Penetration Testing mailing list archives
RE: security tools list
From: Ying <ropstrip () gmail com>
Date: Wed, 29 Apr 2009 08:09:29 +0200
Hello, I'm working on it in a couple of days will have a website available for viewing in real time. Throughout the day today to send the list the collection of tools that are already included. Best regards El mar, 28-04-2009 a las 22:31 -0400, Ng, Kenneth (US) escribió:
Can we get a url to see what is in the list? -----Original Message----- From: listbounce () securityfocus com [mailto:listbounce () securityfocus com] On Behalf Of Ying Sent: Tuesday, April 28, 2009 10:20 AM To: pen-test () securityfocus com Subject: security tools list hello everyone. I'm making a list of security tools. The idea is that a list be made by all and for all. This email is also sent to the people of the project backtrack and wifislax. For those who want to collaborate, I have created a form using google docs, for send your ideas to me. We accept all kinds of suggestions: commercial software, free ... Linux, Windows, *BSD, Mac OS ... When I have a enough long list, send to the list, but if someone wants to ask before you can smoothly. The URL to add tools is: http://spreadsheets.google.com/viewform?hl=en&formkey=cjRsNFh5cENXT2pra3 lYOXU4aXNUVFE6MA.. Greetings to all. ------------------------------------------------------------------------ This list is sponsored by: InfoSec Institute Tired of using other people's tools? Why not learn how to write your own exploits? InfoSec Institute's Advanced Ethical Hacking class teaches you how to write stack and heap buffer overflow exploits for Windows and Linux. Gain your Certified Expert Penetration Tester (CEPT) cert as well. http://www.infosecinstitute.com/courses/advanced_ethical_hacking_trainin g.html ------------------------------------------------------------------------ <html> <body> <p>***********************************************************************</p> <p>The information in this email is confidential and may be legally privileged. It is intended solely for the addressee. Access to this email by anyone else is unauthorized. If you are not the intended recipient, any disclosure, copying, distribution or any action taken or omitted to be taken in reliance on it, is prohibited and may be unlawful. When addressed to our clients any opinions or advice contained in this email are subject to the terms and conditions expressed in the governing KPMG client engagement letter.</p> <p>***********************************************************************</p> </body> </html>
------------------------------------------------------------------------ This list is sponsored by: InfoSec Institute Tired of using other people's tools? Why not learn how to write your own exploits? InfoSec Institute's Advanced Ethical Hacking class teaches you how to write stack and heap buffer overflow exploits for Windows and Linux. Gain your Certified Expert Penetration Tester (CEPT) cert as well. http://www.infosecinstitute.com/courses/advanced_ethical_hacking_training.html ------------------------------------------------------------------------
Current thread:
- security tools list Ying (Apr 28)
- Message not available
- RE: security tools list Ying (Apr 30)
- Message not available
- Re: security tools list Richard Thomas (Apr 30)
- Re: security tools list Ying (Apr 30)
- Re: security tools list Arjun Sambamoorthy (Apr 30)
- Re: security tools list li bo (Apr 30)
- Re: security tools list Ying (Apr 30)
- Re: security tools list Harsh Patel (Apr 30)
- Re: security tools list Ying (Apr 30)