mindtrace
2.6K views | +0 today
Follow
mindtrace
ext
Curated by moon2l
Your new post is loading...
Your new post is loading...
Rescooped by moon2l from Buttercup's
Scoop.it!

hacking website database

hacking website database | mindtrace | Scoop.it

We are professional and experienced hacker and provide various services such as website hacking, system hacking,mobile phone hacking, email hacking, Facebook hacking.We use our 0Day exploits to hack such things,so chances of hack is more.Feel free to contact us at hack@hackne1.com


Via Buttercup
more...
No comment yet.
Rescooped by moon2l from High Technology Threat Brief (HTTB) (2)
Scoop.it!

Metasploit: Microsoft Internet Explorer 0-Day M... | SecurityStreet

Metasploit: Microsoft Internet Explorer 0-Day M... | SecurityStreet | mindtrace | Scoop.it
RT @_sinn3r: FYI: The new IE 0day (CVE-2012-4792) has been updated since the release. The latest news will be updated @ http://t.co/8HBzae4a

Via Daniel A. Libby, CFC
more...
No comment yet.
Rescooped by moon2l from Embedded Systems News
Scoop.it!

SliTaz armhf: 46MB Linux Distribution for Raspberry Pi

SliTaz armhf: 46MB Linux Distribution for Raspberry Pi | mindtrace | Scoop.it
SliTaz armhf is a minimal Linux distribution based on SliTaz Linux, that uses the hard-float ABI for the Raspberry Pi. The compressed SD card image is 46M, the rootfs 18.6 MB, and Slitaz uses just about 7 MB RAM after boot.

Via cnxsoft
more...
No comment yet.
Rescooped by moon2l from Dev Breakthroughs
Scoop.it!

Python Web Services with Tornado

This is an API for the development of soap web services using the python programming language and tornado web server. The goals of this api is provide an simple and easy way of develop and deploy soap web services.


Via Nicolas Weil
more...
No comment yet.
Rescooped by moon2l from ZeroTrustNet
Scoop.it!

Dizzy: A State-full Fuzzing Framework! — PenTestIT

Dizzy is A Next Generation State-full Fuzzing Framework.

Via 0 тrυѕт neт
more...
No comment yet.
Rescooped by moon2l from H4x0r5 Playground
Scoop.it!

Pentesting Vulnerable Study Frameworks Complete List

Pentesting Vulnerable Study Frameworks Complete List | mindtrace | Scoop.it
It's very difficult for the beginner security analyst, mainly the ones interested in the area of pentesting, to find good study pentesting resources.

Via 0xerror
more...
No comment yet.
Rescooped by moon2l from ZeroTrustNet
Scoop.it!

Metasploitable version 2! — PenTestIT

Metasploitable the intentionally vulnerable Linux virtual machine has been updated to version 2!

Via 0 тrυѕт neт
more...
No comment yet.
Rescooped by moon2l from Network security
Scoop.it!

How To compile Exploits | Learn Free Hacking And Ethical Hacking |learn Cyber Security and Blogging

How To compile Exploits | Learn Free Hacking And Ethical Hacking |learn Cyber Security and Blogging | mindtrace | Scoop.it
Learn Ethical Hacking And Get Hacking Ebooks , Download Free Hacking Tools and Softwares learn Unix And Linux Hacking | Penetration Testing | Cyber Crimes Investigations and Consulting |Learn Cyber Security...

Via shabgard
more...
No comment yet.
Rescooped by moon2l from Network security
Scoop.it!

START HACK - Zero-Day Exploit Protection free PDF

START HACK - Zero-Day Exploit Protection free PDF | mindtrace | Scoop.it

 

Twitter Hinders Hackers · Stop google Tracing Your history · 20 years of Linux · Taipei cops launch $68.9M GPS-enabled surveillance · Android Is No. 1 Target of Mobile Hackers ... Network Hacking.


Via shabgard
more...
No comment yet.
Scooped by moon2l
Scoop.it!

Compusics: Social Engineering : Always part of a full pentest

Compusics: Social Engineering : Always part of a full pentest | mindtrace | Scoop.it
We'll start with the basics; wiki defines social engineering as the art of making people give out their confidential information. "Social engineering" is more precisely: the act of psychological manipulation.
more...
No comment yet.
Scooped by moon2l
Scoop.it!

Social Engineering – PenTest 01/2012 (9) | Issues | PenTest Magazine

Social Engineering – PenTest 01/2012 (9) | Issues | PenTest Magazine | mindtrace | Scoop.it
Mastering the Behavioral Techniques for Quick Rapport and Elicitation By Robin Dreeke There are skilled conversationalists that can induce an | Social Engineering – PenTest 01/2012 (9) | The only magazine devoted ...
more...
No comment yet.
Rescooped by moon2l from ZeroTrustNet
Scoop.it!

PenTester - automatic security vulnerability network scanner with GUI | Tools Yard - The Hacker News

PenTester - automatic security vulnerability network scanner with GUI | Tools Yard - The Hacker News | mindtrace | Scoop.it
PenTester - automatic security vulnerability network scanner with GUI. Tools Yard Hacking Tools archive by The Hacker News.

Via 0 тrυѕт neт
more...
No comment yet.
Rescooped by moon2l from ZeroTrustNet
Scoop.it!

NOWASP (Codename Mutillidae) 2.2.1! — PenTestIT

NOWASP (Codename Mutillidae) that contains dozens of vulnerabilities and hints to help the user exploit them has been updated to version 2.2.1.

Via 0 тrυѕт neт
more...
No comment yet.
Rescooped by moon2l from Internet Security 101
Scoop.it!

3 years later, hackers who hit Google continue string of potent attacks

3 years later, hackers who hit Google continue string of potent attacks | mindtrace | Scoop.it

Attackers armed with a seemingly unlimited number of 0day exploits, report says.

It's getting picked up........ It's worm,


Via Angel Rodriguez
more...
No comment yet.
Rescooped by moon2l from High Technology Threat Brief (HTTB) (2)
Scoop.it!

1337day Inj3ct0r Exploit Database : vulnerability : 0day : shellcode by Inj3ct0r Team

1337day Inj3ct0r Exploit Database : vulnerability : 0day : shellcode by Inj3ct0r Team ([remote exploits] - Joomla Component com_dv Arbitrary File Upload Vulnerability metasploit http://t.co/Q9S9VnTB)...

Via Daniel A. Libby, CFC
more...
No comment yet.
Rescooped by moon2l from Arduino Focus
Scoop.it!

Fun with Linux and Hardware: Introduction to Arduino

Fun with Linux and Hardware: Introduction to Arduino | mindtrace | Scoop.it
Thanks to everyone who came to my Arduino/shark #scale10x talk!

Via Kalani Kirk Hausman
more...
No comment yet.
Rescooped by moon2l from ZeroTrustNet
Scoop.it!

Quarks PwDump: The Windows Credentials Extractor! — PenTestIT

Quarks PwDump is a native Win32 open source tool to extract credentials from Windows operating systems.

Via 0 тrυѕт neт
more...
No comment yet.
Rescooped by moon2l from H4x0r5 Playground
Scoop.it!

Cintruder -prealpha- pentesting tool to bypass captchas ~ Security List Network™

Cintruder -prealpha- pentesting tool to bypass captchas ~ Security List Network™ | mindtrace | Scoop.it

Via 0xerror
more...
No comment yet.
Rescooped by moon2l from HackLab
Scoop.it!

50 Links & Resources about Information Security, Pentesting and ...

50 Links & Resources about Information Security, Pentesting and ... | mindtrace | Scoop.it
I always check their forum site for tutorials and tips about penetration testing. 9. Attrition.org. Beware plagiarists, fake security experts, self-proclaimed hackers, and liars. Attrition / Security errata will pawn you till the 4th dawn ...

Via R0CH4X
more...
No comment yet.
Rescooped by moon2l from Network security
Scoop.it!

Metasploit Autopwn With Nessus Tutorial | Ethical Hacking-Your ...

Metasploit Autopwn With Nessus Tutorial | Ethical Hacking-Your ... | mindtrace | Scoop.it

really easy


Via shabgard
more...
No comment yet.
Rescooped by moon2l from Network security
Scoop.it!

Android app turns smartphones into hacking machines | Secfence Blog

Android app turns smartphones into hacking machines | Secfence Blog | mindtrace | Scoop.it
A good news for all android dominated security nerds out there! At DefCon, Itzhak Zuk Avraham, also known by the handle @ihackbanme showed off the new hacking tool. The tool is called “The Android Network Toolkit,” named Anti for short.

Via shabgard
more...
No comment yet.
Rescooped by moon2l from OWASP World
Scoop.it!

Pentesting Vulnerable Study Frameworks Complete List |

Pentesting Vulnerable Study Frameworks Complete List | | mindtrace | Scoop.it
It's very difficult for the beginner security analyst, mainly the ones interested in the area of pentesting, to find good study pentesting resources.

Via Sebastien Gioria
more...
No comment yet.
Rescooped by moon2l from ZeroTrustNet
Scoop.it!

Custom bash scripts to automate various pentesting tasks | Tools Yard - The Hacker News

Custom bash scripts to automate various pentesting tasks | Tools Yard - The Hacker News | mindtrace | Scoop.it
Custom bash scripts to automate various pentesting tasks. Tools Yard Hacking Tools archive by The Hacker News.

Via 0 тrυѕт neт
more...
No comment yet.
Rescooped by moon2l from ZeroTrustNet
Scoop.it!

PowerSploit: A PowerShell Post-Exploitation Framework! — PenTestIT

PowerSploit is a PowerShell Post-Exploitation Framework.

Via 0 тrυѕт neт
more...
No comment yet.
Rescooped by moon2l from ZeroTrustNet
Scoop.it!

Clipcaptcha: A CAPTCHA Provider Impersonation Tool! — PenTestIT

Clipcaptcha is an Open Source CAPTCHA Provider Impersonation Tool.

Via 0 тrυѕт neт
more...
No comment yet.