lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-ID: <441F1B56.2070404@linuxbox.org> Date: Mon Mar 20 23:40:22 2006 From: ge at linuxbox.org (Gadi Evron) Subject: indexes of exploits online [was: Links to Google's cache of 626 FrSIRT exploits] layne@...enot.com wrote: > This page links to Google's cache of 626 FrSIRT exploits > > http://www.elsenot.com/frsirt-google.html <non commercial injection> Or you can come to a site I really like (*obviously*) and check out the extensive, up-to-date and openly accessible exploits section: http://www.securiteam.com/exploits/ If I counted how many people hate/attacked SecuriTeam for hosting exploits and POC code... why should these be easy to find only to the Bad Guys? Please! People should stop living in the 1980's. Gadi.