• Register

CVE - Latest News

CAPEC - Latest News

CWE - Latest News

340+ Bug Bounty and Disclosure Programs List of World Known Bug Bounty Programs
It all started a long time ago. We don’t know who coined the term, but Google made it well-known when they launch their Bug Bounty Program in order to get more secure.After that, big companies like AT&T, Facebook, Mozilla, Paypal, Samsung, Yandex and others, realised how important Bug Bounty and Disclosure Programs are for their services, products and started implementing them as well. The advantages for companies that run Bug Bounty Program and security professionals or bug hunters are clear. Companies patch their flaws/vulnerabilities, while security specialists get paid or hall of fame for it. Commercial programs like bug bounty or reward systems but also regular security acknowledgments.  The "updated list of bug bounty and disclosure programs" impact 340+ world known security programs. UP TO DATED - Together a list of the most notable world known Bug Bounty and Disclosure Programs -   340+ COMPANY SERVICES & PRODUCTS (BUG BOUNTY & REWARDS & SWAGS OFFERED)   COMPANY SERVICES & PRODUCTS BUG BOUNTY & REWARDS SWAG[S] HALL OF FAME

Mailinator is a free, disposable email service for everyone who wants to protect their identity in blogs, forum and social media. The idea is to let a user create a new e-mail address on the fly, whenever needed, for instance while filling a form on a web site.

Mailinator will accept mail for any e-mail address within the mailinator.com domain, and allows anyone to read it. There is no need to register for an account or authenticate via a password. It is intended to provide users with an anonymous and temporary e-mail address to help reduce Inbox spam.

Pros

  1. Mailinator addresses are ultimately easy to use
  2. No connection to your real email address
  3. Mailinator can be used with a number of domain names (should mailinator.com be blocked)

Cons

  1. Mailinator is useful only when you don't really want to get mail
  2. All Mailinator mail is public, keep that in mind

Description

  • Mailinator provides an unlimited number of email addresses for everybody to use.
  • Mail sent to any @mailinator.com address can be picked up by entering just the user name.
  • Use Mailinator addresses to sign up to web sites, register software and more.
  • Using a Mailinator address avoids the risk of your real email address being handed to spammers.
  • Mailinator keeps up to ten messages for every address.
  • You can use a number of alternate domain names instead of mailinator.com.

 

Mailinator takes throwaway email address a step further: all @mailinator.com addresses are in fact thrownaway addresses.

You can use any address you like to sign up for web sites, to post to board and other occasions where you need an email address (maybe to receive a password) quickly, but don't want to give your real address. Since Mailinator addresses have no connection to your real address at all, there's no risk of getting spam from using a Mailinator address.

Picking up mail sent to your made-up address is easy: log in at Mailinator with the email address. Since everybody can do this without a password, Mailinator is useful only when you don't really want to communicate.

Mailinator is email addresses thrown away into the public space.

 

Check out Mailinator @ www.mailinator.com

 

 

BugMeNot is an internet service that provides usernames and passwords to let Internet users bypass mandatory free registration on websites.

Started in August 2003 by an anonymous person, later revealed to be Guy King, it aims to allow Internet users to access websites that have registration walls (for instance, that of The New York Times) with the requirement of compulsory registration.

This came in response to the increasing number of websites that request such registration. Many Internet users find this to be an annoyance and a potential source of spam e-mail. BugMeNot itself used to parody these sentiments in its own fake registration form.

Use of the service

BugMeNot allows users of their service to add new accounts for sites with free registration. It also encourages users to use disposable email address services to create such accounts. However, it does not allow them to add accounts for pay websites, as this could potentially put BugMeNot in legal trouble. BugMeNot also claims to remove accounts for any web site that requests that they do not provide accounts for non-registered users.

To help make access to their service easier, BugMeNot hosts a bookmarklet that can be used with any browser to automatically find a usable account from their service. They also host extensions for the web browsers Mozilla Firefox, Internet Explorer, and Google Chrome (the extensions were created by Eric Hamiter with Dmytri Kleiner and Dean Wilson, respectively). There are also implementations in the form of a BugMeNot Opera widget, or UserJS scripts along with buttons, which makes it fully browser-integrated. An Android application is also available.

 

Check out BugMeNot @ www.bugmenot.com

 

 

DeadFake is a fake email service (an online prank tool) that makes it easy to prank your friends by sending fake email messages to them. The idea behind the service is to make the email look like it is coming from someone else (say This email address is being protected from spambots. You need JavaScript enabled to view it., This email address is being protected from spambots. You need JavaScript enabled to view it. etc).

While there is a funny side to it, DeadFake can also be used by spamer or worse for sending phishing emails. Thus, make sure to always check the headers in suspicious emails. The legit email will always have the “from” email address in the “Sender” field.

Features:

  • Send fake emails.
  • No registration needed.
  • To learn more about how it works go here.
  • Not to be used for spamming or other malicious purpose.

 

Check out DeadFake @ www.deadfake.com

 

 

 

  • Tab 1

    Cloud Security

    Cloud Security is the set of security protocols, methodologies and technologies that protect the availability of cloud resources and the integrity of data stored in a cloud computing environment. Cloud security differs from traditional computer security in that it is not focused on preventing access to specific machines.
    Read More About Cloud Security

     
  • Tab 2

    Mobile Security

    Mobile Security or mobile phone security has become increasingly important in mobile computing. It is of particular concern as it relates to the security of personal information now stored on smartphones. All smartphones, as computers, are preferred targets of attacks.
    Read More About Mobile Security

     
  • Tab 3

    Wireless Security

    Wireless Security is the prevention of unauthorized access or damage to computers using wireless networks. The most common types of wireless security are Wired Equivalent Privacy (WEP) and Wi-Fi Protected Access (WPA). WEP is one of the least secure forms of security.
    Read More About Wireless Security

     

Computer Forensics Analysis

Computer forensics (sometimes known as computer forensic science) is a branch of digital forensic science pertaining to legal evidence found in computers and digital storage media. The goal of computer forensics is to examine digital media in a forensically sound manner with the aim of identifying, preserving, recovering, analyzing and presenting facts and opinions about the information.

Read More...

Malware Analysis

Malware, short for malicious (or malevolent) software, is software used or created by attackers to disrupt computer operation, gather sensitive information, or gain access to private computer systems. It can appear in the form of code, scripts, active content, and other software. 'Malware' is a general term used to refer to a variety of forms of hostile or intrusive software.

Read More...

Guests Online

We have 298 guests and no members online

CORE Impact Professional

Logo Core ImpactCORE Impact Professional is the most comprehensive software solution for assessing and testing security vulnerabilities throughout your organization.

 
 

Read More...

IBM Security AppScan

Logo IBM Rational AppScanIBM Rational AppScan Enterprise is a scalable solution to help resolve application security vulnerabilities, offering recommendations to simplify remediation.

 

Read More...

HP WebInspect

Logo - HP WebInspectHP WebInspect gives security professionals and security novices alike the power and knowledge to quickly identify and validate critical, high-risk security vulnerabilities.

 

Read More...

Acunetix WVS

logo acunetix web application securityAcunetix Web Vulnerability Scanner (WVS) is an automated web application security testing tool that audits web applications by checking for hacking vulnerabilities. 

 

Read More...

w4rri0r - Hacking Is Not A Crime - It's an art of Awareness

\/ w4rri0r - Hacking Is Not A Crime - It's an art of Awareness \/ -  w4rri0r work in the dark, w4rri0r do what w4rri0r can, w4rri0r give what w4rri0r have, w4rri0r doubt is w4rri0r passion and w4rri0r passion is w4rri0r task. The rest is the madness of art \/ w4rri0r \/ 

\/ w4rri0r.com \/ are the great resource for information security professionals and researcher. \/ w4rri0r \/ offers a extensive variation of information security services that include SECURITY EXPLOITS (Bug or Vulnerability), SECURITY ADVISORIES (Security Alerts), SECURITY RESEARCHER TOOLBOX (Freeware, Shareware & Open-Source), SHELLCODE (Attacker Controller - Chunk of Data), SECURITY TRAINING (Educational Purpose), SECURITY NEWS (Security Recent or Important Events) and with this group you can be assured that you’re in the right hands. \/ w4rri0r gr0up \/  efforts being endorsed and appreciated by administrators, security researchers and members of various underground hacking groups and communities worldwide.

\/ w4rri0r mission \/ are to make the information systems more secure, more aware, more reliable and protect against possible security breaches.