Zeitgeist VRA
Quite simply put a powerful indexed "Vulnerability Research Advisory" is something that is lacking in today's software world. Zeigeist VRA bridges the gap by providing a searchable ajax database with vulnerability profiles for software from all across the board.
-
Zeitgeist Hacking Team News
( 0 Articles )
Interested in seeing what's being compromised on a daily basis? Here you go.
-
Remote Exploits
( 1 Article )
A 'remote exploit' works over a network and exploits the security vulnerability without any prior access to the vulnerable system.
-
Local Exploits
( 1 Article )
A 'local exploit' requires prior access to the vulnerable system and usually increases the privileges of the person running the exploit past those granted by the system administrator.
-
Web Applications
( 1 Article )
Content management systems, web scripts and form builders are all examples of "Web Applications".
-
Denial Of Service / POC
( 1 Article )
A denial-of-service attack (DoS attack) or distributed denial-of-service attack (DDoS attack) is an attempt to make a computer resource unavailable to its intended users
-
Shellcode
( 1 Article )
In computer security, a shellcode is a small piece of code used as the payload in the exploitation of a software vulnerability. It is called "shellcode" because it typically starts a command shell from which the attacker can control the compromised machine.
-
Miscellaneous
( 0 Articles )
Generally every type of Vulnerability that doesn't fit into the above categories goes here.
-
Search Engines
( 0 Articles )
Google, Yahoo, Bing, & more. Break into them all.
-
White Papers
( 0 Articles )
Education in scripting keeps you from getting hacked. Check out our white paper collection.