<?xml version='1.0' encoding='UTF-8'?><?xml-stylesheet href="http://www.blogger.com/styles/atom.css" type="text/css"?><feed xmlns='http://www.w3.org/2005/Atom' xmlns:openSearch='http://a9.com/-/spec/opensearchrss/1.0/' xmlns:blogger='http://schemas.google.com/blogger/2008' xmlns:georss='http://www.georss.org/georss' xmlns:gd="http://schemas.google.com/g/2005" xmlns:thr='http://purl.org/syndication/thread/1.0'><id>tag:blogger.com,1999:blog-6995472413807230983</id><updated>2024-11-01T03:39:37.489-07:00</updated><category term="Windows"/><category term="Linux"/><category term="Mac"/><category term="Kalilinux"/><category term="Bactrack"/><category term="Ubuntu"/><category term="Scanner"/><category term="PDF"/><category term="kali"/><category term="EN"/><category term="Network"/><category term="Security"/><category term="Hacks"/><category term="Tool"/><category term="Backtrack"/><category term="E-book"/><category term="Free"/><category term="Hacking"/><category term="Password"/><category term="Python"/><category term="SQL"/><category term="Security Scanner"/><category term="Vulnerability"/><category term="downland"/><category term="ebook"/><category term="Ebook PDF"/><category term="Local Exploit"/><category term="Remote Exploit"/><category term="Scan"/><category term="Web Application"/><category term="Web Security"/><category term="Wifi"/><category term="iPhone"/><category term="0day Exploit"/><category term="Android"/><category term="AutoScan"/><category term="Exploit Vulnerability"/><category term="Facebook"/><category term="Framework"/><category term="Open Source"/><category term="Passwords"/><category term="Shellcode"/><category term="Sniffer"/><category term="Unix"/><category term="Vulnerability Scanner"/><category term="java"/><category term="Admin Exploit"/><category term="Analyzer"/><category term="Application"/><category term="Bing Dork Scanner"/><category term="Browser"/><category term="Brute-force"/><category term="Bruteforce"/><category term="Bug"/><category term="Cracker"/><category term="DNS"/><category term="Dork"/><category term="Exploit"/><category term="FTP"/><category term="Facebook Hacking Tool"/><category term="For"/><category term="Intrusion Detection"/><category term="Multi Vulnerability"/><category term="MySQL"/><category term="Network Manager"/><category term="PHP"/><category term="Penetration Testing"/><category term="Pentester"/><category term="PowerShell"/><category term="Smart"/><category term="Software"/><category term="Testing"/><category term="Web"/><category term="Web Services"/><category term="Webscanner"/><category term="Webshell"/><category term="Wireless"/><category term="Wordpress"/><category term="arsiv"/><category term="hackers"/><category term="iOS"/><category term="jSQL"/><category term="2014"/><category term="2015"/><category term="Access Rights"/><category term="Acrylic WiFi"/><category term="Analysis"/><category term="And Folders"/><category term="Anonymity"/><category term="Antak WebShell"/><category term="Arachni"/><category term="Arachni v1.0"/><category term="Assessment"/><category term="Attacks"/><category term="Audit"/><category term="Audit  Dll Hijacking"/><category term="Auditing"/><category term="Autoshell"/><category term="Autoupload"/><category term="BIOS"/><category term="BSD"/><category term="BackdoorFactory"/><category term="BeEF"/><category term="Big Book"/><category term="Binary Analysis"/><category term="Bing"/><category term="Bitcoin"/><category term="Bitcoins"/><category term="BlackArch"/><category term="Blackhat"/><category term="Blind XPath Injection"/><category term="Bot"/><category term="Botnet"/><category term="Bundle"/><category term="Buy"/><category term="CMS 2.2.1"/><category term="CMSmap"/><category term="CSRF"/><category term="Cache"/><category term="Car PC Hacks"/><category term="Check"/><category term="Chrome"/><category term="Chrome Extension"/><category term="CipherShed"/><category term="Console"/><category term="CookieCatcher"/><category term="Cryptanalysis"/><category term="Cryptographically"/><category term="Cryptographically-strong Passwords"/><category term="Cryptography"/><category term="Cygwin"/><category term="DB"/><category term="DDoS"/><category term="DDoS attacks"/><category term="DNSChef"/><category term="DRM removal"/><category term="DVIA"/><category term="Damn"/><category term="Database"/><category term="Debian"/><category term="Debugger"/><category term="Debugging Tools"/><category term="Denial of Service"/><category term="Distribution"/><category term="Distro"/><category term="DllHijackAuditor"/><category term="DoS attack"/><category term="DoS attack simulator"/><category term="DomainHostingView"/><category term="Download"/><category term="Duplicates Search"/><category term="ELF"/><category term="ES"/><category term="Edition"/><category term="Email"/><category term="Email Generation"/><category term="Email Security"/><category term="Encryption Software"/><category term="Engine"/><category term="Ethical Hacking"/><category term="Ethical Hacking Framework"/><category term="FBCacheView"/><category term="FBHT v3.0"/><category term="Facebook Hacking"/><category term="Facebook Password Cracker"/><category term="Fake"/><category term="File"/><category term="File Integrity"/><category term="Files"/><category term="Fing"/><category term="Firewall"/><category term="Footprinting"/><category term="Forensic"/><category term="Forensic Analyzer"/><category term="Forensic Framework"/><category term="Forensics Tool"/><category term="Free Downland"/><category term="Free Ebook"/><category term="Free Hacking EBooks"/><category term="FuckShitUp"/><category term="Generator"/><category term="Geolocation"/><category term="GnuPG"/><category term="HIDS"/><category term="HTML5 Hacks"/><category term="HTTP Botnet"/><category term="Hacker"/><category term="Hackers Painters"/><category term="Hacking For Dummies"/><category term="Hacking the kinect"/><category term="Hardanger"/><category term="Hardening"/><category term="HconSTF"/><category term="Hijacking"/><category term="HoneyDrive"/><category term="HoneyPot"/><category term="Hosting Information"/><category term="Http-enum"/><category term="Hyperbook"/><category term="IPhone Analyzer"/><category term="ISO"/><category term="Inject"/><category term="Injector"/><category term="Introspy"/><category term="IronWASP"/><category term="JSQL.v0.3"/><category term="Joomla"/><category term="Joomla com_sexycontact"/><category term="Kinect Hacks"/><category term="Knoppix Hacks - Ebook PDF Downland"/><category term="LinSSID"/><category term="Linux Brute Force"/><category term="Linux Server Hacks"/><category term="Linux v2014.10.07 Pentest"/><category term="Login"/><category term="Lynis"/><category term="MS-DOS"/><category term="Mac Hacks"/><category term="Machine Learning"/><category term="Magic Unicorn"/><category term="Manager Windows"/><category term="Metasploit"/><category term="Metasploit Framework"/><category term="MobiSeC"/><category term="Mobile Vulnerability"/><category term="Mobius"/><category term="ModSecurity"/><category term="ModSecurity Console"/><category term="Monitor"/><category term="Monitoring"/><category term="NTFS"/><category term="NTFS Permissions Reporter"/><category term="NTFS symbolic"/><category term="NTFSLinks"/><category term="NetShareMonitor"/><category term="Netsparker"/><category term="Network Exploration"/><category term="Network Mapper"/><category term="Network Scanner"/><category term="Network Security"/><category term="Nmap"/><category term="Nmap Security Scanner"/><category term="OWASP Xenotix"/><category term="Online Anonymizing"/><category term="OpenPGP"/><category term="OpenPGP standard"/><category term="Opensource"/><category term="PDF Analysis Suite"/><category term="PDF Analyzer"/><category term="PDF Hacks"/><category term="PDF Password cracking"/><category term="PE"/><category term="PE infector"/><category term="PENTBOX"/><category term="PGP"/><category term="PWGen"/><category term="Packet"/><category term="Parameter"/><category term="ParanoiDF"/><category term="Passera"/><category term="Passive scanner"/><category term="Passphrases"/><category term="Password Decryptor"/><category term="Password Mangler"/><category term="Paypal"/><category term="Pdf Password Unlocker"/><category term="Penetration"/><category term="Pentest"/><category term="Pentesting"/><category term="Perl"/><category term="Phishing"/><category term="Php Scriptlerim"/><category term="Platform"/><category term="Poisoners"/><category term="Powered by"/><category term="Prevention"/><category term="Protocols"/><category term="Proxy"/><category term="QuasiBot"/><category term="Recovery"/><category term="Remove Pdf Password"/><category term="Research  Tools"/><category term="SAMHAIN"/><category term="SHA256"/><category term="SHA256 Salted Hash Kracker"/><category term="SQL Dork List 2015"/><category term="SQLi"/><category term="SQLi-DB v.1"/><category term="SSH"/><category term="SSH server"/><category term="Scanner Windows"/><category term="Scanners"/><category term="Script"/><category term="Search"/><category term="SearchMyFiles"/><category term="Secure"/><category term="Secure Encryption"/><category term="Secure Passwords"/><category term="Securing"/><category term="Security Audits"/><category term="Services"/><category term="Session Hijacking Tool"/><category term="Share"/><category term="ShellCode Injector"/><category term="Shellter"/><category term="Simple CMS"/><category term="SimpleProgramDebugger"/><category term="SlowHTTPTest"/><category term="Sniffers"/><category term="Sniffing"/><category term="SoftPerfect WiFi Guard"/><category term="Software Security"/><category term="SpearPhisher"/><category term="SpiderFoot"/><category term="Strong Unique Passwords"/><category term="Subrion"/><category term="Suite Pentesting"/><category term="Suricata"/><category term="System"/><category term="System Auditor"/><category term="TCP/IP Scanner"/><category term="TOR"/><category term="The"/><category term="Tools"/><category term="Tor Browser"/><category term="TrueCrypt"/><category term="UFONet"/><category term="USB"/><category term="USBPcap"/><category term="Ubuntu Hacks"/><category term="Unicorn"/><category term="Video"/><category term="View"/><category term="Viproy"/><category term="Virtual Machine"/><category term="VoIP"/><category term="Vulnerable iOS Application"/><category term="WAF-FLE"/><category term="WFacebook"/><category term="WLAN"/><category term="WLAN information"/><category term="WS_FTP"/><category term="WS_FTP Password Decryptor"/><category term="Web Abuse"/><category term="Web-Fu"/><category term="WebVulScan"/><category term="Whois"/><category term="WiFi Guard"/><category term="Wifiscanner"/><category term="Windows Symbolic Links"/><category term="Windows8"/><category term="Windows8 Hacks"/><category term="Wireless Monitor"/><category term="Wireless Network"/><category term="Wireshark"/><category term="WordPress Brute Force - wpbf.py"/><category term="Wordpress com_sexycontact"/><category term="Worldlist"/><category term="Wpa"/><category term="XCat"/><category term="XPath"/><category term="XPath Injection"/><category term="XPath query"/><category term="XSS"/><category term="XSS Vulnerability Scanner"/><category term="XSScrapy"/><category term="Zarp Hacking Toolkit"/><category term="and Analysis"/><category term="arşiv"/><category term="belge"/><category term="dos_ssh"/><category term="döküman"/><category term="e-book hacks"/><category term="e-downland"/><category term="free hack tools downland"/><category term="gizli"/><category term="guestbook v1.30"/><category term="hackers ebook"/><category term="hacksearch"/><category term="hacksearch.wordpress.com"/><category term="http-enum.py"/><category term="iPThief"/><category term="links"/><category term="org"/><category term="paypal.com"/><category term="sqlmap"/><category term="sqlmap.py"/><category term="steven levy"/><category term="tool v0.6"/><category term="txt"/><category term="zarp.py"/><category term="İnjection"/><title type='text'>Web Security Research - Lab</title><subtitle type='html'></subtitle><link rel='http://schemas.google.com/g/2005#feed' type='application/atom+xml' href='http://web-analizi.blogspot.com/feeds/posts/default'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/6995472413807230983/posts/default'/><link rel='alternate' type='text/html' href='http://web-analizi.blogspot.com/'/><link rel='hub' href='http://pubsubhubbub.appspot.com/'/><link rel='next' type='application/atom+xml' href='http://www.blogger.com/feeds/6995472413807230983/posts/default?start-index=26&amp;max-results=25'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><generator version='7.00' uri='http://www.blogger.com'>Blogger</generator><openSearch:totalResults>109</openSearch:totalResults><openSearch:startIndex>1</openSearch:startIndex><openSearch:itemsPerPage>25</openSearch:itemsPerPage><entry><id>tag:blogger.com,1999:blog-6995472413807230983.post-616803724320141233</id><published>2015-07-01T20:06:00.000-07:00</published><updated>2015-07-01T20:06:25.162-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="CMSmap"/><category scheme="http://www.blogger.com/atom/ns#" term="Joomla"/><category scheme="http://www.blogger.com/atom/ns#" term="kali"/><category scheme="http://www.blogger.com/atom/ns#" term="Kalilinux"/><category scheme="http://www.blogger.com/atom/ns#" term="Scanner"/><category scheme="http://www.blogger.com/atom/ns#" term="Simple CMS"/><category scheme="http://www.blogger.com/atom/ns#" term="tool v0.6"/><category scheme="http://www.blogger.com/atom/ns#" term="Vulnerability"/><category scheme="http://www.blogger.com/atom/ns#" term="Wordpress"/><title type='text'>CMSmap tool v0.6 - Simple CMS Vulnerability  Scanner </title><content type='html'>&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEizhKmhrv1l2CVVwhZ5HHXP7ug1YZ7FR1sHX16JGgIUAm-12HVPGcQmSN2Zt0hmu0DF821KSRMAdPf3oXg63aZaDTPnPzkhHd83pp4WW_hP8Y6HevRtyzl3rv5uxehc4m8LkK3B1LNF2CU/s1600/cms1.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;393&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEizhKmhrv1l2CVVwhZ5HHXP7ug1YZ7FR1sHX16JGgIUAm-12HVPGcQmSN2Zt0hmu0DF821KSRMAdPf3oXg63aZaDTPnPzkhHd83pp4WW_hP8Y6HevRtyzl3rv5uxehc4m8LkK3B1LNF2CU/s640/cms1.jpg&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjwb01NPuGGemE2AhsJe_ZQAs8em-VKGkljSXCSQxdX4BEj6er96J-afywiseQB9bA292di55tXF8IspSpMt50KrQM3e5mpbrZ0WKB0jrInhSfw6ueN9DeSrh1dx1DXlLoorMJMFSiPfQg/s1600/cms2.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;195&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjwb01NPuGGemE2AhsJe_ZQAs8em-VKGkljSXCSQxdX4BEj6er96J-afywiseQB9bA292di55tXF8IspSpMt50KrQM3e5mpbrZ0WKB0jrInhSfw6ueN9DeSrh1dx1DXlLoorMJMFSiPfQg/s640/cms2.jpg&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgk_w4KYMGf0TBIL7mNayWfhKDY_Z3g66p9-RTtNLfnErOXztW0qHiMDmZhiByUkZ5fCv318M64OjsUdPNtKozNwTPj4NoPzblYh8kKEqF8zKl90ZucYRA1PX_SCHe2woV3maAX-MFZQdg/s1600/cms3.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;248&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgk_w4KYMGf0TBIL7mNayWfhKDY_Z3g66p9-RTtNLfnErOXztW0qHiMDmZhiByUkZ5fCv318M64OjsUdPNtKozNwTPj4NoPzblYh8kKEqF8zKl90ZucYRA1PX_SCHe2woV3maAX-MFZQdg/s640/cms3.jpg&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEipajMeqp2ZWa0dS11l_M6Tc0lxeEyR1xdGchKKEgccMAjKKmHQWif5xJOZ0RrT-cr8XOr16IQek_TtW60d2ZeF0UHvDq6MY6t3zRKIjn7k3DqF3mn4TwLknSjGparYvFGybFyyt3R52sc/s1600/cms4.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;328&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEipajMeqp2ZWa0dS11l_M6Tc0lxeEyR1xdGchKKEgccMAjKKmHQWif5xJOZ0RrT-cr8XOr16IQek_TtW60d2ZeF0UHvDq6MY6t3zRKIjn7k3DqF3mn4TwLknSjGparYvFGybFyyt3R52sc/s640/cms4.jpg&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;a href=&quot;https://hacksearch.wordpress.com/2015/07/02/cmsmap-tool-v0-6-simple-cms-vulnerability-scanner/&quot; target=&quot;_blank&quot;&gt;https://hacksearch.wordpress.com/2015/07/02/cmsmap-tool-v0-6-simple-cms-vulnerability-scanner/&lt;/a&gt;</content><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/6995472413807230983/posts/default/616803724320141233'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/6995472413807230983/posts/default/616803724320141233'/><link rel='alternate' type='text/html' href='http://web-analizi.blogspot.com/2015/07/cmsmap-tool-v06-simple-cms.html' title='CMSmap tool v0.6 - Simple CMS Vulnerability  Scanner '/><author><name>Anonymous</name><uri>http://www.blogger.com/profile/14191995798879127165</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEizhKmhrv1l2CVVwhZ5HHXP7ug1YZ7FR1sHX16JGgIUAm-12HVPGcQmSN2Zt0hmu0DF821KSRMAdPf3oXg63aZaDTPnPzkhHd83pp4WW_hP8Y6HevRtyzl3rv5uxehc4m8LkK3B1LNF2CU/s72-c/cms1.jpg" height="72" width="72"/></entry><entry><id>tag:blogger.com,1999:blog-6995472413807230983.post-1982542882720683507</id><published>2015-05-27T10:24:00.000-07:00</published><updated>2015-05-27T10:24:04.975-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Attacks"/><category scheme="http://www.blogger.com/atom/ns#" term="Denial of Service"/><category scheme="http://www.blogger.com/atom/ns#" term="Parameter"/><category scheme="http://www.blogger.com/atom/ns#" term="Poisoners"/><category scheme="http://www.blogger.com/atom/ns#" term="Scanner"/><category scheme="http://www.blogger.com/atom/ns#" term="Scanners"/><category scheme="http://www.blogger.com/atom/ns#" term="Services"/><category scheme="http://www.blogger.com/atom/ns#" term="Sniffers"/><category scheme="http://www.blogger.com/atom/ns#" term="Tools"/><category scheme="http://www.blogger.com/atom/ns#" term="Zarp Hacking Toolkit"/><category scheme="http://www.blogger.com/atom/ns#" term="zarp.py"/><title type='text'>Zarp Hacking Toolkit - zarp.py</title><content type='html'>&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjwQXNmhawlsQMTN_kP_J7KjEz-X6Qd8WB94L2U1jBIOW6KaQEzqhjVZYcF281j_9wtEtZURmVrLehIp_X7LC2mEdNq30rDEQmrqBKf4L8Xn7rBcfgBHHpLYW_qZykWjZTkOl0IIWYdAr0/s1600/zarphackingtoolkit.PNG&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;215&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjwQXNmhawlsQMTN_kP_J7KjEz-X6Qd8WB94L2U1jBIOW6KaQEzqhjVZYcF281j_9wtEtZURmVrLehIp_X7LC2mEdNq30rDEQmrqBKf4L8Xn7rBcfgBHHpLYW_qZykWjZTkOl0IIWYdAr0/s400/zarphackingtoolkit.PNG&quot; width=&quot;400&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgmQFUaOv825gm-WxBTIlmFjeEm-eX-61cOELdp0bg0aG7vCT3W92YxTLiBSv-5iPPthUk74bFWloSgu9ATyKW4tniOekm-Zu9mIsrnpJamPVKVkSS8JbF-GAD0H7GYCB8GxJ9mOHSgt80/s1600/zarphackingtoolarpinfo.PNG&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;179&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgmQFUaOv825gm-WxBTIlmFjeEm-eX-61cOELdp0bg0aG7vCT3W92YxTLiBSv-5iPPthUk74bFWloSgu9ATyKW4tniOekm-Zu9mIsrnpJamPVKVkSS8JbF-GAD0H7GYCB8GxJ9mOHSgt80/s320/zarphackingtoolarpinfo.PNG&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjfQceBN8VxYaQbkWMUZJdBM_0OZg6WVPzoQnMUj6D2AzQ7JS83EA4lAGOAuSvjvQRO8mJL_wPSbTl3YvR0pam8BiFM_GtK5Q7y_Y7SxlKTTSXwOZi6cWvvfnFbIq_7kHTS8mrM17xTbQA/s1600/zarphackingtoolhttpsniper.PNG&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;139&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjfQceBN8VxYaQbkWMUZJdBM_0OZg6WVPzoQnMUj6D2AzQ7JS83EA4lAGOAuSvjvQRO8mJL_wPSbTl3YvR0pam8BiFM_GtK5Q7y_Y7SxlKTTSXwOZi6cWvvfnFbIq_7kHTS8mrM17xTbQA/s320/zarphackingtoolhttpsniper.PNG&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgIQ8C_c2kMMgwcB8XmuC6p8CMJp1uddCnHy6ctw_nbFlQvkAUeOuu3yJPCw4q-8Bp6cGlbotVbEBianM1hbEDMedw6ezXRwMH2ZztMLL_q4OTmH5wmhfZkYr5oDcdZzX4gbTkdlS_Udag/s1600/zarphackingtoolkithelp.PNG&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;123&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgIQ8C_c2kMMgwcB8XmuC6p8CMJp1uddCnHy6ctw_nbFlQvkAUeOuu3yJPCw4q-8Bp6cGlbotVbEBianM1hbEDMedw6ezXRwMH2ZztMLL_q4OTmH5wmhfZkYr5oDcdZzX4gbTkdlS_Udag/s320/zarphackingtoolkithelp.PNG&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj8mJE5aHR6oIWhbX9RKSfqx4AHhgzl6NTcRanGyQst2Bx-lXltUCnfp_ZrjKho6LYHFVpEvovn_Roq4Uvil0yGmBvh-XTsBtLwnDEzaWaHyfHvwQNThmWVFuYGvHTKwLBjctmvEWCi898/s1600/zarphackingtoolkitmainmenu.PNG&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;116&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj8mJE5aHR6oIWhbX9RKSfqx4AHhgzl6NTcRanGyQst2Bx-lXltUCnfp_ZrjKho6LYHFVpEvovn_Roq4Uvil0yGmBvh-XTsBtLwnDEzaWaHyfHvwQNThmWVFuYGvHTKwLBjctmvEWCi898/s320/zarphackingtoolkitmainmenu.PNG&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&amp;nbsp;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgRsjzgm68scU40LyfXvw1cQ_zkQuvag6RADSyXL-OWybIQ9quUNkwNVrR6m_l_lb3TpauVP7YjZgc50cWcXxGpzq70f28dFPiny0vxZGzWQ3D-o_Ew7dkTLc9CfGhku0kEuCbog7LIBqk/s1600/zarphackingtoolkitcommandline.PNG&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;228&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgRsjzgm68scU40LyfXvw1cQ_zkQuvag6RADSyXL-OWybIQ9quUNkwNVrR6m_l_lb3TpauVP7YjZgc50cWcXxGpzq70f28dFPiny0vxZGzWQ3D-o_Ew7dkTLc9CfGhku0kEuCbog7LIBqk/s320/zarphackingtoolkitcommandline.PNG&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&amp;nbsp;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgoLd7pOrU5e6ShY5PbczYoOvf1CTikbTCN4ib28EZI4rtssCjCF4kuco_4wbHwRI-eTR1FpUTGcLKbAVeSKj5BtuJrw2Vgri_6cz7znIIre2UcPhy3Cal2fl-dXYb9B3s0bhcy4Q78iHk/s1600/zarphackingtoolkitmodules.PNG&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;197&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgoLd7pOrU5e6ShY5PbczYoOvf1CTikbTCN4ib28EZI4rtssCjCF4kuco_4wbHwRI-eTR1FpUTGcLKbAVeSKj5BtuJrw2Vgri_6cz7znIIre2UcPhy3Cal2fl-dXYb9B3s0bhcy4Q78iHk/s320/zarphackingtoolkitmodules.PNG&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
Poisoners&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
Denial of Service&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
Sniffers&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
Scanners&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
Services&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
Parameter&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
Attacks&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://hacksearch.wordpress.com/2015/05/27/zarp-hacking-toolkit-zarp-py/&quot;&gt;https://hacksearch.wordpress.com/2015/05/27/zarp-hacking-toolkit-zarp-py/&lt;/a&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;br /&gt;</content><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/6995472413807230983/posts/default/1982542882720683507'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/6995472413807230983/posts/default/1982542882720683507'/><link rel='alternate' type='text/html' href='http://web-analizi.blogspot.com/2015/05/zarp-hacking-toolkit-zarppy.html' title='Zarp Hacking Toolkit - zarp.py'/><author><name>Anonymous</name><uri>http://www.blogger.com/profile/14191995798879127165</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjwQXNmhawlsQMTN_kP_J7KjEz-X6Qd8WB94L2U1jBIOW6KaQEzqhjVZYcF281j_9wtEtZURmVrLehIp_X7LC2mEdNq30rDEQmrqBKf4L8Xn7rBcfgBHHpLYW_qZykWjZTkOl0IIWYdAr0/s72-c/zarphackingtoolkit.PNG" height="72" width="72"/></entry><entry><id>tag:blogger.com,1999:blog-6995472413807230983.post-7784220315840073245</id><published>2015-05-05T11:17:00.001-07:00</published><updated>2015-05-05T11:17:49.847-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Brute-force"/><category scheme="http://www.blogger.com/atom/ns#" term="Cracker"/><category scheme="http://www.blogger.com/atom/ns#" term="Facebook"/><category scheme="http://www.blogger.com/atom/ns#" term="Facebook Password Cracker"/><category scheme="http://www.blogger.com/atom/ns#" term="Linux"/><category scheme="http://www.blogger.com/atom/ns#" term="Mac"/><category scheme="http://www.blogger.com/atom/ns#" term="Password"/><category scheme="http://www.blogger.com/atom/ns#" term="WFacebook"/><category scheme="http://www.blogger.com/atom/ns#" term="Windows"/><title type='text'>Facebook Password Cracker</title><content type='html'>&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiPQtM2fbSXuBEIdTqrU0oAm0XWMx9lHAfDzpHzH4U03iW-ri-Wi-XF_xg_i2J1vBTvniUoVA-pZgWDStNRAvOZEqhkN8rqqZtUVnLd-ix0f5MKVg6m0_HiPTTzKD28jF98EEMvWfJeJWo/s1600/Facebook+Password+Cracker.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiPQtM2fbSXuBEIdTqrU0oAm0XWMx9lHAfDzpHzH4U03iW-ri-Wi-XF_xg_i2J1vBTvniUoVA-pZgWDStNRAvOZEqhkN8rqqZtUVnLd-ix0f5MKVg6m0_HiPTTzKD28jF98EEMvWfJeJWo/s1600/Facebook+Password+Cracker.png&quot; height=&quot;392&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;iframe width=&quot;320&quot; height=&quot;266&quot; class=&quot;YOUTUBE-iframe-video&quot; data-thumbnail-src=&quot;https://i.ytimg.com/vi/1RKjJYbFxMM/0.jpg&quot; src=&quot;https://www.youtube.com/embed/1RKjJYbFxMM?feature=player_embedded&quot; frameborder=&quot;0&quot; allowfullscreen&gt;&lt;/iframe&gt;&amp;nbsp;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;a href=&quot;https://hacksearch.wordpress.com/2015/05/05/facebook-password-cracker/&quot;&gt;https://hacksearch.wordpress.com/2015/05/05/facebook-password-cracker/&lt;/a&gt;</content><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/6995472413807230983/posts/default/7784220315840073245'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/6995472413807230983/posts/default/7784220315840073245'/><link rel='alternate' type='text/html' href='http://web-analizi.blogspot.com/2015/05/facebook-password-cracker.html' title='Facebook Password Cracker'/><author><name>Anonymous</name><uri>http://www.blogger.com/profile/14191995798879127165</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiPQtM2fbSXuBEIdTqrU0oAm0XWMx9lHAfDzpHzH4U03iW-ri-Wi-XF_xg_i2J1vBTvniUoVA-pZgWDStNRAvOZEqhkN8rqqZtUVnLd-ix0f5MKVg6m0_HiPTTzKD28jF98EEMvWfJeJWo/s72-c/Facebook+Password+Cracker.png" height="72" width="72"/></entry><entry><id>tag:blogger.com,1999:blog-6995472413807230983.post-4574409362476587404</id><published>2015-05-05T06:53:00.000-07:00</published><updated>2015-05-05T06:53:23.217-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Email Generation"/><category scheme="http://www.blogger.com/atom/ns#" term="Phishing"/><category scheme="http://www.blogger.com/atom/ns#" term="SpearPhisher"/><category scheme="http://www.blogger.com/atom/ns#" term="Windows"/><title type='text'>SpearPhisher -  Phishing Email Generation Tool</title><content type='html'>&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg87HvYCoxKpArY69CUD38Jy1W8wFeHuItVFio6eKn4XFIolfhFlwFiPnUjl7ZHI30V625Ax-0SBYab19NGuKwfjXwnEYdm3doNDOUCGSNk21kLxh-gF7EdviNoj8OQlaZR9wq2UtB6YG0/s1600/spearphiser.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;306&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg87HvYCoxKpArY69CUD38Jy1W8wFeHuItVFio6eKn4XFIolfhFlwFiPnUjl7ZHI30V625Ax-0SBYab19NGuKwfjXwnEYdm3doNDOUCGSNk21kLxh-gF7EdviNoj8OQlaZR9wq2UtB6YG0/s400/spearphiser.png&quot; width=&quot;400&quot; /&gt;&lt;/a&gt;&amp;nbsp;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;strong style=&quot;background-color: white; color: #333333; font-family: Georgia, &#39;Times New Roman&#39;, &#39;Bitstream Charter&#39;, Times, serif; font-size: 16px; line-height: 24px;&quot;&gt;SpearPhisher is a simple point and click Windows GUI tool designed for (mostly) non-technical people who would like to supplement the education and awareness aspect of their information security program. Not only is it useful to non-technical folks, penetration testers may find it handy for sending quick and easy ad-hoc phishing emails. The tool supports specifying different sending names and email addresses, multiple recipients via TO, CC, BCC, and allows bulk loading with one recipient email address per line in a file. It allows customization of the subject, adding one attachment, and SSL support for SMTP enabled mail servers. One of the popular features with our client is the WYSIWYG HTML editor that allows virtually anyone to use the tool; previewing results as you point and click edit your malicious email body. If you want to add custom XSS exploits, client side attacks, or other payloads such as a Java Applet code generated by the Social Engineer Toolkit (SET), its split screen editor allows more advanced users to edit HTML directly.&amp;nbsp;&lt;/strong&gt;&lt;br /&gt;
&lt;strong style=&quot;background-color: white; color: #333333; font-family: Georgia, &#39;Times New Roman&#39;, &#39;Bitstream Charter&#39;, Times, serif; font-size: 16px; line-height: 24px;&quot;&gt;&lt;br /&gt;&lt;/strong&gt;
&lt;span style=&quot;background-color: white; line-height: 24px;&quot;&gt;&lt;span style=&quot;color: #333333; font-family: Georgia, Times New Roman, Bitstream Charter, Times, serif;&quot;&gt;&lt;b&gt;&lt;a href=&quot;https://hacksearch.wordpress.com/2015/05/05/spearphisher-phishing-email-generation-tool/&quot;&gt;https://hacksearch.wordpress.com/2015/05/05/spearphisher-phishing-email-generation-tool/&lt;/a&gt;&lt;/b&gt;&lt;/span&gt;&lt;/span&gt;</content><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/6995472413807230983/posts/default/4574409362476587404'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/6995472413807230983/posts/default/4574409362476587404'/><link rel='alternate' type='text/html' href='http://web-analizi.blogspot.com/2015/05/spearphisher-phishing-email-generation.html' title='SpearPhisher -  Phishing Email Generation Tool'/><author><name>Anonymous</name><uri>http://www.blogger.com/profile/14191995798879127165</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg87HvYCoxKpArY69CUD38Jy1W8wFeHuItVFio6eKn4XFIolfhFlwFiPnUjl7ZHI30V625Ax-0SBYab19NGuKwfjXwnEYdm3doNDOUCGSNk21kLxh-gF7EdviNoj8OQlaZR9wq2UtB6YG0/s72-c/spearphiser.png" height="72" width="72"/></entry><entry><id>tag:blogger.com,1999:blog-6995472413807230983.post-5070994911642128907</id><published>2015-05-05T05:14:00.000-07:00</published><updated>2015-05-05T05:14:22.931-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="CookieCatcher"/><category scheme="http://www.blogger.com/atom/ns#" term="Linux"/><category scheme="http://www.blogger.com/atom/ns#" term="Mac"/><category scheme="http://www.blogger.com/atom/ns#" term="Session Hijacking Tool"/><category scheme="http://www.blogger.com/atom/ns#" term="Web Services"/><category scheme="http://www.blogger.com/atom/ns#" term="Windows"/><title type='text'>CookieCatcher -  Session Hijacking Tool </title><content type='html'>&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjot3m8Azbft3u58jey6VnDjX0oX1QpYeVRr7CShACy3aESph6SAgjo6kmXXqvD3OUPaomRjDxRaFVe-0MtGyfsjPZwVuE6TuOwg2ZVJ7rs2CvLPUlc0OGxI8fjHaaiscDg1T3kwkLHu5k/s1600/CookieCatcher.JPG&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;304&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjot3m8Azbft3u58jey6VnDjX0oX1QpYeVRr7CShACy3aESph6SAgjo6kmXXqvD3OUPaomRjDxRaFVe-0MtGyfsjPZwVuE6TuOwg2ZVJ7rs2CvLPUlc0OGxI8fjHaaiscDg1T3kwkLHu5k/s640/CookieCatcher.JPG&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&amp;nbsp;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;color: #333333; font-family: Georgia, &#39;Times New Roman&#39;, &#39;Bitstream Charter&#39;, Times, serif; font-size: 16px; line-height: 24px;&quot;&gt;
&lt;strong&gt;(Cross Site Scripting) vulnerabilities within web applications to steal user session IDs (aka Session Hijacking). The use of this application is purely educational and should not be used without proper permission from the target application.&lt;/strong&gt;&lt;/div&gt;
&lt;div style=&quot;color: #333333; font-family: Georgia, &#39;Times New Roman&#39;, &#39;Bitstream Charter&#39;, Times, serif; font-size: 16px; line-height: 24px;&quot;&gt;
&lt;strong&gt;Features:&lt;/strong&gt;&lt;br /&gt;&lt;strong&gt;- Prebuilt payloads to steal cookie data&lt;/strong&gt;&lt;br /&gt;&lt;strong&gt;- Just copy and paste payload into a XSS vulnerability&lt;/strong&gt;&lt;br /&gt;&lt;strong&gt;- Will send email notification when new cookies are stolen&lt;/strong&gt;&lt;br /&gt;&lt;strong&gt;- Will attempt to refresh cookies every 3 minutes to avoid inactivity timeouts&lt;/strong&gt;&lt;br /&gt;&lt;strong&gt;- Provides full HTTP requests to hijack sessions through a proxy (BuRP, etc)&lt;/strong&gt;&lt;br /&gt;&lt;strong&gt;- Will attempt to load a preview when viewing the cookie data&lt;/strong&gt;&lt;br /&gt;&lt;strong&gt;- PAYLOADS&lt;/strong&gt;&lt;br /&gt;&lt;strong&gt;- Basic AJAX Attack&lt;/strong&gt;&lt;br /&gt;&lt;strong&gt;- HTTPONLY evasion for Apache CVE-20120053&lt;/strong&gt;&lt;br /&gt;&lt;strong&gt;- More to come&lt;/strong&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;iframe width=&quot;320&quot; height=&quot;266&quot; class=&quot;YOUTUBE-iframe-video&quot; data-thumbnail-src=&quot;https://i.ytimg.com/vi/2GH6RRozOpY/0.jpg&quot; src=&quot;https://www.youtube.com/embed/2GH6RRozOpY?feature=player_embedded&quot; frameborder=&quot;0&quot; allowfullscreen&gt;&lt;/iframe&gt;&amp;nbsp;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;span style=&quot;color: #333333; font-family: Georgia, Times New Roman, Bitstream Charter, Times, serif;&quot;&gt;&lt;span style=&quot;line-height: 24px;&quot;&gt;&lt;b&gt;&lt;a href=&quot;https://hacksearch.wordpress.com/2015/05/05/cookiecatcher-session-hijacking-tool/&quot;&gt;https://hacksearch.wordpress.com/2015/05/05/cookiecatcher-session-hijacking-tool/&lt;/a&gt;&lt;/b&gt;&lt;/span&gt;&lt;/span&gt;</content><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/6995472413807230983/posts/default/5070994911642128907'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/6995472413807230983/posts/default/5070994911642128907'/><link rel='alternate' type='text/html' href='http://web-analizi.blogspot.com/2015/05/cookiecatcher-session-hijacking-tool.html' title='CookieCatcher -  Session Hijacking Tool '/><author><name>Anonymous</name><uri>http://www.blogger.com/profile/14191995798879127165</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjot3m8Azbft3u58jey6VnDjX0oX1QpYeVRr7CShACy3aESph6SAgjo6kmXXqvD3OUPaomRjDxRaFVe-0MtGyfsjPZwVuE6TuOwg2ZVJ7rs2CvLPUlc0OGxI8fjHaaiscDg1T3kwkLHu5k/s72-c/CookieCatcher.JPG" height="72" width="72"/></entry><entry><id>tag:blogger.com,1999:blog-6995472413807230983.post-7230972182618365476</id><published>2015-05-04T17:25:00.001-07:00</published><updated>2015-05-04T17:25:35.161-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Footprinting"/><category scheme="http://www.blogger.com/atom/ns#" term="Linux"/><category scheme="http://www.blogger.com/atom/ns#" term="SpiderFoot"/><category scheme="http://www.blogger.com/atom/ns#" term="Web Services"/><category scheme="http://www.blogger.com/atom/ns#" term="Windows"/><title type='text'>SpiderFoot v2.30 - Footprinting tool</title><content type='html'>&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi4vPhhvhse14yQ4agjph9I2vjOI-MCC1PjUYOOO6nA2Go9F57S90kX3Hd7vB9V4IDg4GPfD8G_muan5OtpOA6bnDBqAm9DXJT-OvgMtaZpuKn3jbPcZA9HpjPPhgxbF2e7dcxG8oR_w_A/s1600/SpiderFoot.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi4vPhhvhse14yQ4agjph9I2vjOI-MCC1PjUYOOO6nA2Go9F57S90kX3Hd7vB9V4IDg4GPfD8G_muan5OtpOA6bnDBqAm9DXJT-OvgMtaZpuKn3jbPcZA9HpjPPhgxbF2e7dcxG8oR_w_A/s1600/SpiderFoot.jpg&quot; /&gt;&lt;/a&gt;&amp;nbsp;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;color: #333333; font-family: Georgia, &#39;Times New Roman&#39;, &#39;Bitstream Charter&#39;, Times, serif; font-size: 16px; line-height: 24px;&quot;&gt;
&lt;strong&gt;&lt;span data-mce-style=&quot;color: #ff0000;&quot; style=&quot;color: red;&quot;&gt;&lt;em&gt;SpiderFoot&amp;nbsp;&lt;/em&gt;&lt;/span&gt;is a free, open-source footprinting tool, enabling you to perform various scans against a given domain name in order to obtain information such as sub-domains, e-mail addresses, owned netblocks, web server versions and so on. The main objective of SpiderFoot is to automate the footprinting process to the greatest extent possible, freeing up a penetration tester’s time to focus their efforts on the security testing itself.&lt;/strong&gt;&lt;/div&gt;
&lt;div style=&quot;color: #333333; font-family: Georgia, &#39;Times New Roman&#39;, &#39;Bitstream Charter&#39;, Times, serif; font-size: 16px; line-height: 24px;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;color: #333333; font-family: Georgia, &#39;Times New Roman&#39;, &#39;Bitstream Charter&#39;, Times, serif; font-size: 16px; line-height: 24px;&quot;&gt;
&lt;strong&gt;&lt;span id=&quot;more-33676&quot;&gt;&lt;/span&gt;&lt;/strong&gt;&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;color: #333333; font-family: Georgia, &#39;Times New Roman&#39;, &#39;Bitstream Charter&#39;, Times, serif; font-size: 16px; line-height: 24px;&quot;&gt;
&lt;span data-mce-style=&quot;color: #ff0000;&quot; style=&quot;color: red;&quot;&gt;&lt;strong&gt;Main features&lt;/strong&gt;&lt;/span&gt;&lt;/div&gt;
&lt;ul style=&quot;color: #333333; font-family: Georgia, &#39;Times New Roman&#39;, &#39;Bitstream Charter&#39;, Times, serif; font-size: 16px; line-height: 24px;&quot;&gt;
&lt;li&gt;&lt;strong&gt;Fast, Easy to Use&lt;/strong&gt;&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Highly Configurable&lt;/strong&gt;&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;For Windows &amp;amp; Linux&lt;/strong&gt;&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Create your own modules in Python&lt;/strong&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;div style=&quot;color: #333333; font-family: Georgia, &#39;Times New Roman&#39;, &#39;Bitstream Charter&#39;, Times, serif; font-size: 16px; line-height: 24px;&quot;&gt;
&lt;br data-mce-bogus=&quot;1&quot; /&gt;&lt;/div&gt;
&lt;h3 style=&quot;color: #333333; font-family: Georgia, &#39;Times New Roman&#39;, &#39;Bitstream Charter&#39;, Times, serif;&quot;&gt;
&lt;span data-mce-style=&quot;color: #ff0000;&quot; style=&quot;color: red;&quot;&gt;Changelog v2.04&lt;/span&gt;&lt;/h3&gt;
&lt;ul style=&quot;color: #333333; font-family: Georgia, &#39;Times New Roman&#39;, &#39;Bitstream Charter&#39;, Times, serif; font-size: 16px; line-height: 24px;&quot;&gt;
&lt;li&gt;&lt;strong&gt;New module: Search all Internet TLDs for targets with the same name (sfp_searchtld), with threading and handling wildcard DNS&lt;/strong&gt;&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;New module: Obtain SSL certificate information (issued to, issued by) and check for host-mismatch, expiry and approaching expiry&lt;/strong&gt;&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Improve sfp_dns to identify and handle cases where wildcard DNS is enabled&lt;/strong&gt;&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;A number of bug fixes, should improve the amount of results returned&lt;/strong&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;div style=&quot;color: #333333; font-family: Georgia, &#39;Times New Roman&#39;, &#39;Bitstream Charter&#39;, Times, serif; font-size: 16px; line-height: 24px;&quot;&gt;
&lt;span data-mce-style=&quot;color: #ff0000;&quot; style=&quot;color: red;&quot;&gt;&lt;strong&gt;Full Changelog:&lt;/strong&gt;&lt;/span&gt;&amp;nbsp;&lt;a data-mce-href=&quot;https://github.com/Theethical/spiderfoot&quot; href=&quot;https://github.com/Theethical/spiderfoot&quot; target=&quot;_blank&quot;&gt;https://github.com/Theethical/spiderfoot&lt;/a&gt;&lt;/div&gt;
&lt;div style=&quot;color: #333333; font-family: Georgia, &#39;Times New Roman&#39;, &#39;Bitstream Charter&#39;, Times, serif; font-size: 16px; line-height: 24px;&quot;&gt;
&lt;strong&gt;&lt;span data-mce-style=&quot;color: #ff0000;&quot; style=&quot;color: red;&quot;&gt;More Information:&lt;/span&gt;&lt;a data-mce-href=&quot;http://www.spiderfoot.net/&quot; href=&quot;http://www.spiderfoot.net/&quot; target=&quot;_blank&quot;&gt;http://www.spiderfoot.net/&lt;/a&gt;&lt;/strong&gt;&lt;/div&gt;
&lt;div style=&quot;color: #333333; font-family: Georgia, &#39;Times New Roman&#39;, &#39;Bitstream Charter&#39;, Times, serif; font-size: 16px; line-height: 24px;&quot;&gt;
&lt;br data-mce-bogus=&quot;1&quot; /&gt;&lt;/div&gt;
&lt;div&gt;
&lt;span data-mce-style=&quot;color: #ff0000;&quot; style=&quot;color: red; font-family: Georgia, &#39;Times New Roman&#39;, &#39;Bitstream Charter&#39;, Times, serif; font-size: 16px; line-height: 24px;&quot;&gt;&lt;strong&gt;Downland :&amp;nbsp;&lt;/strong&gt;&lt;/span&gt;&lt;span style=&quot;color: red; font-family: Georgia, Times New Roman, Bitstream Charter, Times, serif;&quot;&gt;&lt;span style=&quot;line-height: 24px;&quot;&gt;&lt;b&gt;&lt;a href=&quot;https://hacksearch.wordpress.com/2015/05/05/spiderfoot-v2-30-footprinting-tool/&quot;&gt;https://hacksearch.wordpress.com/2015/05/05/spiderfoot-v2-30-footprinting-tool/&lt;/a&gt;&lt;/b&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
</content><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/6995472413807230983/posts/default/7230972182618365476'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/6995472413807230983/posts/default/7230972182618365476'/><link rel='alternate' type='text/html' href='http://web-analizi.blogspot.com/2015/05/spiderfoot-v230-footprinting-tool.html' title='SpiderFoot v2.30 - Footprinting tool'/><author><name>Anonymous</name><uri>http://www.blogger.com/profile/14191995798879127165</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi4vPhhvhse14yQ4agjph9I2vjOI-MCC1PjUYOOO6nA2Go9F57S90kX3Hd7vB9V4IDg4GPfD8G_muan5OtpOA6bnDBqAm9DXJT-OvgMtaZpuKn3jbPcZA9HpjPPhgxbF2e7dcxG8oR_w_A/s72-c/SpiderFoot.jpg" height="72" width="72"/></entry><entry><id>tag:blogger.com,1999:blog-6995472413807230983.post-2237631703106073675</id><published>2015-05-03T18:32:00.000-07:00</published><updated>2015-05-03T18:32:18.660-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="IronWASP"/><category scheme="http://www.blogger.com/atom/ns#" term="Opensource"/><category scheme="http://www.blogger.com/atom/ns#" term="Platform"/><category scheme="http://www.blogger.com/atom/ns#" term="Scanner"/><category scheme="http://www.blogger.com/atom/ns#" term="Testing"/><category scheme="http://www.blogger.com/atom/ns#" term="Web Security"/><category scheme="http://www.blogger.com/atom/ns#" term="Windows"/><title type='text'>IronWASP [ v0.9.8.6 ] Open Source Advanced Web Security Testing Vulnerability</title><content type='html'>&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgpJz4RC9jqNnuU6PMpl19vbcEoSYmNttnre9swZyXCKKllMxMmlcsoKQ-nlf1FQ_RTII_wfaeovOhrGzng4hHXEoWZt_f_-gpyenU23uEp8XK3Y134vl5VjRlRQ3EB4h78BN8qxffJA_c/s1600/IronWASP.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgpJz4RC9jqNnuU6PMpl19vbcEoSYmNttnre9swZyXCKKllMxMmlcsoKQ-nlf1FQ_RTII_wfaeovOhrGzng4hHXEoWZt_f_-gpyenU23uEp8XK3Y134vl5VjRlRQ3EB4h78BN8qxffJA_c/s1600/IronWASP.png&quot; height=&quot;267&quot; width=&quot;400&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div&gt;
&lt;span style=&quot;color: #333333; font-family: Georgia, Times New Roman, Bitstream Charter, Times, serif;&quot;&gt;&lt;span style=&quot;line-height: 24px;&quot;&gt;&lt;b&gt;&lt;br /&gt;&lt;/b&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;ul id=&quot;video_links_list&quot; style=&quot;color: #333333; font-family: Georgia, &#39;Times New Roman&#39;, &#39;Bitstream Charter&#39;, Times, serif; font-size: 16px; line-height: 24px;&quot;&gt;
&lt;li&gt;&lt;strong&gt;Performing Vulnerability Scans with IronWASP&lt;/strong&gt;&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Recording a Login Sequence to use in Vulnerability Scanning&lt;/strong&gt;&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Automatically Testing for CSRF Vulnerabilities using IronWASP&lt;/strong&gt;&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Automatically Testing for Broken Authentication with IronWASP&lt;/strong&gt;&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Automatically Testing for Hidden Parameters using IronWASP&lt;/strong&gt;&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Automatically Testing for Privilege Escalation Vulnerabilities using IronWASP&lt;/strong&gt;&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Hunting for DOM based Cross-site Scripting Vulnerabilities with IronWASP&lt;/strong&gt;&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Using IronWASP&#39;s built-in pre-configured browser to automatically intercept HTTP and HTTPS traffic&lt;/strong&gt;&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Using WiHawk - WiFi Router Vulnerability Scanner&lt;/strong&gt;&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Using XmlChor - XPATH Injection Exploitation Tool&lt;/strong&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;div&gt;
&lt;span style=&quot;color: #333333; font-family: Georgia, Times New Roman, Bitstream Charter, Times, serif;&quot;&gt;&lt;span style=&quot;line-height: 24px;&quot;&gt;&lt;b&gt;&lt;br /&gt;&lt;/b&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
&lt;span style=&quot;color: #333333; font-family: Georgia, Times New Roman, Bitstream Charter, Times, serif;&quot;&gt;&lt;span style=&quot;line-height: 24px;&quot;&gt;&lt;a href=&quot;https://hacksearch.wordpress.com/2015/05/04/ironwasp-v0-9-8-6-open-source-advanced-web-security-testing-platform/&quot;&gt;https://hacksearch.wordpress.com/2015/05/04/ironwasp-v0-9-8-6-open-source-advanced-web-security-testing-platform/&lt;/a&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
</content><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/6995472413807230983/posts/default/2237631703106073675'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/6995472413807230983/posts/default/2237631703106073675'/><link rel='alternate' type='text/html' href='http://web-analizi.blogspot.com/2015/05/ironwasp-v0986-open-source-advanced-web.html' title='IronWASP [ v0.9.8.6 ] Open Source Advanced Web Security Testing Vulnerability'/><author><name>Anonymous</name><uri>http://www.blogger.com/profile/14191995798879127165</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgpJz4RC9jqNnuU6PMpl19vbcEoSYmNttnre9swZyXCKKllMxMmlcsoKQ-nlf1FQ_RTII_wfaeovOhrGzng4hHXEoWZt_f_-gpyenU23uEp8XK3Y134vl5VjRlRQ3EB4h78BN8qxffJA_c/s72-c/IronWASP.png" height="72" width="72"/></entry><entry><id>tag:blogger.com,1999:blog-6995472413807230983.post-6861705365793653302</id><published>2015-05-02T15:37:00.001-07:00</published><updated>2015-05-02T15:37:37.466-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Arachni"/><category scheme="http://www.blogger.com/atom/ns#" term="Framework"/><category scheme="http://www.blogger.com/atom/ns#" term="Linux"/><category scheme="http://www.blogger.com/atom/ns#" term="Open Source"/><category scheme="http://www.blogger.com/atom/ns#" term="Security Scanner"/><category scheme="http://www.blogger.com/atom/ns#" term="The"/><category scheme="http://www.blogger.com/atom/ns#" term="Web Application"/><title type='text'>Arachni  - The Web Application Security Scanner Framework</title><content type='html'>&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhRmhJ1cy-TyEnbHBRTdDksrWE4mwUP_FmzP7ZtCDK2wCmwUaYk2sWzuqsMQ8VFulvjRdYXasBD8gJVWrN4uQx4JBD9HvVelcxwPDNrS_tJbSagy1Y7hhWawtlTqlxMF6j2NAB5aMJPyrE/s1600/arachni-web-logo.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhRmhJ1cy-TyEnbHBRTdDksrWE4mwUP_FmzP7ZtCDK2wCmwUaYk2sWzuqsMQ8VFulvjRdYXasBD8gJVWrN4uQx4JBD9HvVelcxwPDNrS_tJbSagy1Y7hhWawtlTqlxMF6j2NAB5aMJPyrE/s1600/arachni-web-logo.png&quot; height=&quot;38&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
&lt;a href=&quot;https://hacksearch.wordpress.com/2015/05/02/arachni-the-web-application-security-scanner-framework/&quot;&gt;https://hacksearch.wordpress.com/2015/05/02/arachni-the-web-application-security-scanner-framework/&lt;/a&gt;&lt;/div&gt;
</content><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/6995472413807230983/posts/default/6861705365793653302'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/6995472413807230983/posts/default/6861705365793653302'/><link rel='alternate' type='text/html' href='http://web-analizi.blogspot.com/2015/05/arachni-web-application-security.html' title='Arachni  - The Web Application Security Scanner Framework'/><author><name>Anonymous</name><uri>http://www.blogger.com/profile/14191995798879127165</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhRmhJ1cy-TyEnbHBRTdDksrWE4mwUP_FmzP7ZtCDK2wCmwUaYk2sWzuqsMQ8VFulvjRdYXasBD8gJVWrN4uQx4JBD9HvVelcxwPDNrS_tJbSagy1Y7hhWawtlTqlxMF6j2NAB5aMJPyrE/s72-c/arachni-web-logo.png" height="72" width="72"/></entry><entry><id>tag:blogger.com,1999:blog-6995472413807230983.post-6442234214221170299</id><published>2015-05-01T15:18:00.001-07:00</published><updated>2015-05-01T15:18:52.768-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Browser"/><category scheme="http://www.blogger.com/atom/ns#" term="Ethical Hacking Framework"/><category scheme="http://www.blogger.com/atom/ns#" term="HconSTF"/><category scheme="http://www.blogger.com/atom/ns#" term="Open Source"/><category scheme="http://www.blogger.com/atom/ns#" term="Penetration Testing"/><category scheme="http://www.blogger.com/atom/ns#" term="Pentest"/><title type='text'>HconSTF Pentest Browser # Open Source Penetration Testing  Ethical Hacking Framework</title><content type='html'>&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjiPsdVc2FZsvDGsCcA-7H2-ClZLiSXsTqZGagoCAH5okMNGYKPNuRE4mNDF-W8qkhXNjJvYwf2cp6h3ui77P7iGTQqTDPt81eX8GtNN-OrTpa0b28X3flqggwUUXyuScGAuLoocFN6DfU/s1600/HconSTF+Pentest+Browser.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjiPsdVc2FZsvDGsCcA-7H2-ClZLiSXsTqZGagoCAH5okMNGYKPNuRE4mNDF-W8qkhXNjJvYwf2cp6h3ui77P7iGTQqTDPt81eX8GtNN-OrTpa0b28X3flqggwUUXyuScGAuLoocFN6DfU/s1600/HconSTF+Pentest+Browser.png&quot; height=&quot;396&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&amp;nbsp;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://hacksearch.wordpress.com/2015/05/01/hconstf-pentest-browser-open-source-penetration-testing-ethical-hacking-framework/&quot;&gt;https://hacksearch.wordpress.com/2015/05/01/hconstf-pentest-browser-open-source-penetration-testing-ethical-hacking-framework/&lt;/a&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;br /&gt;</content><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/6995472413807230983/posts/default/6442234214221170299'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/6995472413807230983/posts/default/6442234214221170299'/><link rel='alternate' type='text/html' href='http://web-analizi.blogspot.com/2015/05/hconstf-pentest-browser-open-source.html' title='HconSTF Pentest Browser # Open Source Penetration Testing  Ethical Hacking Framework'/><author><name>Anonymous</name><uri>http://www.blogger.com/profile/14191995798879127165</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjiPsdVc2FZsvDGsCcA-7H2-ClZLiSXsTqZGagoCAH5okMNGYKPNuRE4mNDF-W8qkhXNjJvYwf2cp6h3ui77P7iGTQqTDPt81eX8GtNN-OrTpa0b28X3flqggwUUXyuScGAuLoocFN6DfU/s72-c/HconSTF+Pentest+Browser.png" height="72" width="72"/></entry><entry><id>tag:blogger.com,1999:blog-6995472413807230983.post-3427602831152987750</id><published>2015-05-01T13:48:00.000-07:00</published><updated>2015-05-01T13:48:04.348-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Application"/><category scheme="http://www.blogger.com/atom/ns#" term="Hardanger"/><category scheme="http://www.blogger.com/atom/ns#" term="Kalilinux"/><category scheme="http://www.blogger.com/atom/ns#" term="Linux"/><category scheme="http://www.blogger.com/atom/ns#" term="Penetration"/><category scheme="http://www.blogger.com/atom/ns#" term="Testing"/><category scheme="http://www.blogger.com/atom/ns#" term="Web"/><category scheme="http://www.blogger.com/atom/ns#" term="Windows"/><title type='text'>Hardanger -  Web Application Penetration Testing </title><content type='html'>&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhPX6KHt67Yt91v-Z5xcxkm8gVfSDPHpqvLdnSj9Vu39yIWyk8f6hW6BoruUT5JLmi_YS6tBPnKJfrVKwEgw78oY8SOSUHLf_jARLggQqKE6udTfdQD4dLkXM9w2G1-U45aClPnF9Qq_X0/s1600/Hardanger2.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhPX6KHt67Yt91v-Z5xcxkm8gVfSDPHpqvLdnSj9Vu39yIWyk8f6hW6BoruUT5JLmi_YS6tBPnKJfrVKwEgw78oY8SOSUHLf_jARLggQqKE6udTfdQD4dLkXM9w2G1-U45aClPnF9Qq_X0/s1600/Hardanger2.jpg&quot; height=&quot;261&quot; width=&quot;400&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;ul style=&quot;background-color: #fafafa; box-sizing: border-box; color: #333333; font-family: Verdana, Geneva, sans-serif; font-size: 12px; line-height: 19.2000007629395px;&quot;&gt;
&lt;li style=&quot;box-sizing: border-box; text-align: justify;&quot;&gt;Native Windows feel via Windows Presentation Foundation&lt;/li&gt;
&lt;li style=&quot;box-sizing: border-box; text-align: justify;&quot;&gt;Can run as a Fiddler2 add-on or standalone&lt;/li&gt;
&lt;li style=&quot;box-sizing: border-box; text-align: justify;&quot;&gt;ClickOnce installer with automatic updates (standalone version)&lt;/li&gt;
&lt;li style=&quot;box-sizing: border-box; text-align: justify;&quot;&gt;Context tab allowing inspection of full HTTP requests&lt;/li&gt;
&lt;li style=&quot;box-sizing: border-box; text-align: justify;&quot;&gt;Server fuzzer tab to configure and launch the server fuzzer&lt;/li&gt;
&lt;li style=&quot;box-sizing: border-box; text-align: justify;&quot;&gt;Basic random fuzzer generates random strings of UTF8 characters of random lengths&lt;/li&gt;
&lt;li style=&quot;box-sizing: border-box; text-align: justify;&quot;&gt;Non HTTP 200 detection engine&lt;/li&gt;
&lt;li style=&quot;box-sizing: border-box; text-align: justify;&quot;&gt;Results window keeping track of successful detections&lt;/li&gt;
&lt;li style=&quot;box-sizing: border-box; text-align: justify;&quot;&gt;Ability to review requests/responses in the results details window&lt;/li&gt;
&lt;/ul&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;color: #333333; font-family: Verdana, Geneva, sans-serif;&quot;&gt;&lt;span style=&quot;font-size: 12px; line-height: 19.2000007629395px;&quot;&gt;&lt;a href=&quot;https://hacksearch.wordpress.com/2015/05/01/hardanger-web-application-penetration-testing/&quot;&gt;https://hacksearch.wordpress.com/2015/05/01/hardanger-web-application-penetration-testing/&lt;/a&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
</content><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/6995472413807230983/posts/default/3427602831152987750'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/6995472413807230983/posts/default/3427602831152987750'/><link rel='alternate' type='text/html' href='http://web-analizi.blogspot.com/2015/05/hardanger-web-application-penetration.html' title='Hardanger -  Web Application Penetration Testing '/><author><name>Anonymous</name><uri>http://www.blogger.com/profile/14191995798879127165</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhPX6KHt67Yt91v-Z5xcxkm8gVfSDPHpqvLdnSj9Vu39yIWyk8f6hW6BoruUT5JLmi_YS6tBPnKJfrVKwEgw78oY8SOSUHLf_jARLggQqKE6udTfdQD4dLkXM9w2G1-U45aClPnF9Qq_X0/s72-c/Hardanger2.jpg" height="72" width="72"/></entry><entry><id>tag:blogger.com,1999:blog-6995472413807230983.post-3022332555339665795</id><published>2015-05-01T12:53:00.000-07:00</published><updated>2015-05-01T12:53:47.924-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Linux"/><category scheme="http://www.blogger.com/atom/ns#" term="Vulnerability Scanner"/><category scheme="http://www.blogger.com/atom/ns#" term="Web Application"/><category scheme="http://www.blogger.com/atom/ns#" term="WebVulScan"/><category scheme="http://www.blogger.com/atom/ns#" term="Windows"/><title type='text'>WebVulScan - Web Application Vulnerability Scanner </title><content type='html'>&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg1jpZ8ftRVVBf00BoHNibXZd2-xiQn2ph26rhTO0ivBHIf-xtTpvq5SkBHJGsMBXWkYXNpQJUgX-eD51q6ViuZhoZfGSoGG-FsOfiqC2_LUCu2UzDv7I5f2a3eumAbnyUDsQh3oG7KwBc/s1600/WebVulScan.JPG&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg1jpZ8ftRVVBf00BoHNibXZd2-xiQn2ph26rhTO0ivBHIf-xtTpvq5SkBHJGsMBXWkYXNpQJUgX-eD51q6ViuZhoZfGSoGG-FsOfiqC2_LUCu2UzDv7I5f2a3eumAbnyUDsQh3oG7KwBc/s1600/WebVulScan.JPG&quot; height=&quot;356&quot; width=&quot;400&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;div style=&quot;background-color: #fafafa; box-sizing: border-box; color: #333333; font-family: Verdana, Geneva, sans-serif; font-size: 12px; line-height: 19.2000007629395px; text-align: justify;&quot;&gt;
&lt;b style=&quot;box-sizing: border-box;&quot;&gt;The vulnerabilities tested by&amp;nbsp;&lt;a href=&quot;https://hacksearch.wordpress.com/2015/05/01/webvulscan-web-application-vulnerability-scanner/&quot; style=&quot;-webkit-transition: all 0.4s ease-in-out; box-sizing: border-box; color: #999999; text-decoration: none; transition: all 0.4s ease-in-out;&quot;&gt;WebVulScan&lt;/a&gt;&amp;nbsp;are:&lt;/b&gt;&lt;/div&gt;
&lt;ul style=&quot;background-color: #fafafa; box-sizing: border-box; color: #333333; font-family: Verdana, Geneva, sans-serif; font-size: 12px; line-height: 19.2000007629395px;&quot;&gt;
&lt;li style=&quot;box-sizing: border-box; text-align: justify;&quot;&gt;Reflected Cross-Site Scripting&lt;/li&gt;
&lt;li style=&quot;box-sizing: border-box; text-align: justify;&quot;&gt;Stored Cross-Site Scripting&lt;/li&gt;
&lt;li style=&quot;box-sizing: border-box; text-align: justify;&quot;&gt;Standard SQL Injection&lt;/li&gt;
&lt;li style=&quot;box-sizing: border-box; text-align: justify;&quot;&gt;Broken Authentication using SQL Injection&lt;/li&gt;
&lt;li style=&quot;box-sizing: border-box; text-align: justify;&quot;&gt;Autocomplete Enabled on Password Fields&lt;/li&gt;
&lt;li style=&quot;box-sizing: border-box; text-align: justify;&quot;&gt;Potentially Insecure Direct Object References&lt;/li&gt;
&lt;li style=&quot;box-sizing: border-box; text-align: justify;&quot;&gt;Directory Listing Enabled&lt;/li&gt;
&lt;li style=&quot;box-sizing: border-box; text-align: justify;&quot;&gt;HTTP Banner Disclosure&lt;/li&gt;
&lt;li style=&quot;box-sizing: border-box; text-align: justify;&quot;&gt;SSL Certificate not Trusted&lt;/li&gt;
&lt;li style=&quot;box-sizing: border-box; text-align: justify;&quot;&gt;Unvalidated Redirects&lt;/li&gt;
&lt;/ul&gt;
&lt;br style=&quot;background-color: #fafafa; box-sizing: border-box; color: #333333; font-family: Verdana, Geneva, sans-serif; font-size: 12px; line-height: 19.2000007629395px;&quot; /&gt;
&lt;div style=&quot;background-color: #fafafa; box-sizing: border-box; color: #333333; font-family: Verdana, Geneva, sans-serif; font-size: 12px; line-height: 19.2000007629395px; text-align: justify;&quot;&gt;
&lt;b style=&quot;box-sizing: border-box;&quot;&gt;Features:&lt;/b&gt;&lt;/div&gt;
&lt;ul style=&quot;background-color: #fafafa; box-sizing: border-box; color: #333333; font-family: Verdana, Geneva, sans-serif; font-size: 12px; line-height: 19.2000007629395px;&quot;&gt;
&lt;li style=&quot;box-sizing: border-box; text-align: justify;&quot;&gt;Crawler: Crawls a website to identify and display all URLs belonging to the website.&lt;/li&gt;
&lt;li style=&quot;box-sizing: border-box; text-align: justify;&quot;&gt;Scanner: Crawls a website and scans all URLs found for vulnerabilities.&lt;/li&gt;
&lt;li style=&quot;box-sizing: border-box; text-align: justify;&quot;&gt;Scan History: Allows a user to view or download PDF reports of previous scans that they performed.&lt;/li&gt;
&lt;li style=&quot;box-sizing: border-box; text-align: justify;&quot;&gt;Register: Allows a user to register with the web application.&lt;/li&gt;
&lt;li style=&quot;box-sizing: border-box; text-align: justify;&quot;&gt;Login: Allows a user to login to the web application.&lt;/li&gt;
&lt;li style=&quot;box-sizing: border-box; text-align: justify;&quot;&gt;Options: Allows a user to select which vulnerabilities they wish to test for (all are enabled by default).&lt;/li&gt;
&lt;li style=&quot;box-sizing: border-box; text-align: justify;&quot;&gt;PDF Generation: Dynamically generates a detailed PDF report.&lt;/li&gt;
&lt;li style=&quot;box-sizing: border-box; text-align: justify;&quot;&gt;Report Delivery: The PDF report is emailed to the user as an attachment.&lt;/li&gt;
&lt;/ul&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;color: #333333; font-family: Verdana, Geneva, sans-serif;&quot;&gt;&lt;span style=&quot;font-size: 12px; line-height: 19.2000007629395px;&quot;&gt;&lt;a href=&quot;https://hacksearch.wordpress.com/2015/05/01/webvulscan-web-application-vulnerability-scanner/&quot;&gt;https://hacksearch.wordpress.com/2015/05/01/webvulscan-web-application-vulnerability-scanner/&lt;/a&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
</content><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/6995472413807230983/posts/default/3022332555339665795'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/6995472413807230983/posts/default/3022332555339665795'/><link rel='alternate' type='text/html' href='http://web-analizi.blogspot.com/2015/05/webvulscan-web-application.html' title='WebVulScan - Web Application Vulnerability Scanner '/><author><name>Anonymous</name><uri>http://www.blogger.com/profile/14191995798879127165</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg1jpZ8ftRVVBf00BoHNibXZd2-xiQn2ph26rhTO0ivBHIf-xtTpvq5SkBHJGsMBXWkYXNpQJUgX-eD51q6ViuZhoZfGSoGG-FsOfiqC2_LUCu2UzDv7I5f2a3eumAbnyUDsQh3oG7KwBc/s72-c/WebVulScan.JPG" height="72" width="72"/></entry><entry><id>tag:blogger.com,1999:blog-6995472413807230983.post-8002756856935509084</id><published>2015-03-22T22:26:00.001-07:00</published><updated>2015-03-22T22:26:31.891-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="iPThief"/><category scheme="http://www.blogger.com/atom/ns#" term="kali"/><category scheme="http://www.blogger.com/atom/ns#" term="Kalilinux"/><category scheme="http://www.blogger.com/atom/ns#" term="Linux"/><category scheme="http://www.blogger.com/atom/ns#" term="Mac"/><category scheme="http://www.blogger.com/atom/ns#" term="PHP"/><category scheme="http://www.blogger.com/atom/ns#" term="Ubuntu"/><category scheme="http://www.blogger.com/atom/ns#" term="Windows"/><title type='text'>IP Thief - Simple IP Stealer in PHP</title><content type='html'>&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg88OU1dE9AqXqUUQgcaR9FDapk1VtqLURVRq4WDE8hdN8Ftxdz-3e9w4n6QAimay6hb0cdPG7gsCSs9mXClIzNhI-MIomf8Ir1f-ih1ywMPA30iTpWotsDyJRe0LfYojxyVKuDNY5bTcs/s1600/ip_thief.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg88OU1dE9AqXqUUQgcaR9FDapk1VtqLURVRq4WDE8hdN8Ftxdz-3e9w4n6QAimay6hb0cdPG7gsCSs9mXClIzNhI-MIomf8Ir1f-ih1ywMPA30iTpWotsDyJRe0LfYojxyVKuDNY5bTcs/s1600/ip_thief.jpg&quot; height=&quot;284&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&amp;nbsp;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;background-color: #fafafa; box-sizing: border-box; color: #333333; font-family: Verdana, Geneva, sans-serif; font-size: 12px; line-height: 19.2000007629395px; text-align: justify;&quot;&gt;
A simple PHP script to capture the IP address of anyone that send the &quot;imagen.php&quot; file with the following options:&lt;br style=&quot;box-sizing: border-box;&quot; /&gt;&lt;a href=&quot;https://www.blogger.com/null&quot; name=&quot;more&quot; style=&quot;-webkit-transition: all 0.4s ease-in-out; box-sizing: border-box; transition: all 0.4s ease-in-out;&quot;&gt;&lt;div id=&quot;MBB-Ads&quot; style=&quot;box-sizing: border-box;&quot;&gt;
&lt;br style=&quot;box-sizing: border-box;&quot; /&gt;&lt;center style=&quot;box-sizing: border-box;&quot;&gt;
&lt;/center&gt;
&lt;/div&gt;
&lt;/a&gt;&lt;/div&gt;
&lt;div style=&quot;background-color: #fafafa; box-sizing: border-box; color: #333333; font-family: Verdana, Geneva, sans-serif; font-size: 12px; line-height: 19.2000007629395px; text-align: justify;&quot;&gt;
[+] It comes with an administrator to view and delete IP&lt;/div&gt;
&lt;div style=&quot;background-color: #fafafa; box-sizing: border-box; color: #333333; font-family: Verdana, Geneva, sans-serif; font-size: 12px; line-height: 19.2000007629395px; text-align: justify;&quot;&gt;
[+] You can change the redirect URL image&lt;/div&gt;
&lt;div style=&quot;background-color: #fafafa; box-sizing: border-box; color: #333333; font-family: Verdana, Geneva, sans-serif; font-size: 12px; line-height: 19.2000007629395px; text-align: justify;&quot;&gt;
[+] Can you see the country of the visitor&lt;/div&gt;
&lt;div style=&quot;background-color: #fafafa; box-sizing: border-box; color: #333333; font-family: Verdana, Geneva, sans-serif; font-size: 12px; line-height: 19.2000007629395px; text-align: justify;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;background-color: #fafafa; box-sizing: border-box; text-align: justify;&quot;&gt;
&lt;span style=&quot;color: #333333; font-family: Verdana, Geneva, sans-serif;&quot;&gt;&lt;span style=&quot;font-size: 12px; line-height: 19.2000007629395px;&quot;&gt;&lt;a href=&quot;https://hacksearch.wordpress.com/2015/03/23/ip-thief-simple-ip-stealer-in-php/&quot;&gt;https://hacksearch.wordpress.com/2015/03/23/ip-thief-simple-ip-stealer-in-php/&lt;/a&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;br /&gt;</content><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/6995472413807230983/posts/default/8002756856935509084'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/6995472413807230983/posts/default/8002756856935509084'/><link rel='alternate' type='text/html' href='http://web-analizi.blogspot.com/2015/03/ip-thief-simple-ip-stealer-in-php.html' title='IP Thief - Simple IP Stealer in PHP'/><author><name>Anonymous</name><uri>http://www.blogger.com/profile/14191995798879127165</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg88OU1dE9AqXqUUQgcaR9FDapk1VtqLURVRq4WDE8hdN8Ftxdz-3e9w4n6QAimay6hb0cdPG7gsCSs9mXClIzNhI-MIomf8Ir1f-ih1ywMPA30iTpWotsDyJRe0LfYojxyVKuDNY5bTcs/s72-c/ip_thief.jpg" height="72" width="72"/></entry><entry><id>tag:blogger.com,1999:blog-6995472413807230983.post-627137864952628960</id><published>2015-03-18T21:23:00.000-07:00</published><updated>2015-03-18T21:23:25.827-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Packet"/><category scheme="http://www.blogger.com/atom/ns#" term="Sniffer"/><category scheme="http://www.blogger.com/atom/ns#" term="USB"/><category scheme="http://www.blogger.com/atom/ns#" term="USBPcap"/><category scheme="http://www.blogger.com/atom/ns#" term="Windows"/><title type='text'>USBPcap - USB Packet capture for Windows</title><content type='html'>&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj6w66sm0Rilh0IgC7TuFPM1gRTDApVacacMbIs_-SI_Anfk0afdRfN9yI2LNtf-HE_VeDIuaQZnyAFx_aZiVGwS2hwx-1FjvgV_uHnS5EIkghE-qsMVQFabDmG_oEsRjmVTbAKodgXQIk/s1600/USBPcap.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj6w66sm0Rilh0IgC7TuFPM1gRTDApVacacMbIs_-SI_Anfk0afdRfN9yI2LNtf-HE_VeDIuaQZnyAFx_aZiVGwS2hwx-1FjvgV_uHnS5EIkghE-qsMVQFabDmG_oEsRjmVTbAKodgXQIk/s1600/USBPcap.png&quot; height=&quot;239&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&amp;nbsp;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi8TkbYFKsyaprBSgICyMQxLvnU2jzpUFEBEU_4YPxzihqnsg70JNIp8_L3PnaSxFkpmHgzFXAK7ZMTF5Oz9ZA54hwU6y7wl1I_HJuzCBwdXsz6tU2vA7E62VswCV9oxUxzExLhcuQ9eko/s1600/step2_small.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi8TkbYFKsyaprBSgICyMQxLvnU2jzpUFEBEU_4YPxzihqnsg70JNIp8_L3PnaSxFkpmHgzFXAK7ZMTF5Oz9ZA54hwU6y7wl1I_HJuzCBwdXsz6tU2vA7E62VswCV9oxUxzExLhcuQ9eko/s1600/step2_small.png&quot; height=&quot;161&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjksCwPCofcHrndZDGxR1w_L6pJ-mbKERf2iWc9T7h0zhdV_q0ACldJLRB7qJ2-ZvC0Sn3-o9AbzmL4QcPmx_hic97FIb1bjQZdy6F4Y2kyv8IHSQJw-m0syRUy3_JdVK4LlY5TBvOiaUE/s1600/step3_small.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjksCwPCofcHrndZDGxR1w_L6pJ-mbKERf2iWc9T7h0zhdV_q0ACldJLRB7qJ2-ZvC0Sn3-o9AbzmL4QcPmx_hic97FIb1bjQZdy6F4Y2kyv8IHSQJw-m0syRUy3_JdVK4LlY5TBvOiaUE/s1600/step3_small.png&quot; height=&quot;271&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&amp;nbsp;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;span style=&quot;color: red;&quot;&gt;USBPcap - USB Packet capture for Windows&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://hacksearch.wordpress.com/2015/03/19/usbpcap-usb-packet-capture-for-windows-open-source-usb-sniffer-for-windows/&quot;&gt;https://hacksearch.wordpress.com/2015/03/19/usbpcap-usb-packet-capture-for-windows-open-source-usb-sniffer-for-windows/&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;</content><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/6995472413807230983/posts/default/627137864952628960'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/6995472413807230983/posts/default/627137864952628960'/><link rel='alternate' type='text/html' href='http://web-analizi.blogspot.com/2015/03/usbpcap-usb-packet-capture-for-windows.html' title='USBPcap - USB Packet capture for Windows'/><author><name>Anonymous</name><uri>http://www.blogger.com/profile/14191995798879127165</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj6w66sm0Rilh0IgC7TuFPM1gRTDApVacacMbIs_-SI_Anfk0afdRfN9yI2LNtf-HE_VeDIuaQZnyAFx_aZiVGwS2hwx-1FjvgV_uHnS5EIkghE-qsMVQFabDmG_oEsRjmVTbAKodgXQIk/s72-c/USBPcap.png" height="72" width="72"/></entry><entry><id>tag:blogger.com,1999:blog-6995472413807230983.post-7311701605210898074</id><published>2015-02-27T17:30:00.001-08:00</published><updated>2015-02-27T17:30:20.289-08:00</updated><title type='text'>Ethical Hacking 2 Görsel Eğitim Seti İndir Türkçe Full </title><content type='html'>&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEicuTNUsBTPkvvvdtrFF2FA0mVvsPpcDZWhvnjHGsQe2PXu1XgElO-xn2z9AwJ8Kd7DcG_Ti_X7q5AX7W6jMt3xcdGhOQaaYMHQMVAdynvIrKzTPCHA4_hqNRTM9zYcchGB3px0-97UCSU/s1600/ethical-hacking-ve-guvenlik-2-gorsel-egitim-seti.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEicuTNUsBTPkvvvdtrFF2FA0mVvsPpcDZWhvnjHGsQe2PXu1XgElO-xn2z9AwJ8Kd7DcG_Ti_X7q5AX7W6jMt3xcdGhOQaaYMHQMVAdynvIrKzTPCHA4_hqNRTM9zYcchGB3px0-97UCSU/s1600/ethical-hacking-ve-guvenlik-2-gorsel-egitim-seti.png&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh3D7dFvYhzVm97i4CNNS7akizOuLdVyY4fF6LBogS3qHry3zAFOPpmjgoFvj_-M7Q2tyMbpVW-TLiCfq33nsJX2DOYlGIAyEjkBy94y4qblMxTIap8e0hANWL4axQ63sVFZl_kMgK-pK8/s1600/Ethicalhackingg%C3%BCvenlik2.1.JPG&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh3D7dFvYhzVm97i4CNNS7akizOuLdVyY4fF6LBogS3qHry3zAFOPpmjgoFvj_-M7Q2tyMbpVW-TLiCfq33nsJX2DOYlGIAyEjkBy94y4qblMxTIap8e0hANWL4axQ63sVFZl_kMgK-pK8/s1600/Ethicalhackingg%C3%BCvenlik2.1.JPG&quot; height=&quot;185&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjF4MUEGDndYdY7TUTcFJgfaXGzAkBdyufNtbaqs5YUvjNx6waNn587_PR_5s4EdnEPXWGYJShgGzDP9IGmOqmwcru8Jn3X_vgFGzRJ-17lNmQ0yrxwzqQqrMTXZACJt4_N0Ji5ct7yCvM/s1600/Ethicalhackingg%C3%BCvenlik2.2.JPG&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjF4MUEGDndYdY7TUTcFJgfaXGzAkBdyufNtbaqs5YUvjNx6waNn587_PR_5s4EdnEPXWGYJShgGzDP9IGmOqmwcru8Jn3X_vgFGzRJ-17lNmQ0yrxwzqQqrMTXZACJt4_N0Ji5ct7yCvM/s1600/Ethicalhackingg%C3%BCvenlik2.2.JPG&quot; height=&quot;196&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhPj1oOFSMMZ4n1C6j6Vdiv5vShNTUxie6kf94Vy0JPFGxXZt92VOMe-PdrJGt3oSBBC_fijdp8xAoiVh2DCBUofZYncEx_hwdSWHKVAbjWjRW6sB5Xr-iLVWPWSv9-WNMc5yayBLprBEE/s1600/Ethicalhackingg%C3%BCvenlik2.3.JPG&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhPj1oOFSMMZ4n1C6j6Vdiv5vShNTUxie6kf94Vy0JPFGxXZt92VOMe-PdrJGt3oSBBC_fijdp8xAoiVh2DCBUofZYncEx_hwdSWHKVAbjWjRW6sB5Xr-iLVWPWSv9-WNMc5yayBLprBEE/s1600/Ethicalhackingg%C3%BCvenlik2.3.JPG&quot; height=&quot;184&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh8tOsEO_OX3Fj7FurroBQzCfX_ytYnz4HVJYaFODvk3C1RtpK39JmPap5F-6CIysRSQDPTv5OUL_GBYRB0ushNe6ym_WrzjjR3Tkm-cF_pWZxvdxgcxHOJNww6P5szAIPB4TfE3arkVnE/s1600/Ethicalhackingg%C3%BCvenlik2.JPG&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh8tOsEO_OX3Fj7FurroBQzCfX_ytYnz4HVJYaFODvk3C1RtpK39JmPap5F-6CIysRSQDPTv5OUL_GBYRB0ushNe6ym_WrzjjR3Tkm-cF_pWZxvdxgcxHOJNww6P5szAIPB4TfE3arkVnE/s1600/Ethicalhackingg%C3%BCvenlik2.JPG&quot; height=&quot;195&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&amp;nbsp;&lt;/div&gt;
&lt;div style=&quot;color: #333333; font-family: Georgia, &#39;Times New Roman&#39;, &#39;Bitstream Charter&#39;, Times, serif; font-size: 16px; line-height: 24px;&quot;&gt;
&lt;b&gt;Boyut:1.3-gb&lt;/b&gt;&lt;br /&gt;&lt;b&gt;Sıkıştırma: Rar / Şifresiz&lt;/b&gt;&lt;br /&gt;&lt;b&gt;Tarama: Webroot. / Durum Temiz&lt;/b&gt;&lt;/div&gt;
&lt;div style=&quot;color: #333333; font-family: Georgia, &#39;Times New Roman&#39;, &#39;Bitstream Charter&#39;, Times, serif; font-size: 16px; line-height: 24px;&quot;&gt;
&lt;b&gt;&lt;br /&gt;&lt;/b&gt;&lt;/div&gt;
&lt;span style=&quot;color: #333333; font-family: Georgia, Times New Roman, Bitstream Charter, Times, serif;&quot;&gt;&lt;span style=&quot;line-height: 24px;&quot;&gt;&lt;b&gt;&lt;a href=&quot;https://hacksearch.wordpress.com/2015/02/28/ethical-hacking-2-gorsel-egitim-seti-indir-turkce-full/&quot;&gt;https://hacksearch.wordpress.com/2015/02/28/ethical-hacking-2-gorsel-egitim-seti-indir-turkce-full/&lt;/a&gt;&lt;/b&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;br /&gt;</content><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/6995472413807230983/posts/default/7311701605210898074'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/6995472413807230983/posts/default/7311701605210898074'/><link rel='alternate' type='text/html' href='http://web-analizi.blogspot.com/2015/02/ethical-hacking-2-gorsel-egitim-seti.html' title='Ethical Hacking 2 Görsel Eğitim Seti İndir Türkçe Full '/><author><name>Anonymous</name><uri>http://www.blogger.com/profile/14191995798879127165</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEicuTNUsBTPkvvvdtrFF2FA0mVvsPpcDZWhvnjHGsQe2PXu1XgElO-xn2z9AwJ8Kd7DcG_Ti_X7q5AX7W6jMt3xcdGhOQaaYMHQMVAdynvIrKzTPCHA4_hqNRTM9zYcchGB3px0-97UCSU/s72-c/ethical-hacking-ve-guvenlik-2-gorsel-egitim-seti.png" height="72" width="72"/></entry><entry><id>tag:blogger.com,1999:blog-6995472413807230983.post-3396691450856213012</id><published>2015-02-27T16:49:00.000-08:00</published><updated>2015-02-27T16:49:02.205-08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Ethical Hacking"/><title type='text'> ETHİCAL HACKİNG VE GÜVENLİK EĞİTİM SETİ TURKCE FULL İNDİR </title><content type='html'>&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;span style=&quot;background-color: white; color: #444444; font-family: &#39;Helvetica Neue&#39;, Helvetica, Arial, sans-serif; font-size: 12px; line-height: 21px;&quot;&gt;&lt;b&gt;Boyut:600-mb Sıkıştırma: Rar / Şifresiz Tarama: Webroot. / Durum Temiz &amp;nbsp;&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;span style=&quot;background-color: white; color: #444444; font-family: &#39;Helvetica Neue&#39;, Helvetica, Arial, sans-serif; font-size: 12px; line-height: 21px;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjkMEUDAd08OWVLppIGDNdT982lDKtxHfCZMjlV1dbpKZNA4BGSSESpb0ZHPZxLMLP_tQLjNc1GEA4q4tKp8WS6qs8xmzS2MIcu-DPNRyV3OxsYAri5_1P6POoVdighEgyUYEVVcf_MVI0/s1600/ethicalhackingveguvenl%C4%B1kgorseleg%C4%B1t%C4%B1mturkcepaket.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjkMEUDAd08OWVLppIGDNdT982lDKtxHfCZMjlV1dbpKZNA4BGSSESpb0ZHPZxLMLP_tQLjNc1GEA4q4tKp8WS6qs8xmzS2MIcu-DPNRyV3OxsYAri5_1P6POoVdighEgyUYEVVcf_MVI0/s1600/ethicalhackingveguvenl%C4%B1kgorseleg%C4%B1t%C4%B1mturkcepaket.jpg&quot; height=&quot;320&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&amp;nbsp;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;span style=&quot;background-color: white; font-size: 12px; line-height: 21px;&quot;&gt;&lt;span style=&quot;color: #444444; font-family: Helvetica Neue, Helvetica, Arial, sans-serif;&quot;&gt;&lt;a href=&quot;https://hacksearch.wordpress.com/2015/02/23/ethical-hacking-ve-guvenlik-egitim-seti-turkce-full-indir/&quot;&gt;https://hacksearch.wordpress.com/2015/02/23/ethical-hacking-ve-guvenlik-egitim-seti-turkce-full-indir/&lt;/a&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;background-color: white; color: #444444; font-family: &#39;Helvetica Neue&#39;, Helvetica, Arial, sans-serif; font-size: 12px; line-height: 21px;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span style=&quot;background-color: white; color: #444444; font-family: &#39;Helvetica Neue&#39;, Helvetica, Arial, sans-serif; font-size: 12px; line-height: 21px;&quot;&gt;&lt;br /&gt;&lt;/span&gt;</content><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/6995472413807230983/posts/default/3396691450856213012'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/6995472413807230983/posts/default/3396691450856213012'/><link rel='alternate' type='text/html' href='http://web-analizi.blogspot.com/2015/02/ethical-hacking-ve-guvenlik-egitim-seti.html' title=' ETHİCAL HACKİNG VE GÜVENLİK EĞİTİM SETİ TURKCE FULL İNDİR '/><author><name>Anonymous</name><uri>http://www.blogger.com/profile/14191995798879127165</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjkMEUDAd08OWVLppIGDNdT982lDKtxHfCZMjlV1dbpKZNA4BGSSESpb0ZHPZxLMLP_tQLjNc1GEA4q4tKp8WS6qs8xmzS2MIcu-DPNRyV3OxsYAri5_1P6POoVdighEgyUYEVVcf_MVI0/s72-c/ethicalhackingveguvenl%C4%B1kgorseleg%C4%B1t%C4%B1mturkcepaket.jpg" height="72" width="72"/></entry><entry><id>tag:blogger.com,1999:blog-6995472413807230983.post-8901699307044416088</id><published>2015-02-13T17:53:00.000-08:00</published><updated>2015-02-13T17:53:07.219-08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="0day Exploit"/><category scheme="http://www.blogger.com/atom/ns#" term="Admin Exploit"/><category scheme="http://www.blogger.com/atom/ns#" term="Backtrack"/><category scheme="http://www.blogger.com/atom/ns#" term="Bactrack"/><category scheme="http://www.blogger.com/atom/ns#" term="Exploit"/><category scheme="http://www.blogger.com/atom/ns#" term="kali"/><category scheme="http://www.blogger.com/atom/ns#" term="Kalilinux"/><category scheme="http://www.blogger.com/atom/ns#" term="Multi Vulnerability"/><category scheme="http://www.blogger.com/atom/ns#" term="Ubuntu"/><category scheme="http://www.blogger.com/atom/ns#" term="Unix"/><category scheme="http://www.blogger.com/atom/ns#" term="Windows"/><title type='text'>ICONİUM EKONOMİK THEME – MULTİPLE VULNERABİLİTİES</title><content type='html'>&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;b&gt;&lt;span style=&quot;color: red;&quot;&gt;ICONİUM EKONOMİK THEME – MULTİPLE VULNERABİLİTİES&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhySMAYerL_o2RRuuw-vHs9szJunFhAfOUFHhCmR7ktWMuUnDE5O5uy8Bccl4k94IyZc-hfyuMR_nNTlI5Cn5VRqsEyK0von9eAlYRDasjchfjHVuzwH1qqZzNZzpwYCOFzdVXU4UT-EL0/s1600/exploit.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhySMAYerL_o2RRuuw-vHs9szJunFhAfOUFHhCmR7ktWMuUnDE5O5uy8Bccl4k94IyZc-hfyuMR_nNTlI5Cn5VRqsEyK0von9eAlYRDasjchfjHVuzwH1qqZzNZzpwYCOFzdVXU4UT-EL0/s1600/exploit.jpg&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://hacksearch.wordpress.com/2015/02/13/iconium-ekonomik-theme-multiple-vulnerabilities/&quot;&gt;https://hacksearch.wordpress.com/2015/02/13/iconium-ekonomik-theme-multiple-vulnerabilities/&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;</content><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/6995472413807230983/posts/default/8901699307044416088'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/6995472413807230983/posts/default/8901699307044416088'/><link rel='alternate' type='text/html' href='http://web-analizi.blogspot.com/2015/02/iconium-ekonomik-theme-multiple.html' title='ICONİUM EKONOMİK THEME – MULTİPLE VULNERABİLİTİES'/><author><name>Anonymous</name><uri>http://www.blogger.com/profile/14191995798879127165</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhySMAYerL_o2RRuuw-vHs9szJunFhAfOUFHhCmR7ktWMuUnDE5O5uy8Bccl4k94IyZc-hfyuMR_nNTlI5Cn5VRqsEyK0von9eAlYRDasjchfjHVuzwH1qqZzNZzpwYCOFzdVXU4UT-EL0/s72-c/exploit.jpg" height="72" width="72"/></entry><entry><id>tag:blogger.com,1999:blog-6995472413807230983.post-6116557678988101631</id><published>2015-01-26T13:46:00.002-08:00</published><updated>2015-01-26T13:46:33.385-08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Bactrack"/><category scheme="http://www.blogger.com/atom/ns#" term="Ebook PDF"/><category scheme="http://www.blogger.com/atom/ns#" term="Kalilinux"/><category scheme="http://www.blogger.com/atom/ns#" term="Linux"/><category scheme="http://www.blogger.com/atom/ns#" term="Mac"/><category scheme="http://www.blogger.com/atom/ns#" term="PDF"/><category scheme="http://www.blogger.com/atom/ns#" term="Ubuntu"/><category scheme="http://www.blogger.com/atom/ns#" term="Windows8"/><category scheme="http://www.blogger.com/atom/ns#" term="Windows8 Hacks"/><title type='text'>Windows 8 Hacks - Ebook PDF</title><content type='html'>&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjpZ1EwFdwVcwITwLVez_rM3h-OS4xc3PJZ-MChNWZzbcBQbBgOVfCNpGG10V-WeeqxWd-TynMBQOEJp-KELvVziuJduzlLJlIU4w4vn4yI8M7q8ydoyDQneoo2JrHB8xWJGJLypXXaEjA/s1600/windows_8_hacks.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjpZ1EwFdwVcwITwLVez_rM3h-OS4xc3PJZ-MChNWZzbcBQbBgOVfCNpGG10V-WeeqxWd-TynMBQOEJp-KELvVziuJduzlLJlIU4w4vn4yI8M7q8ydoyDQneoo2JrHB8xWJGJLypXXaEjA/s1600/windows_8_hacks.jpg&quot; /&gt;&lt;/a&gt;&amp;nbsp;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;strong style=&quot;background-color: white; color: red; font-family: Georgia, &#39;Times New Roman&#39;, &#39;Bitstream Charter&#39;, Times, serif; font-size: 16px; line-height: 24px;&quot;&gt;Windows 8 Hacks - Ebook PDF&lt;/strong&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;a href=&quot;http://filepi.com/i/LZuDmDl&quot;&gt;http://filepi.com/i/LZuDmDl&lt;/a&gt;&lt;/div&gt;
</content><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/6995472413807230983/posts/default/6116557678988101631'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/6995472413807230983/posts/default/6116557678988101631'/><link rel='alternate' type='text/html' href='http://web-analizi.blogspot.com/2015/01/windows-8-hacks-ebook-pdf.html' title='Windows 8 Hacks - Ebook PDF'/><author><name>Anonymous</name><uri>http://www.blogger.com/profile/14191995798879127165</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjpZ1EwFdwVcwITwLVez_rM3h-OS4xc3PJZ-MChNWZzbcBQbBgOVfCNpGG10V-WeeqxWd-TynMBQOEJp-KELvVziuJduzlLJlIU4w4vn4yI8M7q8ydoyDQneoo2JrHB8xWJGJLypXXaEjA/s72-c/windows_8_hacks.jpg" height="72" width="72"/></entry><entry><id>tag:blogger.com,1999:blog-6995472413807230983.post-4558797879030208013</id><published>2015-01-26T12:56:00.004-08:00</published><updated>2015-01-26T12:56:55.909-08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Bactrack"/><category scheme="http://www.blogger.com/atom/ns#" term="Ebook PDF"/><category scheme="http://www.blogger.com/atom/ns#" term="Hacker"/><category scheme="http://www.blogger.com/atom/ns#" term="Hacking"/><category scheme="http://www.blogger.com/atom/ns#" term="Hacks"/><category scheme="http://www.blogger.com/atom/ns#" term="Kalilinux"/><category scheme="http://www.blogger.com/atom/ns#" term="Linux"/><category scheme="http://www.blogger.com/atom/ns#" term="Mac"/><category scheme="http://www.blogger.com/atom/ns#" term="Ubuntu"/><category scheme="http://www.blogger.com/atom/ns#" term="Ubuntu Hacks"/><category scheme="http://www.blogger.com/atom/ns#" term="Windows"/><title type='text'>Ubuntu Hacks - Ebook PDF  </title><content type='html'>&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiPoLvRPuQJmI19uud13W1LEBGtxLT7YyA5ExfbYDv-CBeG-izZbKbsiQezWIW-1365iem2qMY1waMvz9pPtzj8OhjK5dAaLMCgq4DMeno6UaCgHtQlzTqqcNdHOUo89loifGzKRby61Lw/s1600/ubuntu_hacks.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiPoLvRPuQJmI19uud13W1LEBGtxLT7YyA5ExfbYDv-CBeG-izZbKbsiQezWIW-1365iem2qMY1waMvz9pPtzj8OhjK5dAaLMCgq4DMeno6UaCgHtQlzTqqcNdHOUo89loifGzKRby61Lw/s1600/ubuntu_hacks.jpg&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&amp;nbsp; &amp;nbsp;&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
&lt;strong style=&quot;background-color: white; color: red; font-family: Georgia, &#39;Times New Roman&#39;, &#39;Bitstream Charter&#39;, Times, serif; font-size: 16px; line-height: 24px; text-align: center;&quot;&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; Ubuntu Hacks - Ebook PDF&lt;/strong&gt;&lt;/div&gt;
&lt;div&gt;
&lt;strong style=&quot;background-color: white; color: red; font-family: Georgia, &#39;Times New Roman&#39;, &#39;Bitstream Charter&#39;, Times, serif; font-size: 16px; line-height: 24px; text-align: center;&quot;&gt;&lt;br /&gt;&lt;/strong&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: right;&quot;&gt;
&lt;span style=&quot;background-color: white; line-height: 24px; text-align: center;&quot;&gt;&lt;span style=&quot;color: red; font-family: Georgia, Times New Roman, Bitstream Charter, Times, serif;&quot;&gt;&lt;b&gt;&lt;a href=&quot;http://filepi.com/i/4Vg8RKR&quot;&gt;http://filepi.com/i/4Vg8RKR&lt;/a&gt;&lt;/b&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: right;&quot;&gt;
&lt;strong style=&quot;background-color: white; color: red; font-family: Georgia, &#39;Times New Roman&#39;, &#39;Bitstream Charter&#39;, Times, serif; font-size: 16px; line-height: 24px; text-align: center;&quot;&gt;&lt;br /&gt;&lt;/strong&gt;&lt;/div&gt;
</content><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/6995472413807230983/posts/default/4558797879030208013'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/6995472413807230983/posts/default/4558797879030208013'/><link rel='alternate' type='text/html' href='http://web-analizi.blogspot.com/2015/01/ubuntu-hacks-ebook-pdf.html' title='Ubuntu Hacks - Ebook PDF  '/><author><name>Anonymous</name><uri>http://www.blogger.com/profile/14191995798879127165</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiPoLvRPuQJmI19uud13W1LEBGtxLT7YyA5ExfbYDv-CBeG-izZbKbsiQezWIW-1365iem2qMY1waMvz9pPtzj8OhjK5dAaLMCgq4DMeno6UaCgHtQlzTqqcNdHOUo89loifGzKRby61Lw/s72-c/ubuntu_hacks.jpg" height="72" width="72"/></entry><entry><id>tag:blogger.com,1999:blog-6995472413807230983.post-8013003900937739317</id><published>2015-01-26T12:10:00.001-08:00</published><updated>2015-01-26T12:10:12.577-08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Bactrack"/><category scheme="http://www.blogger.com/atom/ns#" term="downland"/><category scheme="http://www.blogger.com/atom/ns#" term="ebook"/><category scheme="http://www.blogger.com/atom/ns#" term="Kalilinux"/><category scheme="http://www.blogger.com/atom/ns#" term="Mac"/><category scheme="http://www.blogger.com/atom/ns#" term="PDF Hacks"/><category scheme="http://www.blogger.com/atom/ns#" term="Ubuntu"/><category scheme="http://www.blogger.com/atom/ns#" term="Windows"/><title type='text'>PDF Hacks - Ebook Downland</title><content type='html'>&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiDYEcBowVdVNcxoQ77u2oRFzoRqnOGjS2HIZw9txxM7kVfJag89QZS6Eym0ym4xEah0huF-MvTbHKeYb_SkcZEusI9e6UanTPJnSyEmRIz4BxNeWKDb9OnZdrR199MaD-WXH5Q8psHdzU/s1600/pdf_hacks.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiDYEcBowVdVNcxoQ77u2oRFzoRqnOGjS2HIZw9txxM7kVfJag89QZS6Eym0ym4xEah0huF-MvTbHKeYb_SkcZEusI9e6UanTPJnSyEmRIz4BxNeWKDb9OnZdrR199MaD-WXH5Q8psHdzU/s1600/pdf_hacks.jpg&quot; /&gt;&lt;/a&gt;&amp;nbsp;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div data-mce-style=&quot;text-align: center;&quot; style=&quot;color: #333333; font-family: Georgia, &#39;Times New Roman&#39;, &#39;Bitstream Charter&#39;, Times, serif; font-size: 16px; line-height: 24px; text-align: center;&quot;&gt;
&lt;span data-mce-style=&quot;color: #ff0000;&quot; style=&quot;color: red;&quot;&gt;&lt;strong&gt;PDF Hacks - Ebook Downland&lt;/strong&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
&lt;span data-mce-style=&quot;color: #ff0000;&quot; style=&quot;color: red;&quot;&gt;&lt;strong&gt;&lt;br /&gt;&lt;/strong&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
&lt;span data-mce-style=&quot;color: #ff0000;&quot; style=&quot;color: red;&quot;&gt;&lt;strong&gt;&lt;br /&gt;&lt;/strong&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;span data-mce-style=&quot;color: #ff0000;&quot;&gt;&lt;span style=&quot;color: red;&quot;&gt;&lt;b&gt;&lt;a href=&quot;http://filepi.com/i/OqhapRt&quot;&gt;http://filepi.com/i/OqhapRt&lt;/a&gt;&lt;/b&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;span data-mce-style=&quot;color: #ff0000;&quot; style=&quot;color: red;&quot;&gt;&lt;strong&gt;&lt;br /&gt;&lt;/strong&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
&lt;span data-mce-style=&quot;color: #ff0000;&quot; style=&quot;color: red;&quot;&gt;&lt;strong&gt;&lt;br /&gt;&lt;/strong&gt;&lt;/span&gt;&lt;/div&gt;
</content><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/6995472413807230983/posts/default/8013003900937739317'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/6995472413807230983/posts/default/8013003900937739317'/><link rel='alternate' type='text/html' href='http://web-analizi.blogspot.com/2015/01/pdf-hacks-ebook-downland.html' title='PDF Hacks - Ebook Downland'/><author><name>Anonymous</name><uri>http://www.blogger.com/profile/14191995798879127165</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiDYEcBowVdVNcxoQ77u2oRFzoRqnOGjS2HIZw9txxM7kVfJag89QZS6Eym0ym4xEah0huF-MvTbHKeYb_SkcZEusI9e6UanTPJnSyEmRIz4BxNeWKDb9OnZdrR199MaD-WXH5Q8psHdzU/s72-c/pdf_hacks.jpg" height="72" width="72"/></entry><entry><id>tag:blogger.com,1999:blog-6995472413807230983.post-931532323596866209</id><published>2015-01-25T11:12:00.002-08:00</published><updated>2015-01-25T11:17:24.035-08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Ebook PDF"/><category scheme="http://www.blogger.com/atom/ns#" term="Hacks"/><category scheme="http://www.blogger.com/atom/ns#" term="kali"/><category scheme="http://www.blogger.com/atom/ns#" term="Kalilinux"/><category scheme="http://www.blogger.com/atom/ns#" term="Linux"/><category scheme="http://www.blogger.com/atom/ns#" term="Mac"/><category scheme="http://www.blogger.com/atom/ns#" term="Network"/><category scheme="http://www.blogger.com/atom/ns#" term="Network Security"/><category scheme="http://www.blogger.com/atom/ns#" term="Ubuntu"/><category scheme="http://www.blogger.com/atom/ns#" term="Windows"/><title type='text'>Network Security Hacks - Ebook PDF </title><content type='html'>&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhSsHfv63P3ZYEpurkR2QkBu7_sH0-QF_KsHqLgclCh0HpskHvjNzLi3S4tco1BUECbBUIQcKaVsXeQhZfo9ugqBvCt_TPsYKo_lCatMy3O9UWBcGjYEEpkzQlmAOlOau2Sn91IWkFuKMg/s1600/network_security_hacks_2nd_edition.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhSsHfv63P3ZYEpurkR2QkBu7_sH0-QF_KsHqLgclCh0HpskHvjNzLi3S4tco1BUECbBUIQcKaVsXeQhZfo9ugqBvCt_TPsYKo_lCatMy3O9UWBcGjYEEpkzQlmAOlOau2Sn91IWkFuKMg/s1600/network_security_hacks_2nd_edition.jpg&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
&lt;div data-mce-style=&quot;text-align: center;&quot; style=&quot;color: #333333; font-family: Georgia, &#39;Times New Roman&#39;, &#39;Bitstream Charter&#39;, Times, serif; font-size: 16px; line-height: 24px; text-align: center;&quot;&gt;
&lt;span data-mce-style=&quot;color: #ff0000;&quot; style=&quot;color: red;&quot;&gt;&lt;strong&gt;Network Security Hacks - Ebook PDF&lt;/strong&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
&lt;span data-mce-style=&quot;color: #ff0000;&quot; style=&quot;color: red;&quot;&gt;&lt;strong&gt;&lt;br /&gt;&lt;/strong&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;a href=&quot;http://filepi.com/i/gwjgO1X&quot;&gt;http://filepi.com/i/gwjgO1X&lt;/a&gt;&lt;/div&gt;
&lt;/div&gt;
</content><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/6995472413807230983/posts/default/931532323596866209'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/6995472413807230983/posts/default/931532323596866209'/><link rel='alternate' type='text/html' href='http://web-analizi.blogspot.com/2015/01/network-security-hacks-ebook-pdf.html' title='Network Security Hacks - Ebook PDF '/><author><name>Anonymous</name><uri>http://www.blogger.com/profile/14191995798879127165</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhSsHfv63P3ZYEpurkR2QkBu7_sH0-QF_KsHqLgclCh0HpskHvjNzLi3S4tco1BUECbBUIQcKaVsXeQhZfo9ugqBvCt_TPsYKo_lCatMy3O9UWBcGjYEEpkzQlmAOlOau2Sn91IWkFuKMg/s72-c/network_security_hacks_2nd_edition.jpg" height="72" width="72"/></entry><entry><id>tag:blogger.com,1999:blog-6995472413807230983.post-506549531856091485</id><published>2015-01-25T11:01:00.000-08:00</published><updated>2015-01-25T11:01:27.982-08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Backtrack"/><category scheme="http://www.blogger.com/atom/ns#" term="Bactrack"/><category scheme="http://www.blogger.com/atom/ns#" term="For"/><category scheme="http://www.blogger.com/atom/ns#" term="Free Ebook"/><category scheme="http://www.blogger.com/atom/ns#" term="hackers"/><category scheme="http://www.blogger.com/atom/ns#" term="kali"/><category scheme="http://www.blogger.com/atom/ns#" term="Kalilinux"/><category scheme="http://www.blogger.com/atom/ns#" term="Linux"/><category scheme="http://www.blogger.com/atom/ns#" term="Mac"/><category scheme="http://www.blogger.com/atom/ns#" term="Machine Learning"/><category scheme="http://www.blogger.com/atom/ns#" term="PDF"/><category scheme="http://www.blogger.com/atom/ns#" term="Ubuntu"/><category scheme="http://www.blogger.com/atom/ns#" term="Windows"/><title type='text'>Machine Learning for Hackers - Free Ebook PDF </title><content type='html'>&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjRipn9Ojry8BKc3Oql9p3tyz574NrNimm_Mud_DZXsWwEfYHI-CnSUq-HZrkqR8D-_mL5VnaUZCWrcqEePQTKvLZYX4rvW1FrECBDnN1J-wtepApS-ppQrSh8jolRaF07QOnEVbCu0wCY/s1600/machine_learning_for_hackers.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjRipn9Ojry8BKc3Oql9p3tyz574NrNimm_Mud_DZXsWwEfYHI-CnSUq-HZrkqR8D-_mL5VnaUZCWrcqEePQTKvLZYX4rvW1FrECBDnN1J-wtepApS-ppQrSh8jolRaF07QOnEVbCu0wCY/s1600/machine_learning_for_hackers.jpg&quot; /&gt;&lt;/a&gt;&amp;nbsp;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div data-mce-style=&quot;text-align: center;&quot; style=&quot;color: #333333; font-family: Georgia, &#39;Times New Roman&#39;, &#39;Bitstream Charter&#39;, Times, serif; font-size: 16px; line-height: 24px; text-align: center;&quot;&gt;
&lt;span data-mce-style=&quot;color: #ff0000;&quot; style=&quot;color: red;&quot;&gt;&lt;strong&gt;Machine Learning for Hackers - Free Ebook PDF&lt;/strong&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
&lt;span data-mce-style=&quot;color: #ff0000;&quot; style=&quot;color: red;&quot;&gt;&lt;strong&gt;&lt;br /&gt;&lt;/strong&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
&lt;span data-mce-style=&quot;color: #ff0000;&quot; style=&quot;color: red;&quot;&gt;&lt;strong&gt;&lt;br /&gt;&lt;/strong&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;span data-mce-style=&quot;color: #ff0000;&quot;&gt;&lt;span style=&quot;color: red;&quot;&gt;&lt;b&gt;&lt;a href=&quot;http://filepi.com/i/O593cTx&quot;&gt;http://filepi.com/i/O593cTx&lt;/a&gt;&lt;/b&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
</content><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/6995472413807230983/posts/default/506549531856091485'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/6995472413807230983/posts/default/506549531856091485'/><link rel='alternate' type='text/html' href='http://web-analizi.blogspot.com/2015/01/machine-learning-for-hackers-free-ebook.html' title='Machine Learning for Hackers - Free Ebook PDF '/><author><name>Anonymous</name><uri>http://www.blogger.com/profile/14191995798879127165</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjRipn9Ojry8BKc3Oql9p3tyz574NrNimm_Mud_DZXsWwEfYHI-CnSUq-HZrkqR8D-_mL5VnaUZCWrcqEePQTKvLZYX4rvW1FrECBDnN1J-wtepApS-ppQrSh8jolRaF07QOnEVbCu0wCY/s72-c/machine_learning_for_hackers.jpg" height="72" width="72"/></entry><entry><id>tag:blogger.com,1999:blog-6995472413807230983.post-4798589615891600480</id><published>2015-01-25T10:29:00.003-08:00</published><updated>2015-01-25T10:29:49.820-08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Backtrack"/><category scheme="http://www.blogger.com/atom/ns#" term="Bactrack"/><category scheme="http://www.blogger.com/atom/ns#" term="Ebook PDF"/><category scheme="http://www.blogger.com/atom/ns#" term="kali"/><category scheme="http://www.blogger.com/atom/ns#" term="Kalilinux"/><category scheme="http://www.blogger.com/atom/ns#" term="Mac"/><category scheme="http://www.blogger.com/atom/ns#" term="Mac Hacks"/><category scheme="http://www.blogger.com/atom/ns#" term="SQL"/><category scheme="http://www.blogger.com/atom/ns#" term="Ubuntu"/><category scheme="http://www.blogger.com/atom/ns#" term="Windows"/><title type='text'>Mac Hacks   - Ebook PDF </title><content type='html'>&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhDmJ4ky_KB_vszYWmB1RrmDv9MaiwA3IfC47j0DUPxKeytBKJnxEdH4KkzczTnhUQ9TLXPCK5huVF1Rn30YURRwkb3QCX2Js9BRK3UB4hV1R8oRXeQoEgGDqSIEvGRX5jf0B4c6L8eeW8/s1600/mac_hacks.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhDmJ4ky_KB_vszYWmB1RrmDv9MaiwA3IfC47j0DUPxKeytBKJnxEdH4KkzczTnhUQ9TLXPCK5huVF1Rn30YURRwkb3QCX2Js9BRK3UB4hV1R8oRXeQoEgGDqSIEvGRX5jf0B4c6L8eeW8/s1600/mac_hacks.jpg&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&amp;nbsp;&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
&lt;div data-mce-style=&quot;text-align: center;&quot; style=&quot;color: #333333; font-family: Georgia, &#39;Times New Roman&#39;, &#39;Bitstream Charter&#39;, Times, serif; font-size: 16px; line-height: 24px; text-align: center;&quot;&gt;
&lt;strong&gt;&lt;span style=&quot;color: red;&quot;&gt;Mac Hacks - Ebook PDF&lt;/span&gt;&lt;/strong&gt;&lt;/div&gt;
&lt;div&gt;
&lt;strong&gt;&lt;span style=&quot;color: red;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/strong&gt;&lt;/div&gt;
&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&lt;a href=&quot;http://filepi.com/i/sLf5e7K&quot; style=&quot;text-align: center;&quot;&gt;http://filepi.com/i/sLf5e7K&lt;/a&gt;&lt;/div&gt;
</content><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/6995472413807230983/posts/default/4798589615891600480'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/6995472413807230983/posts/default/4798589615891600480'/><link rel='alternate' type='text/html' href='http://web-analizi.blogspot.com/2015/01/mac-hacks-ebook-pdf.html' title='Mac Hacks   - Ebook PDF '/><author><name>Anonymous</name><uri>http://www.blogger.com/profile/14191995798879127165</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhDmJ4ky_KB_vszYWmB1RrmDv9MaiwA3IfC47j0DUPxKeytBKJnxEdH4KkzczTnhUQ9TLXPCK5huVF1Rn30YURRwkb3QCX2Js9BRK3UB4hV1R8oRXeQoEgGDqSIEvGRX5jf0B4c6L8eeW8/s72-c/mac_hacks.jpg" height="72" width="72"/></entry><entry><id>tag:blogger.com,1999:blog-6995472413807230983.post-3839012322674754289</id><published>2015-01-25T09:20:00.002-08:00</published><updated>2015-01-25T09:20:14.844-08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Backtrack"/><category scheme="http://www.blogger.com/atom/ns#" term="Bactrack"/><category scheme="http://www.blogger.com/atom/ns#" term="ebook"/><category scheme="http://www.blogger.com/atom/ns#" term="kali"/><category scheme="http://www.blogger.com/atom/ns#" term="Kalilinux"/><category scheme="http://www.blogger.com/atom/ns#" term="Linux"/><category scheme="http://www.blogger.com/atom/ns#" term="Linux Server Hacks"/><category scheme="http://www.blogger.com/atom/ns#" term="Mac"/><category scheme="http://www.blogger.com/atom/ns#" term="PDF"/><category scheme="http://www.blogger.com/atom/ns#" term="Ubuntu"/><category scheme="http://www.blogger.com/atom/ns#" term="Windows"/><title type='text'>Linux Server Hacks - Ebook PDF </title><content type='html'>&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjlGFITOnNTiaJprH0LRonc0TMpbUoJpICCQX8fV1HSiPfFwnGtHrwvSWLyUDiiFNmc9Io9TuKf42fVE9v3NP0brlnlo3agIRTL_bVUqwK9w_7OWKK2c8zsgyhy9u5gThD81Py5fMGA8bs/s1600/linux_server_hacks.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjlGFITOnNTiaJprH0LRonc0TMpbUoJpICCQX8fV1HSiPfFwnGtHrwvSWLyUDiiFNmc9Io9TuKf42fVE9v3NP0brlnlo3agIRTL_bVUqwK9w_7OWKK2c8zsgyhy9u5gThD81Py5fMGA8bs/s1600/linux_server_hacks.jpg&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;b&gt;&lt;span style=&quot;color: red;&quot;&gt;Linux Server Hacks - Ebook PDF&amp;nbsp;&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;b&gt;&lt;span style=&quot;color: red;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;b&gt;&lt;span style=&quot;color: red;&quot;&gt;&lt;a href=&quot;http://filepi.com/i/G3S2mA9&quot; target=&quot;_blank&quot;&gt;http://filepi.com/i/G3S2mA9&lt;/a&gt;&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;
</content><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/6995472413807230983/posts/default/3839012322674754289'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/6995472413807230983/posts/default/3839012322674754289'/><link rel='alternate' type='text/html' href='http://web-analizi.blogspot.com/2015/01/linux-server-hacks-ebook-pdf.html' title='Linux Server Hacks - Ebook PDF '/><author><name>Anonymous</name><uri>http://www.blogger.com/profile/14191995798879127165</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjlGFITOnNTiaJprH0LRonc0TMpbUoJpICCQX8fV1HSiPfFwnGtHrwvSWLyUDiiFNmc9Io9TuKf42fVE9v3NP0brlnlo3agIRTL_bVUqwK9w_7OWKK2c8zsgyhy9u5gThD81Py5fMGA8bs/s72-c/linux_server_hacks.jpg" height="72" width="72"/></entry><entry><id>tag:blogger.com,1999:blog-6995472413807230983.post-4638747303447595644</id><published>2015-01-25T08:52:00.000-08:00</published><updated>2015-01-25T08:52:00.481-08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Bactrack"/><category scheme="http://www.blogger.com/atom/ns#" term="kali"/><category scheme="http://www.blogger.com/atom/ns#" term="Knoppix Hacks - Ebook PDF Downland"/><category scheme="http://www.blogger.com/atom/ns#" term="Linux"/><category scheme="http://www.blogger.com/atom/ns#" term="Mac"/><category scheme="http://www.blogger.com/atom/ns#" term="Windows"/><title type='text'>Knoppix Hacks - Ebook PDF Downland </title><content type='html'>&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjqWQwyTrInrf2O9RJQ-RjAO9r0aDRncQpmYfGa5F03AKdQMPoLxAxnPlN1srd2Gj-j-BJ0dbBTpefHpsz-3Fodt_PtXjbR-ie7YEuXPdAwI73ZhBGG4_-e_J5YUx3IetVMpBvynPqfdcY/s1600/knoppix_hacks_second_edition.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjqWQwyTrInrf2O9RJQ-RjAO9r0aDRncQpmYfGa5F03AKdQMPoLxAxnPlN1srd2Gj-j-BJ0dbBTpefHpsz-3Fodt_PtXjbR-ie7YEuXPdAwI73ZhBGG4_-e_J5YUx3IetVMpBvynPqfdcY/s1600/knoppix_hacks_second_edition.jpg&quot; /&gt;&lt;/a&gt;&amp;nbsp;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;b&gt;&lt;span style=&quot;color: red;&quot;&gt;Knoppix Hacks - Ebook PDF Downland&amp;nbsp;&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;b&gt;&lt;span style=&quot;color: red;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;b&gt;&lt;span style=&quot;color: red;&quot;&gt;&lt;a href=&quot;http://filepi.com/i/OOS9svK&quot;&gt;http://filepi.com/i/OOS9svK&lt;/a&gt;&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;
</content><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/6995472413807230983/posts/default/4638747303447595644'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/6995472413807230983/posts/default/4638747303447595644'/><link rel='alternate' type='text/html' href='http://web-analizi.blogspot.com/2015/01/knoppix-hacks-ebook-pdf-downland.html' title='Knoppix Hacks - Ebook PDF Downland '/><author><name>Anonymous</name><uri>http://www.blogger.com/profile/14191995798879127165</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjqWQwyTrInrf2O9RJQ-RjAO9r0aDRncQpmYfGa5F03AKdQMPoLxAxnPlN1srd2Gj-j-BJ0dbBTpefHpsz-3Fodt_PtXjbR-ie7YEuXPdAwI73ZhBGG4_-e_J5YUx3IetVMpBvynPqfdcY/s72-c/knoppix_hacks_second_edition.jpg" height="72" width="72"/></entry><entry><id>tag:blogger.com,1999:blog-6995472413807230983.post-7442579243000559976</id><published>2015-01-24T14:46:00.000-08:00</published><updated>2015-01-24T14:46:18.234-08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Backtrack"/><category scheme="http://www.blogger.com/atom/ns#" term="Bactrack"/><category scheme="http://www.blogger.com/atom/ns#" term="Kinect Hacks"/><category scheme="http://www.blogger.com/atom/ns#" term="Linux"/><category scheme="http://www.blogger.com/atom/ns#" term="Mac"/><category scheme="http://www.blogger.com/atom/ns#" term="Ubuntu"/><category scheme="http://www.blogger.com/atom/ns#" term="Windows"/><title type='text'>Kinect Hacks - E-book Downland PDF </title><content type='html'>&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh71tOzJM72VLWZoHt1knPCU9t7hll43EFGW0nQenaizHTrurFiL_yy27KOhGBAO3KiJPPnCgl_tzyY888Cnwih_i6OYG9jfgMpSS1U4plVuQ_b0XjWgoQpA7iV-LUyFueO-PeoUlzDIk0/s1600/kinect_hacks.jpg&quot; /&gt;&lt;/div&gt;
&amp;nbsp; &amp;nbsp;&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;a href=&quot;http://filepi.com/i/GdSZX1T&quot;&gt;http://filepi.com/i/GdSZX1T&lt;/a&gt;&lt;/div&gt;
&lt;/div&gt;
</content><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/6995472413807230983/posts/default/7442579243000559976'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/6995472413807230983/posts/default/7442579243000559976'/><link rel='alternate' type='text/html' href='http://web-analizi.blogspot.com/2015/01/kinect-hacks-e-book-downland-pdf.html' title='Kinect Hacks - E-book Downland PDF '/><author><name>Anonymous</name><uri>http://www.blogger.com/profile/14191995798879127165</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh71tOzJM72VLWZoHt1knPCU9t7hll43EFGW0nQenaizHTrurFiL_yy27KOhGBAO3KiJPPnCgl_tzyY888Cnwih_i6OYG9jfgMpSS1U4plVuQ_b0XjWgoQpA7iV-LUyFueO-PeoUlzDIk0/s72-c/kinect_hacks.jpg" height="72" width="72"/></entry></feed>