethttp://adaywithtape.blogspot.comhttp://contagiodump.blogspot.comhttp://cybexin.blogspot.comhttp://www.darknet.org.ukhttp://www.irongeek.comhttp://www.room362.comhttp://question-defense.comhttp://securityjuggernaut.blogspot.comhttp://theinterw3bs.comAcestea sunt bookmark-urile lui g0tmi1k ... cred ca veti gasi o gramada de chestii interesante !! Quote