wig – WebApp Information Gatherer – Identify CMS
February 24th, 2014 | 🕒
ttswig is a Python tool that identifies a websites CMS by searching for fingerprints of static files and extracting version
February 24th, 2014 | 🕒
ttswig is a Python tool that identifies a websites CMS by searching for fingerprints of static files and extracting version
February 24th, 2014 | 🕒
iSpeech.orgGoldenEye is a HTTP/S Layer 7 Denial-of-Service Testing Tool. It uses KeepAlive (and Connection: keep-alive) paired with Cache-Control options to persist
February 23rd, 2014 | 🕒
Powered by iSpeech The Secret Life of SIM Cards Speakers: Karl Koscher - Grad student, University of Washington Eric Butler
February 23rd, 2014 | 🕒
iSpeech.org We are Legion: Pentesting with an Army of Low-power Low-cost Devices Speaker: Dr. Philip Polstra - Hacker in Residence,
February 23rd, 2014 | 🕒
iSpeech.org I Can Hear You Now: Traffic Interception and Remote Mobile Phone Cloning with a Compromised CDMA Femtocell Speakers: Doug
February 23rd, 2014 | 🕒
iSpeech.org Backdoors, Government Hacking and The Next Crypto Wars Speaker: Christopher Soghoian - Principal Technologist, Privacy & Technology Project, ACLU
February 23rd, 2014 | 🕒
iSpeech.org Defense by numbers: Making problems for script kiddies and scanner monkeys Speaker: Chris John Riley On the surface most
February 23rd, 2014 | 🕒
https://www.ispeech.org Java Every-Days: Exploiting Software Running on 3 Billion Devices Speakers: Brian Gorenc - Zero Day Initiative, HP Security Research
February 23rd, 2014 | 🕒
iSpeech Demo of SQL injection and CSRF attacks on web applications. Lecture 23 of ITS335 IT Security at Sirindhorn International
February 22nd, 2014 | 🕒
iSpeech.org Smartphone is the need of everyone today and so the first target of most of the Cyber Criminals. Malware authors
February 22nd, 2014 | 🕒
iSpeech.org Apple's latest 35.4 MB update of iOS 7.0.6 doesn't seem important at first, but it contains a critical security patch that addresses a flaw
February 22nd, 2014 | 🕒
Text to Speech Voices The Network Forensics industry in Malaysia is relatively new compared to countries in Europe and North
February 21st, 2014 | 🕒
Text to Speech A user asked how to install BackTrack in VirtualBox. Since BackTrack is no longer supported and since
February 21st, 2014 | 🕒
https://www.ispeech.org/text.to.speech Hackers breached University of Maryland's computer and compromised data belong to more than 300,000 people affiliated with the school
Gloss