-
http://www.offensive-security.com/metasploit-unleashed/
$ nmap -v -sV 192.168.0.0/24
- overthewire.net
- crackes.me
- http://canyoucrackit.co.uk/
- http://exploit-exercises.com/
- http://smashthestack.org/
- http://webstersprodigy.net/2012/07/06/some-practical-arp-poison-attacks-with-scapy-iptables-and-burp/
- https://github.com/crossbear/Crossbear
- Article about using only some characters in order to do some XSS
- http://www.christian-schneider.net/CsrfAndSameOriginXss.html
- http://volatility-labs.blogspot.it/2012/10/omfw-2012-analyzing-linux-kernel.html?m=1
- https://code.google.com/p/lime-forensics/
- http://eoftedal.github.com/TrondheimDC2012/index.htm
- https://thesprawl.org/journal/corelan-tutorial-10-exercise-solution/
- http://mainisusuallyafunction.blogspot.it/2012/05/automatic-binary-hardening-with.html
- http://disse.cting.org/2012/07/27/penetration-testing-with-httfs-rfi/
- http://blog.cloudflare.com/65gbps-ddos-no-problem
- http://www.slideshare.net/grugq/opsec-for-hackers
- http://ethanheilman.tumblr.com/post/28951702391/imagining-a-secure-backdoor-cipher
- http://www.datagenetics.com/blog/september32012/index.html
- http://blog.ioactive.com/2012/11/hacking-android-banking-application.html
- http://joxeankoret.com/blog/2012/11/04/a-simple-pin-tool-unpacker-for-the-linux-version-of-skype/
- http://securetheinterior.blogspot.co.uk/2012/11/malicious-javascript.html
- http://resources.infosecinstitute.com/web-vulnerabilities-explained/
- Slide about bypassing certificate pinning using JDWP
- Dissecting PostgreSQL CVE-2013-1899
- http://blog.detectify.com/post/35208929112/how-to-exploit-an-xss
- http://erratasec.blogspot.it/2013/02/silent-circle-and-inexperienced.html
- exploiting the f* functions (a.k.a. abusing file-streams in libc)