Sponsor Links |
Soft Name |
|
Test if You are Vulnerable to the IE ANI Cursor Exploit |
|
This test may not be effective against all known and vulnerable versions of user32.dll. if the te... Soft Directory:Group Releases |
|
Crack the Code and win $20,000 |
|
We are offering a $20,000 prize for anyone who can help us make a compatible battery for the devi... Soft Directory:Group Releases |
|
Wireless Penetration Testing Framework |
|
Extensive list of audit points to be taken into consideration while auditing wireless networks. Soft Directory:Wireless Security |
|
Secure connections: how secure are they? |
|
There are several ways to secure data transmission, and they all involve the use of data encrypti... Soft Directory:Group Releases |
|
Keyloggers : How they work and how to detect them (Part 1) |
|
This report provides an overview of different types of keyloggers, gives examples of losses cause... Soft Directory:Group Releases |
|
2006 Operating System Vulnerability Summary |
|
The summarized coverage of 2006 vulnerabilities by SANS showed the most prevalent attack vectors ... Soft Directory:Group Releases |
|
An Overview Of USB Hardware Keyloggers |
|
This article however is on hardware keyloggers, specifically those that work with USB keyboards. ... Soft Directory:Group Releases |
|
Penetration Testing with SILICA |
|
Imagine a device that, with the push of a button, automatically scans for wireless networks, conn... Soft Directory:Group Releases |
|
The Metasploit Framework v3.0 |
|
This version contains 177 exploits, 104 payloads, 17 encoders, and 3 nop modules. Additionally, 3... Soft Directory:Group Releases |
|
The Lazy Guide to Installing Knoppix on a USB Key |
|
Of course, it can be even more portable when it runs entirely off of an inexpensive USB key. So l... Soft Directory:Group Releases |
|