• Register

CVE - Latest News

CAPEC - Latest News

CWE - Latest News

340+ Bug Bounty and Disclosure Programs List of World Known Bug Bounty Programs
It all started a long time ago. We don’t know who coined the term, but Google made it well-known when they launch their Bug Bounty Program in order to get more secure.After that, big companies like AT&T, Facebook, Mozilla, Paypal, Samsung, Yandex and others, realised how important Bug Bounty and Disclosure Programs are for their services, products and started implementing them as well. The advantages for companies that run Bug Bounty Program and security professionals or bug hunters are clear. Companies patch their flaws/vulnerabilities, while security specialists get paid or hall of fame for it. Commercial programs like bug bounty or reward systems but also regular security acknowledgments.  The "updated list of bug bounty and disclosure programs" impact 340+ world known security programs. UP TO DATED - Together a list of the most notable world known Bug Bounty and Disclosure Programs -   340+ COMPANY SERVICES & PRODUCTS (BUG BOUNTY & REWARDS & SWAGS OFFERED)   COMPANY SERVICES & PRODUCTS BUG BOUNTY & REWARDS SWAG[S] HALL OF FAME

Zone-H is an archive of defaced websites. Once a defaced website is submitted to Zone-H, it is mirrored on the Zone-H servers, it is then moderated by the Zone-H staff to check if the defacement was fake. Sometimes the hackers themselves admittedly submit their hacked pages to the site. It is an Internet security portal containing original IT security news, digital warfare news, geopolitics, proprietary and general advisories, analyses, forums, researches. 

Zone-H is the largest web intrusions archive. It is published in several languages.

 

Check out Zone-h @ www.zone-h.org

 

The XSSed project was created in early February 2007 by KF and DP. It  provides information on all things related to cross-site scripting vulnerabilities and is the largest online archive of XSS vulnerable websites

KF and DP started this project with the scope of increasing security and privacy on the web. Professional and amateur webmasters and web developers are notified about any cross-site scripting vulnerability affecting their online properties. The importance of securing their web applications is emphasized through the informational and educational content which provide.

What they do is to simply validate all the submitted XSS vulnerable websites and then publish them on the archive. We actively assist all website owners to remediate the cross-site scripting issues by bringing them up to their attention on a timely manner. 

 

Check out XSSed @ www.xssed.com

The ultimate archive of exploits and vulnerable software and a great resource for vulnerability researchers and security professionals. Inj3t0r aim is to collect exploits from submit tals and various mailing lists and concentrate them in one, easy to navigate database. 

1337day - The Underground, is one of the world's most popular and comprehensive computer security web sites.

This site is visited by home and enterprise users, universities, government and military institutions on a daily basis. 1337day are comprised of security professionals that are dedicated to provide necessary information to secure application software. 1337day staff accomplish this goal by publishing new security advisories on the internet. 1337day staff is made up of a group of highly skilled professionals, all directly engaged in the technical computer and software security arenas.

Inj3ct0r provides useful information to people who perform penetration testing, IDS signature development, and exploit research. This project was created to provide information on exploit techniques and to create a useful resource for exploit developers and security professionals. The tools and information on this site are provided for legal security research and testing purposes only. 

For the first time the idea of creating 1337day project appeared on 13 May 2008. The project is devoted to computer security, protection and hacking of computer networks, software and information.

1337day site, which is a regularly updated database with descriptions of the vulnerabilities and exploit the various software products. The base is divided into sections by type of exploit: local, remote, DoS, etc. Also presented to the division on the platform: BSD, Linux, QNX, OSX, Solaris, Unix, Windows and so on.

Latest exploits are designed to exploit newly discovered critical vulnerabilities. This project is designed to receive, deposit and exchange of information between the parties, which are thematically linked to computer activities. One of the priorities is the creation of a unified knowledge base for people interested in the subject, one way or another connected with the computer: be it software or programming languages, network protocols, or security network resources and hardware - all this we seek to explain on the project.

Inj3ct0r Team

Inj3ct0r (founder r0073r) is a group of hacktivists. Inj3ct0r Team was originally founded in 2003, by a hacker computer enthusiast. Domain Inj3ct0r.com was registered in 2008. The enormous database, the constant updates, the unique nature of the content published. :) 

New Inj3ct0r Domain: 1337day.com

Inj3ct0r Operators: Name - Specialty

  • r0073r -  Owner :)
  • Keystr0ke  - Milw0rm Owner
  • r4dc0re - Curator Exploit DataBase
  • Kingcope - Curator Exploit DataBase
  • CrosS - IRC Administrator

 

Check out Inj3ct0r @ www.1337day.com

  • Tab 1

    Cloud Security

    Cloud Security is the set of security protocols, methodologies and technologies that protect the availability of cloud resources and the integrity of data stored in a cloud computing environment. Cloud security differs from traditional computer security in that it is not focused on preventing access to specific machines.
    Read More About Cloud Security

     
  • Tab 2

    Mobile Security

    Mobile Security or mobile phone security has become increasingly important in mobile computing. It is of particular concern as it relates to the security of personal information now stored on smartphones. All smartphones, as computers, are preferred targets of attacks.
    Read More About Mobile Security

     
  • Tab 3

    Wireless Security

    Wireless Security is the prevention of unauthorized access or damage to computers using wireless networks. The most common types of wireless security are Wired Equivalent Privacy (WEP) and Wi-Fi Protected Access (WPA). WEP is one of the least secure forms of security.
    Read More About Wireless Security

     

Computer Forensics Analysis

Computer forensics (sometimes known as computer forensic science) is a branch of digital forensic science pertaining to legal evidence found in computers and digital storage media. The goal of computer forensics is to examine digital media in a forensically sound manner with the aim of identifying, preserving, recovering, analyzing and presenting facts and opinions about the information.

Read More...

Malware Analysis

Malware, short for malicious (or malevolent) software, is software used or created by attackers to disrupt computer operation, gather sensitive information, or gain access to private computer systems. It can appear in the form of code, scripts, active content, and other software. 'Malware' is a general term used to refer to a variety of forms of hostile or intrusive software.

Read More...

Guests Online

We have 213 guests and no members online

CORE Impact Professional

Logo Core ImpactCORE Impact Professional is the most comprehensive software solution for assessing and testing security vulnerabilities throughout your organization.

 
 

Read More...

IBM Security AppScan

Logo IBM Rational AppScanIBM Rational AppScan Enterprise is a scalable solution to help resolve application security vulnerabilities, offering recommendations to simplify remediation.

 

Read More...

HP WebInspect

Logo - HP WebInspectHP WebInspect gives security professionals and security novices alike the power and knowledge to quickly identify and validate critical, high-risk security vulnerabilities.

 

Read More...

Acunetix WVS

logo acunetix web application securityAcunetix Web Vulnerability Scanner (WVS) is an automated web application security testing tool that audits web applications by checking for hacking vulnerabilities. 

 

Read More...

w4rri0r - Hacking Is Not A Crime - It's an art of Awareness

\/ w4rri0r - Hacking Is Not A Crime - It's an art of Awareness \/ -  w4rri0r work in the dark, w4rri0r do what w4rri0r can, w4rri0r give what w4rri0r have, w4rri0r doubt is w4rri0r passion and w4rri0r passion is w4rri0r task. The rest is the madness of art \/ w4rri0r \/ 

\/ w4rri0r.com \/ are the great resource for information security professionals and researcher. \/ w4rri0r \/ offers a extensive variation of information security services that include SECURITY EXPLOITS (Bug or Vulnerability), SECURITY ADVISORIES (Security Alerts), SECURITY RESEARCHER TOOLBOX (Freeware, Shareware & Open-Source), SHELLCODE (Attacker Controller - Chunk of Data), SECURITY TRAINING (Educational Purpose), SECURITY NEWS (Security Recent or Important Events) and with this group you can be assured that you’re in the right hands. \/ w4rri0r gr0up \/  efforts being endorsed and appreciated by administrators, security researchers and members of various underground hacking groups and communities worldwide.

\/ w4rri0r mission \/ are to make the information systems more secure, more aware, more reliable and protect against possible security breaches.