Penetration Testing mailing list archives

RE: security tools list


From: Ying <ropstrip () gmail com>
Date: Wed, 29 Apr 2009 08:09:29 +0200

Hello,
        I'm working on it in a couple of days will have a website available for
viewing in real time. Throughout the day today to send the list the
collection of tools that are already included.

Best regards


El mar, 28-04-2009 a las 22:31 -0400, Ng, Kenneth (US) escribió:
Can we get a url to see what is in the list? 

-----Original Message-----
From: listbounce () securityfocus com [mailto:listbounce () securityfocus com]
On Behalf Of Ying
Sent: Tuesday, April 28, 2009 10:20 AM
To: pen-test () securityfocus com
Subject: security tools list

hello everyone. 
      I'm making a list of security tools. The idea is that a list be
made by all and for all. This email is also sent to the people of the
project backtrack and wifislax. For those who want to collaborate, I
have created a form using google docs, for send your ideas to me. We
accept all kinds of suggestions: commercial software, free ... Linux,
Windows, *BSD, Mac OS ... 
      When I have a enough long list, send to the list, but if someone
wants to ask before you can smoothly. 
      The URL to add tools is: 

http://spreadsheets.google.com/viewform?hl=en&formkey=cjRsNFh5cENXT2pra3
lYOXU4aXNUVFE6MA..


Greetings to all.




------------------------------------------------------------------------
This list is sponsored by: InfoSec Institute

Tired of using other people's tools? Why not learn how to write your own
exploits? 
InfoSec Institute's Advanced Ethical Hacking class teaches you how to
write stack and heap buffer overflow exploits for Windows and Linux.
Gain your Certified Expert Penetration Tester (CEPT) cert as well. 

http://www.infosecinstitute.com/courses/advanced_ethical_hacking_trainin
g.html
------------------------------------------------------------------------

<html>
<body>
<p>***********************************************************************</p>
<p>The information in this email is confidential and may be legally privileged.
It is intended solely for the addressee. Access to this email by anyone else is
unauthorized. If you are not the intended recipient, any disclosure, copying,
distribution or any action taken or omitted to be taken in reliance on it, is
prohibited and may be unlawful. When addressed to our clients any opinions or
advice contained in this email are subject to the terms and conditions
expressed in the governing KPMG client engagement letter.</p>
<p>***********************************************************************</p>
</body>
</html>



------------------------------------------------------------------------
This list is sponsored by: InfoSec Institute

Tired of using other people's tools? Why not learn how to write your own exploits? 
InfoSec Institute's Advanced Ethical Hacking class teaches you how to write stack and heap buffer overflow exploits for 
Windows and Linux. Gain your Certified Expert Penetration Tester (CEPT) cert as well. 

http://www.infosecinstitute.com/courses/advanced_ethical_hacking_training.html
------------------------------------------------------------------------


Current thread: