Versus71 Posted September 23, 2013 Share Posted September 23, 2013 This is the hidden content, please Sign In or Sign Up This is the hidden content, please Sign In or Sign Up Encode any JavaScript program to Japanese style emoticons (^_^) This is the hidden content, please Sign In or Sign Up This is the hidden content, please Sign In or Sign Up Malware Knowledge Base. Currently, the database contains data on 200 000 malicious programs, details on how to remove 3 000 viruses and 6 000 IP-addresses that are controlled and used to detect and identify attacks. This is the hidden content, please Sign In or Sign Up This is the hidden content, please Sign In or Sign Up A large-scale scan of the top million web sites (per Alexa traffic data) was performed in early 2010 using the Nmap Security Scanner and its scripting engine. As seen in the New York Times, Slashdot, Gizmodo, Engadget, and Telegraph.co.uk ... We retrieved each site's icon by first parsing the HTML for a link tag and then falling back to /favicon.ico if that failed. 328,427 unique icons were collected, of which 288,945 were proper images. The remaining 39,482 were error strings and other non-image files. Our original goal was just to improve our http-favicon.nse script, but we had enough fun browsing so many icons that we used them to create the visualization below. Link to comment Share on other sites More sharing options...
Versus71 Posted October 14, 2013 Author Share Posted October 14, 2013 (edited) Re: Hack service [link] This is the hidden content, please Sign In or Sign Up This is the hidden content, please Sign In or Sign Up Generating long, high-quality random passwords is not simple. So here is some totally random raw material, generated just for YOU. This is the hidden content, please Sign In or Sign Up This is the hidden content, please Sign In or Sign Up For 1.99 USD, you can enter up to 5 Yahoo usernames. We will notify you if they become available to claim within the next 3 years. This is the hidden content, please Sign In or Sign Up This is the hidden content, please Sign In or Sign Up Analog lavabit.com [die]. Worried about your privacy? Generate a PGP key in the Horde webmail system!? Send your public key to your friends and they can encrypt their email to you. View our new Privacy This is the hidden content, please Sign In or Sign Up ! Edited October 14, 2013 by Versus71 Link to comment Share on other sites More sharing options...
Versus71 Posted October 19, 2013 Author Share Posted October 19, 2013 Re: Hack service [link] This is the hidden content, please Sign In or Sign Up This is the hidden content, please Sign In or Sign Up Search engine to Tor sites. This is the hidden content, please Sign In or Sign Up This is the hidden content, please Sign In or Sign Up Test DDoS service. Free 100 visitors for 10 minutes [need registration]. DEFCAD This is the hidden content, please Sign In or Sign Up DEFCAD is a search engine for 3D printable models. Link to comment Share on other sites More sharing options...
Versus71 Posted October 24, 2013 Author Share Posted October 24, 2013 (edited) Re: Hack service [link] This is the hidden content, please Sign In or Sign Up This is the hidden content, please Sign In or Sign Up Sandy developed under Indian Honeynet and is capable of doing both static and dynamic analysis of Malicious Office, Jar,HTML files at the moment. Static | Dynamic Analyze Java exploits, Static analysis of Java malwares. Limited support for office file formats. Analysis of url having support for Firefox and IE browsers. This is the hidden content, please Sign In or Sign Up This is the hidden content, please Sign In or Sign Up Digital Attack Map is a live data visualization of DDoS attacks around the globe, built through a collaboration between Google Ideas and Arbor Networks. The tool surfaces anonymous attack traffic data to let users explore historic trends and find reports of outages happening on a given day. This is the hidden content, please Sign In or Sign Up Project Shield is an initiative launched by Google Ideas to use Google's own Distributed Denial of Service (DDoS) attack mitigation technology to protect free infrastructure online. The service allows other websites to serve their content through Google’s infrastructure without having to move their hosting location. Edited October 24, 2013 by Versus71 Link to comment Share on other sites More sharing options...
Versus71 Posted October 27, 2013 Author Share Posted October 27, 2013 Re: Hack service [link] This is the hidden content, please Sign In or Sign Up This is the hidden content, please Sign In or Sign Up Alternative site to show respective profitability of the alt coins. This is the hidden content, please Sign In or Sign Up This is the hidden content, please Sign In or Sign Up [OSINT] Do you really know who these people are? We associate with them and even invite them in our homes. Do they have a criminal background? This is the hidden content, please Sign In or Sign Up This is the hidden content, please Sign In or Sign Up [OSINT] Spokeo is a people search engine that organizes White Pages listings, Public Records and Social Network Information to help you safely find & learn about people. Link to comment Share on other sites More sharing options...
Versus71 Posted October 31, 2013 Author Share Posted October 31, 2013 Re: Hack service [link] This is the hidden content, please Sign In or Sign Up This is the hidden content, please Sign In or Sign Up Check Usernames allows you to check the availability of your brand or username on 160 popular Social Networking and Social Bookmarking websites. This is the hidden content, please Sign In or Sign Up This is the hidden content, please Sign In or Sign Up [OSINT] Free online People Search. Find out what is on the Internet about you and other people Check photos, telephone numbers, social network profiles, links and much more Protect your personal data Protect yourself from compromising pictures This is the hidden content, please Sign In or Sign Up This is the hidden content, please Sign In or Sign Up [OSINT] Find Business Information. Browse structured, hand selected content and relevant feeds to help you find what you need. Companies 1.4M People 5M Topics 40K Link to comment Share on other sites More sharing options...
Versus71 Posted November 4, 2013 Author Share Posted November 4, 2013 Re: Hack service [link] This is the hidden content, please Sign In or Sign Up This is the hidden content, please Sign In or Sign Up Database of web security breaches collected from all over the world. This is the hidden content, please Sign In or Sign Up This is the hidden content, please Sign In or Sign Up This service can be used to crack password-protected archive. Method: Brute-force attack. Decrypts lungs passwords. This is the hidden content, please Sign In or Sign Up This is the hidden content, please Sign In or Sign Up [OSINT] We dive into the deep web to bring you results you won't find in any other search engine then we use a powerful identity resolution engine to link those seemingly disparate results into a set of meaningful profiles so you can easily find the person you are looking for. Link to comment Share on other sites More sharing options...
Recommended Posts