Exploit Websites
SecurityFocus
SecurityFocus is designed to facilitate discussion on computer security related topics, create computer security awareness, and to provide the Internet's largest and most comprehensive database of computer security knowledge and resources to the public. It also hosts the BUGTRAQ mailing list.
Packet Storm
Information Security Services, News, Files, Tools, Exploits, Advisories and Whitepapers
Security Vulnerability Management, Penetration Testing, and Security C
Security Vulnerability Management, Security Compliance, and Penetration Testing for Network, Web Application, and Database Security
Xbox-Scene.com - HomeBrew Xbox 360 and Orignal Xbox News, JTAG/SMC Hac
Xbox-Scene.com - HomeBrew Xbox 360 and Orignal Xbox News, JTAG/SMC Hack, DVD Firmware Mods, C4Eva iXtreme LT+, FW Hacks, Modchips, Kinect, Exploits, Modifications, Jailbreak, RRoD, Repair, Tutorials
Der Keiler: All Security-Lists on one Site
An searchable real-time updated archive of all important security-lists and newsgroups: Cert, Securiteam, Linuxsecurity, VulnWatch, Full-Disclosure, Bugtraq, Incidents, Securityfocus (all lists), comp.os.linux.security, comp.security.misc, comp.security.unix, ...
CXSECURITY.COM Free Security List
CXSECURITY (Independent information about security) is a huge collection of information on data communications safety. Its main objective is to inform about errors in various applications.
Packet Storm
Information Security Services, News, Files, Tools, Exploits, Advisories and Whitepapers
Packet Storm
Information Security Services, News, Files, Tools, Exploits, Advisories and Whitepapers
:: PostNuke Forum :: The forum for Postnuke
The forum for Postnuke
IT Security Database. OVAL patch, vulnerability, compliance definition
IT Security Database. Patch, vulnerability, compliance data source. OVAL, open vulnerability and assessment language definitions from NIST, Mitre, Red Hat, Suse, Apache and others.
Security Research by Dan Rosenberg
Security research by Dan Rosenberg
w3af - Open Source Web Application Security Scanner
w3af is a Web Application Attack and Audit Framework. The project's goal is to create a framework to find and exploit web application vulnerabilities that
Websecurity - Веб безпека - Безпека веб-додатків та веб-систем
Веб безпека - це безпека веб сайтів, веб-додатків та веб-систем. Актуальна інформація на тему веб безпеки: статті, новини, уразливості, помилки, експлоіти, патчі та рекомендації
SecuObs - L'observatoire de la sécurite internet - Site d'informations
SecuObs - L'observatoire de la sécurite internet - Site d'informations professionnelles francophone sur la sécurité informatique
CXSECURITY.COM Free Security List
CXSECURITY (Independent information about security) is a huge collection of information on data communications safety. Its main objective is to inform about errors in various applications.
SOOM.cz - e-zin o poèítaèové bezpeènosti • hacking • cracking • phreak
Portál zabývající se pøevážnì poèítaèovou bezpeèností se zamìøením na hacking, cracking, phreaking, lockpicking a mnohé jiné oblasti nejen poèítaèového svìta.
..:: Corelan Team | Peter Van Eeckhoutte (corelanc0d3r) ::..
Corelan Cyber Security Research Exploit Development Tutorials Training Infosec Training corelanc0d3r
ACIS Professional Center
ACIS Professional Center is a Number one IT security Training and Consult firm in Thailand. ACIS provides IT Security training courses and consultancy by A. Prinya Hom-Anek and his team. Also hosts the biggest IT security Event known as CDIC
Cyber-Warrior Information Technology's World
Cyber-Warrior.Org - Turk Hackerlar Cyber Security Siber Guvenlik Türk Hacker Grubu
SecureRoot Computer Security Resource. Hacking, Cryptography, Etc
Underground computer security search engine. Covers hacking, security, cryptography, phreaking, trojans, exploits, carding, icq tools, virii, zines, warez and more...
CVE security vulnerability database. Security vulnerabilities, exploit
CVEdetails.com is a free CVE security vulnerability database/information source. You can view CVE vulnerability details, exploits, references, metasploit modules, full list of vulnerable products and cvss score reports and vulnerability trends over time