lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <2d6724810804201817k7bcdabaue4d8ff7af7394d1b@mail.gmail.com>
Date: Sun, 20 Apr 2008 21:17:19 -0400
From: "T Biehn" <tbiehn@...il.com>
To: "Jean Duboscs" <jean.duboscs@...il.com>
Cc: full-disclosure@...ts.grok.org.uk
Subject: Re: exploit coding / Pentesting / 0day selling
	services

Resume, phone contact, references, previous works? Otherwise BS?

On Sun, Apr 20, 2008 at 2:06 PM, Jean Duboscs <jean.duboscs@...il.com> wrote:
> Hi All,
>
> I am reaching this Mailing-List in order to propose services to people
> and/or compagny (even governmental) which are insterested. I am currently
> proposing these following services :
>
> 1. Vulnerability audity and eventually exploit coding for vulnerability
> found.
>
> 2. Pentesting.
>
> 3. 0day working exploits for Windows Applications and for UNIX (mostly Linux
> kernel 2.6, and also HP-UX 11.x).
>
> I am working in freelance way. I am in the security since 9 years and
> already worked in several internationals compagnies. I am belgium.
>
> Thanks to read this post,
>
> Cheers,
>
> J. Duboscs
> _______________________________________________
>  Full-Disclosure - We believe in it.
>  Charter: http://lists.grok.org.uk/full-disclosure-charter.html
>  Hosted and sponsored by Secunia - http://secunia.com/
>

_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ