Zone-H is an archive of defaced websites. Once a defaced website is submitted to Zone-H, it is mirrored on the Zone-H servers, it is then moderated by the Zone-H staff to check if the defacement was fake. Sometimes the hackers themselves admittedly submit their hacked pages to the site. It is an Internet security portal containing original IT security news, digital warfare news, geopolitics, proprietary and general advisories, analyses, forums, researches.
Zone-H is the largest web intrusions archive. It is published in several languages.
Check out Zone-h @ www.zone-h.org
The XSSed project was created in early February 2007 by KF and DP. It provides information on all things related to cross-site scripting vulnerabilities and is the largest online archive of XSS vulnerable websites.
KF and DP started this project with the scope of increasing security and privacy on the web. Professional and amateur webmasters and web developers are notified about any cross-site scripting vulnerability affecting their online properties. The importance of securing their web applications is emphasized through the informational and educational content which provide.
What they do is to simply validate all the submitted XSS vulnerable websites and then publish them on the archive. We actively assist all website owners to remediate the cross-site scripting issues by bringing them up to their attention on a timely manner.
Check out XSSed @ www.xssed.com
VirusTotal is a website that provides free checking of files for viruses. It uses up to 44 different antivirus products and scan engines to check for viruses that the user's own antivirus solution may have missed, or to verify against any false positives. Files up to 32 MB can be uploaded to the website or sent via email. Anti-virus software vendors can receive copies of files that were flagged by other scans but passed by their own engine, to help improve their software and, by extension, VirusTotal's own capability. Users can also scan suspect URLs and search through the VirusTotal dataset.
VirusTotal was selected by PC World as one of the best 100 products of 2007. On September7, 2012 it was announced on VirusTotal's blog that Google Inc. had acquired VirusTotal.
Antivirus Engines Used:
Check out VirusTotal @ www.virustotal.com
The ultimate archive of exploits and vulnerable software and a great resource for vulnerability researchers and security professionals. Inj3t0r aim is to collect exploits from submit tals and various mailing lists and concentrate them in one, easy to navigate database.
1337day - The Underground, is one of the world's most popular and comprehensive computer security web sites.
This site is visited by home and enterprise users, universities, government and military institutions on a daily basis. 1337day are comprised of security professionals that are dedicated to provide necessary information to secure application software. 1337day staff accomplish this goal by publishing new security advisories on the internet. 1337day staff is made up of a group of highly skilled professionals, all directly engaged in the technical computer and software security arenas.
Inj3ct0r provides useful information to people who perform penetration testing, IDS signature development, and exploit research. This project was created to provide information on exploit techniques and to create a useful resource for exploit developers and security professionals. The tools and information on this site are provided for legal security research and testing purposes only.
For the first time the idea of creating 1337day project appeared on 13 May 2008. The project is devoted to computer security, protection and hacking of computer networks, software and information.
1337day site, which is a regularly updated database with descriptions of the vulnerabilities and exploit the various software products. The base is divided into sections by type of exploit: local, remote, DoS, etc. Also presented to the division on the platform: BSD, Linux, QNX, OSX, Solaris, Unix, Windows and so on.
Latest exploits are designed to exploit newly discovered critical vulnerabilities. This project is designed to receive, deposit and exchange of information between the parties, which are thematically linked to computer activities. One of the priorities is the creation of a unified knowledge base for people interested in the subject, one way or another connected with the computer: be it software or programming languages, network protocols, or security network resources and hardware - all this we seek to explain on the project.
Inj3ct0r Team
Inj3ct0r (founder r0073r) is a group of hacktivists. Inj3ct0r Team was originally founded in 2003, by a hacker computer enthusiast. Domain Inj3ct0r.com was registered in 2008. The enormous database, the constant updates, the unique nature of the content published. :)
New Inj3ct0r Domain: 1337day.com
Inj3ct0r Operators: Name - Specialty
Check out Inj3ct0r @ www.1337day.com
DEF CON (also written as DEFCON or Defcon) is one of the world's largest annual computer hacker conventions, held every year in Las Vegas, Nevada. The first DEF CON took place in June 1993.
Many of the attendees at DEF CON include computer security professionals, journalists, lawyers, federal government employees, security researchers, and hackers with a general interest in computer code, computer architecture, phone phreaking, hardware modification, and anything else that can be "hacked".
The event consists of several tracks of speakers about computer- and hacking-related subjects, as well as social events and contests in everything from creating the longest Wi-Fi connection and cracking computer systems to who can most effectively cool a beer in the Nevada heat. Other contests include lockpicking, robotics-related contests (discontinued), art, slogan, coffee wars (not currently running), scavenger hunt and Capture the Flag. Capture the Flag (CTF) is perhaps the best known of these contests. It is a hacking competition where teams of hackers attempt to attack and defend computers and networks using certain software and network structures. CTF has been emulated at other hacking conferences as well as in academic and military contexts.
Conference founder Jeff Moss contends that the quality of submitted talks has diminished since DEF CON's inception.
Since DEF CON 11, fundraisers have been conducted for the Electronic Frontier Foundation. The first fundraiser was a dunk tank and was an "official" event. The EFF now has an event named "The Summit" hosted by the Vegas 2.0 crew that is an open event and fundraiser. DefCon 18 (2010) hosted a new fundraiser called MohawkCon. In 2010, over 10,000 people attended DEF CON 18.
Federal law enforcement agents from the FBI, DoD, United States Postal Inspection Service, and other agencies regularly attend DEF CON.
DEF CON was also portrayed in the The X-Files episode "Three of a Kind" featuring an appearance by The Lone Gunmen. DEF CON was portrayed as a United States government sponsored convention instead of a computer hacker convention.
Check out DEF CON @ www.defcon.org
CORE Impact Professional is the most comprehensive software solution for assessing and testing security vulnerabilities throughout your organization.
IBM Rational AppScan Enterprise is a scalable solution to help resolve application security vulnerabilities, offering recommendations to simplify remediation.
HP WebInspect gives security professionals and security novices alike the power and knowledge to quickly identify and validate critical, high-risk security vulnerabilities.
Acunetix Web Vulnerability Scanner (WVS) is an automated web application security testing tool that audits web applications by checking for hacking vulnerabilities.
\/ w4rri0r - Hacking Is Not A Crime - It's an art of Awareness \/ - w4rri0r work in the dark, w4rri0r do what w4rri0r can, w4rri0r give what w4rri0r have, w4rri0r doubt is w4rri0r passion and w4rri0r passion is w4rri0r task. The rest is the madness of art \/ w4rri0r \/
\/ w4rri0r.com \/ are the great resource for information security professionals and researcher. \/ w4rri0r \/ offers a extensive variation of information security services that include SECURITY EXPLOITS (Bug or Vulnerability), SECURITY ADVISORIES (Security Alerts), SECURITY RESEARCHER TOOLBOX (Freeware, Shareware & Open-Source), SHELLCODE (Attacker Controller - Chunk of Data), SECURITY TRAINING (Educational Purpose), SECURITY NEWS (Security Recent or Important Events) and with this group you can be assured that you’re in the right hands. \/ w4rri0r gr0up \/ efforts being endorsed and appreciated by administrators, security researchers and members of various underground hacking groups and communities worldwide.
\/ w4rri0r mission \/ are to make the information systems more secure, more aware, more reliable and protect against possible security breaches.