Recent posts

Typesort icon Title Author Replies Last Post
Blog entry Mini-Review: Tunnelr VPN service Amp 6 years 23 weeks
Blog entry Amp Blasts: Defcon 23 Amp 3 years 38 weeks
Blog entry HDB Cleanup RaT 10 years 30 weeks
Blog entry Old Content RaT 9 years 29 weeks
Blog entry 12 programming issues to avoid Cyber_Wolf_Remus 8 years 20 weeks
Blog entry Ahhhhh upgrade Digital_Paralysis 7 years 13 weeks
Blog entry Amp Blasts: eSports! Amp 5 years 33 weeks
Blog entry UGNazi 2018? xuorelonuj 1 41 weeks 3 days
Blog entry Microsoft Confirms 17-Year Old Windows bug -Ha-Ha-Ha Sure they didn't know....! Der Jäger 1 8 years 36 weeks
Blog entry Amp Blasts: Halo Amp 8 years 10 weeks
Blog entry Amp Blasts: Valve Corporation Amp 7 years 2 weeks
Blog entry steps of pen testing danish 5 years 9 weeks
Blog entry [NIX Programming] Part 1: Knowing the Roots. Erra 16 weeks 3 days
Blog entry Moving past Durandal... RaT 1 10 years 39 weeks
Blog entry Rants: SFF Cases and External Power bricks. EverestX 7 8 years 9 weeks
Blog entry iXtreme LT+ released: Put a stop to AP25 checks! Amp 8 years 38 weeks
Blog entry Five "Holy Shit" Moments in 2011 for SX Amp 7 years 33 weeks
Blog entry Defcon or Bust Amp 2 6 years 11 weeks
Blog entry Wants to learn unethical hacking Ayushi Jais 1 2 years 11 weeks
Blog entry (C)rap Amp 10 years 25 weeks
Blog entry Teleprompter Personalities.... Amp 10 years 47 weeks
Blog entry Why I Hate Ghostbusters II Azrael 10 years 16 weeks
Blog entry Reverse Engineering Jerbo 9 years 11 weeks
Blog entry Amp Blasts: cheapassgamer.com Amp 8 years 2 weeks
Blog entry XSS & SQLI Vulnerability Detected SkarY 1 6 years 30 weeks
Blog entry Content updates Amp 4 years 1 week
Blog entry Howard and Nester RaT 10 years 32 weeks
Blog entry Warning this person is a cop or works with the cops, "xplicit" - Der Jäger 9 years 33 weeks
Blog entry hardware junk mkdsbunnell 8 years 30 weeks
Blog entry need help of computer masters...... royal_soma 3 7 years 18 weeks
Blog entry Brief Notes Amp 5 years 37 weeks
Blog entry GIRL HACKERS asmita1@ 1 1 year 21 weeks
Book Disassembling Code: IDA Pro and SoftICE RaT 11 years 4 weeks
Book Learning the Unix Operating System RaT 11 years 5 weeks
Book Applied Cryptography, Second Edition: Protocols, Algorthms, and Source Code in C RaT 11 years 2 weeks
Book Hacking: The Art of Exploitation RaT 3 40 weeks 2 days
Book The Shellcoder's Handbook: Discovering and Exploiting Security Holes RaT 11 years 4 weeks
Book TCP/IP Network Administration RaT 1 10 years 19 weeks
Book Perl Best Practices RaT 11 years 4 weeks
Book Unix Power Tools RaT 11 years 5 weeks
Book CD Cracking Uncovered: Protection Against Unsanctioned CD Copying RaT 11 years 2 weeks
Book C Primer Plus RaT 11 years 4 weeks
Book C# Cookbook RaT 11 years 4 weeks
Book sendmail RaT 11 years 5 weeks
Book Security in Computing RaT 11 years 4 weeks
Book Unix in a Nutshell RaT 11 years 5 weeks
Book Network Security Tools RaT 11 years 4 weeks
Book Automating UNIX and Linux Administration durandal 11 years 4 weeks
Book Building Internet Firewalls RaT 11 years 5 weeks
Book Silence on the Wire: A Field Guide to Passive Reconnaissance and Indirect Attacks RaT 11 years 4 weeks