exploitdb nmap script available

December 21st, 2010 | by NJ Ouchn

Here is a little script wrote by “L10n“. It searches the exploitdb archive for possible exploits. It is very verbose [&hellip

Detecting Google hacking against your Website

December 20th, 2010 | by NJ Ouchn

Google or other search engines have been used for many purposes such as finding useful information, important websites and latest news on different topics, Google index a huge number of web pages that are growing daily

Common Weakness Scoring System (CWSS) v0.1 released

December 20th, 2010 | by NJ Ouchn

So for each weakness in the architecture, design, code or implementation that might be introduced into an application, which in some cases can contribute to a vulnerability within that software, we need to be able toreason and communicate about the relative importance of different weaknesses. For example, a buffer overflow vulnerability might arise from aweakness in which the programmer doesnot properly validate the length of an input buffer. This weakness only contributes to a vulnerability if the input buffer can be influenced by amalicious party, and the malicious buffer is copied toa smaller buffer

Spiceworks Update 5.0.60600 Now Available

December 20th, 2010 | by NJ Ouchn

Spiceworks is the complete network management & monitoring, helpdesk, PC inventory & software reporting solution to manage Everything IT in small and medium businesses

The First Open Source Telephony Conference in 2011

December 20th, 2010 | by NJ Ouchn

The real beautiful thing about open source telephony is when everybody talks about it and benefits from it. I am happy to know that the has announced the 1st open source telephony conference in Shenzhen China in the coming year. And I do think it

The Samurai Web Testing Framework v0.9.5 released

December 20th, 2010 | by NJ Ouchn

The Samurai Web Testing Framework is a LiveCD focused on web application testing. We have collected the top testing tools and pre-installed them to build the perfect environment for testing applications

Back to Top ↑