blog.tetra-bytes.gr
Hacking | TetraBytes ...blogging
http://blog.tetra-bytes.gr/tag/hacking-2
Bringing your company to the WWWorld. November 23, 2010. Log in to leave a Comment. Tags: evilgrade, hacking, update ( 2 ). Evil Upgrade = Evilgrade! The title is quite intriguing and to be honest it is equal to its capabilities! We are talking for the latest creation by Infobyte Security Research ( http:/ www.infobytesec.com/. Presented to the public by the name Evilgrade ( http:/ www.infobytesec.com/down/isr-evilgrade-Readme.txt. See a sample of how it works to get a taste …. For those interested to us...
icio2.com
www.iCIO2.com: julio 2015
http://www.icio2.com/2015_07_01_archive.html
NEGO2CIO 009: INTERNET OF THINGS #IOT - PARADIGMAS DIGITALES, Juan Sztark, Daniel Piazza, Oscar Schmitz (2015/07/27) www.nego2cio.com. Enviar esto por correo electrónico. No hay comentarios.:. Pasión, Éxitos y Miedos (#Radio y #TV). Lunes de 14:00 a 15:00 hs (GMT -3 Buenos Aires) en Nego2CIO. Pasión, Éxitos y Miedos. Conducción: Oscar Schmitz. Http:/ www.oscarschmitz.com. Portal: http:/ www.facebook.com/nego2cio. Http:/ www.nego2cio.com/radio. IDG: IT Invisibles: Will quiet IT miss out to noisy marketing?
faradaysec.com
FaradaySEC | Multiuser Pentest Environment
https://www.faradaysec.com/index.html
An Integrated Multiuser Pentest Environment. That maps and leverages all the knowledge you generate in real time. Share all of the info generated during a pentest w/o changing the way you work using #BHUSA. Arsenal tool "Faraday" http:/ ow.ly/OIgZj. Faraday by the neat team at InfoByte @famato. Hack Security S.A @Hack SEC. Faraday: una herramienta imprescindible en auditorías de seguridad: http:/ bit.ly/16j5WvI. Faraday lets you track and understand your audits. Kill redundancy, join your team! Is purely...
kaoticcreations.blogspot.com
Kaotic Creations: May 2011
http://kaoticcreations.blogspot.com/2011_05_01_archive.html
BASIC SQL INJECTION 101. XPATH Injection w/ extractvalue(). SQL INJECTION and WAF BYPASSING. BLIND and TIME-BASED SQL INJECTIONS. DOUBLE QUERY BASED SQL INJECTION. FREE PROXY LIST - FREE ANONYMOUS PROXIES and ELITE PROXIES. Wednesday, May 18, 2011. SILENTLY Owning the Network with ISR EVILGRADE. You will need to start by extracting Evilgrade once it has been downloaded from the homepage, for this you can use the following commands:. Tar -zxvf isr-evilgrade-2.0.0.tar.gz. Can't locate Data/Dump.pm in @...
blog.tetra-bytes.gr
Update | TetraBytes ...blogging
http://blog.tetra-bytes.gr/tag/update
Bringing your company to the WWWorld. November 25, 2010. Log in to leave a Comment. Tags: brimelow adobe, flash, flex, tutorials, update. For those involved or interested in learning techniques and tips for the technologies implemented by Adobe, I strongly suggest visiting gotoandlearn.com. A collection of tutorials created by Lee Brimelow, who is one of the most well known Adobe Evangelists. You must be logged in. To post a comment. November 23, 2010. Log in to leave a Comment. Evil Upgrade = Evilgrade!
blog.tetra-bytes.gr
Evilgrade | TetraBytes ...blogging
http://blog.tetra-bytes.gr/tag/evilgrade
Bringing your company to the WWWorld. November 23, 2010. Log in to leave a Comment. Tags: evilgrade, hacking, update ( 2 ). Evil Upgrade = Evilgrade! The title is quite intriguing and to be honest it is equal to its capabilities! We are talking for the latest creation by Infobyte Security Research ( http:/ www.infobytesec.com/. Presented to the public by the name Evilgrade ( http:/ www.infobytesec.com/down/isr-evilgrade-Readme.txt. See a sample of how it works to get a taste …. For those interested to us...
SOCIAL ENGAGEMENT