# ---------------------------------------- # Alexa Internet # Competitive Intelligence # Sites Linking In for exploit-db.com # 12/06/2015 (MM/DD/YYYY UTC) # Downloads larger than 10 MB will be truncated # ---------------------------------------- Note: The following table is sorted by popularity of the link Total Sites Linking In: 2194 Site, http://Page URL wikipedia.org, http://en.wikipedia.org:80/wiki/Cracking_of_wireless_networks reddit.com, http://reddit.com:80/r/HowToHack/comments/19dulp/blackarch_linux_arch_linux_for_pen_testers 360.cn, http://bobao.360.cn:80/ctf/learning/115.html stackoverflow.com, http://stackoverflow.com:80/questions/12146128/why-is-cesarftp-python-exploits-not-working naver.com, http://cafe.naver.com:80/sec themeforest.net, http://themeforest.net:80/item/sahifa-responsive-wordpress-magazine-newspaper-theme/2819356/comments?page=252 secureserver.net, http://ip-173-201-142-193.ip.secureserver.net:80/alexa/Alexa_4.html goodreads.com, http://goodreads.com:80/book/show/61630.Google_Hacking_for_Penetration_Testers_Volume_1 stumbleupon.com, http://stumbleupon.com:80/content/2RTJwy r10.net, http://r10.net:80/site-guvenligi-amp-saldirilar/1432232-windows-iis-uzaktan-kod-calistirma-http-sys-nisan-2015-acigi.html gameforge.com, http://board.tera.gameforge.com:80/board2-tera-en/board687-en-forum-archive/203479-is-my-old-account-deleted-for-being-inactive stackexchange.com, http://android.stackexchange.com:80/questions/105841/when-i-search-on-a-music-download-app-why-does-it-not-find-any-songs-and-shows businessinsider.com, http://businessinsider.com:80/term-of-the-day-google-dorking-2014-8 zhihu.com, http://zhihu.com:80/collection/58038829 codecanyon.net, http://codecanyon.net:80/item/crea8social-php-social-networking-platform-v42/9211270/comments?page=29 dmoz.org, http://dmoz.org:80/Computers/Hacking/Exploits sourceforge.net, http://devloop.users.sourceforge.net:80/index.php?archives/2014/04 github.io, http://7h3ram.github.io:80/2012/9/2/shadow-stream-recorder-asx-jmpesp kaskus.co.id, http://archive.kaskus.co.id:80/thread/13451958/0 xda-developers.com, http://forum.xda-developers.com:80/note-4-att/general/galaxy-note-4-root-progress-t2961974/post58340101 globo.com, http://g1.globo.com:80/tecnologia/noticia/2010/08/falha-no-windows-ja-afeta-mais-de-100-programas-e-segue-sem-correcao.html harvard.edu, http://math.harvard.edu:80/~knill/technology psu.edu, http://cs.bd.psu.edu:80/~zux2 umich.edu, http://www-personal.umich.edu:80/~markmont/awp pcmag.com, http://pcmag.com:80/article2/0 2817 2374710 00.asp stanford.edu, http://web.stanford.edu:80/~hyatt4/cgi-bin/serve_file.php?fname=about heise.de, http://heise.de:80/newsticker/meldung/Asus-Router-schutzlos-bei-Angriffen-aus-dem-eigenen-Netz-2515120.html vice.com, http://motherboard.vice.com:80/nl/read/wie-zijn-de-nederlandse-cybermilitairen?trk_source=recommended theregister.co.uk, http://theregister.co.uk:80/2010/08/16/adobe_coldfusion_vuln blogspot.de, http://anonhacknews.blogspot.de:80/2013/12/hackforumsnet-190000-accounts-leaked.html wired.com, http://wired.com:80/2011/03/scada-vulnerabilities bestblackhatforum.com, http://bestblackhatforum.com:80/Thread-Free-SEO-DirectorY-For-Every-One blackhatworld.com, http://blackhatworld.com:80/blackhat-seo/black-hat-seo-tools/677722-get-free-google-scraper.html rackspace.com, http://rackspace.com:80/blog/protect-your-sites-with-rapidly-deployed-waf-rules blogspot.jp, http://ashu-hackingforever.blogspot.jp:80/2013/03/dialog-box-with-positive-and-negative.html umd.edu, http://hyperbolic.cs.umd.edu:80 academia.edu, http://academia.edu:80/5599059/How_to_Buffer_OverFlow_And_Exploiting hatena.ne.jp, http://d.hatena.ne.jp:80/dichika/20150401/p1 nairaland.com, http://nairaland.com:80/785863/whmcompletesolution-cart.php-local-file-disclosure taringa.net, http://taringa.net:80/comunidades/joomla/2784083/Info---Las-50-mejores-extensiones-de-Joomla.html traidnt.net, http://traidnt.net:80/vb/traidnt1661685 arstechnica.com, http://arstechnica.com:80/civis/viewtopic.php?f=2&t=1183788&start=40 somethingawful.com, http://forums.somethingawful.com:80/showthread.php?threadid=3289126&pagenumber=7 howtogeek.com, http://howtogeek.com:80/168831/htg-explains-do-you-need-to-worry-about-desktop-application-updates zoomit.ir, http://zoomit.ir:80/it-news/security/17074-google-reveals-zero-day-mac-exploits macrumors.com, http://forums.macrumors.com:80/threads/mac-google-redirecting-virus.928671/page-4 blogspot.ru, http://defendhackers.blogspot.ru:80/2011/12/hack-passwords-using-istealer.html persiangig.com, http://zhanghui.persiangig.com:80/Alexa-Rank-15000.html scoop.it, http://scoop.it:80/t/strategy-and-information-analysis/p/4039577241/2015/03/20/who-are-the-top-20-influencers-in-big-data-forbes superuser.com, http://superuser.com:80/questions/307968/what-are-these-hex-codes-and-how-can-they-be-decoded-encoded bu.edu, http://algorithmics.bu.edu:80/twiki/bin/view/EC521/SectionA1/LabOneReferenceSolution exblog.jp, http://jehupc.exblog.jp:80/tags/ESET gatech.edu, http://cc.gatech.edu:80/~blee303 ufl.edu, http://cise.ufl.edu:80/~jnw/thehackerplaybookindex springer.com, http://link.springer.com:80/chapter/10.1007/978-3-642-21424-0_12 hatenablog.com, http://inaz2.hatenablog.com:80/entry/2014/03/15/065034 opencart.com, http://forum.opencart.com:80/viewtopic.php?f=161&t=64653 pcworld.com, http://pcworld.com:80/article/2038263/namecom-forces-customers-to-reset-passwords-following-security-breach.html joomla.org, http://forum.joomla.org:80/viewtopic.php?f=615&p=3203303 sapo.pt, http://pplware.sapo.pt:80/apple/ultima-hora-ios7-tem-falha-grave startimes.com, http://startimes.com:80/f.aspx?t=33746851 ubuntu.com, http://irclogs.ubuntu.com:80/2012/01/29/#ubuntu.html digiato.com, http://digiato.com:80/article/2014/07/24/پلاگین-mailpoet-عامل-هک-۵۰-هزار-وبسایت-وردپرس kaspersky.com, http://brazil.kaspersky.com:80/sobre-a-kaspersky/centro-de-imprensa/blog-da-kaspersky/2012/conto-modems-adsl askubuntu.com, http://askubuntu.com:80/users/17275/hank blogspot.tw, http://baesystemsai.blogspot.tw:80/2015/06/new-mac-os-malware-exploits-mackeeper.html zdnet.com, http://zdnet.com:80/article/hypervisors-are-the-pillars-of-the-cloud-not-the-achilles-heel makeuseof.com, http://makeuseof.com:80/answers/recover-password-protecting-zip-file webhostingtalk.ir, http://webhostingtalk.ir:80/showthread.php?t=138832 softpedia.com, http://news.softpedia.com:80/news/Carding-Forum-Exploits-Database-and-Others-Hacked-on-Christmas-Eve-174615.shtml cnblogs.com, http://cnblogs.com:80/by-3ks/p/4062366.html serverfault.com, http://serverfault.com:80/questions/129413/how-can-i-audit-a-linux-filesystem-for-files-which-have-been-changed-or-added-wi k12.va.us, http://waynesboro.k12.va.us:80/kcms blogspot.pe, http://obscuresecurity.blogspot.pe:80/2011/11/old-privilege-escalation-techniques.html slashdot.org, http://it.slashdot.org:80/story/10/07/16/122259/millions-of-home-routers-are-hackable codeproject.com, http://codeproject.com:80/Articles/28909/HTTP-Handler-to-Combine-Multiple-Files-Cache-and-D symantec.com, http://symantec.com:80/connect/forums/pcanywhere-login-and-password-field-buffer-overflow-exploit dummies.com, http://dummies.com:80/how-to/content/wordpress-security-resources.html tistory.com, http://2thet0p.tistory.com:80/104 anandtech.com, http://forums.anandtech.com:80/showthread.php?t=2342487 searchengines.guru, http://searchengines.guru:80/showthread.php?t=622025 plurk.com, http://plurk.com:80/m/p/jcovyz um.ac.ir, http://cert.um.ac.ir:80/wiki/index.php/آسیب_پذیری_ها_رایج_در_تجهیزات_بی‌سیم oschina.net, http://my.oschina.net:80/fgq611/blog/156089 spiceworks.com, http://community.spiceworks.com:80/topic/381343-3com-3870-48-port-switch-limited-lifetime-hardware-warranty techtarget.com, http://whatis.techtarget.com:80/definition/Google-dork-query uky.edu, http://uky.edu:80/ukat/aggregator/sources/3 habrahabr.ru, http://habrahabr.ru:80/company/1cloud/blog/243001 uludagsozluk.com, http://uludagsozluk.com:80/k/exploit-database wpmudev.org, http://premium.wpmudev.org:80/forums/topic/for-those-of-you-who-havent-updated-to-wp-361-yet techrepublic.com, http://techrepublic.com:80/blog/it-security/google-hacking-its-all-about-the-dorks th3professional.com, http://th3professional.com:80/2013/10/how-to-secure-your-wordpress-blog.html readthedocs.org, http://rd.readthedocs.org:80/zh_CN/latest pcadvisor.co.uk, http://pcadvisor.co.uk:80/news/network-wifi/exploit-released-for-vulnerability-targeted-by-linksys-router-worm-3502282 metafilter.com, http://ask.metafilter.com:80/242681/Local-root-exploit-code-for-Ubuntu webhostingtalk.com, http://webhostingtalk.com:80/showthread.php?t=1044007 movistar.es, http://comunidad.movistar.es:80/t5/Soporte-Técnico-Banda-Ancha/Grave-agujero-de-seguridad-en-routers-ADSL-de-Movistar/m-p/465479 wonderhowto.com, http://null-byte.wonderhowto.com:80/forum/easiest-way-hack-wordpress-site-0150862 clubic.com, http://clubic.com:80/application-mobile/actualite-439518-anti-prochaine-application-android-tester-securite-reseau-local.html ubuntuforums.org, http://ubuntuforums.org:80/showthread.php?t=2121604 zamzar.com, http://blog.zamzar.com:80 computerbase.de, http://computerbase.de:80/forum/showthread.php?t=1458061 8ch.net, http://8ch.net:80/hax doctissimo.fr, http://forum.doctissimo.fr:80/psychologie/depression-deprime-stress/pensez-instant-sujet_215209_4012.htm computerworld.com, http://computerworld.com:80/article/2471321/government-it/hacking-to-pwn-a-cop-car.html blogspot.cl, http://samiux.blogspot.cl:80/2013/05/howto-john-ripper-on-ubuntu-desktop.html ashiyane.org, http://ashiyane.org:80/forums/showthread.php?21721-shell-upload-bugs/page3 techtunes.com.bd, http://techtunes.com.bd:80/hacking/tune-id/327056 cplusplus.com, http://cplusplus.com:80/forum/windows/101207 blogspot.com.ng, http://kali4hackers.blogspot.com.ng:80/p/some-important-links.html blogspot.cz, http://samiux.blogspot.cz:80/2013/05/howto-w3af-on-ubuntu-desktop-1204-lts.html rpi.edu, http://security.cs.rpi.edu:80/courses/malware-spring2013 qiita.com, http://qiita.com:80/osada/items/9d776940a9907e041bfc kayako.com, http://forums.kayako.com:80/threads/kayako-v3-70-02-sql-injection.27501 cyberciti.biz, http://cyberciti.biz:80/tips/linux-unix-bsd-documentations.html lofter.com, http://0safe.lofter.com:80/post/2de15b_261e41e blogspot.ch, http://baesystemsai.blogspot.ch:80/2015/06/new-mac-os-malware-exploits-mackeeper.html dev-point.com, http://dev-point.com:80/vb/t110424.html appleinsider.com, http://appleinsider.com:80/articles/14/12/22/apple-releases-critical-security-update-for-os-x-ntp-services-vulnerability uakron.edu, http://uakron.edu:80/security/advisories-warnings/us-cert-bulletins.dot forumcommunity.net, http://geniv.forumcommunity.net:80/?t=54542306 majorgeeks.com, http://majorgeeks.com:80/news/story/dreammail_removed_from_majorgeeks_listings.html trendmicro.com, http://blog.trendmicro.com:80/trendlabs-security-intelligence/multiple-zero-day-poc-exploits-threaten-oracle-mysql-server 51cto.com, http://infosec.blog.51cto.com:80 bitlanders.com, http://bitlanders.com:80/blogs/bagaimana-seharusnya-kita-menggunakan-google/2648549 gofuckbiz.com, http://gofuckbiz.com:80/showthread.php?t=5441&page=1476 blogspot.hk, http://mono-desktopsupport.blogspot.hk:80 blogspot.rs, http://mono-desktopsupport.blogspot.rs:80 sucuri.net, http://blog.sucuri.net:80/2014/09/slider-revolution-plugin-critical-vulnerability-being-exploited.html web.tv, http://wantedhackerpentestsecurityinvasion.web.tv:80/video/shell-php-upload-vulnerability-exploit-fckeditor-html-webtv__mu1ltwhh8vw atmarkit.co.jp, http://atmarkit.co.jp:80/ait/articles/1501/13/news036.html pearltrees.com, http://pearltrees.com:80/u/7687339-google-hacking-database-dorks vbiran.ir, http://vbiran.ir:80/thread1997.html blogspot.kr, http://bs-secretroom.blogspot.kr:80/2013/01/blog-post_30.html blogspot.hu, http://backtracktut.blogspot.hu:80 angelfire.com, http://angelfire.com:80/pa2/Panama2Hot/test.html thewindowsclub.com, http://thewindowsclub.com:80/antivirus-protection-expired-next vtc.vn, http://security.vtc.vn:80/news/search.php?search=exploit-db&tag=true corsair.com, http://forum.corsair.com:80/v3/showthread.php?t=95163 experts-exchange.com, http://experts-exchange.com:80/OS/Microsoft_Operating_Systems/Server/Q_27997983.html whirlpool.net.au, http://forums.whirlpool.net.au:80/archive/2349901 blogspot.dk, http://amolnaik4.blogspot.dk:80/2011/05/csrf-protection-bypass-with-xss-in.html wright.edu, http://cecs.wright.edu:80/~pmateti/InternetSecurity/Lectures/RaceConditions/index.html nabble.com, http://security-basics.996294.n3.nabble.com:80/Exploitable-vulnerabilities-in-Microsoft-IIS-7-0-td22892.html blogspot.fi, http://h2-exploitation.blogspot.fi:80/2013_07_01_archive.html turkhackteam.org, http://turkhackteam.org:80/exploitler/947116-exploit-yazma-hakkinda-tek-turkce-dokuman.html openclassrooms.com, http://openclassrooms.com:80/forum/sujet/proteger-un-repertoire-chmod-777-avec-htaccess-11299 dlink.com, http://securityadvisories.dlink.com:80/security/publication.aspx?name=SAP10012 feedburner.com, http://feeds.feedburner.com:80/HydroStretchProducts infoworld.com, http://infoworld.com:80/article/2608461/security-management/symantec-patches-privilege-escalation-flaws-in-endpoint-protection.html rhcloud.com, http://chris-nullpayload.rhcloud.com:80 ugm.ac.id, http://ferryts.staff.ugm.ac.id:80/index.php/2013/01/19/cms-lokomedia-di-ugm iis.net, http://blogs.iis.net:80/nazim nku.edu, http://faculty.cs.nku.edu:80/~waldenj/security-resources.html c-sharpcorner.com, http://c-sharpcorner.com:80/UploadFile/ajyadav123/the-mechanics-of-metasploit bleepingcomputer.com, http://bleepingcomputer.com:80/forums/t/388856/looking-for-a-virusmalware-threat-map-if-available nist.gov, http://web.nvd.nist.gov:80/view/vuln/detail?vulnId=CVE-2010-4398 ixbt.com, http://forum.ixbt.com:80/print/0014/058922.html linuxquestions.org, http://linuxquestions.org:80/questions/slackware-14/mempodipper-exploited-my-slackware-13-37-a-932288 mybb.com, http://community.mybb.com:80/thread-136703.html blogspot.co.ke, http://maltego.blogspot.co.ke:80/2010_11_01_archive.html blogspot.sk, http://mono-desktopsupport.blogspot.sk:80/2013/06/download-office-2010-professional-plus.html soup.io, http://blackfire.soup.io:80 iranserver.com, http://blog.iranserver.com:80/critical-microsoft-iis-vulnerability-leads-rce-ms15-034 hackaday.com, http://hackaday.com:80/2010/09/26 webempresa.com, http://webempresa.com:80/blog/item/1383-recomendaciones-para-mejorar-la-seguridad-de-tu-tienda-online-virtuemart.html wooyun.org, http://drops.wooyun.org:80 plos.org, http://journals.plos.org:80/plosone/article?id=10.1371/journal.pone.0117180 ucalgary.ca, http://wiki.ucalgary.ca:80/page/Courses/Computer_Science/CPSC_525.F2014/Lecture_Notes blogspot.co.za, http://proactivedefender.blogspot.co.za:80 homeworkmarket.com, http://homeworkmarket.com:80/content/ethical-hacking-2304692-2 ewu.edu, http://access.ewu.edu:80/it/security/resources xpg.uol.com.br, http://qaz52e.xpg.uol.com.br:80/alexa-rank-15000.html fortinet.com, http://docs-legacy.fortinet.com:80/fscan/olh/FortiScan_510_Online_Help/fortiguard.07.1.html xmarks.com, http://share.xmarks.com:80/folder/bookmarks/UzW13yTI6E joomlaforum.ir, http://joomlaforum.ir:80/printthread.php?t=6024&pp=40&page=2 komputerswiat.pl, http://komputerswiat.pl:80/nowosci/bezpieczenstwo/2010/42/uwaga-na-dziure-w-shockwave-player.aspx techrum.vn, http://techrum.vn:80/threads/hanh-trinh-pham-toi-cua-hacker-truong-quy-phap.27845 usna.edu, http://usna.edu:80/CS/si110/lec/l37/lec.html mikrotik.com, http://forum.mikrotik.com:80/viewtopic.php?t=61621 forosdelweb.com, http://forosdelweb.com:80/f64/herramientas-para-seo-827871/index3.html mhhe.com, http://mhhe.com:80/tegrity/node/159.html businessinsider.com.au, http://businessinsider.com.au:80/term-of-the-day-google-dorking-2014-8 chinaunix.net, http://blog.chinaunix.net:80/uid-26349264-id-4455657.html tuicool.com, http://tuicool.com:80/articles/INruqa thehackernews.com, http://thehackernews.com:80/2012/10/scada-hacking-exploit-released-to-hack.html lowendtalk.com, http://lowendtalk.com:80/discussion/14812/recommendations-for-billing-system dobreprogramy.pl, http://dobreprogramy.pl:80/Co-dalej-z-luka-w-ladowaniu-plikow-DLL News 20088.html locaweb.com.br, http://wiki.locaweb.com.br:80/index.php?title=PHP_-_Entendendo_o_PHP_Injection_e_como_se_proteger&oldid=62359 ncl.ac.uk, http://catless.ncl.ac.uk:80/Risks/28.75.html vbulletin.org, http://vbulletin.org:80/forum/showthread.php?s=f66d33624988bdeae2554ed1188b7c97&t=233517&page=4 kali.org, http://tools.kali.org:80/information-gathering/exploitdb gatorcountry.com, http://gatorcountry.com:80/swampgas/threads/risks-digest.315897 blogspot.hr, http://mono-desktopsupport.blogspot.hr:80 upv.es, http://ednolo.alumnos.upv.es:80/?cat=4 ifanr.com, http://ifanr.com:80/news/402175 daynhauhoc.com, http://daynhauhoc.com:80/t/hanh-trinh-pham-toi-cua-hacker-truong-quy-phap/11249 vbulletin.com, http://vbulletin.com:80/forum/forum/vbulletin-3-8/vbulletin-3-8-questions-problems-and-troubleshooting/363170-forum-home-page-is-redirected-hacked-for-google/page3 itcentralstation.com, http://itcentralstation.com:80/product_reviews/incapsula-review-29496-by-gjoko-krstic cyber-warrior.org, http://cyber-warrior.org:80/Forum/display_topic_threads.asp?ForumID=13&TopicID=517778&light=1&ThreadPage=1 uab.cat, http://blogs.uab.cat:80/gmartinez/2011/12/04/google-hacking-database-sitio-web-con-trucos-exploit-vulnerabilidades-y-mas hack-ar.com, http://hack-ar.com:80/cc/showthread.php?p=173008 techmeme.com, http://techmeme.com:80 ru-board.com, http://forum.ru-board.com:80/topic.cgi?forum=31&topic=13230 srad.jp, http://mobile.srad.jp:80/story/10/11/16/1024209 blogspot.lt, http://jumpespjump.blogspot.lt:80 wpde.org, http://forum.wpde.org:80/allgemeines/101287-seite-gehackt-komplette-neuinstallation-und-trotzdem-noch-probleme-uff.html sharif.edu, http://ce.sharif.edu:80/courses/90-91/2/ce874-1/resources/root/TuesdaysSyllabus/TuesdaysSyllabus.html 1stwebdesigner.com, http://1stwebdesigner.com:80/guide-secure-site-web-hackers ithome.com.tw, http://ithelp.ithome.com.tw:80/question/10121501 swalif.net, http://swalif.net:80/softs/swalif54/softs289558 sans.org, http://digital-forensics.sans.org:80/blog/2012/07/26/four-focus-areas-of-malware-analysis twitpic.com, http://twitpic.com:80/photos/AnonymousOwn3r itworld.com, http://itworld.com:80/article/2700261/networking/exploit-released-for-vulnerability-targeted-by-linksys-router-worm.html developpez.net, http://developpez.net:80/forums/d1344339/systemes/linux/securite/faille-kernel-linux cityu.edu.hk, http://wikisites.cityu.edu.hk:80/sites/netcomp/articles/Pages/ExploitationonFirewall.aspx stuffgate.com, http://stuffgate.com:80/stuff/website/top-24000-sites skidrowgames.net, http://skidrowgames.net:80/fifa-13-ultimate-edition-retail-dvd-multi6.html owasp.org, http://lists.owasp.org:80/pipermail/owasp-turkey/2012-June/001540.html onion.link, http://xiwayuybs2l2vdcq.onion.link:80/test/read.cgi/ura/1360054308 krebsonsecurity.com, http://krebsonsecurity.com:80/2010/12 blogspot.com.cy, http://samiux.blogspot.com.cy:80/2014/12/howto-oracle-java-8-on-kali-linux-109a.html korben.info, http://korben.info:80/faille-dans-wordpress-3-0-4-et-pas-de-patch-pour-le-moment.html egloos.com, http://hkpco.egloos.com:80 phoca.cz, http://phoca.cz:80/forum/viewtopic.php?t=10012 bissoy.com, http://ans.bissoy.com:80/141394 virtuemart.net, http://forum.virtuemart.net:80/index.php?topic=66258.0 nidbox.com, http://mini.nidbox.com:80/diary/read/8806880 mitre.org, http://cve.mitre.org:80/compatible/compatible.html unnes.ac.id, http://repo.unnes.ac.id:80/v2/?p=755 flexispy.com, http://blog.flexispy.com:80/popular-wifi-routers-are-susceptible-to-mass-hacking-says-researcher zimbra.com, http://community.zimbra.com:80/collaboration/f/1884/t/1076653 gmane.org, http://blog.gmane.org:80/gmane.comp.apache.mod-security.user/month=20140201 singlehop.com, http://singlehop.com:80/blog/hacking-scada-and-ics-part-2 zive.cz, http://forum.zive.cz:80/viewtopic.php?f=1042&t=1186689 wordfence.com, http://wordfence.com:80/blog/2015/02/0-day-sql-injection-vulnerability-in-wordpress-video-gallery tomsitpro.com, http://tomsitpro.com:80/articles/hacking-no_tech_hacking-low_tech_hacking-google_hacking-security 2-333-2.html groupspaces.com, http://groupspaces.com:80/CyberSecurityOrg/pages/bookmarks-kreali joomlaportal.de, http://joomlaportal.de:80/allgemeine-fragen-zu-joomla-1-5/250184-allowed-memory-size-67108864-bytes-exhausted-2.html onlinehile.org, http://onlinehile.org:80/exploiting/33062-proftpd-1-3-3c-compromised-source-remote-root-trojan.html toronto.edu, http://cs.toronto.edu:80/~sgorbunov/347f13 eetimes.com, http://eetimes.com:80/document.asp?doc_id=1319179 huihoo.com, http://docs.huihoo.com:80/knownsec/Knownsec_RD_Checklist/v2.2.html checkpoint.com, http://checkpoint.com:80/advisories/page/6/index.html 2cto.com, http://2cto.com:80/Article/201111/110676.html antichat.ru, http://forum.antichat.ru:80/threads/217784 polytechnic.edu.na, http://download2.polytechnic.edu.na:80/pub4/sourceforge/g/gh/ghdb3953html/ghdb_1-3953.html mbt3th.us, http://mbt3th.us:80/vb/forum19/thread177989.html tenable.com, http://tenable.com:80/pvs-plugins/8619 uaic.ro, http://profs.info.uaic.ro:80/~busaco/teach/courses/web/web-film.html oscommerce.com, http://forums.oscommerce.com:80/topic/373777-oscommerce-security-osc-secphp/page-3 social-peek.com, http://social-peek.com:80/Keywords/Inurl/80 vnwebmaster.com, http://vnwebmaster.com:80/bao-mat-web-va-phong-chong-ddos/3702-mot-loat-wordpress-plugin-dinh-timthumb-php-vulnerabilites.html ixiacom.com, http://preview.ixiacom.com:80/about-us/news-events/corporate-blog/implementing-newest-jboss-attacks rapid7.com, http://rapid7.com:80/db/modules/auxiliary/admin/http/dlink_dir_300_600_exec_noauth tr-opencart.com, http://tr-opencart.com:80/Konu-opencart-1-5-2-1-multiple-vulnerabilities-tehlikeli-acik%20 onextrapixel.com, http://onextrapixel.com:80/2013/05/30/how-to-identify-wordpress-vulnerabilities dixie.edu, http://cit.dixie.edu:80/it/4500 ubuntu.ir, http://forum.ubuntu.ir:80/index.php/topic 111722.0.html mybbiran.com, http://community.mybbiran.com:80/archive/index.php?thread-13980-2.html linuxidc.com, http://linuxidc.com:80/Linux/2013-10/91650.htm vbulletin.web.tr, http://vbulletin.web.tr:80/showthread.php/5999-Üye-Özel-Basliklari algerieinfo.com, http://algerieinfo.com:80/Linux%20User%20Groups.html techexams.net, http://techexams.net:80/forums/off-topic/51719-best-security-websites.html lowendbox.com, http://lowendbox.com:80/blog/availablevps-12year-128mb-openvz-vps-exclusive-offer solidot.org, http://solidot.org:80/story?sid=43483 root-me.org, http://root-me.org:80/?lang=en ubotstudio.com, http://network.ubotstudio.com:80/forum/index.php?/topic/14617-anyone-know-a-good-place-to-hire-white-hat-hackers alexa.com.hk, http://top.alexa.com.hk:80/Alexa_2.html vanillaforums.org, http://vanillaforums.org:80/discussion/24257/security-vulnerability-in-version-2-0-18-8 aytablog.com, http://techlist.aytablog.com:80 tugraz.at, http://newsarchiv.tugraz.at:80/browse/tu-graz.security.sans/msg00246.html rin.ru, http://cs.rin.ru:80/forum/viewtopic.php?f=10&t=62000&hilit=Far%20Cry%203%20Multiplayer%20Coop%20Fix&start=390 davidicke.com, http://davidicke.com:80/forum/showthread.php?p=1062312138 drupal.ru, http://drupal.ru:80/node/100976 webnamelist.com, http://webnamelist.com:80/ALEXA/Alexa_4.html joomla.fr, http://forum.joomla.fr:80/showthread.php?131468-HELP!-mon-site-piraté(-)-par-components-com_fpss-et-com_remository_files freebuf.com, http://freebuf.com:80/articles/system/24177.html cgsecurity.org, http://cgsecurity.org:80/Articles/sotm30 modx.com, http://forums.modx.com:80/thread/95195/kcfinder-2-51-vulnerability darkreading.com, http://darkreading.com:80/vulnerabilities-and-threats/coldfusion-hacks-point-to-unpatched-systems/d/d-id/1112199? osdir.com, http://osdir.com:80/ml/bugtraq.security/2012-05/msg00008.html unej.ac.id, http://zonelinuxer.web.unej.ac.id:80/category/hacking joomlaforum.ru, http://joomlaforum.ru:80/index.php/topic 178109.60.html gfi.com, http://gfi.com:80/blog/research-web-browser-war-security-battle-in-2011 nuzzel.com, http://nuzzel.com:80/story/04222015/exploit-db/openletters_remote_php_code_injection_vulnerability_exploits ar-wp.com, http://ar-wp.com:80/forums-archive/t2906.html netvouz.com, http://netvouz.com:80/tag/google tripwire.com, http://tripwire.com:80/state-of-security/latest-security-news/oracle-forms-reports-11-1-remote-exploit-code-published x6x.net, http://x6x.net:80/vb/t232693 sa-mp.com, http://forum.sa-mp.com:80/showthread.php?p=1401472 csoonline.com, http://csoonline.com:80/article/2899874/network-security/at-least-700000-routers-given-to-customers-by-isps-are-vulnerable-to-hacking.html prlog.ru, http://prlog.ru:80/analysis/phpshell.in toolbox.com, http://it.toolbox.com:80/blogs/securitymonkey/cool-tools-shadow-daemon-10-waf-65451? osticket.com, http://osticket.com:80/forum/discussion/4898/osticket-1-6-local-file-inclusion prophethacker.com, http://prophethacker.com:80/2014/04/how-to-become-a-hacker-everything-that-the-hacker-know-now-you-know.html thementalclub.com, http://thementalclub.com:80/some-important-hacking-tools-to-become-a-white-hat-hacker-5701 acyba.com, http://acyba.com:80/forum/4-general-talk-about-acymailing/16401-high-security-alert-v-1-7-2-is-there-a-patch-yet.html trendmicro.co.jp, http://blog.trendmicro.co.jp:80/archives/6399 inforge.net, http://inforge.net:80/xi/threads/apache-php-5-x-remote-code-execution-exploit.369553 websense.com, http://community.websense.com:80/blogs/securitylabs/archive/2012/01/30/3_2D00_2_2D00_1-wordpress-vulnerability-leads-to-possible-new-exploit-kit.aspx certcollection.org, http://certcollection.org:80/forum/topic/51094-linux-root-exploit acunetix.com, http://acunetix.com:80/blog/articles/html-form-found-in-redirect-page linux.org.ru, http://linux.org.ru:80/forum/talks/7312039 muycomputer.com, http://muycomputer.com:80/2015/03/20/700-000-routers-adsl-isp-vulnerables theiet.org, http://eandt.theiet.org:80/magazine/2012/03/hacking-on-the-hoof.cfm?origin=EtOtherStories adslgr.com, http://adslgr.com:80/forum/threads/861117-Ρούτερ-ZXHN-H108L-Ένα-μεγάλο-μπράβο-στην-Forthnet lwn.net, http://lwn.net:80/Articles/474243 wap.sh, http://isvo.wap.sh:80/mucphu/ok.php aljyyosh.com, http://aljyyosh.com:80/vb/showthread.php?t=10699 ryukoku.ac.jp, http://st.ryukoku.ac.jp:80/~kjm/security/memo/2010/04.html binarytides.com, http://binarytides.com:80/google-hacking-tutorial metareddit.com, http://metareddit.com:80/r/HowToHack elhacker.net, http://foro.elhacker.net:80/bugs_y_exploits/alguien_sabe_que_ha_pasado_con_milworm-t303656.0.html mibbit.com, http://search.mibbit.com:80/networks/DALnet/#Securityfocus opennet.ru, http://opennet.ru:80/opennews/art.shtml?num=28338 linux.cn, http://linux.cn:80/article-5132-1-rel.html blogmarks.net, http://blogmarks.net:80/marks/tag/database cyberoam.com, http://cyberoam.com:80/blog eremedia.com, http://eremedia.com:80/sourcecon/sourcecon-nyc-sourcing-from-multipl-viewpoints vivaolinux.com.br, http://vivaolinux.com.br:80/script/SearchSploit-GTK-Interface-grafica-simples-para-o-searchsploit-Kali-Linux iranled.com, http://iranled.com:80/forum/thread-28450-post-234675.html#pid234675 askto.net, http://askto.net:80/601582 drupalcms.ir, http://drupalcms.ir:80/forum/سوالاتی-در-مورد-دروپال-0 listofdomains.org, http://listofdomains.org:80/ALEXA/Alexa_4.html imperva.com, http://blog.imperva.com:80/2013/11/threat-advisory-a-jboss-as-exploit-web-shell-code-injection.html vbpro.ir, http://vbpro.ir:80/f4/تامین-امنیت-سایت-و-سرور-توسط-تیم-امنیتی-دنجر-12553.html hackthissite.org, http://hackthissite.org:80/forums/viewtopic.php?f=37&t=8893 webcindario.com, http://androide400.webcindario.com:80/bibliotecacopyleft.html hacoder.com, http://hacoder.com:80/2015/07/80-best-free-hacking-tutorials-resources-to-become-pro-hacker cresttal.com, http://cresttal.com:80/alexa/Alexa_2.html linux.org, http://linux.org:80/threads/linux-security-issue-protect-against-post-cgi-bin-php-attacks.5577 pub.ro, http://ocw.cs.pub.ro:80/courses/cns/labs/lab-05 blogbus.com, http://riusksk.blogbus.com:80/c2246328 arhivach.org, http://arhivach.org:80/thread/13945 computerwissen.de, http://computerwissen.de:80/it-sicherheit/it-risiken/artikel/neue-vlc-schwachstelle-abc-dateien-ermoeglichen-angriff-auf-ihren-rechner.html urlvoid.com, http://blog.urlvoid.com:80/43/prevent-sql-injection-attacks-in-wordpress-plugins iranphp.org, http://forum.iranphp.org:80/Thread-انواع-حمله-های-نفوذ-و-سوءاستفاده-از-صفحات-وب?page=3 hackingforum.ru, http://hackingforum.ru:80/Thread-LIST-OF-SQL-VULNERABLE-WEBSITES--49778 exsees.com, http://newscentral.exsees.com:80/item/ae1801e39373156354d4e75dff06b4d4-d47339c8a47cb10f88252372afb9dd44 digitalmunition.me, http://digitalmunition.me:80/2015/03/seagate-nas-zero-day-vulnerability-allows-unauthorized-root-access-remotely quup.com, http://quup.com:80/ryuzaki? perimeterusa.com, http://blog.perimeterusa.com:80/category/blog-post psu.ac.th, http://sysadmin.psu.ac.th:80/2013/12/13/hacking-website-detection-05 compsmag.com, http://compsmag.com:80/kali-linux-review root.vn, http://root.vn:80/threads/sqli-scanner-online-–-quet-loi-sqlinjection-online.2763 axe-net.fr, http://blog.axe-net.fr:80/we-help-you-do-stuff-les-lasagnes-a-la-sauce-google-aussi tunerpage.com, http://tunerpage.com:80/archives/9367 cvedetails.com, http://cvedetails.com:80 pixelstech.net, http://pixelstech.net:80/article/1334166417-PHP:-a-fractal-of-bad-design yourcolor.net, http://wordpress.yourcolor.net:80/15-اضافة-مصابة-بثغرات-امنية-خطيرة-في-الو fromdev.com, http://fromdev.com:80/2013/07/Hacking-Tutorials.html c-point.com, http://c-point.com:80/best-wordpress-forum-plugins securityxploded.com, http://securityxploded.com:80/remote-buffer-overflow-exploits.php qmusica.info, http://qmusica.info:80/1E-1_YKkuZA/sagem-fast-3304-v2-authentication-bypass nic.cz, http://blog.nic.cz:80/2012/11 poly.edu, http://blog.isis.poly.edu:80/exploitation%20mitigation%20techniques/exploitation%20techniques/2011/06/02/relro-relocation-read-only.html hosting101.ru, http://hosting101.ru:80/xlserver.org learningtree.com, http://blog.learningtree.com:80/google-fu-and-security-be-careful-what-you-search-for webstats7.net, http://webstats7.net:80/alexa/Alexa_3.html tuxfamily.org, http://flatland.tuxfamily.org:80/shellcodes.php unmaskparasites.com, http://blog.unmaskparasites.com:80/2015/04/01/fancybox-for-wordpress-has-expired-infection list-of-domains.org, http://list-of-domains.org:80/alexa/Alexa_4.html soft4fun.net, http://soft4fun.net:80/tech/information-security/3rd-party-software-security-issues.htm cheatography.com, http://cheatography.com:80/fred/cheat-sheets/passive-recon redeszone.net, http://redeszone.net:80/2015/03/18/la-plataforma-de-aprendizaje-moodle-vulnerable-inyecciones-de-codigo szm.com, http://qaz52e.szm.com:80/Alexa-Rank-15000.html welivesecurity.com, http://welivesecurity.com:80/2014/08/28/google-dorks myhack58.com, http://myhack58.com:80/Article/html/3/62/2011/31220_2.htm startalkradio.net, http://startalkradio.net:80/show/a-conversation-with-edward-snowden-part-1 backtrack-linux.org, http://backtrack-linux.org:80/2010/12 digi.no, http://digi.no:80/sikkerhet/2012/10/03/masseangrep-mot-rutere hacking-tutorial.com, http://hacking-tutorial.com:80/hacking-news/exploit-db-error-503-service-unavailable fortiguard.com, http://fortiguard.com:80/report/NewVulnCoverage-20100118 cylance.com, http://blog.cylance.com:80/authentic-issues-the-rise-of-no-ware niebezpiecznik.pl, http://niebezpiecznik.pl:80/post/exploit-na-grepa joomla.de, http://forum.joomla.de:80/index.php/Thread/243-Schadcode-eingeschleust-in-com-sexycontact borncity.com, http://borncity.com:80/blog/2015/02/21/zero-day-sql-sicherheitslcke-in-wordpress-video-galerie elektrikport.com, http://elektrikport.com:80/haber-roportaj/acik-kaynak-siber-istihbarat-aglari/10111 moph.go.th, http://mkho.moph.go.th:80/mko/remote/private/beach/wso.php efytimes.com, http://efytimes.com:80/e1/fullnews.asp?edid=130705 itvnn.net, http://itvnn.net:80/showthread.php?35495-Một-loạt-Wordpress-Plugin-dính-timthumb-php-Vulnerabilites linuxfr.org, http://linuxfr.org:80/users/yellowiscool/journaux/prestashop-communique-beaucoup-à-la-maison troyhunt.com, http://troyhunt.com:80/2013/05/hack-yourself-first-how-to-go-on.html silicon.fr, http://silicon.fr:80/ver-informatique-cible-routeurs-linksys-92787.html linuxac.org, http://linuxac.org:80/forum/content/1693-مدخل-الى-معالجات-arm?1693-مدخل-الى-معالجات-arm= securityweek.com, http://securityweek.com:80/researchers-disarm-microsofts-emet websetnet.com, http://websetnet.com:80/tr/heart-bleed-bug-openssl version2.dk, http://version2.dk:80/artikel/ung-it-kriminel-slipper-med-straf-fra-mor-44223 flickspoint.com, http://flickspoint.com:80/top/web-directories-sites-3288.html topalternate.com, http://topalternate.com:80/rafayhackingarticles.net yooco.org, http://hackingencrypted.yooco.org:80/databases_and_resources jonn22.com, http://edu.jonn22.com:80/forum/showthread.php?s=9c7518bf91e1ac5f862aa2016f0024d5&p=185988 seclists.org, http://seclists.org:80/basics/2012/Jun/48 sekurak.pl, http://sekurak.pl:80/apache mahdportal.ir, http://social.mahdportal.ir:80/sfiles/image/firstpage_3.php tangscan.com, http://tangscan.com:80/plugin/15722 linksysinfo.org, http://linksysinfo.org:80/index.php?threads/toastman-mips-and-arm-releases.36106/page-25 viruslist.com, http://viruslist.com:80/fr/analysis?pubid=200676295 hacksvilla.com, http://hacksvilla.com:80/official-kali-linux-download-kali-linux-tutorials strims.pl, http://strims.pl:80/s/Security/szukaj?szukaj=etykieta:EXPLOIT&strim=1 sectools.org, http://sectools.org:80/?page=2 pchelplinebd.com, http://pchelplinebd.com:80/হ্যাকিং/অধ্যায়-২-হ্যাকার-কারা-হ্য wmasteru.org, http://wmasteru.org:80/threads/Взломали-joomla-вирус-на-сайте.2174/page-5 diskusjon.no, http://diskusjon.no:80/index.php?showtopic=1553256&page=5 snort.org, http://vrt-blog.snort.org:80/2009_12_01_archive.html it-connect.fr, http://it-connect.fr:80/lamp-security-5-solution-et-explications sec4ever.com, http://sec4ever.com:80/home/printthread.php?t=16005 dsl.sk, http://dsl.sk:80/article.php?article=15234 cisecurity.org, http://msisac.cisecurity.org:80/advisories/2015/2015-042-2.cfm mudraa.com, http://mudraa.com:80/trading/155776/0/heads-tails-of-nifty.html elastix.org, http://elastix.org:80/index.php/es/descargas/63-downloadsec/downloadcat.html ajanlar.org, http://ajanlar.org:80/konu-18-turk-liseli-ifsa-arsiv-part-2.zz?page=2 ispreview.co.uk, http://ispreview.co.uk:80/index.php/2015/03/masses-of-broadband-routers-still-vulnerable-to-directory-traversal-hack.html onemorething.nl, http://onemorething.nl:80/shows/hoe-veilig-ben-je-nog-op-een-mac mratwork.com, http://forum.mratwork.com:80/kloxo-mr-releases-and-announcements/(info)-kloxo-mr-6-5-0-csrf-vulnerability-really root.cz, http://root.cz:80/clanky/postrehy-z-bezpecnosti-hacktivista-zverejnil-data-kyberspionazni-spolecnosti seeoux.com, http://blog.seeoux.com:80/problema-sicurezza-slider-revolution the-globe.com, http://the-globe.com:80/the_worlds_most_visited_web_pages_25.html windowsecurity.com, http://windowsecurity.com:80/articles-tutorials/windows_os_security/Analyzing-DLL-Hijacking-Attacks.html telkomspeedy.com, http://opensource.telkomspeedy.com:80/wiki/index.php/Teknik_Hacking wibki.com, http://wibki.com:80/juancrui spinics.net, http://spinics.net:80/lists/security/msg02773.html inploid.com, http://inploid.com:80/ibrahimbalic blogger.de, http://securityxploit.blogger.de:80 cert.org, http://kb.cert.org:80/vuls/id/124059 malekal.com, http://malekal.com:80/2015/04/08/fr-exemple-piratage-hack-wordpress vulgumtechus.com, http://vulgumtechus.com:80/Bases_de_données_en_ligne wardom.org, http://wardom.org:80/exploit-linkleri-387066 hackblog.net, http://hackblog.net:80 dominiok.it, http://dominiok.it:80/faq/n-157.php shabakeh.net, http://blog.shabakeh.net:80/12251/نقطه-ضعف-جدید-در-yahoo-میلیونها-کاربر-را-تهد.html comefromchina.com, http://bbs.comefromchina.com:80/threads/1336049/page-4 indonesianbacktrack.or.id, http://indonesianbacktrack.or.id:80/forum/newreply.php?tid=5144 rootzwiki.com, http://rootzwiki.com:80/topic/20911-629-root-exploit-development/page-5 cio.com.au, http://cio.com.au:80/article/532153/hackers_actively_exploiting_jboss_vulnerability_compromise_servers_researchers_say fwasl.com, http://wp.fwasl.com:80/شرح-متكامل-لحمايه-مدونات-ووردبريس-من-ا elladodelmal.com, http://elladodelmal.com:80/2011/11/el-parche-del-bug-de-reverse-proxy-en.html arabhosters.com, http://blog.arabhosters.com:80/أفضل-8-مواقع-للهاكرز mandiant.com, http://mandiant.com:80/blog/dll-search-order-hijacking-revisited cyut.edu.tw, http://dywang.csie.cyut.edu.tw:80/moodle23/dywang/security my3gb.com, http://cybershakti.my3gb.com:80/Porting_Exploits.htm irongeek.com, http://irongeek.com:80/i.php?page=oldnews tomatocart.com, http://tomatocart.com:80/community/22-security-issues/15532-pdfphp-post-auth-local-file-inclusion-vulnerability.html crunchbang.org, http://crunchbang.org:80/forums/viewtopic.php?id=24722 esecurityplanet.com, http://esecurityplanet.com:80/browser-security/how-to-prevent-remote-file-inclusion-rfi-attacks.html proxy-base.com, http://proxy-base.com:80/f94/pomogite_vzlom_wordpress_3_0_1_znaya_put_k_phpmyadmin-20781.html hackersome.com, http://hackersome.com:80/p/rolinston/awesome-pentest longwin.com.tw, http://blog.longwin.com.tw:80/2014/09/cve-2014-6271-bash-remote-code-execution-2014 openwall.com, http://openwall.com:80/lists/oss-security/2012/03/06/11 netz-gaenger.de, http://cdn.netz-gaenger.de:80/blog/wordpress-tutorials/wordpress-konfigurieren-fuer-mehr-sicherheit securityintelligence.com, http://securityintelligence.com:80/how-to-stay-up-to-date-on-security-trends softpanorama.org, http://softpanorama.org:80/Scripting/php.shtml beyondtrust.com, http://beyondtrust.com:80/Partners/TechnologyPartners bisakomputer.com, http://bisakomputer.com:80/4-plugin-wordpress-yang-tidak-aman forensicswiki.org, http://forensicswiki.org:80/index.php?title=Apple_iPhone&oldid=14879 theglobe.org, http://theglobe.org:80/the_worlds_most_visited_web_pages_25.html darknet.org.uk, http://darknet.org.uk:80 maydany.com, http://maydany.com:80/t~7146 liqi.io, http://liqi.io:80/yuxian nas-forum.com, http://nas-forum.com:80/forum/topic/39499-processus-a-100-et-dhcppid frompo.com, http://holiday.frompo.com:80/h/ok%20logout%20inurl%20vb.htm%20logout%201 codientu.org, http://codientu.org:80/threads/10608 iss.net, http://iss.net:80/security_center/reference/2108222.html funinformatique.com, http://funinformatique.com:80/dpscan-le-scanner-de-securite-drupal binushacker.net, http://binushacker.net:80/deface-website.html kittentoob.com, http://kittentoob.com:80/wp-content/uploads/sites/3/_wp_cache.php portaldohost.com.br, http://portaldohost.com.br:80/forum/topic/7335-tutorial-completo-segurança-de-seu-dedicadovps sebsauvage.net, http://sebsauvage.net:80/rhaa/index.php?q=aucun solojoomla.com, http://solojoomla.com:80/foro/20-joomla-en-general/20019-mi-pagina-demora-en-cargar-posibles-problemas sources.ru, http://forum.sources.ru:80/index.php?showtopic=386220 iransec.net, http://iransec.net:80/forums/index.php?/topic/1763-bypass-admin-page-and-deface devilzc0de.org, http://devilzc0de.org:80/forum/printthread.php?tid=10283 quickiwiki.com, http://quickiwiki.com:80/en/Clickjacking itshqip.com, http://forum.itshqip.com:80/members/bi0.196 isecur1ty.org, http://isecur1ty.org:80/0day-في-سكريبت-جملة-و-ووردبريس-من-نوع-dos iranhack.org, http://forum.iranhack.org:80/archive/index.php/thread-2314.html securitytube.net, http://securitytube.net:80/bookmarks/root/web-application-security/attacks/cross-site-scripting ceh.vn, http://data.ceh.vn:80/Metasploit/Analyzing_the_Exploit.html jvn.jp, http://jvn.jp:80/tr/JVNTR-2010-23/index.html trendmicro.de, http://blog.trendmicro.de:80/mehrfache-zero-day-angriffe-bedrohen-oracle-mysql-server v4-team.com, http://v4-team.com:80/cc/showthread.php?t=51164 onion.nu, http://54ogum7gwxhtgiya.onion.nu:80/blog/index.php/catalog v80.me, http://news.v80.me:80/page/list-of-worlds-top-domains-3 eljadida24.com, http://eljadida24.com:80/8879/admin/editor/lang/bernay.php uzusionet.com, http://oono.uzusionet.com:80/iku/link/entry26.html certcc.ir, http://certcc.ir:80/index.php?module=cdk&func=loadmodule&system=cdk&sismodule=user/content_view.php&cnt_id=3840&ctp_id=104&id=2081&sisOp=view kalitutorials.net, http://kalitutorials.net:80/2014/06/add-new-exploits-to-metasploit-from.html kitploit.com, http://kitploit.com:80/2013/03/joomlascan-v15-scanner-para-encontrar.html attivissimo.blogspot.it, http://attivissimo.blogspot.it:80/2013/07/polizia-blocca-il-computer-truffa.html admin-magazine.com, http://admin-magazine.com:80/Articles/Security-data-analytics-and-visualization-with-R/(offset)/3 pagerankresearch.com, http://pagerankresearch.com:80/alexaDev/Alexa_List_3.html haproxy.com, http://blog.haproxy.com:80/2012/11/13/exchange-outlook-web-access-owa-cross-site-request-forgery-csrf-protection trafficnymphomaniac.com, http://trafficnymphomaniac.com:80/blog-comments-plugins-that-will-increase-participation-and-control-spam asis.io, http://news.asis.io:80/content/انتشار-نسخه‌ی-323-جوملا-و-رفع-آسیب‌پذیری‌ِ-تزریق-sql datapool.vn, http://datapool.vn:80/khuyen-cao-cac-ma-nguon-khong-nen-su-dung.html webimho.ru, http://wiki.webimho.ru:80/joomila blackbap.org, http://bbs.blackbap.org:80/thread-6135-1-1.html moal.ir, http://moal.ir:80/lib/1393/06 burakavci.com.tr, http://burakavci.com.tr:80/2014/01/sql-injection-login-bypass.html infosecisland.com, http://infosecisland.com:80/blogview/21381-Guessable-Passwords-The-Unpatchable-Exploit.html mycroftproject.com, http://mycroftproject.com:80/search-engines.html?category=29 brandigg.info, http://brandigg.info:80/brand/ACTIVE-FAX linuxeden.com, http://linuxeden.com:80/html/news/20131020/144764.html exo.do, http://exo.do:80/user/seginbur ppfinder.com, http://ppfinder.com:80/tools/timthumbphp garage4hackers.com, http://answers.garage4hackers.com:80/39/can-anyone-suggest-me-some-links-for-mobile-security coverity.com, http://security.coverity.com:80/blog.html lemagit.fr, http://lemagit.fr:80/actualites/2240189431/Special-securite-savez-vous-planter-les-trous-a-la-mode-a-la-mode bluereader.org, http://bluereader.org:80/article/106747 univ-mlv.fr, http://www-igm.univ-mlv.fr:80/~dr/XPOSE2013/reverse_engineering/synthesis.html cloudpassage.com, http://blog.cloudpassage.com:80/2013/10/31/cve-2012-1823-apache-php5-x-remote-code-execution-exploit open-emr.org, http://open-emr.org:80/wiki/index.php/Security_Alert_Fixes fullsecurity.org, http://ask.fullsecurity.org:80/index.php/272/باگ-وردپرس-۳-۷-۱ zaufanatrzeciastrona.pl, http://zaufanatrzeciastrona.pl:80/post/2012/05 cyberwarzone.com, http://cyberwarzone.com:80/world-warcraft-vulnerable-dos-via-macros-cache-txt-stack-overflow idetarah.ir, http://idetarah.ir:80/blogs/protect-from-sql-injection trafficip.com, http://trafficip.com:80/stuff/website/top-24000-sites zataz.com, http://eromang.zataz.com:80/2010/05/19/joomla-wgpicasa-component-local-file-inclusion-is-in-the-hype xcode.or.id, http://xcode.or.id:80/go.html okbase.net, http://doc.okbase.net:80/LittleHann/archive/54666.html pagerank.co.in, http://pagerank.co.in:80/alexa_5.html moemesto.ru, http://moemesto.ru:80/Antonio24/file/14715098/1.php black-hg.org, http://black-hg.org:80/cc/thread4682.html rus-linux.net, http://rus-linux.net:80/nlib.php?name=/MyLDP/sec/IDS/Hacking-Linux-with-Armitage.html opx.pl, http://yhuqur.opx.pl:80/start-using-cgi-proxy-url-below.php bilgiguvenligi.gov.tr, http://bilgiguvenligi.gov.tr:80/kritik-acikliklar/bash-uzaktan-kod-calistirma-acikligi-cve-2014-6271.html thefempire.org, http://thefempire.org:80/user/gracana idc-team.net, http://idc-team.net:80/cc/showthread.php?t=1254 undernews.fr, http://undernews.fr:80/alertes-securite/des-milliers-de-blogs-wordpress-vulnerables-a-cause-dun-outil-dedie-aux-images-0-day.html antoniogonzalezm.es, http://antoniogonzalezm.es:80/google-hacking-46-ejemplos-hacker-contrasenas-usando-google-enemigo-peor netsecurity.ne.jp, http://scan.netsecurity.ne.jp:80/article/2013/12/04/33079.html securehost.ir, http://blog.securehost.ir:80/vuln-slider-revolution envato.link, http://envato.link:80/cc/item/phpsfp-schedule-facebook-posts/5177393/comments?page=83 colorslab.net, http://colorslab.net:80/2013/12/14/قائمة-تحقق-لتحصين-موقعك-ضد-الإختراق pageranker.us, http://pageranker.us:80/majestic/majestic_list_244.html whitefirdesign.com, http://whitefirdesign.com:80/blog siph0n.in, http://siph0n.in:80/links.php abwebnagpur.in, http://abwebnagpur.in:80/alexa-top-1-million-sites-2 bukulokomedia.com, http://bukulokomedia.com:80/artikel-119-update-cms-lokomedia-15.html aahana.co.in, http://aahana.co.in:80/domain-list-25 lifars.com, http://blog.lifars.com:80/2015/01/09/popular-asus-routers-can-easily-be-hacked jeromeweb.net, http://jeromeweb.net:80/securite-2/2376-exploit-db-com-base-de-donness-d-exploits-et-de-vulnerabilites lumension.com, http://leic.lumension.com:80/vulnerabilities/2013/CVE-2013-3956.html psdevwiki.com, http://psdevwiki.com:80/ps3/Bugs_&_Vulnerabilities hackplayers.com, http://hackplayers.com:80/2010/08/dll-hijacking.html winpenpack.com, http://winpenpack.com:80/en/download.php?view.495 hacker9.com, http://hacker9.com:80/best-hacking-websites-list.html e-siber.com, http://e-siber.com:80/guvenlik/google-hacking-hic-bu-kadar-kolay-olmamisti opencartaz.com, http://opencartaz.com:80/opencart/opencart-152-exploits.html vbspiders.com, http://vbspiders.com:80 jpcert.or.jp, http://vrda.jpcert.or.jp:80/feed/en/NISTNVD_CVE-2010-5056_AD_1.html sdf.org, http://decal.sdf.org:80/hack.html lissyara.su, http://forum.lissyara.su:80/viewtopic.php?t=22252 kv.by, http://kv.by:80/content/325057-prosto-o-vzlome-saitov pev.pl, http://inyfymod.pev.pl:80/intitleindexofmysql_history.html spambotsecurity.com, http://spambotsecurity.com:80/forum/viewtopic.php?f=43&t=2241 tipstune24.com, http://tipstune24.com:80/hacking-tricks/tune-id/9961 bga.com.tr, http://blog.bga.com.tr:80/2012/05/pentest-calsmalarnda-sosyal-muhendislik.html gaza-hacker.net, http://gaza-hacker.net:80/cc/showthread-s_71113aaa15223ac6e8ca87fa9870ec05-t_28460.html cso.com.au, http://cso.com.au:80/article/570884/least-700-000-routers-given-customers-by-isps-vulnerable-hacking abclinuxu.cz, http://abclinuxu.cz:80/zpravicky/dos-zranitelnost-weboveho-serveru-apache/diskuse locaweb.com, http://wiki.locaweb.com:80/pt-br/PHP_-_Entendendo_o_PHP_Injection_e_como_se_proteger surfsession.com, http://surfsession.com:80/annuaire revisium.com, http://revisium.com:80/ru/blog/AI-BOLIT-2.html websecurify.com, http://blog.websecurify.com:80/2014/09/landing-wpscanner.html clean-mx.com, http://lists.clean-mx.com:80/pipermail/viruswatch/20091130/012216.html top.ind.in, http://top.ind.in:80/domain-list-25 security-insider.de, http://security-insider.de:80/themenbereiche/bedrohungen/sicherheitsluecken/articles/312525 lb-h.com, http://lb-h.com:80/vb/showthread.php?t=18567 z0n.ir, http://z0n.ir:80/server/deface/312 ehackingnews.com, http://ehackingnews.com:80/search/label/Exploits id-joomla.com, http://id-joomla.com:80/forum/11-instalasi-bugs-error-dll/154990-cara-mudah-mengatasi-hack-dan-infeksi?start=6 unknownerror.org, http://unknownerror.org:80/opensource/rapid7/metasploit-framework/q/stackoverflow/28213745/ie-8-crashes-when-exploited-using-metasploit-framework cobaltstrike.com, http://blog.cobaltstrike.com:80/2012/11/09/using-av-safe-executables-with-cortana extremehacking.org, http://blog.extremehacking.org:80/blog/2015/06/30/metasploit-using-the-egghunter-mixin saetechnologies.com, http://saetechnologies.com:80/error-based-sql-injection-example knownsec.com, http://blog.knownsec.com:80/2015/03/mongodb-management-programm-phpmoadmin-remote-code-execution-leak-analysis kali-linux.fr, http://kali-linux.fr:80/forum/index.php?topic=1074.0 rumyittips.com, http://rumyittips.com:80/some-useful-websites-for-hacking ptsecurity.com, http://blog.ptsecurity.com:80/2011_08_01_archive.html htw.pl, http://ryjanet.htw.pl:80/intitle-index-of-google-hack.php xssed.com, http://xssed.com:80/article/31/The_Beginners_Guide_to_XSS moffed.com, http://moffed.com:80/community/viewtopic.php?f=37&t=4747&start=0 sysmagazine.com, http://sysmagazine.com:80/posts/125338 computersecuritystudent.com, http://computersecuritystudent.com:80/SECURITY_TOOLS/METASPLOITABLE/EXPLOIT/lesson2 solutionary.com, http://solutionary.com:80/resource-center/blog/2014/09/open-source-intelligence 91ri.org, http://91ri.org:80/6715.html talosintel.com, http://blog.talosintel.com:80/2009_12_01_archive.html playsms.org, http://playsms.org:80/2011/09 lcx.cc, http://lcx.cc:80/?i=4082 pcfreunde.de, http://pcfreunde.de:80/artikel/a627/h4ckb3rts-blog-hacker-hacken-hacker sec-wiki.com, http://sec-wiki.com:80/news/1614 alekhteraq.com, http://alekhteraq.com:80/2014/09/06/ثغرة-خطيرة-في-احدى-اضافات-ورد-برس،-واله sssslide.com, http://sssslide.com:80/speakerdeck.com/co3k/gong-kai-ban osvdb.org, http://blog.osvdb.org:80/2009/12 keep.pl, http://mepoqakymiv.keep.pl:80/intranet-advanced-guestbook-231.php iq-team.org, http://iq-team.org:80/vb/t22684.html rohitab.com, http://rohitab.com:80/discuss/topic/40042-program-startup-as-administrator maxindo.net.id, http://support.maxindo.net.id:80 linux.or.id, http://balikpapan.linux.or.id:80/2011/08 blast.hk, http://blast.hk:80/threads/6306 eev.ee, http://eev.ee:80/blog/2012/04/09/php-a-fractal-of-bad-design newsgeneration.co.in, http://newsgeneration.co.in:80/world.php social-engineer.org, http://social-engineer.org:80/podcast/episode-011-extreme-social-engineering-defying-human-nature secpulse.com, http://secpulse.com:80/archives/2664.html siph0n.net, http://siph0n.net:80/links.php eflo.net, http://eflo.net:80/VICIDIALforum/viewtopic.php?f=2&t=30586 governmentsecurity.org, http://governmentsecurity.org:80/forum/topic/32608-shell-code-in-image-files modx.im, http://modx.im:80/blog/questions/2483.html postubo.com, http://postubo.com:80/foro/t/informatica/administracion-web/ayuda-con-dominio-infectado sanmarcosrecord.com, http://sanmarcosrecord.com:80/san-marcos-record techtarget.in, http://searchsecurity.techtarget.in:80/photostory/2240160118/Nine-must-have-OSINT-tools/5/4-GHDB kmitl.ac.th, http://webserv.kmitl.ac.th:80/bushido/book/CEH%20Certified%20Ethical%20Hacker%20All-in-One%20Exam%20Guide.html leblogduhacker.fr, http://leblogduhacker.fr:80/google-hacking techeconomy.it, http://techeconomy.it:80/2014/05/20/in-modo-hacker-puo-utilizzare-motore-ricerca-come-google dragonjar.org, http://comunidad.dragonjar.org:80/f155/problemas-con-las-dll-en-el-exploit-13856 monobook.org, http://monobook.org:80/w/index.php?title=Tor秘匿サービス&mobileaction=toggle_view_mobile securitybydefault.com, http://securitybydefault.com:80/2010_06_01_archive.html aide-joomla.com, http://aide-joomla.com:80/actualites/securite-joomla/586-xmap-vulnerable aqua-weeb.com, http://aqua-weeb.com:80/2015/08/Best-30-source-to-be-a-pro-hacker.html behindthefirewalls.com, http://behindthefirewalls.com:80/2013/04/hakcking-with-default-credentials-and.html debian-fr.org, http://debian-fr.org:80/comment-bien-faire-ses-recherches-google-t32898.html fortinet.co.jp, http://fortinet.co.jp:80/security_blog/201103.html freebloggingtricks.com, http://freebloggingtricks.com:80/wp-easy-slideshow underc0de.org, http://blog.underc0de.org:80/2015_01_01_archive.html picateshackz.com, http://picateshackz.com:80 boiteaweb.fr, http://boiteaweb.fr:80/ma-liste-sites-7727.html coyotus.com, http://coyotus.com:80/viewtopic.php?id=376 samsclass.info, http://samsclass.info:80/121/121_S15.shtml d3ng3.org, http://d3ng3.org:80/php-scriptlerde-sqli-tespiti-ve-exploit-etme mr-tricks.blogspot.in, http://mr-tricks.blogspot.in:80/2015/04/best-hacking-websites-for-hackers-to.html security4arabs.com, http://security4arabs.com:80/2015/04/03/how-to-start-in-webapps-security bromium.com, http://blogs.bromium.com:80/page/8/?app-download=ios w2d-siquando.de, http://forum.w2d-siquando.de:80/Forum/OffTopic_Diverses/Erledigt_PHP7-946 zugaina.org, http://gpo.zugaina.org:80/app-exploits/exploitdb lowyinterpreter.org, http://lowyinterpreter.org:80/author/Philippa%20Nicole%20Barr.aspx segu-info.com.ar, http://blog.segu-info.com.ar:80/2012/03/exploit-publico-para-ms12-020-parchea.html securityweekly.com, http://securityweekly.com:80/2010/09/21/web-application-penetration-te spamloco.net, http://spamloco.net:80/2011/12/google-hacking-buscando-cosas-prohibidas-y-secretas-en-la-red.html h-online.com, http://h-online.com:80/security/news/item/Back-door-exploit-for-Android-phones-1131858.html linhadefensiva.org, http://linhadefensiva.org:80/2012/03/criminosos-alteram-dns-de-modems-usando-falha-para-realizar-fraudes openipcam.com, http://openipcam.com:80/forum/index.php?topic=534.0 antichat.net, http://forum.antichat.net:80/threads/235697 s-a7lm.com, http://s-a7lm.com:80/vb/showthread.php?t=31774 tw.ma, http://vegeta.tw.ma:80/blog.html-P1526 deanmarshall.co.uk, http://deanmarshall.co.uk:80/joomla-services/joomla-security/joomla-security-issues.html nsfocus.net, http://nsfocus.net:80/index.php?act=alert&do=view&aid=156 fossforce.com, http://fossforce.com:80/2014/09/only-fossers-get-foss 5brh.com, http://5brh.com:80/alexa/Alexa_2.html basic-hack.blogspot.com, http://basic-hack.blogspot.com:80/2014/06/cms.html blackarch.org, http://blackarch.org:80/tools.html honeynet.org, http://gsoc2013.honeynet.org:80/2013/06 markmaunder.com, http://markmaunder.com:80/2011/08/01/zero-day-vulnerability-in-many-wordpress-themes aldeid.com, http://aldeid.com:80/wiki/Favorites hackersoft.ru, http://hackersoft.ru:80/info/590 bishopfox.com, http://bishopfox.com:80/resources/tools/google-hacking-diggity/attack-tools webdevelopmentconsultancy.com, http://webdevelopmentconsultancy.com:80/blog.html ciscozine.com, http://ciscozine.com:80/cisco-linksys-wag54gs-csrf-change-admin-password garykessler.net, http://garykessler.net:80/library/securityurl.html threatstop.com, http://blog.threatstop.com:80/2010/07 twiwired.com, http://twiwired.com:80/Plugins virtuemartbrasil.com.br, http://virtuemartbrasil.com.br:80/tutoriais/blogger/listings/virtueadmin.html geeklab.com.ar, http://wp.geeklab.com.ar:80/gl/2013/05/09/como-instalar-gnupanel-en-debian-wheezy unijimpe.net, http://blog.unijimpe.net:80/seguridad-en-upload-de-archivos hackershandbook.org, http://hackershandbook.org:80/forum/hacking-discussion/list-android-hacking-apps is-sec.org, http://is-sec.org:80/cc/t12450.html tux-planet.fr, http://tux-planet.fr:80/metasploit-et-les-failles-dans-adobe-reader-et-flash-player daboweb.com, http://daboweb.com:80/2011/05 indonesianhacker.or.id, http://forum.indonesianhacker.or.id:80/showthread.php?11357-Schoolhos-CMS-Beta-2-29-(index-php-id-parameter)-SQL-Injection simplelib.com, http://forum.simplelib.com:80/index.php?threads/exploit-wordpress-simple-ads-manager-2-5-94-arbitrary-file-upload.145822 attackresearch.com, http://carnal0wnage.attackresearch.com:80/2014/05/nagios-and-npre.html ethraa2.net, http://ethraa2.net:80/1817/كيف-تصبح-هكر-محترف-من-خلال-32-مصدر-للتعلم mmleoni.net, http://mmleoni.net:80/sql-iniection-lfi-protection-plugin-for-joomla clojurehackers.com, http://clojurehackers.com:80/p/enaqx/awesome-pentest extratipstricks.com, http://extratipstricks.com:80/2015_11_01_archive.html scip.ch, http://scip.ch:80/?labs.2013 devttys0.com, http://devttys0.com:80/2013/06/encryption-vs-compression-part-2 crack-wifi.com, http://crack-wifi.com:80/forum/topic-4598-metasploit-mais-pas-en-local.html phpinfo.me, http://phpinfo.me:80 darkoperator.com, http://darkoperator.com:80/infosec-tactico-podcast uw-team.org, http://uw-team.org:80/forum/viewtopic.php?t=9757 cyphort.com, http://cyphort.com:80/huffingtonpost-serving-malware hpage.in, http://somnathguhaneogi.hpage.in:80/burp-intruder_39064982.html waitalone.cn, http://waitalone.cn:80/fckeditor2-6-8asp-upload-files-to-bypass.html 4xmen.ir, http://4xmen.ir:80/shellcode-نویسی-در-دلفی-قسمت-دوم depthsecurity.com, http://blog.depthsecurity.com:80/2010_08_01_archive.html h4cking.rzb.ir, http://h4cking.rzb.ir:80/post/158 ps3devwiki.com, http://ps3devwiki.com:80/ps3/Bugs_&_Vulnerabilities perltricks.com, http://perltricks.com:80/article/179/2015/7/1/Basic-network-hacking-with-Perl snipe.net, http://snipe.net:80/2010/10/firefox-addons-xss-testing enmimaquinafunciona.com, http://enmimaquinafunciona.com:80/pregunta/732/mi-servidor-es-vulnerable-a-heartbleed-incluso-despues-de-que-la-actualizacion-de-openssl livehacking.com, http://livehacking.com:80/2010/10 usethistip.com, http://usethistip.com:80/2014/09/what-is-google-hacking.html kabinet-shiraz.ir, http://kabinet-shiraz.ir:80/author/admin linuxito.com, http://linuxito.com:80/seguridad/294-google-dorks seguridadapple.com, http://seguridadapple.com:80/2010/08/seria-vulnerabilidad-en-coldfusion.html trapx.com, http://trapx.com:80/resources/hot-links gelsana.com, http://gelsana.com:80/Ektron alkrsan.net, http://alkrsan.net:80/forum/256859-post1.html kompjuteras.com, http://kompjuteras.com:80/zastita-sajtova-baziranih-na-wordpress-u avsarsoft.com, http://avsarsoft.com:80/demo/dugunv2/images/galeri/6543_kodis.php thehackerway.com, http://thehackerway.com:80 linuxmint.net.tr, http://forum.linuxmint.net.tr:80/index.php?topic=2035.0 olympos.net, http://olympos.net:80/frontpage?page=20 routerpwn.com, http://routerpwn.com:80/2Wire separatista.net, http://separatista.net:80/wordpress/wordpress-3-1-3-prinasi-mnoho-bezpecnostnich-oprav wirelessdomination.com, http://wirelessdomination.com:80/backtrack-is-dead-long-live-kali-linux bases-hacking.org, http://bases-hacking.org:80/vrai-hacking.html quickr.jp, http://b.quickr.jp:80/?tag=cve fox-it.com, http://blog.fox-it.com:80 securityscorecard.com, http://blog.securityscorecard.com:80/tag/security r00tsec.com, http://r00tsec.com:80/2011/09/exploiting-microsoft-iis-version-60.html securitygeeks.net, http://securitygeeks.net:80/2013/01/how-to-search-for-exploits-using.html w3facility.org, http://w3facility.org:80/question/known-public-exploits-for-vsftpd-2-0-12-0-5 brandingpersonality.com, http://brandingpersonality.com:80/why-wordpress-is-the-best-website-platform itsecuritynews.info, http://itsecuritynews.info:80/2015/04/06/sb15-096-vulnerability-summary-for-the-week-of-march-30-2015 g0tmi1k.com, http://blog.g0tmi1k.com:80/2011/06/dictionaries-wordlists cmsitservices.com, http://cmsitservices.com:80/security-sense.html intevation.org, http://lists.wald.intevation.org:80/pipermail/openvas-commits/2010-January/006547.html madirish.net, http://madirish.net:80/186 jhezer.com, http://jhezer.com:80/masih-amankah-wordpress chooseplugin.com, http://chooseplugin.com:80/plugin-info/wp-bannerize corelan.be, http://corelan.be:8800/index.php/2010/08/25/dll-hijacking-kb-2269637-the-unofficial-list crazydavinci.net, http://crazydavinci.net:80/link-exchange top-hat-sec.com, http://forum.top-hat-sec.com:80/index.php?topic=3162.0 hackdig.com, http://hackdig.com:80/?12/hack-7527.htm moonsec.com, http://moonsec.com:80/post-309.html sathisharthars.wordpress.com, http://sathisharthars.wordpress.com:80/2014/01/06/installing-openerp-in-centos-6 highsec.es, http://highsec.es:80/2013/07/dns-gathering-transferencia-de-zona-shodan-resolucion-inversa-ataque-de-diccionario-y-maltego joomall.org, http://joomall.org:80/extensions/access-a-security/site-security/site-protection/14265 linuxfreedom.com, http://linuxfreedom.com:80/kali chzv.net, http://chzv.net:80/tag/sql-injection getmantra.com, http://getmantra.com:80/forums/Thread-Exploiting-chillyCMS-1-3-0-vulnerabilities-using-OWASP-Mantra hackshowblog.com, http://hackshowblog.com:80 ismailhakkialtuntas.com, http://ismailhakkialtuntas.com:80/2015/05/01/siber-guvenlik-uzmani-olmak guidepointsecurity.com, http://guidepointsecurity.com:80/727/vulnerability-management/the-heartburn-of-heartbleed mainstream-tech.com, http://mainstream-tech.com:80/news-press/page/3 tubbydev.com, http://tubbydev.com:80/2014/03/comment-trouver-les-failles-de-google-youtube-apple-facebook-twitter-et-autres-gros-sites.html deltahacker.gr, http://deltahacker.gr:80/antivirus-bypass firedaemon.com, http://firedaemon.com:80/blog nagios-plugins.org, http://nagios-plugins.org:80 ieeelcn.org, http://ww.ieeelcn.org:80/library/securityurl.html alvarolara.com, http://alvarolara.com:80/2013/07/17/descubre-exploits-con-exploit-db crezybrain.net, http://crezybrain.net:80/80-best-free-hacking-tutorials ideativi.it, http://ideativi.it:80/blog/548/usa-google-per-scoprire-se-ti-hanno-hackerato-il-sito.aspx mytripolog.com, http://mytripolog.com:80/cat/city reliablebooks.in, http://reliablebooks.in:80/includes/img/chamai.php wuestenigel.com, http://seo.wuestenigel.com:80 cnsec.org, http://forum.cnsec.org:80/thread-94438-1-1.html furkansandal.com, http://furkansandal.com:80/hackerin-olmazsa-olmazi-assembly-5-nerede-bu-devlet-2 hackademics.fr, http://hackademics.fr:80/showthread.php?691-Google-Hacking tamadon.net, http://tamadon.net:80/?q=node/3 acsite.org, http://wp.ping.acsite.org:80/?cat=17 actulligence.com, http://actulligence.com:80/2014/11/26/la-veille-une-activite-legale kennasecurity.com, http://blog.kennasecurity.com:80/2015/02/miss-when-rely-on-cvss-scores boorow.com, http://boorow.com:80/Blogs/sql_shop_dork_and_1_and_Length((database()))_48)_UNION_ALL_SELECT_NULL NULL NULL?query=sql shop dork and 1 and Length((database())) 48) UNION ALL SELECT NULL NULL NULL venustech.com.cn, http://venustech.com.cn:80/NewsInfo/123/29773.Html cyberdefensemagazine.com, http://cyberdefensemagazine.com:80/a-new-version-of-diy-google-dorks-based-hacking-tool-has-been-released-it-is-an-extremely-useful-tool-for-reconnaissance-of-targets freelancers-tools.com, http://freelancers-tools.com:80/?p=2384 toolswatch.org, http://toolswatch.org:80/2011/04/latest-latest-google-hacking-entries shtorm.net, http://forum.shtorm.net:80/index.php?/topic/10745-novosti-softa/page-14 hackingtune.com, http://hackingtune.com:80/2015/06/hacking-dnn-based-web-sites-2015.html radio4seo.de, http://radio4seo.de:80/black-hat-show-005-programmiere-dein-eigenes-seo-tool borfast.com, http://borfast.com:80/projects/arris-password-of-the-day-generator/generator scap.org.cn, http://cve.scap.org.cn:80/BID/52034.html webinsider.com.br, http://webinsider.com.br:80/2013/10/31/analise-e-gestao-de-vulnerabilidades-em-ti phishlabs.com, http://blog.phishlabs.com:80/inside-the-phishing-ecosystem-staging-phishing-attacks budaklembur0703.blogspot.co.id, http://budaklembur0703.blogspot.co.id:80/2012/03/celebration.html qahelp.net, http://qahelp.net:80/questions/kali-linux-backtrack-kak-osnova-dlya-razvitiya-v-testirovanii-bezopasnosti saintcorporation.com, http://saintcorporation.com:80/cgi-bin/demo_tut.pl?tutorial_name=IrfanView_vulnerabilities.html&fact_color=&tag= slashdot.jp, http://slashdot.jp:80/journal/564734/韓国サイバー攻撃事件、韓国AhnLab社製パッチ管理システム経由での攻撃か banglahero.com, http://banglahero.com:80/নিজেকে-হ্যাকিং-এ-পারদর্শ blackstump.com.au, http://blackstump.com.au:80/hoax.htm inurl.com.br, http://blog.inurl.com.br:80 iraqmoon.info, http://iraqmoon.info:80/vb/showthread.php?t=39732 pentest-standard.org, http://pentest-standard.org:80/index.php/PTES_Technical_Guidelines th3-hacker.com, http://th3-hacker.com:80 claudiokuenzler.com, http://claudiokuenzler.com:80/blog/534/joomla-hacked-through-akeeba-backup-restore-joomlaupdate thehackerblog.com, http://thehackerblog.com:80/hacking-xampp-web-servers-via-local-file-inclusion-lfi toranjonline.blogsky.com, http://toranjonline.blogsky.com:80/1393/12/22/post-238/How-To-Use-SQLi-Dumper-SQLMap byakuya-shobo.co.jp, http://byakuya-shobo.co.jp:80/hj/moh2/bt5_tools_list.html hashtec.org, http://hashtec.org:80/apple-backdoors-us mertsarica.com, http://mertsarica.com:80 secupedia.info, http://secupedia.info:80/wiki/Hacker bot24.com, http://bot24.com:80/2014/06/checkdhcp-nagios-plugins-202-race.html greenweb.com.bd, http://greenweb.com.bd:80/2015/07/blog-post_75.html madleets.com, http://madleets.com:80/Thread-Localroot-2-6-32-531?pid=36309 bankshung.net, http://mis.bankshung.net:80/2013_08_01_archive.html wesipa.com, http://wesipa.com:80/alexa/alexa_top_websites_list_this_day_23.html alexa.in.net, http://alexa.in.net:80/domain-list-25 a1arte.com, http://blog.a1arte.com:80/tag/adsl/page/2 elis.org, http://blogs.elis.org:80/isa/hackers-actively-exploiting-jboss-vulnerability-to-compromise-servers h-k.me, http://h-k.me:80 sohbetim.com, http://sohbetim.com:80/forum/tarayicilar/1840-firefox-10-hack-tools.html watchguardsecuritycenter.com, http://watchguardsecuritycenter.com:80/2010/10 botbie.com, http://blog.botbie.com:80/category/uncategorized cnvd.org.cn, http://cnvd.org.cn:80/flaw/show/CNVD-2013-14944 shellsec.com, http://ensec.shellsec.com:80/index.php?hours=-1 linuxmafia.com, http://linuxmafia.com:80/~rick/faq almaz161.ru, http://almaz161.ru:80/wp-includes/css/zaq.php djlab.com, http://djlab.com:80/2010/05/mod_security-rule-for-joomla-com_properties-aid-vulnerability ithuan.com, http://ithuan.com:80/1438301/microsoft-character-information-disclosure-vulnerability websec.it, http://websec.it:80/exploit-joomla-1.5.12-rce-via-tinymce-upload-vulnerability.html prologic.su, http://prologic.su:80/topic/469-ujazvimosti-vbulletin serveradminblog.com, http://serveradminblog.com:80/2014/04 blackploit.com, http://blackploit.com:80/2010/12/0day-todas-las-versiones-de-internet.html diniscruz.com, http://blog.diniscruz.com:80/2013/08/loading-parsing-and-consuming.html malwaremustdie.org, http://blog.malwaremustdie.org:80/2012/11/plugindetect-079-payloads-of-blackhole.html kaimi.ru, http://kaimi.ru:80/category/деньги hispasec.com, http://laboratorio.blogs.hispasec.com:80/2013_05_01_archive.html seeseekey.net, http://seeseekey.net:80/blog/tag/datenbank binrev.com, http://binrev.com:80/forums/index.php/topic/44474-hacker-newbie-aid-on-wp-and-pdf navisec.it, http://navisec.it:80 sectechno.com, http://sectechno.com:80/csrf-exploit-for-joomla-1-6-3-or-lower tokumaru.org, http://blog.tokumaru.org:80/2013/11/apache-magica-attack.html jasongregory.biz, http://businessfromhome.jasongregory.biz:80/en/video/k3KzsW27al8/How-To-Exploit-WordPress-Themes-Arbitrary-File-Upload-Vulnerability atawebtasarim.com, http://dugunv2.atawebtasarim.com:80/images/galeri/6043_kod.php secudemy.com, http://secudemy.com:80/exploit-research-megaprimer-part-4-minishare-buffer-overflow securityspace.com, http://securityspace.com:80/smysecure/catid.html?id=1.3.6.1.4.1.25623.1.0.103654 cmclab.net, http://support.cmclab.net:80/vn/index.php?topic=8362.0 vulscan.cn, http://vulscan.cn:80/edu/0829117.html rootshell.be, http://blog.rootshell.be:80/2012/04 dicas-l.com.br, http://dicas-l.com.br:80/arquivo/mitigando_ataques_contra_o_php5-cgi.php enlinux.org, http://enlinux.org:80/2013/08 blogspot.com.eg, http://hackyor.blogspot.com.eg:80/2015/09/blog-post.html homelab.it, http://homelab.it:80/index.php/2014/05/03/nagios-nrpe-remote-command-injection-test-fix olevia.com.hk, http://olevia.com.hk:80/product_details.php?workplaceID=19&productid=637 ctf365.com, http://blog.ctf365.com:80/hackers-dome-double-kill-the-official-writeup circl.lu, http://cve.circl.lu:80/cve/CVE-2009-4458 joomlanutshell.com, http://joomlanutshell.com:80/joomla-extension/access-a-security/site-security/site-protection/302.html portalhacker.net, http://portalhacker.net:80/b37/duda-exploit-local-root/155885 wiert.me, http://wiert.me:80/2011/01 beebeeto.com, http://beebeeto.com:80/pdb/poc-2014-0174 berndpulch.org, http://berndpulch.org:80/2014/08 cmsenergizer.com, http://cmsenergizer.com:80 devco.re, http://devco.re:80/blog/2014/03/14/3rd-party-software-security-issues pdfsdownload.com, http://pdfsdownload.com:80/download-pdf-for-free/addon%20for%20firefox selectrealsecurity.com, http://selectrealsecurity.com:80/useful-security-resources fuzzysecurity.com, http://fuzzysecurity.com:80/contact.html primalsecurity.net, http://primalsecurity.net:80/0x0-exploit-tutorial-buffer-overflow-vanilla-eip-overwrite-2 tipstrickshack.blogspot.in, http://tipstrickshack.blogspot.in:80/2012/10/online-hacking-tools.html vxheaven.org, http://vxheaven.org:80/forum/viewtopic.php?id=2640 ducdung08clc.blogspot.com, http://ducdung08clc.blogspot.com:80/2012/02/mot-so-dien-hacking-va-ug.html ewerkzeug.info, http://ewerkzeug.info:80/wordpress/schuetzt-eure-wordpress-installation gm-parts.ir, http://gm-parts.ir:80/2013/11 insight-labs.org, http://insight-labs.org:80/wiki/index.php?type=article&class=Fuzzing raidersec.blogspot.com, http://raidersec.blogspot.com:80/2012/03/introduction-to-metasploit.html rsrl.ru, http://rsrl.ru:80/forum/index.php?showtopic=108327 securitysift.com, http://securitysift.com:80/about seguridadwordpress.com, http://seguridadwordpress.com:80/vulnerabilidad-en-wordpress-seo-plugin-by-yoast-inyeccion-sql soclcrazy.com, http://soclcrazy.com:80/2013/09/ebooks-collection-of-hacking-ebooks.html cfcl.com, http://wiki.cfcl.com:80/Vicki/Twitter/TwitterLog2015-Jan-05 corujadeti.com.br, http://blog.corujadeti.com.br:80/site-do-backtrack-hackeado computercrimeinfo.com, http://computercrimeinfo.com:80/pds.html toxigon.com, http://toxigon.com:80/website-like-milw0rm-alternative antivirus.lv, http://antivirus.lv:80/bezkategorijas/microsoft-bridina-par-windows-siktelu-ievainojamibu kali4hackers.blogspot.com, http://kali4hackers.blogspot.com:80/p/some-important-links.html rafale.org, http://rafale.org:80/~mattoufoutu/GhostInTheStack/ghostsinthestack.org/index-2.html vavai.net, http://vavai.net:80/2014/02/zimbra-collaboration-urgent-patch-releases-exploit-db commonexploits.com, http://commonexploits.com:80/ms11-080-local-privilege-escalation evilsocket.net, http://evilsocket.net:80/2015/02/01/huawei-usb-modems-authentication-bypass getoto.net, http://getoto.net:80/noise/tag/fun/page/7 hamza.ma, http://hamza.ma:80/tutorial/cours-de-hacking-en-arabe-marocaine-darija izocin.wordpress.com, http://izocin.wordpress.com:80/2010/08/03/cgi-telnet-gif-shell-bypass-teknigi m14hackersworld.blogspot.in, http://m14hackersworld.blogspot.in:80/p/hacking-apps.html p5security.blogspot.com, http://p5security.blogspot.com:80/2015/08/learnhacking.html secuobs.com, http://secuobs.com:80/news/18022014-jtrig-gchq-anonymous.shtml admin-talk.com, http://admin-talk.com:80/threads/security-bulletin-vbseo-3-6-0-pl2-released.6876 armorize.com, http://blog.armorize.com:80/2011/04/newest-adobe-flash-0-day-used-in-new.html cometohack.com, http://cometohack.com:80/2013_10_01_archive.html csphere.eu, http://csphere.eu:80/forum/board/thread/where/13354 inattack.ru, http://inattack.ru:80/article/metasploit-vzlom-windows-7-podsmatrivaem/676.html mylingual.net, http://japanize.mylingual.net:80/index.cgi/list oscarulloa.com, http://oscarulloa.com:80/scrapebox-tambien-es-herramienta-para-white-hat yaztekbilisim.com, http://yaztekbilisim.com:80/sanayi/dokumanlar/kode.php 0xlabs.com, http://blog.0xlabs.com:80/2014/03/zpanel-10.1.x-remote-root.html csnc.ch, http://blog.csnc.ch:80 cehvietnam.com, http://cehvietnam.com:80/showthread.php?20-Footprinting-amp-Reconnaissance-1-2-3-4-Footprinting-_-Reconnaissance-1-2-3-4 haker.edu.pl, http://haker.edu.pl:80/2014/11/20/jak-zalozyc-strone-internetowa mulliner.org, http://mulliner.org:80/blog/blosxom.cgi/2014/11 conspiracy-cafe.com, http://conspiracy-cafe.com:80/apps/blog/show/41959060-ayrton-senna-google-doodle hackmethod.com, http://hackmethod.com:80/hack-with-metasploit-exploitation illegallab.com, http://lab.illegallab.com:80/php/exploit/jcom_scanner.php m14hackersworld.blogspot.com, http://m14hackersworld.blogspot.com:80/p/hacking-apps.html malwareremovalservice.com, http://malwareremovalservice.com:80/local-hexchat-2-9-4-local-exploit-submission mpls-experts.com, http://mpls-experts.com:80/amplified-ddos-attacks-smurf-bang-dns-ntp programmingethicalhackerway.blogspot.in, http://programmingethicalhackerway.blogspot.in:80/2015/07/conditional-statements-if-else-else-if.html zahyl.fr, http://zahyl.fr:80/Shaarli/?page=2 kechocgian.blogspot.com, http://kechocgian.blogspot.com:80/2012/08/hack-vbb-sqlinject-38x.html knowledgepia.com, http://knowledgepia.com:80/en/k-blog/security/add-new-exploits-to-metasploit-from-exploit-db net527.cn, http://linux.net527.cn:80/Linuxxinwen/51419.html rndc.or.id, http://rndc.or.id:80/wiki/index.php?title=Reverse_Engineering_Belkin_WeMo_Smart_Switch samiux.blogspot.com, http://samiux.blogspot.com:80/2009/12/howto-mygica-d689-usb-hdtv-dongle-on.html websec.ca, http://websec.ca:80/blog/view/optimized_blind_sql_injection_data_retrieval 0xicf.wordpress.com, http://0xicf.wordpress.com:80/2012/07/12/439 antiy.net, http://antiy.net:80/p/series-one-of-bash-shellshock-analysis shuo1.com, http://blog.shuo1.com:80/?m=201007 charanyuvasamman.in, http://charanyuvasamman.in:80/admin/upload/wso.php web2y.com, http://codejoomla.web2y.com:80/open-source/joomla/-solved-finding-the-entry-point-of-the-hack-2485.html icq-num.ru, http://icq-num.ru:80/threads/massovyj-vzlom-sajtov-2012.14584 isoc.my, http://isoc.my:80/profile/wthack lifeoverip.net, http://lifeoverip.net:80/newsletter/sayi39 samir.ga, http://samir.ga:80/2013_09_12_archive.html securitygeneration.com, http://securitygeneration.com:80/security/proftpd-1-3-3c-briefly-backdoored-by-hackers securityvulns.com, http://securityvulns.com:80/CVE-2010-4398.html uncu78.com, http://uncu78.com:80/images/slidelar/khyln2015-08-Wed-04-26-59.php 0day5.com, http://0day5.com:80 antoniopainn.com, http://antoniopainn.com:80/podcast-02-misterios-del-social-media thestateofme.com, http://blog.thestateofme.com:80/page/2 contagiodump.blogspot.com, http://contagiodump.blogspot.com:80/2010/07/cve-2010-2568-lnk-vunerability-stuxnet.html hrazvedka.ru, http://hrazvedka.ru:80/poisk_soft/soft-i-servisy-dlya-professionalnogo-poiska.html paulrosenzweig.com, http://paulrosenzweig.com:80/explore-reddit/r/zeroday reydes.com, http://reydes.com:80/d/?q=Explotar_Vulnerabilidad_en_Extension_Joomla_Komento_1_7_2 jetlib.com, http://sec.jetlib.com:80/2010/05/04 securityorb.net, http://securityorb.net:80/2014/10 techingspot.blogspot.in, http://techingspot.blogspot.in:80/2014/10/access-google-hacking-database.html turk-bh.ir, http://turk-bh.ir:80/cc/showthread.php?t=26 webhostingturkey.com, http://webhostingturkey.com:80/?tag=/ddos 5dmail.net, http://5dmail.net:80/html/2010-12-29/20101229112041.htm aksitservices.co.in, http://aksitservices.co.in:80/blogs informaticalab.com, http://blog.informaticalab.com:80/cosa-sono-le-dork-e-come-usarle cphpvb.net, http://cphpvb.net:80/network-security/9382-offline-bruteforce-attacks joomla.jp, http://docs.joomla.jp:80/Cleared_vulnerable_extensions huaidan.org, http://huaidan.org:80/category/tools packetpunks.net, http://packetpunks.net:80/showthread.php?tid=3183 tacticalcode.de, http://tacticalcode.de:80/2012/02/security-wir-lesen-ein-adminpasswort-aus-vbulletin-exploit.html durusau.net, http://tm.durusau.net:80/?m=201502 tmto.org, http://tmto.org:80/pages/about/history zeronights.org, http://2014.zeronights.org:80/conference/speakers.html aprendeahackear.com, http://aprendeahackear.com:80/utilidades.html pusheax.com, http://blog.pusheax.com:80/2011/12/gathering-information-before-hacking.html dandylife.net, http://dandylife.net:80/blog/index.php/tools groupages.fr, http://groupages.fr:80/چم-ھ-ۅرۑة-آڹۅڹۑم-ۅڛ-آڵھ-آڪرڒ hack2wwworld.blogspot.com, http://hack2wwworld.blogspot.com:80/2013/09/joomscan-how-to-identify-all.html htpow.com, http://htpow.com:80/Public/htmledit/attached/file/20150710/20150710132227_12302.html itpixie.com, http://itpixie.com:80/2012/06/wordpress-exploit-alert-uploadify-php vexillium.org, http://j00ru.vexillium.org:80/?p=2105 l0.cm, http://masatokinugawa.l0.cm:80/2012/02/xss.html nevermore.blog.ir, http://nevermore.blog.ir:80 novid.ir, http://novid.ir:80/بازی-موش-و-گربه sycsec.com, http://blog.sycsec.com:80 duyk.net, http://duyk.net:80/topic/11-Bug-SQL-injection-tai-VBB-5 fbiic.gov, http://fbiic.gov:80/links_archive.htm itgeekchronicles.co.uk, http://itgeekchronicles.co.uk:80/2011/10/31/netscaler-rpcnode-issue itsec.persianblog.ir, http://itsec.persianblog.ir:80/1390/11 kali4hackers.blogspot.in, http://kali4hackers.blogspot.in:80/p/some-important-links.html nxadmin.com, http://nxadmin.com:80/web/612.html origiweb.com.br, http://origiweb.com.br:80/blog/invasao-em-sites-desenvolvidos-com-wordpress-e-joomla securityforrealpeople.com, http://securityforrealpeople.com:80/2015_02_01_archive.html socialbuckets.com, http://socialbuckets.com:80/bucket/search/site/web/39510/save_22282 yaser-ebrahimi.com, http://yaser-ebrahimi.com:80/?page_id=25 apiscam.blogspot.com.es, http://apiscam.blogspot.com.es:80/2010_08_01_archive.html bitacoraderedes.com, http://bitacoraderedes.com:80/2014/04 ilvwp.com, http://ilvwp.com:80/google-hacking-46-ejemplos-como-consigue-un-hacker-contrasenas-usando-solo-google thegrebs.com, http://irclogs.thegrebs.com:80/linode/2011/06/11 karingroup.ir, http://karingroup.ir:80/236/وب-سایت-های-100-هزار-تومانی netsec.ws, http://netsec.ws:80/?cat=9 quantika14.com, http://quantika14.com:80/blog/2014/12/03/wordpressa-repository-vulnerabilidades-wordpress stproject.info, http://stproject.info:80/blog/?p=1939 sublimigeek.fr, http://sublimigeek.fr:80/exemple-arnaque-sur-internet thesprawl.org, http://thesprawl.org:80/research/corelan-tutorial-10-exercise-solution alikasraei.blog.ir, http://alikasraei.blog.ir:80 anonhacksociety2.blogspot.in, http://anonhacksociety2.blogspot.in:80/2014/02/geeky-links.html c22.cc, http://blog.c22.cc:80/2010/03 enggmeet.com, http://enggmeet.com:80/best-ethical-hacking-ebooks-collection-free remoteexecution.org, http://foro.remoteexecution.org:80/index.php/topic 670.0.html gnucitizen.org, http://gnucitizen.org:80/blog/coldfusion-directory-traversal-faq-cve-2010-2861 isecnews.com, http://isecnews.com:80/كيف-تبدأ-طريقك-في-إكتشاف-ثغرات-المواقع joomlacorner.com, http://joomlacorner.com:80/joomla-news/joomla-vulnerability-news/328-joomla-component-ozio-gallery-qwritetofilephpq-file-manipulation-vulnerability.html justhackitnow.com, http://justhackitnow.com:80/2011_03_01_archive.html sniferl4bs.com, http://sniferl4bs.com:80/2014/04/fortificando-nmap-con-vulscan.html soom.cz, http://soom.cz:80/index.php?name=newsreel/all&foo vulnerabilityassessment.co.uk, http://vulnerabilityassessment.co.uk:80/Citrix.html wordpress.com.vn, http://wordpress.com.vn:80/blog/wordpress-pluginsthemes-uploadify-php-arbitrary-code-executionvulnerability-169 silentsignal.eu, http://blog.silentsignal.eu:80/2014/02 buffered.io, http://buffered.io:80/posts/idsecconf-2013-myftpd-challenge denis-creative.com, http://denis-creative.com:80/kak-zaschitit-sajt-na-cms-wordpress-ot-vzloma ericparlier.com, http://ericparlier.com:80/ref/top_8_kiddie_hacks phpvms.net, http://forum.phpvms.net:80/topic/16288-notice-open-flash-chart-exploit cker.in, http://ha.cker.in:80 minglecommunities.com, http://minglecommunities.com:80/wordpress-security-tips websecuritywatch.com, http://websecuritywatch.com:80/code-execution-vulnerability-in-vbseo-3-5-0-3-5-1-3-5-2-3-6-0-and-earlier yobi.be, http://wiki.yobi.be:80/wiki/Reverse-Engineering wiremask.eu, http://wiremask.eu:80/winrar-file-extension-spoofing-vulnerability adsecurity.org, http://adsecurity.org:80/?p=870/?paged=9 amanhardikar.com, http://amanhardikar.com:80/mindmaps/Practice.html sshida.com, http://diary.sshida.com:80/?c=Security&p=53 psnc.pl, http://dl.psnc.pl:80/2010/04 elmundoenbits.com, http://elmundoenbits.com:80/2013_12_01_archive.html globalsecuritymag.com, http://globalsecuritymag.com:80/CERT-XMCO-Avis-d-expert-semaine-du 20120502 29985.html hypervsir.blogspot.com, http://hypervsir.blogspot.com:80/2014/10/kernel-information-leak-with.html lawrencepingree.com, http://lawrencepingree.com:80/2010/10 morningstarsecurity.com, http://morningstarsecurity.com:80/links mythoughts.co.in, http://mythoughts.co.in:80/2012/11/automatingbreaking-captcha-using.html security-database.com, http://security-database.com:80/cpe.php?detail=cpe:/a:devexpress:aspxfilemanager_control_for_webforms_and_mvc:12.2.12 simonsen.br, http://simonsen.br:80/ets/base.php?inscricao=palestrantes subliminalhacking.net, http://subliminalhacking.net:80/2012/12/27/osint-tools-recommendations-list idf.cn, http://bbs.idf.cn:80/thread-26-1-1.html binary-zone.com, http://binary-zone.com:80/misc/library fiks-ru.net, http://fiks-ru.net:80/forum/7-310-1 freewaf.org, http://freewaf.org:80/upload/thread-7-1-1.html h4nk.blogspot.com, http://h4nk.blogspot.com:80/2013/05/mengenal-serangan-csrf.html lvsec.cn, http://lvsec.cn:80/1214.html maltego.blogspot.com, http://maltego.blogspot.com:80/2010/11/transform-tuesday-facebooksoaspf-and.html newhax.com, http://newhax.com:80/forum/index.php?threads/remote-achat-v0-150-beta7-buffer-overflow.110513 oversitesentry.com, http://oversitesentry.com:80/category/securityexploits terminatio.org, http://terminatio.org:80/cmsmap-the-ultimate-cms-scanner-to-hack-75-of-websites thehackersolutions.com, http://thehackersolutions.com:80/kali-linux/metasploit-basics/metasploit-for-the-aspiring-hacker-part-9-how-to-install-new-modules evolix.net, http://trac.evolix.net:80/infogerance/wiki/HowtoZimbra williballenthin.com, http://williballenthin.com:80/rss/index.html xenuser.org, http://xenuser.org:80 alltrickbyte.com, http://alltrickbyte.com:80/2014/02/ethical-hacking-ebooks-collection.html avcilarmuftulugu.gov.tr, http://avcilarmuftulugu.gov.tr:80/arsiv/08299300-4124bc0a9335c27f086f24ba207a4912.php buildingautomationmonthly.com, http://blog.buildingautomationmonthly.com:80/bas-hacking-101-overview lab69.com, http://blog.lab69.com:80/2008/10/joomla-remote-admin-passwd-change.html cerosecurity.com, http://cerosecurity.com:80/category/metasploit/page/6 coruhspor.com, http://coruhspor.com:80/upload/resimler/be3779c152.php hpv.cc, http://hpv.cc:80/~maty/pukiwiki1/index.php?memo iranspace.ir, http://iranspace.ir:80/post/archive/1393/12/page/4 marketingshaker.com, http://marketingshaker.com:80/how-to-protect-your-seo-rankings-from-malware-attacks-a-step-by-step-guide myhome.net.tw, http://myhome.net.tw:80/2012_03/p09.htm nothink.org, http://nothink.org:80/utilities.php phpweekly.com, http://phpweekly.com:80/archive/2013-06-20.html serioushackguid4u.blogspot.in, http://serioushackguid4u.blogspot.in:80/2012/01/researcher-releases-android-exploit-in.html stylem.pl, http://stylem.pl:80/blog/hacklinki-pod-viagre-jak-oni-to-robia blogspot.co.id, http://budaklembur0703.blogspot.co.id:80/2015/02/musik-online-aku-mah-apa-atuh.html blinkenshell.org, http://cl_iff.blinkenshell.org:80/chat_links/urls.html idbackbox.org, http://forum.idbackbox.org:80/portal.php?page=4 iodigitalsec.com, http://iodigitalsec.com:80/snmp-network-attacks justanotherhacker.com, http://justanotherhacker.com:80/2011/05/htaccess-based-attacks.html labdesign80.it, http://labdesign80.it:80/perche-aggiornare-joomla netspective.com, http://opsfolio.cak.netspective.com:80/2015/01 red-orbita.com, http://red-orbita.com:80 security-portal.cz, http://security-portal.cz:80 sitedirsec.com, http://sitedirsec.com:80/link.asp vnsecurity.net, http://vnsecurity.net:80/category/research agguvenligi.net, http://agguvenligi.net:80/2013/02/apache-icin-ddos-onlemi-olarak.html buguroo.com, http://blog.buguroo.com:80/como-buscar-vulnerabilidades-en-software c1gstudio.com, http://blog.c1gstudio.com:80 bulbsecurity.com, http://bulbsecurity.com:80/finding-bad-characters-with-immunity-debugger-and-mona-py darksite.co.in, http://darksite.co.in:80/2013/09/xss-exploit-framework-v4-perfect-tool.html digitalwhisper.co.il, http://digitalwhisper.co.il:80/Links hackasoftware.com, http://hackasoftware.com:80/hacking-training-using-google itsecuritas.net, http://itsecuritas.net:80/latest-threats/exploit-database lestutosdenico.com, http://lestutosdenico.com:80 makthepla.net, http://makthepla.net:80/blog/=/Google-Hacking maltego.blogspot.fr, http://maltego.blogspot.fr:80/2010_11_01_archive.html mathyvanhoef.com, http://mathyvanhoef.com:80/2012/05/whatsapp-considered-insecure.html mydakshacom.ipage.com, http://mydakshacom.ipage.com:80/classified-advertiser.html normandieresto.com, http://normandieresto.com:80/st-francois.php pupha.net, http://pupha.net:80/archives/1851 q8handasa.net, http://q8handasa.net:80/vb/forumdisplay.php?f=8&s=7e81d97e6860632265e33a78a3d6f087 qiusuoge.com, http://qiusuoge.com:80/11436.html securesolutions.no, http://securesolutions.no:80/hacks-that-work-just-by-changing-the-url securitycafe.ro, http://securitycafe.ro:80/2015/01/05/understanding-php-object-injection sneakerhax.com, http://sneakerhax.com:80/jumping-into-exploit-development thbhacking.com, http://thbhacking.com:80/2011/06/collection-of-google-dorks-google.html thehackerlogs.com, http://thehackerlogs.com:80 wiegrefe.com, http://wiegrefe.com:80/wordpress_sicherheit.html 100security.com.br, http://100security.com.br:80/google-hacking-database abdullahog.lu, http://abdullahog.lu:80/index.php/hoo-assembly/assembly-badi-buyuldink alquimiabinaria.cat, http://alquimiabinaria.cat:80/2014/10/30/a-seguretat-informatica-no-sacabara-la-feina anquanquan.info, http://anquanquan.info:80 chewriter.ru, http://chewriter.ru:80/obzory/schetchik-poseshheniy-wordpress-obzor-plaginov-chast-vtoraya.html inventedtheinternet.com, http://colesec.inventedtheinternet.com:80 edgard.net, http://edgard.net:80 fountainheadcollege.edu, http://fountainheadcollege.edu:80/about/national-center-of-academic-excellence/cybersecurity-resources guillaumeanjou.fr, http://guillaumeanjou.fr:80/security-obscurity-google-google-dorks-robots-txt-et-wordpress ibrahimbalic.com, http://ibrahimbalic.com:80/2013/10 insinuator.net, http://insinuator.net:80/2013/01/rails-yaml itnews.jp, http://itnews.jp:80/?page_id=278 itnotes.in, http://itnotes.in:80/reconnaissance-resources itportal.co.il, http://itportal.co.il:80/articles-3675 jaikannadamma.com, http://jaikannadamma.com:80/install.php kizilsapkalihackerlar.blogspot.com.tr, http://kizilsapkalihackerlar.blogspot.com.tr:80/2015/03/kolay-yoldan-wordpress-ve-blog-hack-2015.html muratkaya.com.tr, http://muratkaya.com.tr:80/category/ehack-tools networkadminsecrets.com, http://networkadminsecrets.com:80/2011_01_01_archive.html oguzhanakkaya.com, http://oguzhanakkaya.com:80/whatsapp-v2-11-7-remote-crash-dos-exploit-poc.sh rebootuser.com, http://rebootuser.com:80/? hoa.ro, http://river.hoa.ro:80/search.php?q=tag:hack softpanorama.info, http://softpanorama.info:80/Scripting/php.shtml the-more-u-know.tumblr.com, http://the-more-u-know.tumblr.com:80/post/128361397349/80-free-hacking-tutorials-resources-to-become viproy.com, http://viproy.com:80/fozavci wpactions.com, http://wpactions.com:80/859/how-to-secure-your-wordpress-plugin xknife.org, http://xknife.org:80 zeronights.ru, http://2014.zeronights.ru:80/speakers.html aitalk.com, http://aitalk.com:80/top1.html amolnaik4.blogspot.com, http://amolnaik4.blogspot.com:80/2011/05/csrf-protection-bypass-with-xss-in.html attivissimo.blogspot.com, http://attivissimo.blogspot.com:80/2013/07/polizia-blocca-il-computer-truffa.html stalkr.net, http://blog.stalkr.net:80/2010/06/unrealircd-3281-backdoored.html cometohacking.blogspot.com, http://cometohacking.blogspot.com:80/2013/10/hacking-vidoes-ebooks-huge-collection.html cyberinjection.com, http://cyberinjection.com:80 dagger3d.com, http://dagger3d.com:80/2012/11/remedy-password-encoding.html educatedguesswork.org, http://educatedguesswork.org:80/2011/09/security_impact_of_the_rizzodu.html phpee.com, http://forum.phpee.com:80/viewtopic.php?f=5&p=15544 ieroot.com, http://ieroot.com:80 indonesiahackercyberteam.blogspot.com, http://indonesiahackercyberteam.blogspot.com:80/2014/02/peralatan-hacker-cyber-war-version.html securegossip.com, http://infolookup.securegossip.com:80/2010/08 insidetrust.blogspot.com, http://insidetrust.blogspot.com:80/2011/01/accessing-and-cracking-mysql-passwords.html kaoticcreations.blogspot.com, http://kaoticcreations.blogspot.com:80/2011/05/owning-database-with-sqlmap-and.html kioptrix.com, http://kioptrix.com:80/blog/2009/09 kjfido.blogspot.com, http://kjfido.blogspot.com:80/2013/10/flashchat-exploit-201310.html managementkennisbank.nl, http://managementkennisbank.nl:80/nl/crm-internet-marketing-advies/website-bouw-cms-php-opensource-hosting/beveilig-website-tegen-hackers noflex.org, http://noflex.org:80/cve-2012-0056-mempodipper os-tm.com, http://os-tm.com:80 planetalinux.org, http://planetalinux.org:80/es salmonriverbrewery.com, http://salmonriverbrewery.com:80/blog/wp-content/upLoads/userphoto/xsec3.php shinnok.com, http://shinnok.com:80/stuff/shinnok-hcf-bookmarks-v0.3.html tecnologiaaberta.com.br, http://tecnologiaaberta.com.br:80/2014/12/opencast-45-openbsd uinc.ru, http://uinc.ru:80/links anyun.org, http://anyun.org:80 dixo.net, http://blog.dixo.net:80/2012/12/hacking-the-wdtv-live-streaming-media-player techorganic.com, http://blog.techorganic.com:80/2012/07/16/kioptrix-hacking-challenge-part-3 btk-clan.ch, http://btk-clan.ch:80 budaklembur0703.blogspot.com, http://budaklembur0703.blogspot.com:80/2010/08/area-download.html codepeach.com, http://codepeach.com:80/wordpress/revolution-slider-plugin-vulnerability dreammail.eu, http://dreammail.eu:80 envoydata.com, http://envoydata.com:80 flu-project.com, http://flu-project.com:80/2011_05_01_archive.html foadansary.persianblog.ir, http://foadansary.persianblog.ir:80/1391/2 hackiteasy.blogspot.in, http://hackiteasy.blogspot.in:80 vfreaks.com, http://hacksys.vfreaks.com:80/ar/research/egg-hunter-twist-in-buffer-overflow-bisonware-ftp-server-v3-5.html harmj0y.net, http://harmj0y.net:80/blog/2014/04 infamoussyn.com, http://infamoussyn.com:80/2013/04/11/bisonftp-server-v3-5-mkd-buffer-overflow-exploit jumpespjump.blogspot.fr, http://jumpespjump.blogspot.fr:80 linusec.blog.ir, http://linusec.blog.ir:80 mundotecnologico.net, http://mundotecnologico.net:80/2014/07/18/lista-com-ferramentas-de-seguranca-e-pentest oussamaca.blogspot.com, http://oussamaca.blogspot.com:80/2014/03/blog-post_3026.html r00tnetwork.org, http://r00tnetwork.org:80/2014_02_01_archive.html seowebmaster.cz, http://seowebmaster.cz:80/robots-txt-prikazy-robotum shmsi.com, http://shmsi.com:80/wp/wp-content/uploads/bookmarks.html skhass.ir, http://skhass.ir:80/f.php tamouse.org, http://swaac.tamouse.org:80 theevilbit.blogspot.com, http://theevilbit.blogspot.com:80/2013/11/kioptrix-level-2-walkthrough.html w00tsec.blogspot.com, http://w00tsec.blogspot.com:80/2014/02/analyzing-malware-for-embedded-devices.html zeroscience.mk, http://zeroscience.mk:80/blog armoredcode.com, http://armoredcode.com:80/blog/ghost-in-the-shell-an-exploiting-attempt-examinated disects.com, http://blog.disects.com:80 bugsec.org, http://bugsec.org:80/7145.html ceh.com.tr, http://ceh.com.tr:80 cnis-mag.com, http://cnis-mag.com:80/deux-annees-de-hacking-scada-en-acces-libre.html condorinblu.com, http://condorinblu.com:80/newsdetails1.php?nid=NA== fug.com.br, http://fug.com.br:80/historico/html/freebsd/2011-08/msg00356.html hydraze.org, http://gits.hydraze.org:80 packetlove.com, http://golfreeze.packetlove.com:80/guyblog/archives/category/diary-life hoax.it, http://hoax.it:80/bufale/tag/windows indonesianhackeranonymous.blogspot.co.id, http://indonesianhackeranonymous.blogspot.co.id:80/2013/06/cara-hack-password-facebook-dengan-usb.html? insecurety.net, http://insecurety.net:80/?tag=lfi jinglingshu.org, http://jinglingshu.org:80/?p=7245 jorhack.blogspot.com, http://jorhack.blogspot.com:80/2009/01/138-c99-r75-c100-etc.html jurina-matsui13.ml, http://jurina-matsui13.ml:80/2015/10/deface-dengan-jomsocial-26-remote-code.html markscrano.com, http://markscrano.com:80 myexploit.wordpress.com, http://myexploit.wordpress.com:80/control-linux-john-passwd-crack nlsecurity.org, http://nlsecurity.org:80 psi-udc.blogspot.com.es, http://psi-udc.blogspot.com.es:80/2009_12_01_archive.html securitytrainings.net, http://securitytrainings.net:80/shell-access-bypassing-aslr-dep sentrant.com, http://sentrant.com:80/2015/03/25/ad-fraud-malware-hijacks-router-dns-injects-ads-via-google-analytics shellshocklabs.com, http://shellshocklabs.com:80/2012_11_01_archive.html rstack.org, http://sid.rstack.org:80/blog/index.php/2010/12 spentera.com, http://spentera.com:80/2010/11 telussecuritylabs.com, http://telussecuritylabs.com:80/threats/show/TSL20110718-02 007software.net, http://007software.net:80/2014/08/page/2 awesomehackers.org, http://awesomehackers.org:80/2015/11/06/rooting-a-linux-box-metasploit-style backlion.org, http://backlion.org:80/archives/21 beford.org, http://beford.org:80/sec 0day.jp, http://blog.0day.jp:80 astyran.sg, http://blog.astyran.sg:80/2011/06/deliberately-vulnerable-applications.html bazatelefonow.pl, http://blog.bazatelefonow.pl:80/categories/inne bitpiloten.de, http://blog.bitpiloten.de:80/2014/07/28/kurze-erfahrung-zu-deepofix-mailserver cee.moe, http://blog.cee.moe:80/dear-assembly-3.html k3170makan.com, http://blog.k3170makan.com:80/2012/01/injecting-javascript-via-mysql-error.html bufferoverflow.it, http://bufferoverflow.it:80/tag/openx davidonzo.com, http://davidonzo.com:80/2014/06 debasish.in, http://debasish.in:80/2012_06_01_archive.html hackingstuffs.com, http://hackingstuffs.com:80/backtrack hackwithkalilinux.blogspot.in, http://hackwithkalilinux.blogspot.in:80/2014/08/exploiting-database-on-github-with-kali.html huo119.com, http://huo119.com:80/post/783.shtm iniqua.com, http://iniqua.com:80/labs/mozilla-plugins joshpate.com, http://joshpate.com:80/2013/01/how-to-fix-hacked-by-hmei7-on-joomla-web-site linoob.com, http://linoob.com:80/2011/06/backtrack-5-pwn5auce-revolution-reviewed neeao.com, http://neeao.com:80/tag/java php-security.org, http://php-security.org:80/2010/05/20/mops-submission-07-our-dynamic-php/index.html pir8geek.com, http://pir8geek.com:80/the-growing-attacks-of-whmcs-local-file-disclosure-vulnerability savemoney-portal.com, http://savemoney-portal.com:80/sh3llZ/uploadshell/Shell.php tbouku.com, http://tbouku.com:80/vb/t46112-2.html webnotlarimm.wordpress.com, http://webnotlarimm.wordpress.com:80/category/wordpress-guvenligi-2 diamondsteel.ru, http://wp-plugins.diamondsteel.ru:80/blog xiarch.com, http://xiarch.com:80 ykuaile.net, http://ykuaile.net:80/sharerecommend agarri.fr, http://agarri.fr:80/blog/archives/2011/09/index.html ambitwire.com, http://ambitwire.com:80/tags/desktop artiflo.net, http://artiflo.net:80/2010/09/quelques-outils-de-pentest-et-daudit-securite n-z.jp, http://blog.n-z.jp:80/blog/2014-04-08-cve-2014-0160.html sedona.fr, http://blog.sedona.fr:80/2013/03/top-10-owasp-2013-les-failles-de-securite-web-les-plus-courantes sjinks.pro, http://blog.sjinks.pro:80/tag/plugin casual-scrutiny.blogspot.com, http://casual-scrutiny.blogspot.com:80/2015/03/defeating-emet-52-protections-2.html ceilers-news.de, http://ceilers-news.de:80/serendipity/221-Ein-bekannter-Advanced-Persistent-Threat-Operation-Aurora.html celticwolf.com, http://celticwolf.com:80/blog/2010/09/14/possible-vulnerability-in-gcalendar-joomla-extension code511.com, http://deepquest.code511.com:80/blog/2014/01/webapps-horizon-qcms-4-0-multiple-vulnerabilities ethicalhackingcourse.co.in, http://ethicalhackingcourse.co.in:80/2014_06_01_archive.html felipemartins.info, http://felipemartins.info:80/2015/09/pentesting-vulnerable-study-frameworks-complete-list firetra.ir, http://firetra.ir:80/playerpanel/game.php flinkd.org, http://flinkd.org:80/2011/07/fuzzing-with-peach-part-1 dbootcamp.org, http://ghana.dbootcamp.org:80/leave-comment bluehoststaff.com, http://gruiz.bluehoststaff.com:80/scripts/powersat/library/Documents/Books hackarde.blogspot.in, http://hackarde.blogspot.in:80/2011_09_24_archive.html hackavision.com, http://hackavision.com:80/2012/11/hacking-metasploitable-1-introduction.html hacktalk.net, http://hacktalk.net:80/tutorialsguides/how-to-hack-vbulletin-forums-(hot)-(exploit) harryadinanta.com, http://harryadinanta.com:80/exploit-rfi-dan-eskalasi-hak-akses it-ua.info, http://it-ua.info:80/news/2014/06/05/rozbr-zavdan-konkursu-konkurentna-rozvdka-na-phdays-iv.html itsulut.com, http://itsulut.com:80/hacking kaoticcreations.blogspot.nl, http://kaoticcreations.blogspot.nl:80/p/xpath-injection-using-extractvalue.html king-sabri.net, http://king-sabri.net:80/?page_id=828 kronus.me, http://kronus.me:80/читаем hakim.ws, http://m.hakim.ws:80 monkey-business.biz, http://monkey-business.biz:80/tag/security muha-hacker.blogspot.com.eg, http://muha-hacker.blogspot.com.eg:80/2012_01_01_archive.html obscuresecurity.blogspot.com, http://obscuresecurity.blogspot.com:80/2011/11/old-privilege-escalation-techniques.html poralliresopla.com, http://poralliresopla.com:80/2014/09/nueva-oleada-ataques-contra-wordpress-que-hacer.html redteamsecure.com, http://redteamsecure.com:80/labs/post/45/RedTeam-Labs-Awarded-CVE-2010-2028 skfu.xxx, http://skfu.xxx:80 cert-hungary.hu, http://tech.cert-hungary.hu:80/vulnerabilities/CH-7346 tinyhack.com, http://tinyhack.com:80/2014/03/12/implementing-a-web-server-in-a-single-printf-call voice0fblackhat.blogspot.com, http://voice0fblackhat.blogspot.com:80/2012/01/from-vuln-site-to-symlink.html websiteyazilimlari.com, http://websiteyazilimlari.com:80/demolar/KurumsalFirma/Firma-V2/galeri/613_kode.php websynn.com, http://websynn.com:80/2011/03/22/why-not-to-use-opencart-bad-reviews-of-opencart-team webuser.fr, http://webuser.fr:80/securisation-wordpress-trucs-astuces willsjojo.blogspot.in, http://willsjojo.blogspot.in:80/2012_04_01_archive.html xp10.com, http://xp10.com:80 886404.com, http://886404.com:80/search?q=powered by eggblog net acampos.net, http://acampos.net:80/2013_01_01_archive.html appunix.com.br, http://appunix.com.br:80/tag/exploit aslitsecurity.com, http://aslitsecurity.com:80/exploit-development.html 7-a.org, http://blog.7-a.org:80/2010/11/security-weekly-news-12-november-2010.html anidear.com, http://blog.anidear.com:80/2013/02/hack-fight-ctf-at-cdic-2013-write-up.html bluebirdhacker.blogspot.in, http://bluebirdhacker.blogspot.in:80/2014_08_01_archive.html bsius.com, http://bsius.com:80/news/security-industry/ncas-bulletins.aspx buayacorp.com, http://buayacorp.com:80/archivos/wordpress-313-multiples-vulnerabilidades calebbucker.blogspot.com, http://calebbucker.blogspot.com:80/2012/08/exploits-aplicaciones-y-sistemas-web.html carablogworld.blogspot.com, http://carablogworld.blogspot.com:80/2012/02/kali-ini-saya-akan-berbagi-step-by-step.html darksecurity.de, http://darksecurity.de:80/index.php?/204-Video-Build-a-backdoor-in-OpenSSH-5.9.html deadmanindia.blogspot.in, http://deadmanindia.blogspot.in:80/2013_06_16_archive.html kalepanel.com, http://dugunv2.kalepanel.com:80/images/galeri/7677_kod.php ecommercefacil.com.br, http://ecommercefacil.com.br:80 exploiterz.blogspot.in, http://exploiterz.blogspot.in:80 faisalwe.com, http://faisalwe.com:80/vb/showthread.php?t=5117 g4chan.com, http://g4chan.com:80/thread/48057141/wdg-web-development-general.html gozder.org.tr, http://gozder.org.tr:80/2014 hackerstorm.co.uk, http://hackerstorm.co.uk:80/vr/index.php henriksjokvist.net, http://henriksjokvist.net:80/archive/2010/6/joomla-has-a-security-problem-the-benefits-of-centralized-contrib-hosting javascriptpopupwindow.com, http://javascriptpopupwindow.com:80/de/javascript-popup-z-index.html jumpespjump.blogspot.co.uk, http://jumpespjump.blogspot.co.uk:80 kali4hackers.blogspot.gr, http://kali4hackers.blogspot.gr:80/p/some-important-links.html localtechrepair.blogspot.com, http://localtechrepair.blogspot.com:80/2014/01/information-security-software-books-and.html nasirpour.info, http://nasirpour.info:80/blog/vbulletin-vbseo-4-dot-x-x-vulnerability-leads-to-remote-code-execution sergeybelove.ru, http://oisd.sergeybelove.ru:80/materials pmenier.net, http://pmenier.net:80 rageweb.info, http://rageweb.info:80/2013/06/29/website-attacks rtzra.ru, http://rtzra.ru:80/wiki/software/joomla/components securityhome.eu, http://securityhome.eu:80/links.php securitystreetknowledge.com, http://securitystreetknowledge.com:80 shellzen.net, http://shellzen.net:80/links-uteis tech4lab.blogspot.in, http://tech4lab.blogspot.in:80/2012/05/root-rooting-webserver.html tipsfortoday.net, http://tipsfortoday.net:80/pluginuri-wordpress-pentru-securitate unline.blog.ir, http://unline.blog.ir:80 utalk.xyz, http://utalk.xyz:80/cross-domain-form-posting wapainc.org, http://wapainc.org:80/index.cfm/live-feeds/us-cert-cyber-security-bulletins websiteanalystsresource.wordpress.com, http://websiteanalystsresource.wordpress.com:80/2012/08 wizardpedia.com, http://wizardpedia.com:80/resources-for-hacking-and-security xatrix.org, http://xatrix.org:80/videos/introduction-to-shell-code-v1 505forensics.com, http://505forensics.com:80/exploiting-elasticsearch adarq.org, http://adarq.org:80/shell-server-unixnetwork-lab/automated-openvas-scans alltechhacks.blogspot.in, http://alltechhacks.blogspot.in:80 astropatrol2450dc.it, http://astropatrol2450dc.it:80/pagineguida/istruzioniavanzate.html bailey.st, http://bailey.st:80/blog/2013/05/21/phpvirtualbox-google-dork bechtsoudis.com, http://bechtsoudis.com:80/archive/2012/03/19/from-web-app-lfi-to-shell-spawn/index.html beneaththewaves.net, http://beneaththewaves.net:80/Software/OTORI_-_Exploring_the_Linux_Filesystem.html alphasmanifesto.com, http://blog.alphasmanifesto.com:80/2013/04/15/php-un-fractal-de-un-mal-diseno flawlessguru.com, http://blog.flawlessguru.com:80/httrack-clone-a-website-for-offline-analysisethical-hacking-assignmentreconnaissance-assignmenttask-given-a-company-name-now-hack1-httrack hostmach.com.br, http://blog.hostmach.com.br:80/2012/12 jangmt.com, http://blog.jangmt.com:80/2013/09/appserv-appserv.html nibblesec.org, http://blog.nibblesec.org:80/2010/12/typo3-sa-2010-020-typo3-sa-2010-022.html pepelux.org, http://blog.pepelux.org:80/2011/04 phdays.ru, http://blog.phdays.ru:80/2014/06/phdays-iv.html securityarchitect.org, http://blog.securityarchitect.org:80/hakkinda bluetouff.com, http://bluetouff.com:80/2010/10/28/scada-sous-les-balles/comment-page-1 brainwalk.net, http://brainwalk.net:80/tips-trik/deface-wordpress-dengan-rfi bricolaviaggi.it, http://bricolaviaggi.it:80/incoming/wp-content/plugins/revslider/temp/update_extract/wpextract.php carluys.blogspot.com.es, http://carluys.blogspot.com.es:80/2012/04/atacando-servidor-vulnerabilidad-php.html cekoop.org.tr, http://cekoop.org.tr:80/yonetim/posta/dosyalar/20150829040845kode.php corrspt.com, http://corrspt.com:80/blog/2014/01 polux-hosting.com, http://d4n3ws.polux-hosting.com:80/2010/08 dafthack.com, http://dafthack.com:80/blog/pentestingwithbacktrackoscpreview dbasystem.com, http://dbasystem.com:80/recursos-y-herramientas-en-la-red-sobre-seguridad-y-hacking double-dragon.blogspot.com, http://double-dragon.blogspot.com:80/2011/11/hack-server-kioptrix-level-1.html dr3dr3.mihanblog.com, http://dr3dr3.mihanblog.com:80 virtadpt.net, http://drwho.virtadpt.net:80 egebook.net, http://egebook.net:80/file/pic/app/2015/07/b034f11e2e7ff631cfdc2ae8a217fe81.php colombiaredes.info, http://escorpion.colombiaredes.info:80/~laborato estacion-informatica.com, http://estacion-informatica.com:80 evilc0de.blogspot.com, http://evilc0de.blogspot.com:80/2014/10/wordpress-slideshow-gallery-146-shell.html floyd.ch, http://floyd.ch:80 h4ck3rcracks.com, http://h4ck3rcracks.com:80/2012_06_01_archive.html hackmeimfamous.xyz, http://hackmeimfamous.xyz:80/archive hiddenspider.net, http://hiddenspider.net:80/links/links-3 hxbl4nk.blogspot.co.id, http://hxbl4nk.blogspot.co.id:80 ics-informatique.com, http://ics-informatique.com:80/category/insolite icttf.org, http://icttf.org:80/rssfeeds/view/31/us-cert-cyber-security-bulletins ihazomgsecurityskillz.blogspot.ro, http://ihazomgsecurityskillz.blogspot.ro:80 incubus.homelinux.net, http://incubus.homelinux.net:80/forum/forum/varie/exploit/126584-exploit-db-webapps-wordpress-supportezzy-ticket-system-plugin-1-2-5-stored-xss-vulnerability indiancomputerwizard.com, http://indiancomputerwizard.com:80 infodicas.com.br, http://infodicas.com.br:80/wordpress/nova-vulnerabilidade-critica-no-thimtumb-outra-vez infosecstuff.com, http://infosecstuff.com:80/openx-csrf-vulnerability-being-actively-exploited kaoticcreations.blogspot.fr, http://kaoticcreations.blogspot.fr:80 kaoticcreations.blogspot.gr, http://kaoticcreations.blogspot.gr:80 kaoticcreations.blogspot.in, http://kaoticcreations.blogspot.in:80 kurd-h-zone.com, http://kurd-h-zone.com:80/bak.php/?id=633 lanyus.com, http://lanyus.com:80/wordpress/链接 learnnetsec.blogspot.com, http://learnnetsec.blogspot.com:80/2015/10/12-million-unique-passwords-list.html momodrock.blogspot.in, http://momodrock.blogspot.in:80/2012_02_01_archive.html nes.fr, http://nes.fr:80/securitylab/? nixmicrosoft.blogspot.com, http://nixmicrosoft.blogspot.com:80/2011/05/snort-barnyard2-base-tren-centos.html pbweb.cz, http://pbweb.cz:80/Hot%20Database/exploit.html pentester.es, http://pentester.es:80 poc-hack.blogspot.com.es, http://poc-hack.blogspot.com.es:80 jabetto.com, http://portal.jabetto.com:80/support/discussions/topics/5000006361 poshalzagros.ir, http://poshalzagros.ir:80/poshalzagros/sakht-karkhane-tolid-poshal-koler programmingethicalhackerway.blogspot.com, http://programmingethicalhackerway.blogspot.com:80/2015/07/conditional-statements-if-else-else-if.html refinedpractice.com, http://refinedpractice.com:80/2014/01/choosing-a-wordpress-plugin russellnomer.com, http://russellnomer.com:80/full-disclosure.html?m samiux.blogspot.in, http://samiux.blogspot.in:80 securethelock.com, http://securethelock.com:80/zimbra-zero-day-exploit-allows-privilege-escalation-via-lfi-2 novaclic.com, http://securid.novaclic.com:80/cyber-securite-industrielle/anssi-classification-et-mesures.html seguranca-informatica.net, http://seguranca-informatica.net:80 seleniumhome.blogspot.in, http://seleniumhome.blogspot.in:80/2013/07/automatingbreaking-captcha-using.html zeering.com, http://server.zeering.com:80/LoadAnswers.aspx?q=How-to-install-apd-in-debian-php5 lxnan.com, http://static.lxnan.com:80/Knownsec_RD_Checklist_v2.2/v2.2.html stealthentry.com, http://stealthentry.com:80 tech4lab.blogspot.com, http://tech4lab.blogspot.com:80/2012/05/root-rooting-webserver.html thehackernewsvn.blogspot.com, http://thehackernewsvn.blogspot.com:80/2012/08/cain-abel-chuong-trinh-nghe-len-tim-mat.html thehackerspaper.com, http://thehackerspaper.com:80/2009/06/analizar-vulnerabilidades-web-traves-de.html todosoluciones.es, http://todosoluciones.es:80/2012/03/14/penetrando-y-manteniendo-acceso-metasploit-netcat uaehackers.com, http://uaehackers.com:80 versionactualdelplugin.blogspot.com, http://versionactualdelplugin.blogspot.com:80/2015/04/downloadupdater.html whitecliffe.com.au, http://whitecliffe.com.au:80/en/images/press/large/1343512116_mshfr.phtml winteacher.com, http://winteacher.com:80/part2/expert/57.htm wp-how-to.com, http://wp-how-to.com:80/wordpress-tutorials/optimize-the-security-of-your-wordpress-website-part-1 xakep-archive.ru, http://xakep-archive.ru:80/xa-content/xa/147/55544/default.htm xocoder.com, http://xocoder.com:80 xoda.org, http://xoda.org:80 zitstif.no-ip.org, http://zitstif.no-ip.org:80 0937686468.com, http://0937686468.com:80 phdays.com, http://2013.phdays.com:80/program/conference 3kconsulting.ca, http://3kconsulting.ca:80/xZ.php 3ncrypt0r.blogspot.com.au, http://3ncrypt0r.blogspot.com.au:80 alexfeleol.com.br, http://alexfeleol.com.br:80/2013/02/18/google-hacking amolnaik4.blogspot.in, http://amolnaik4.blogspot.in:80/2011_05_01_archive.html asafety.fr, http://asafety.fr:80/vuln-exploit-poc/lfd-rce-zeroshell-2-0rc2-multiple-vulnerabilities assuntonerd.com.br, http://assuntonerd.com.br:80/category/seguranca dedalo.in, http://backup.dedalo.in:80 bigsea.com.cn, http://bigsea.com.cn:80/archives/1079 airbuscybersecurity.com, http://blog.airbuscybersecurity.com:80/post/2014/05/APT-Kill-chain-Part-3-:-Reconnaissance cr4.sh, http://blog.cr4.sh:80/2010/12/windows.html gojhonny.com, http://blog.gojhonny.com:80/2013/10/buffer-overflow-smashing-stack-tutorial.html harvie.cz, http://blog.harvie.cz:80 infosecsee.com, http://blog.infosecsee.com:80/2012_06_01_archive.html mayaseven.com, http://blog.mayaseven.com:80/2014/01 teusink.net, http://blog.teusink.net:80/2010_08_01_archive.html budaklembur0703.blogspot.in, http://budaklembur0703.blogspot.in:80 bugdz.co.vu, http://bugdz.co.vu:80 caceriadespammers.com.ar, http://caceriadespammers.com.ar:80/2013/03/google-hack-awstats.html calebbucker.blogspot.com.es, http://calebbucker.blogspot.com.es:80/2012/08/wordpress-y-algunas-de-sus.html cloud101.eu, http://cloud101.eu:80/linux/security/programming/slae32/2013/05/03/slae-assigment-3-egg-hunter-shellcode.html codeexplain.com, http://codeexplain.com:80/code/815a76b0-4c5c-4ae0-885d-05446b60c879 cseye.vcp.ir, http://cseye.vcp.ir:80/forum/thread-3032-46232.html?list=2 cybersafenv.org, http://cybersafenv.org:80/category/us-cert-all/page/13 demolarimiz.com, http://demolarimiz.com:80/dugunv2/images/galeri/2026_kod.php securescout.com, http://descriptions.securescout.com:80/tc/19572 digitalplace.nl, http://digitalplace.nl:80/tutorials/programmeren/1134/maak-je-php-website-veilig dvw-j.blogspot.com, http://dvw-j.blogspot.com:80/2010/05/phpmyadmin.html ehacking.com.bo, http://ehacking.com.bo:80/author/ehcadmin/page/6 exactlimon.com, http://exactlimon.com:80/1478/general/insecam-camaras-con-contrasena-por-defecto-en-todo-el-mundo.html farzadsharifi.ir, http://farzadsharifi.ir:80 handgrep.se, http://fluxius.handgrep.se:80/2011/10/20/the-art-of-elf-analysises-and-exploitations gosecure.it, http://gosecure.it:80/blog/art/510/sec/full-disclosure-ipswitch-imail-server-web-client-vulnerability hackbal.com, http://hackbal.com:80 hackcrack4u.blogspot.in, http://hackcrack4u.blogspot.in:80 hackdox.com, http://hackdox.com:80 hacked2bits.com, http://hacked2bits.com:80/it-security/my-first-bof-exploit hakingandsecurity.blogspot.in, http://hakingandsecurity.blogspot.in:80/2014_05_01_archive.html hamaiti.com, http://hamaiti.com:80/archives/2425 horizonsportnature.net, http://horizonsportnature.net:80/club-escalade/index.php hostingaldescubierto.com, http://hostingaldescubierto.com:80/wordpress/page/3 indianz.ch, http://indianz.ch:80/security.html indonesiahackercyberteam.blogspot.sg, http://indonesiahackercyberteam.blogspot.sg:80/2014/02/peralatan-hacker-cyber-war-version.html infobacktrack.net, http://infobacktrack.net:80/category/deface invisible-404.blogspot.com, http://invisible-404.blogspot.com:80/2014/04/data-incaran-para-hacker.html ismellpackets.com, http://ismellpackets.com:80/sans-dbis-2015-sec-401-dallas-tx-scratch-pad jamespegram.com, http://jamespegram.com:80/block-spam-by-math-reloaded joaonatalbertotti.adv.br, http://joaonatalbertotti.adv.br:80/?acao=empresa joeloughton.com, http://joeloughton.com:80/blog/web-applications/metservice-hacked-how-it-happened jumpespjump.blogspot.ca, http://jumpespjump.blogspot.ca:80 justlink.info, http://justlink.info:80/install/cfq.php kali4hackers.blogspot.co.uk, http://kali4hackers.blogspot.co.uk:80/p/some-important-links.html kali4hackers.blogspot.fr, http://kali4hackers.blogspot.fr:80/p/some-important-links.html kaoticcreations.blogspot.co.uk, http://kaoticcreations.blogspot.co.uk:80 kaoticcreations.blogspot.it, http://kaoticcreations.blogspot.it:80 kaoticcreations.blogspot.ro, http://kaoticcreations.blogspot.ro:80 kartalwebtasarimi.com, http://kartalwebtasarimi.com:80/yonetim/greybox/kode.php linuxerz.cl, http://konarr.linuxerz.cl:80 l4mers3c.com, http://l4mers3c.com:80/2013/10/09/fun-with-webmin leberger.biz, http://leberger.biz:80/090/lien.html linuxando.com, http://linuxando.com:80/distro.php?t=Kali%20Linux_21 localtechrepair.blogspot.in, http://localtechrepair.blogspot.in:80/2014/01/information-security-software-books-and.html lockboxx.blogspot.in, http://lockboxx.blogspot.in:80/2013_07_01_archive.html m3m0ry64p.blogspot.com, http://m3m0ry64p.blogspot.com:80/2011/11/installing-wordpress-in-ubuntu.html malhar.me, http://malhar.me:80/category/uncategorized mcle8.wordpress.com, http://mcle8.wordpress.com:80/2012/12/23/hosting-tools-with-zpanel-kloxo-and-ispconfig-3 mefhigoseth.com.ar, http://mefhigoseth.com.ar:80/2013/01/elastixorg-file-inclusion-vulnerability.html merron.ru, http://merron.ru:80/wso.php mesuttimur.com, http://mesuttimur.com:80/2013/12 mono-desktopsupport.blogspot.com, http://mono-desktopsupport.blogspot.com:80/2012/05/alcatel-x200-usb-hsdpa-modem-windows-7.html morihi-soc.net, http://morihi-soc.net:80/?p=219 muha-hacker.blogspot.com.tr, http://muha-hacker.blogspot.com.tr:80 nakedsecurity.com, http://nakedsecurity.com:80/exploit/224243.htm net-ict.blogfa.com, http://net-ict.blogfa.com:80 nulledtricks.blogspot.co.uk, http://nulledtricks.blogspot.co.uk:80/2015/04/best-hacking-websites-for-hackers-to.html p0deje.blogspot.in, http://p0deje.blogspot.in:80/2009_11_01_archive.html phpscriptsatisi.com, http://phpscriptsatisi.com:80/demo/dernekv2/wp-content/uploads/galeri/3467_kod.php poc-hack.blogspot.com, http://poc-hack.blogspot.com:80/2012/08/kioptrix-level-2.html runovikov.ru, http://pro.runovikov.ru:80/?cat=8 quickreply.blogspot.com, http://quickreply.blogspot.com:80/2014/02/sql-injection-vulnerability.html raidersec.blogspot.in, http://raidersec.blogspot.in:80/p/resources.html reelix.blogspot.com, http://reelix.blogspot.com:80/2009/01/mirc-635-key.html rohitpatel.in, http://rohitpatel.in:80 samiux.blogspot.ca, http://samiux.blogspot.ca:80/2013/07/howto-limechat-with-tor-on-mac-os-x-1084.html samiux.blogspot.com.tr, http://samiux.blogspot.com.tr:80/2011/05/howto-wpawpa2-cracking-with-backtrack-5.html samiux.blogspot.mx, http://samiux.blogspot.mx:80/2014/02/howto-kali-linux-106-on-macbook-air-mid.html secsky.sinaapp.com, http://secsky.sinaapp.com:80 secuid0.net, http://secuid0.net:80/?page_id=35 securitatea-informatica.ro, http://securitatea-informatica.ro:80 security-is-just-an-illusion.blogspot.com.tr, http://security-is-just-an-illusion.blogspot.com.tr:80 soykrucil.blogspot.com, http://soykrucil.blogspot.com:80/2011/11/php-reverse-shell-on-linux-server.html quequero.org, http://spin.quequero.org:80/Links cluat.com, http://stackoverflow.cluat.com:80/questions/19888522/complie-a-exploit-that-has-a-makefile tasharuk.net, http://tasharuk.net:80/ar/resources/index.php?id=1029 techinquiry.altervista.org, http://techinquiry.altervista.org:80/penetration-test-esempio-pratico-kali-linux-vs-kioptrix-level-1 tesban.com, http://tesban.com:80/hunharca-gulen-adam-2 teu-informatico.blogspot.com, http://teu-informatico.blogspot.com:80/2007/09/ingls-sin-barreras.html tontonfred.net, http://tontonfred.net:80/blog/?p=2034 iooiu.com, http://tools.iooiu.com:80 tutos.eu, http://tutos.eu:80/favoris.php ehcommunity.com, http://vb.ehcommunity.com:80/f159/t85656 voip-lab.ru, http://voip-lab.ru:80/2013/08 woop.es, http://wiki.woop.es:80/ProFTPD_TELNET_IAC woltaj.org, http://woltaj.org:80/index.php?/topic/41-wordpress-participants-database-1548-sql-injection woollsaxe.co.za, http://woollsaxe.co.za:80/dynamic/packaging/thumbs/23/xd.php onion.city, http://xiwayy2kn32bo3ko.onion.city:80/test/read.cgi/ura/1360054308 xuantuyen47.com, http://xuantuyen47.com:80/backup-restore-database-bang-via-sshtelnet z3r0d4y.com, http://z3r0d4y.com:80 zoyzo.cn, http://zoyzo.cn:80/index.php 0x0ff.info, http://0x0ff.info:80/2014/cracking-password-fiche-memo 0xdeadbeef.info, http://0xdeadbeef.info:80 47.re, http://47.re:80 4lbayrak.wordpress.com, http://4lbayrak.wordpress.com:80/2012/05/18/676 admlife.de, http://admlife.de:80 adsa.co.in, http://adsa.co.in:80/admin/pdf/wp-post.php allanjaydumanhug.ninja, http://allanjaydumanhug.ninja:80/blog/dragonpay-ph-bug andrusk.com, http://andrusk.com:80 anilaobeachclub.com, http://anilaobeachclub.com:80/site-map.htm antisec-security.blogspot.mx, http://antisec-security.blogspot.mx:80/2013_11_01_archive.html arjunkotri.in, http://arjunkotri.in:80/2014_11_01_archive.html arthusu.blogspot.mx, http://arthusu.blogspot.mx:80 ashifgsm1.blogspot.com, http://ashifgsm1.blogspot.com:80/2012/03/blog-post_1497.html averagesecurityguy.info, http://averagesecurityguy.info:80/2011/12/09/owning-a-coldfusion-server b34tz.net, http://b34tz.net:80 ben0xa.com, http://ben0xa.com:80/links billscontinuinglife.com, http://billscontinuinglife.com:80/feeds bitbull.ch, http://bitbull.ch:80/wiki/index.php/Hacking_Notes blackpentesters.blogspot.ae, http://blackpentesters.blogspot.ae:80 bluenotch.com, http://blog.bluenotch.com:80 boanhack.com, http://blog.boanhack.com:80/107 ghostsec-team.org, http://blog.ghostsec-team.org:80/2015/08/kumpulan-exploit-wordpress.html guetsec.org, http://blog.guetsec.org:80/?p=844 l3g3ndary.org, http://blog.l3g3ndary.org:80/2014/08/05/oscp-my-chronicle mikeclassic.ca, http://blog.mikeclassic.ca:80/post/joomla-nonumber-hack nigmatullin.net, http://blog.nigmatullin.net:80 sbarbeau.fr, http://blog.sbarbeau.fr:80/2010_04_01_archive.html brainoverflow.org, http://brainoverflow.org:80 bs-img.com, http://bs-img.com:80/hoax.htm c0decstuff.blogspot.com, http://c0decstuff.blogspot.com:80/2010/02/tinymce-wysiwyg-editor-multiple_11.html carluys.blogspot.mx, http://carluys.blogspot.mx:80/2012/04/atacando-servidor-vulnerabilidad-php.html ceh7hacking.blogspot.in, http://ceh7hacking.blogspot.in:80/2013_07_01_archive.html census-labs.com, http://census-labs.com:80/news/2011/10/03/netvolution-referer-SQLi certsandprogs.com, http://certsandprogs.com:80 computer4-you.blogspot.com, http://computer4-you.blogspot.com:80/2013/07/footprinting.html con2me.blogspot.in, http://con2me.blogspot.in:80/2011/04/how-to-compiler-bcompilerxampplampp-on.html contagiodump.blogspot.fr, http://contagiodump.blogspot.fr:80/2010_07_01_archive.html controllingtheinter.net, http://controllingtheinter.net:80/forums/viewtopic.php?f=83&t=1141 crystalcube.co.kr, http://crystalcube.co.kr:80/category/Security darklest.me, http://darklest.me:80/2013/12/user-pass-seesantvcom-12.html david.web.tr, http://david.web.tr:80/pen-testing-process.html dcepler.net, http://dcepler.net:80/archives.cfm/category/adobe debugroom.fr, http://debugroom.fr:80/categorie/non-classe/page/3 desktop2ch.org, http://desktop2ch.org:80/software/1316143566 wirelesssecured.com, http://dev2.wirelesssecured.com:80/index.php/resources/71-news/packet-storm-exploits/3248-wordpress-leaguemanager-3-8-sql-injection digimagical.com, http://digimagical.com:80/wordpress/resourcen/security doomedraven.com, http://doomedraven.com:80/2013_04_01_archive.html dotdotpwn.blogspot.com, http://dotdotpwn.blogspot.com:80/2011/02/dotdotpwn-v21-directory-traversal.html dutalinux.org, http://dutalinux.org:80/webid-remote-exploit-php-shell e-spohn.com, http://e-spohn.com:80/blog/2010/12/10/local-privilege-escalation-windows eas7.livejournal.com, http://eas7.livejournal.com:80/622831.html eggpain.tk, http://eggpain.tk:80/ghdb ethicalhacking.do.am, http://ethicalhacking.do.am:80/faq evilc0de.blogspot.com.es, http://evilc0de.blogspot.com.es:80 f13-labs.net, http://f13-labs.net:80 fernandogr.com.br, http://fernandogr.com.br:80/fgrblog/dino-news/? frishella.com, http://frishella.com:80/2015/08/rooting-server-with-weevely-windows.html geekologie.me, http://geekologie.me:80/2013/05/firefox-connaitre-la-version-de-wordpress-utilisee-par-un-blog-en-un-clic.html ghasronline.com, http://ghasronline.com:80/lammers/archive/index.php/thread-3-14.html godwincaruana.me, http://godwincaruana.me:80 gothie27.blogspot.in, http://gothie27.blogspot.in:80 vaillant.me, http://guillaume.vaillant.me:80/?p=349 gutermann.net, http://gutermann.net:80/lesezeichen h3rucutu.blogspot.com, http://h3rucutu.blogspot.com:80/2013/01/google-hacking-database.html hackingcrackingweb.blogspot.com, http://hackingcrackingweb.blogspot.com:80/2012/07/google-dorks.html hacksec.cn, http://hacksec.cn:80/?post=11 hacktrack.com, http://hacktrack.com:80 hacktxt.com, http://hacktxt.com:80/article/sort012/sort0228/info-70079.html haclong.info, http://haclong.info:80/2015/01/wpscan-tim-va-khai-thac-lo-hong-trong.html hakawati.co.kr, http://hakawati.co.kr:80/150 haowu.info, http://haowu.info:80/2010/08 hauntit.blogspot.com.tr, http://hauntit.blogspot.com.tr:80/p/public-3107.html howtheyhack.com, http://howtheyhack.com:80/hack-bots-how-do-they-work ikotler.org, http://ikotler.org:80 indonesianhackeranonymous.blogspot.com, http://indonesianhackeranonymous.blogspot.com:80/2013/04/cara-deface-website-melalui-spaw-uploud.html informatiquedzon.blogspot.com, http://informatiquedzon.blogspot.com:80/2014/04/31.html infosecdailydigest.com, http://infosecdailydigest.com:80/2013/08 infosecninja.blogspot.com, http://infosecninja.blogspot.com:80/2013/07/penetration-testing-samba-server.html insecure.cl, http://insecure.cl:80/links insidetrust.blogspot.in, http://insidetrust.blogspot.in:80/2010/11/adobe-pdf-reader-x-worlds-most.html ipositivesecurity.blogspot.com, http://ipositivesecurity.blogspot.com:80/2012/08/passed-giac-gxpn-exam.html isecurestuff.com, http://isecurestuff.com:80/sb14-335-vulnerability-summary-for-the-week-of-november-24-2014 iod.krakow.pl, http://it.iod.krakow.pl:80/google-hacking-sprytne-wyszukiwanie jabsoft.io, http://jabsoft.io:80 jl.blogsky.com, http://jl.blogsky.com:80 joomlaid.it, http://joomlaid.it:80/joomla-youtube-component.html junookyo.blogspot.com.au, http://junookyo.blogspot.com.au:80/2012_02_01_archive.html justin-goldberg.blogspot.ca, http://justin-goldberg.blogspot.ca:80 kali4hackers.blogspot.co.il, http://kali4hackers.blogspot.co.il:80/p/some-important-links.html kali4hackers.blogspot.com.tr, http://kali4hackers.blogspot.com.tr:80/p/some-important-links.html kalpin.us, http://kalpin.us:80 kaoticcreations.blogspot.pt, http://kaoticcreations.blogspot.pt:80 kecoak.or.id, http://kecoak.or.id:80/f34r-u5-f34r-u5-dude.html kkib.com.tw, http://kkib.com.tw:80/upload/1340794475.php lamaredugof.fr, http://lamaredugof.fr:80/blog/wp-content/uploads/2013/10/20131020_Breves_Rattrapage.htm lokisec.com, http://lokisec.com:80/?p=325 luom.net, http://luom.net:80 m4g1c5t0rm.blogspot.com, http://m4g1c5t0rm.blogspot.com:80/2011/12/microsoft-sql-server-downgrade-attack.html malicious.sinaapp.com, http://malicious.sinaapp.com:80 martijn-lammerts.com, http://martijn-lammerts.com:80/portal/aggregator/categories/8?page=21 maverickblogging.com, http://maverickblogging.com:80 megamerel.nl, http://megamerel.nl:80/c-e-h miguellopes.net, http://miguellopes.net:80/0day-no-wordpress-com-timthumb mmtechebooksfree.blogspot.in, http://mmtechebooksfree.blogspot.in:80/2013/08/best-ethical-hacking-ebooks-collection.html mondotech.blogspot.se, http://mondotech.blogspot.se:80 mono-desktopsupport.blogspot.gr, http://mono-desktopsupport.blogspot.gr:80 mono-desktopsupport.blogspot.in, http://mono-desktopsupport.blogspot.in:80 mstrokin.com, http://mstrokin.com:80/category/sec mustafakaya.com.tr, http://mustafakaya.com.tr:80 mysec.hu, http://mysec.hu:80/magazin/kuelfoeldi-hirek/10585-hacking-with-new-diy-google-dorks-based-hacking-tool naifsabrah.com, http://naifsabrah.com:80/2015/03/blog-post_33.html netwrkspider.blogspot.com, http://netwrkspider.blogspot.com:80/2012/05/how-to-install-google-adwords-on-ubuntu.html nextstopcode.com, http://nextstopcode.com:80 okamalo.com, http://okamalo.com:80 onestraw.net, http://onestraw.net:80/links.html ostimdenal.com, http://ostimdenal.com:80/demo/dugunv2/images/galeri/23_kod.php osvaldohp.blogspot.com.br, http://osvaldohp.blogspot.com.br:80/2011/11/entendendo-iptables-prerouting-e.html altx-soft.ru, http://ovaldb.altx-soft.ru:80/Definition.aspx?id=oval:org.mitre.oval:def:27557 penguinpackets.com, http://penguinpackets.com:80/~kelly/kblog/blog pentest.it, http://pentest.it:80/cve-2014-2340.html poc-hack.blogspot.com.tr, http://poc-hack.blogspot.com.tr:80/2012_08_01_archive.html poc-hack.blogspot.in, http://poc-hack.blogspot.in:80/2012_08_01_archive.html popms.net, http://popms.net:80/en/news portantier.com, http://portantier.com:80/obteniendo-datos-analizando-peticiones-http ppkj.net, http://ppkj.net:80 predi-blog.blogspot.com, http://predi-blog.blogspot.com:80/2008/11/pertanyaan-seputar-wireless.html pwnag3.com, http://pwnag3.com:80 qiaocui.net, http://qiaocui.net:80/post/33fdca_5e6c313 quickreply.blogspot.com.tr, http://quickreply.blogspot.com.tr:80/2014/02/sql-injection-vulnerability.html qyqoqat.comuv.com, http://qyqoqat.comuv.com:80/echoes-advanced-guestbook-234.php reelix.blogspot.gr, http://reelix.blogspot.gr:80/2013/05/mirc-732-crack.html refinedinteriors.com.au, http://refinedinteriors.com.au:80/author/admin rockfishsec.com, http://rockfishsec.com:80/2014_01_01_archive.html sadk.org, http://sadk.org:80/page/24 samiux.blogspot.fr, http://samiux.blogspot.fr:80/2013/05/howto-freemind-on-ubuntu-desktop-1204.html scadahacker.blogspot.in, http://scadahacker.blogspot.in:80/2014/03/recent-development-of-ics-exploits.html scadahacker.blogspot.sg, http://scadahacker.blogspot.sg:80/2014/01/gleg-releases-ver-131-of-scada-exploit.html sec-worldweb.blogspot.com.tr, http://sec-worldweb.blogspot.com.tr:80/2013/06/blog-post_752.html sectalk.ir, http://sectalk.ir:80/235/هک-پانل-هاستینگ-cpanel security-geeks.blogspot.com.es, http://security-geeks.blogspot.com.es:80 security-sh3ll.blogspot.fr, http://security-sh3ll.blogspot.fr:80 security-sh3ll.blogspot.in, http://security-sh3ll.blogspot.in:80 securityec.com, http://securityec.com:80/herramientas-enfocadas-a-las-seguridad-informatica-pen-testing-seguridadinformatica securityhorror.blogspot.co.uk, http://securityhorror.blogspot.co.uk:80/2012_04_08_archive.html securitypadawan.blogspot.com, http://securitypadawan.blogspot.com:80/2011/10/attacking-metasploitable-part-2.html securityresearch.in, http://securityresearch.in:80/index.php/projects/malware_lab/m_briefing/metasploit-exploits securobo.com, http://securobo.com:80/security/2014/11/11/بهترین-پلاگین-های-وردپرس seenhack.com, http://seenhack.com:80/archives/author/0x191-unauthorized seyfullahkilic.com, http://seyfullahkilic.com:80/ios-application-security sbgodin.fr, http://shaarli.sbgodin.fr:80/?searchtags=en shwekoyantaw.blogspot.in, http://shwekoyantaw.blogspot.in:80 smallrascal.cn, http://smallrascal.cn:80/smallrascal/default.asp smemorando.com, http://smemorando.com:80 soft-genius.blogspot.ca, http://soft-genius.blogspot.ca:80 soft-genius.blogspot.com, http://soft-genius.blogspot.com:80/2012/09/exploit-writing-complete-guidelines-for.html solidmonster.com, http://solidmonster.com:80/tag/havij spareclockcycles.org, http://spareclockcycles.org:80/2010/08/01/multiple-vulnerabilities-in-xerver-4-32 sploit.ir, http://sploit.ir:80/تحقیق-و-بررسی-آسیب-پذیری-internet-explorerو-نحوه-اکسپ squiggle.city, http://squiggle.city:80/~acg stan.gr, http://stan.gr:80/2013/03/building-pentest-lab.html helloworldweb.com, http://status.helloworldweb.com:80/2010/09/critical-security-update-joomla-15-0day.html svatava.co.uk, http://svatava.co.uk:80/links.htm securityupdate.info, http://t130189.security-ids-snort-emerging-sigs.securityupdate.info:80/daily-ruleset-update-summary-11-10-2014-t130189.html tailongtq.blogspot.com, http://tailongtq.blogspot.com:80/2010/11/bsod-with-vulnerability-ms10054.html teamctfu.weebly.com, http://teamctfu.weebly.com:80/pun1sh_3r.html teamhackaholic.blogspot.com, http://teamhackaholic.blogspot.com:80/2011/11/website-hacking-remote-file-inclusion_03.html tecnologia-simples.blogspot.com.br, http://tecnologia-simples.blogspot.com.br:80 teu-informatico.blogspot.in, http://teu-informatico.blogspot.in:80/2009/12/cc2bank-13-bin-checker.html the-linke.blogspot.com, http://the-linke.blogspot.com:80/2013/10/blog-post_4633.html thegreycorner.com, http://thegreycorner.com:80/2010/01/beginning-stack-based-buffer-overflow.html tinyls.net, http://tinyls.net:80/? tokyo-fudousan.asia, http://tokyo-fudousan.asia:80/content/338 tranzcare.in, http://tranzcare.in:80/? vagmour.eu, http://vagmour.eu:80/kioptrix-2014 vanchester.ru, http://vanchester.ru:80/bookmarks vansoest.it, http://vansoest.it:80/v1/uk/default.asp?file=rss.whcICT vhbgr0up.blogspot.com, http://vhbgr0up.blogspot.com:80/2013/04/mot-so-dien-hacking-va-ug.html viedugeek.eu, http://viedugeek.eu:80/topic/224-exploitdb-base-de-données-du-hacker voice0fblackhat.blogspot.com.tr, http://voice0fblackhat.blogspot.com.tr:80/2012/01/from-vuln-site-to-symlink.html voice0fblackhat.blogspot.in, http://voice0fblackhat.blogspot.in:80/2012/01/from-vuln-site-to-symlink.html web-analizi.blogspot.com, http://web-analizi.blogspot.com:80/2014/12/blackarch-linux-v20141007-1050-pentest.html website-list-info.blogspot.in, http://website-list-info.blogspot.in:80/2012/11/website-list-15001-16000.html brokentwill.co.uk, http://wholesale.brokentwill.co.uk:80/d53d0-hentai-sitemap-watch-a72d7-free whysuck.com, http://whysuck.com:80/why-joomla-sucks tuxunix.com, http://wiki.tuxunix.com:80/index.php/Hack witamine.com, http://witamine.com:80/2014/05/15/wordpress-infection-elf-malware-ld_preload-librairies-so xportaaberta.blogspot.com.br, http://xportaaberta.blogspot.com.br:80 0entropy.blogspot.fr, http://0entropy.blogspot.fr:80 0underground7.blogspot.com, http://0underground7.blogspot.com:80/2011/01/test.html 0verl0ad.net, http://0verl0ad.net:80/2011_07_01_archive.html 0x191unauthorized.blogspot.com, http://0x191unauthorized.blogspot.com:80/2015/04/is-php-vulnerable-and-under-what.html 3ncrypt0r.blogspot.com, http://3ncrypt0r.blogspot.com:80/2012/09/bypassing-antivirus-with-pe-crypters.html 3ncrypt0r.blogspot.in, http://3ncrypt0r.blogspot.in:80 49mm.com, http://49mm.com:80/archives/date/2013/01 6scanopedia.com, http://6scanopedia.com:80/wp-e-commerce-plugin-sql-injection acehline.or.id, http://acehline.or.id:80/latest-google-hacking-dork brad-x.com, http://aconole.brad-x.com:80/programs/sfuzz.html activpc.com, http://activpc.com:80/tools/newsfeeds/13-us-cert/3-cyber-security-bulletins addmattress.com, http://addmattress.com:80/xshll.php.php agnosticdev.com, http://agnosticdev.com:80/popular-tags/Linux alexanderheid.com, http://alexanderheid.com:80/2014/03 alfanhendro.com, http://alfanhendro.com:80/free-open-source-classifieds-php-scripts allnetworkhacking.blogspot.in, http://allnetworkhacking.blogspot.in:80/p/site-hack_4802.html allpctricx.blogspot.nl, http://allpctricx.blogspot.nl:80/2014/10/tutorial-hack-wordpress-websitesno.html almanshurin.com, http://almanshurin.com:80/2011/11/form-shapping-program-in-c alt-f4.de, http://alt-f4.de:80 altussolutionsllc.com, http://altussolutionsllc.com:80/newsevents/13-cyber-security/1-cyber-tips.html amkenisasa.blogspot.co.il, http://amkenisasa.blogspot.co.il:80/2015/01/hacking-asus-rt-ac66u-and-preparing-for_11.html ammarsufyan56.blogspot.com, http://ammarsufyan56.blogspot.com:80/2015/01/cara-carding-pengertiannya.html amolnaik4.blogspot.com.es, http://amolnaik4.blogspot.com.es:80/2011_05_01_archive.html amroot.com, http://amroot.com:80 animecyber-id.blogspot.com, http://animecyber-id.blogspot.com:80/2014/06/cara-deface-dengan-jomsoc-remote-code.html anonhacknews.blogspot.co.uk, http://anonhacknews.blogspot.co.uk:80/2013/04/habbo-full-sql-database-lulzsecreborn.html anonhacknews.blogspot.com.es, http://anonhacknews.blogspot.com.es:80/2012/06/passwords-internet-insecure.html anonhacknews.blogspot.com.tr, http://anonhacknews.blogspot.com.tr:80 anonhacknews.blogspot.com, http://anonhacknews.blogspot.com:80/2012/06/hacked-premium-brazzers-leaked-1352.html anonhacknews.blogspot.in, http://anonhacknews.blogspot.in:80 anthonyvoza.blogspot.com, http://anthonyvoza.blogspot.com:80/2013/09/hack-this-site-basic-mission-9.html anugrah-tamfan.blogspot.com, http://anugrah-tamfan.blogspot.com:80/2014/08/peralatan-cyber-wars-version-indonesian.html arcsightbbs.com, http://arcsightbbs.com:80/forum.php?mod=viewthread&tid=57 arthusu.blogspot.com.es, http://arthusu.blogspot.com.es:80 meah.me.uk, http://ashley.meah.me.uk:80 asyaecza.com, http://asyaecza.com:80/yonetim/dosyalar/icerik/kode.php atver.info, http://atver.info:80/domain-whois wavecom.pw, http://audit.wavecom.pw:80/21e668bf8fbd12895a00516a8b51a5e3532867ef5a263a6f7cdbdca99ce2f599 ayopaul.blogspot.fr, http://ayopaul.blogspot.fr:80/2013_04_01_archive.html backtracktut.blogspot.com, http://backtracktut.blogspot.com:80/2013/12/dos-es-ddos-tamadasok-tulterheleses.html bad-bytes.blogspot.in, http://bad-bytes.blogspot.in:80/2011/09/revisting-recent-oscommerce-mass.html bad-robot.blogspot.mx, http://bad-robot.blogspot.mx:80 baesystemsai.blogspot.be, http://baesystemsai.blogspot.be:80/2015/06/new-mac-os-malware-exploits-mackeeper.html baesystemsai.blogspot.com, http://baesystemsai.blogspot.com:80/2015/06/new-mac-os-malware-exploits-mackeeper.html baesystemsai.blogspot.ie, http://baesystemsai.blogspot.ie:80/2015/06/new-mac-os-malware-exploits-mackeeper.html banglarpost.blogspot.com, http://banglarpost.blogspot.com:80/2015/04/hacker-you-will-be-rejected-more-then.html basic-hack.blogspot.in, http://basic-hack.blogspot.in:80 binaryhackers.net, http://binaryhackers.net:80 binaryplanting.com, http://binaryplanting.com:80 blackhathack.com, http://blackhathack.com:80/2014/09/how-to-exploit-shellshock-vulnerability.html blackhellworld.blogspot.in, http://blackhellworld.blogspot.in:80/2015_01_04_archive.html blackpentesters.blogspot.com, http://blackpentesters.blogspot.com:80/2013/12/linux-privilege-escalation-enumeration.html blackpentesters.blogspot.in, http://blackpentesters.blogspot.in:80 b-nm.at, http://blog.b-nm.at:80/2014/08/15/various-security-checks bekyarov.info, http://blog.bekyarov.info:80/php-fatal-error-call-to-undefined-function-bcsub cinu.pl, http://blog.cinu.pl:80/2012_12_01_archive.html dm4.tw, http://blog.dm4.tw:80/blog/2012/07/22/hitcon-2012-wargame-notes illurity.com, http://blog.illurity.com:80 j2g2.com, http://blog.j2g2.com:80 jeremyscott.org, http://blog.jeremyscott.org:80/? leune.org, http://blog.leune.org:80/2009_12_01_archive.html msf8.tk, http://blog.msf8.tk:80/2014/11/kali-penetration-system-initialization-settings.html nettion.com.br, http://blog.nettion.com.br:80/2010_09_01_archive.html nobytes.com, http://blog.nobytes.com:80/2012/03/android-colornote-notes-recovery.html nonamecyberteam.com, http://blog.nonamecyberteam.com:80/2014/07/jomsocial-26-remote-code-execution.html phpdreamer.ru, http://blog.phpdreamer.ru:80/?arhiv=1 politoinc.com, http://blog.politoinc.com:80/2015/04 risk.io, http://blog.risk.io:80/author/michael seguesec.com, http://blog.seguesec.com:80/blog-2 sharpesecurity.com, http://blog.sharpesecurity.com:80 sweetchip.kr, http://blog.sweetchip.kr:80/category/0x10%20정보보안/0x15%20System vidasconcurrentes.com, http://blog.vidasconcurrentes.com:80 w4kfu.com, http://blog.w4kfu.com:80/tag/64bits yougom.com, http://blog.yougom.com:80/category boltonwebdesign.net, http://boltonwebdesign.net:80/articles breacaliente.blogspot.com.tr, http://breacaliente.blogspot.com.tr:80/2009/05/ssl-debil-de-cifra.html c-mediapro.com, http://c-mediapro.com:80 caarels.nl, http://caarels.nl:80/sure.php calebbucker.blogspot.com.ar, http://calebbucker.blogspot.com.ar:80/2012_11_01_archive.html calebbucker.blogspot.in, http://calebbucker.blogspot.in:80/2013/01/php-audit-el-arte-de-encontrar-0-days.html casadoimpermeabilizante.com.br, http://casadoimpermeabilizante.com.br:80/noticias casual-scrutiny.blogspot.in, http://casual-scrutiny.blogspot.in:80/2015/03/defeating-emet-52-protections-2.html central-cyber2.blogspot.com, http://central-cyber2.blogspot.com:80/2012/02/cara-root-lewat-shell.html cert-devoteam.fr, http://cert-devoteam.fr:80/wisec/WISecNews-2010.html chatsubo-labs.blogspot.mx, http://chatsubo-labs.blogspot.mx:80 chennaicyberforce.com, http://chennaicyberforce.com:80/complete-web-pentesting-tools-list chosik.com, http://chosik.com:80 ciphermonk.net, http://ciphermonk.net:80 ciprianidesign.com, http://ciprianidesign.com:80 ciuffysblog.blogspot.com, http://ciuffysblog.blogspot.com:80/2014/07/how-i-hacked-you-generical-guide-to.html ciuffysblog.blogspot.in, http://ciuffysblog.blogspot.in:80 ciuffysblog.blogspot.it, http://ciuffysblog.blogspot.it:80 clicknconnect.nl, http://clicknconnect.nl:80/amazon-web-services codehackersblog.blogspot.in, http://codehackersblog.blogspot.in:80/2015/06/80-best-free-hacking-tutorials.html codinguy.net, http://codinguy.net:80/2013/05/16/reverse-tcp-bind-shell con2me.blogspot.com, http://con2me.blogspot.com:80/2011/04/how-to-compiler-bcompilerxampplampp-on.html consulmatic.net, http://consulmatic.net:80/isacaguatemala/aggregator corazoncontentogranada.org, http://corazoncontentogranada.org:80/xmlrpc.php?rsd coretanrakapaksi.blogspot.com.tr, http://coretanrakapaksi.blogspot.com.tr:80/2013/10/xampp-for-linux-write-access.html coretanrakapaksi.blogspot.com, http://coretanrakapaksi.blogspot.com:80/2013/03/cara-upload-shell-backdoor-di-wordpress.html creturn.com, http://creturn.com:80/html/2012-07-02-wordpress-fancy-gallery-plugin-1-2-4-漏洞利用.html crowz.co.kr, http://crowz.co.kr:80/417 csaba.se, http://csaba.se:80 cyberfringe.com, http://cyberfringe.com:80/2014_07_01_archive.html cyberhero911.blogspot.com, http://cyberhero911.blogspot.com:80/2011/08/seek-n-destroy-team-history.html cyberix.blogfa.com, http://cyberix.blogfa.com:80 cybershaft.blogspot.com, http://cybershaft.blogspot.com:80/2010/12/how-to-run-php-exploit.html cyberthreats.org, http://cyberthreats.org:80 cybrexpert.blogspot.com, http://cybrexpert.blogspot.com:80/2013/07/hacking-joomla-websites-get-r00t-access.html d1966.blogspot.it, http://d1966.blogspot.it:80/2012_10_01_archive.html dartsec.com, http://dartsec.com:80/references.html scanny.io, http://dashboard.scanny.io:80/websites/23/scans/93ElGOXkyDrA decimadomuro.com.br, http://decimadomuro.com.br:80/promo defendhackers.blogspot.com, http://defendhackers.blogspot.com:80/2011/01/bill-gates-steve-jobsdocumentary-movie.html defsecurityjam.blogspot.com, http://defsecurityjam.blogspot.com:80/2015/05/freshly-vulnerable-vm-walkthrough-today.html demirozali.com, http://demirozali.com:80/?p=6 devlog.xyz, http://devlog.xyz:80/google-cloud-messaging-service-delay diablohorn.com, http://diablohorn.com:80/2014/07/26/writing-your-own-blind-sqli-script dotdotpwn.blogspot.ca, http://dotdotpwn.blogspot.ca:80 dotdotpwn.blogspot.com.tr, http://dotdotpwn.blogspot.com.tr:80 dotdotpwn.blogspot.sg, http://dotdotpwn.blogspot.sg:80 duniacybercrew.blogspot.com, http://duniacybercrew.blogspot.com:80/2012/02/thimthum-scanzen.html dynamicwirelessparts.com, http://dynamicwirelessparts.com:80/occasion-09da5-4x4-voitures-d-be8a9-sitemap earnestwish.com, http://earnestwish.com:80 ehopen-sec.blogspot.com, http://ehopen-sec.blogspot.com:80/2011/01/auditoria-de-passwords-brute-forcing.html eidelweiss-advisories.blogspot.com, http://eidelweiss-advisories.blogspot.com:80/2010/05/moodle-198-libdir-dirroot-rfi.html eklipse.es, http://eklipse.es:80/marcadores eldiabloazul.blogspot.com.es, http://eldiabloazul.blogspot.com.es:80 eldiabloazul.blogspot.com, http://eldiabloazul.blogspot.com:80/2012/09/all-about-skimmers.html electricworry.net, http://electricworry.net:80 elmundodeskizzo.blogspot.com.ar, http://elmundodeskizzo.blogspot.com.ar:80/2013_12_01_archive.html emanuelreis.blogspot.com, http://emanuelreis.blogspot.com:80/2009/09/tutorial-para-configuracao-de-adsl-oi.html ericamos.com, http://ericamos.com:80/us-cert nor.fi, http://ervinia.nor.fi:80/linkit.php eskisehir-tasarim.com, http://eskisehir-tasarim.com:80/script-demo/dugunv2/images/galeri/506_kodis.php ethicalhackingbhcc.blogspot.com, http://ethicalhackingbhcc.blogspot.com:80/2013/04/hack-of-week-hacking-ip-camera.html evidenciasecurity.blogspot.com.es, http://evidenciasecurity.blogspot.com.es:80/2010_12_01_archive.html evilc0de.blogspot.it, http://evilc0de.blogspot.it:80 exloid.info, http://exloid.info:80/hit.html expku.com, http://expku.com:80 exploiterz.blogspot.ca, http://exploiterz.blogspot.ca:80 exploiterz.blogspot.co.id, http://exploiterz.blogspot.co.id:80 exploiterz.blogspot.com.es, http://exploiterz.blogspot.com.es:80 exploiterz.blogspot.com.tr, http://exploiterz.blogspot.com.tr:80 exploiterz.blogspot.pt, http://exploiterz.blogspot.pt:80 fallensnow-jack.blogspot.com, http://fallensnow-jack.blogspot.com:80/2012/01/learning-metasploitable-tikiwiki.html fathe-shamsabad.com, http://fathe-shamsabad.com:80/io/f.php ferdi-it.blogspot.com, http://ferdi-it.blogspot.com:80/2013/12/patch-zimbra-0day-exploit-privilegie.html followersfacebook.jimdo.com, http://followersfacebook.jimdo.com:80/scorpion-hacked forensicsblog.org, http://forensicsblog.org:80/category/security-2/page/4 freaklyzone.blogspot.com, http://freaklyzone.blogspot.com:80/2010/02/google-dork.html freehack-tools.blogspot.it, http://freehack-tools.blogspot.it:80/2014_01_01_archive.html fsg2.org, http://fsg2.org:80/archives/11 fslab.dk, http://fslab.dk:80/wordpress/beskyt-din-wordpress-installation fuzzmyapp.com, http://fuzzmyapp.com:80/en/advisories.html garudabangkit.blogspot.com, http://garudabangkit.blogspot.com:80/2011/06/tutorial-menggunakan-xcode-sqli.html ghostblup.blogspot.com, http://ghostblup.blogspot.com:80/2010/04/url-cloacking.html ghostsecret-team.blogspot.be, http://ghostsecret-team.blogspot.be:80 gigavpn.net, http://gigavpn.net:80/?Page=IpsSignature&SP=390 gilsoncamelo.com.br, http://gilsoncamelo.com.br:80/?p=28 gl6.cc, http://gl6.cc:80/poc/index.php?page=170&platform=php glamisonsecurity.com, http://glamisonsecurity.com:80/2012/02/29/quando-lintelligence-si-rivolta-contro googlehacking.com.pl, http://googlehacking.com.pl:80/linki.html googlesearchfoo.com, http://googlesearchfoo.com:80/tag/search-parameter gruppohackeritaliano.blogspot.it, http://gruppohackeritaliano.blogspot.it:80/p/guide.html gunawanasia.blogspot.com, http://gunawanasia.blogspot.com:80/2011/07/mb-gb-kb-dan-mb.html gweb.persianblog.ir, http://gweb.persianblog.ir:80 h1tch.org, http://h1tch.org:80/wordpress/?cat=2 h2-exploitation.blogspot.com.tr, http://h2-exploitation.blogspot.com.tr:80/2013_07_01_archive.html h4cking.rozblog.com, http://h4cking.rozblog.com:80/post/158 hack-website.blogspot.com.es, http://hack-website.blogspot.com.es:80 hackandsecure.do.am, http://hackandsecure.do.am:80/publ/chuzhie_stati/nokaut_dlja_aol_poluchaem_privilegii_ruta_na_servere_korporacii_aol/2-1-0-9 hackcrack4u.blogspot.com, http://hackcrack4u.blogspot.com:80/2011/09/essential-terminology.html hacked-by.blogspot.com, http://hacked-by.blogspot.com:80/2011/01/read-file-via-my-sql-loadfile-function.html hackerblogegitimi.blogspot.com.tr, http://hackerblogegitimi.blogspot.com.tr:80 hackermayur.blogspot.com, http://hackermayur.blogspot.com:80/2012/09/stupid-geek-tricks-how-to-modify-icon.html hackermayur.blogspot.in, http://hackermayur.blogspot.in:80/2013/01/how-to-earn-mony-and-free-sms-per-msg-1.html hackernigata.blogspot.ae, http://hackernigata.blogspot.ae:80/2012/05/gathering-information-before-hacking.html hackersaddaa.blogspot.in, http://hackersaddaa.blogspot.in:80 hackerspointtk.blogspot.com.tr, http://hackerspointtk.blogspot.com.tr:80/2012/02/black-ubuntu.html hackfans.org, http://hackfans.org:80/showthread.php/163-آموزش-زبان-برنامه-نویسی-asp-net-2010 hackhow.to, http://hackhow.to:80/week-38-exploit-news hacking-share.blogspot.gr, http://hacking-share.blogspot.gr:80/2012/12/dictionaries-wordlists.html latestnewsabout.com, http://hacking.latestnewsabout.com:80 hackingbalg.blogspot.fr, http://hackingbalg.blogspot.fr:80 hackiteasy.blogspot.ae, http://hackiteasy.blogspot.ae:80 hackiteasy.blogspot.ca, http://hackiteasy.blogspot.ca:80 hackiteasy.blogspot.com.tr, http://hackiteasy.blogspot.com.tr:80 hackiteasy.blogspot.gr, http://hackiteasy.blogspot.gr:80 hackiteasy.blogspot.sg, http://hackiteasy.blogspot.sg:80 hackluom.net, http://hackluom.net:80 hackthepacket.com, http://hackthepacket.com:80/category/Network hacktroversy.com, http://hacktroversy.com:80/category/online-tools hackwithkalilinux.blogspot.com.tr, http://hackwithkalilinux.blogspot.com.tr:80/2014/08/exploiting-database-on-github-with-kali.html hacxorprogramming.blogspot.in, http://hacxorprogramming.blogspot.in:80/2013_11_01_archive.html hakhub.blogspot.com, http://hakhub.blogspot.com:80/2011/01/scanning-random-ip-ranges-for-specific.html halildz.com, http://halildz.com:80 hatdefender.com, http://hatdefender.com:80/vulnerabilities hauntit.blogspot.co.uk, http://hauntit.blogspot.co.uk:80/p/public-3107.html hcakofficial.blogspot.in, http://hcakofficial.blogspot.in:80/2015_01_01_archive.html hellcode.net, http://hellcode.net:80/publications help-society.weebly.com, http://help-society.weebly.com:80/how-hackers-target-and-hack-your-site.html highperformance.blogg.se, http://highperformance.blogg.se:80 hisjournal.net, http://hisjournal.net:80/blog/category/20 hodreams.com, http://hodreams.com:80 hrsec.blogspot.com, http://hrsec.blogspot.com:80/2015/03/xwaydah-project.html hrsec.blogspot.in, http://hrsec.blogspot.in:80 hxbl4nk.blogspot.com, http://hxbl4nk.blogspot.com:80/2011/11/cara-memasang-backdoor-di-windows-xp.html ianux.com, http://ianux.com:80/aggregator/sources/4 icheernoom.blogspot.com, http://icheernoom.blogspot.com:80/2013/08/wordpress-timthumbphp.html icoverasia.com, http://icoverasia.com:80/index.php/tag/media idealasymetry.blogspot.com, http://idealasymetry.blogspot.com:80/2012/02/installing-backbox-linux-with-lvm-and.html ihazomgsecurityskillz.blogspot.com, http://ihazomgsecurityskillz.blogspot.com:80/2011/04/linux-exploit-development-pt-2-rev-2.html ihz-team.com, http://ihz-team.com:80/wp/vbulletin-a-journey-into-0day-exploitation ilblogdigianni.altervista.org, http://ilblogdigianni.altervista.org:80/google-hacking-database ilearnethicalhacking.blogspot.com.br, http://ilearnethicalhacking.blogspot.com.br:80/2015/01/wordpress-file-disclosure-vulnerability.html illmob.org, http://illmob.org:80 in7h3wi1d.blogspot.com, http://in7h3wi1d.blogspot.com:80/2011/02/shodan-exploit-db-fun.html indonesianhackeranonymous.blogspot.se, http://indonesianhackeranonymous.blogspot.se:80/2014_05_01_archive.html indonesianhackeranonymous.blogspot.sg, http://indonesianhackeranonymous.blogspot.sg:80/2013/04/dork-for-deface.html inforleon.blogspot.com, http://inforleon.blogspot.com:80/2008/03/definicion-de-phreaker.html infosec-regeneration.blogspot.in, http://infosec-regeneration.blogspot.in:80 infosec42.blogspot.co.il, http://infosec42.blogspot.co.il:80/2012_01_01_archive.html infosec42.blogspot.gr, http://infosec42.blogspot.gr:80/2012_01_01_archive.html infragardhouston.org, http://infragardhouston.org:80/tech-tool-kit/item/44-exploit-database insecurity.in.ua, http://insecurity.in.ua:80/2011/10/lfi-with-phpinfo-assistance.html insidesec.blogspot.com.br, http://insidesec.blogspot.com.br:80 insidetrust.blogspot.gr, http://insidetrust.blogspot.gr:80/2011/04/quick-guide-to-linux-privilege.html intrasek.com, http://intrasek.com:80 iranpython.blog.ir, http://iranpython.blog.ir:80 iraqe.webs.com, http://iraqe.webs.com:80 irvian.blogspot.com, http://irvian.blogspot.com:80/2009/08/ssh-tunnel-mac-os-x.html itas.vn, http://itas.vn:80/en/itas-team-discovered-multiple-sql-injection-in-sp-client-document-manager-plugin itglobalsystems.com, http://itglobalsystems.com:80/IT_news_Space.php itpm.it, http://itpm.it:80/wordpress/?page_id=53 ityat.com, http://ityat.com:80/?p=213 jacduque.blogspot.com.es, http://jacduque.blogspot.com.es:80/2015_04_01_archive.html jackal00.blogspot.com, http://jackal00.blogspot.com:80/2015/09/almzor-g-20.html jadcode.blogspot.com.ar, http://jadcode.blogspot.com.ar:80/2014_09_01_archive.html janda35.tk, http://janda35.tk:80/test jibar0.blog.com, http://jibar0.blog.com:80 johnandersonblogs.blogspot.mx, http://johnandersonblogs.blogspot.mx:80/2013_05_01_archive.html johncrackernet.blogspot.ca, http://johncrackernet.blogspot.ca:80/2009/09/how-to-investigate-compromised-linux.html johncrackernet.blogspot.com.au, http://johncrackernet.blogspot.com.au:80/2009/02/howto-installing-squid-proxy-in-pfsense.html johncrackernet.blogspot.com.tr, http://johncrackernet.blogspot.com.tr:80/2009/02/howto-installing-squid-proxy-in-pfsense.html johncrackernet.blogspot.com, http://johncrackernet.blogspot.com:80/2009/09/how-to-investigate-compromised-linux.html joomla-consultant.co.uk, http://joomla-consultant.co.uk:80/services.html joshrendek.com, http://joshrendek.com:80/2013/02/why-setuid-is-bad-and-what-you-can-do journeyintoir.blogspot.co.nz, http://journeyintoir.blogspot.co.nz:80/2015/03/compromised-root-cause-analysis-model.html jumpespjump.blogspot.com.es, http://jumpespjump.blogspot.com.es:80 jumpespjump.blogspot.in, http://jumpespjump.blogspot.in:80 jumpespjump.blogspot.nl, http://jumpespjump.blogspot.nl:80 junookyo.blogspot.in, http://junookyo.blogspot.in:80/2012_11_01_archive.html k3dsec.blogspot.in, http://k3dsec.blogspot.in:80 kali4hackers.blogspot.co.at, http://kali4hackers.blogspot.co.at:80/p/some-important-links.html kali4hackers.blogspot.com.es, http://kali4hackers.blogspot.com.es:80/p/some-important-links.html kaoticcreations.blogspot.be, http://kaoticcreations.blogspot.be:80/2011/11/burp-suite-part-i-intro-via-sql.html kaoticcreations.blogspot.ca, http://kaoticcreations.blogspot.ca:80/p/double-query-based-sql-injection.html kaoticcreations.blogspot.co.il, http://kaoticcreations.blogspot.co.il:80/2011/08/automated-lfirfi-scanning-exploiting.html kaoticcreations.blogspot.com.br, http://kaoticcreations.blogspot.com.br:80/2012/08/how-to-build-your-own-hidemyass-proxy_27.html kaoticcreations.blogspot.com.es, http://kaoticcreations.blogspot.com.es:80 kaoticcreations.blogspot.com.tr, http://kaoticcreations.blogspot.com.tr:80 keithpachulski.blogspot.com, http://keithpachulski.blogspot.com:80/2010/01/product-comparison-nessus-420-vs-rapid7.html kevin-heflin.net, http://kevin-heflin.net:80/aggregator/sources/6 kezamx.blogspot.co.at, http://kezamx.blogspot.co.at:80/2012/08/how-to-hack-joomla-websites-complete.html kezamx.blogspot.com, http://kezamx.blogspot.com:80/2012/08/how-to-hack-joomla-websites-complete.html kinoz-tdimension.blogspot.com, http://kinoz-tdimension.blogspot.com:80/2012/04/cara-cara-hack-web-mengunakan-upload.html kizilsapkalihackerlar.blogspot.com, http://kizilsapkalihackerlar.blogspot.com:80/2015/03/kolay-yoldan-wordpress-ve-blog-hack-2015.html klaubers.de, http://klaubers.de:80/blog knforum.blogspot.com, http://knforum.blogspot.com:80/2013/06/best-ethical-hacking-ebooks-collection.html komputer-milikku.blogspot.com, http://komputer-milikku.blogspot.com:80/2011/09/top-10-hacker-malay-version-part-2.html kwepik9.blogspot.in, http://kwepik9.blogspot.in:80/2013_11_01_archive.html kytsumaru.blogspot.com, http://kytsumaru.blogspot.com:80/2014/06/pembahasan-soal-forensic-2.html kyu-fusion.blogspot.com, http://kyu-fusion.blogspot.com:80/2011/10/mikrotik-dengan-2-line-speedy-proxy.html l0wk3y.blogspot.in, http://l0wk3y.blogspot.in:80/2012/07/how-not-to-flunk-in-oscp.html lancit.blogspot.com, http://lancit.blogspot.com:80/2012/06/cctv-netsurveillance-active-x-control.html layaq.blogfa.com, http://layaq.blogfa.com:80/9007.aspx lbmg.ca, http://lbmg.ca:80/blog learnnetsec.blogspot.ro, http://learnnetsec.blogspot.ro:80 leethackerpakistan.blogspot.in, http://leethackerpakistan.blogspot.in:80/2015/05/hacking-dnn-based-web-sites.html dg-sc.org, http://lille.dg-sc.org:80/random links-zone.org, http://links-zone.org:80/useful.php levacic.net, http://links.levacic.net:80 xhausted.de, http://links.xhausted.de:80/yacy.php linux-focus.blogspot.com, http://linux-focus.blogspot.com:80/2014/07/install-metasploit-di-ubuntu-1404.html linux-penetrasi.blogspot.com, http://linux-penetrasi.blogspot.com:80/2012/01/scan-menggunakan-sql-sqlmappy.html linux4dummy.blogspot.be, http://linux4dummy.blogspot.be:80 linux4dummy.blogspot.it, http://linux4dummy.blogspot.it:80 lirasenlared.blogspot.com.br, http://lirasenlared.blogspot.com.br:80/2013_11_01_archive.html longjidinz.blogspot.com, http://longjidinz.blogspot.com:80/2013/04/tools-and-exploits.html maltego.blogspot.sg, http://maltego.blogspot.sg:80/2010_11_01_archive.html malwarenew.wordpress.com, http://malwarenew.wordpress.com:80/2011/02/23/moon-crypter-source-code-runtime-3264 mammothsurfer.com, http://mammothsurfer.com:80 manz1.blogspot.in, http://manz1.blogspot.in:80 mateusz-lach.blogspot.com, http://mateusz-lach.blogspot.com:80/2011/08/rekurencyjne-zliczanie-linii-kodu-w.html matongmz.blogspot.com, http://matongmz.blogspot.com:80/2012/08/inferno-vbshout-sqli-0day-252.html matthewjharmon.com, http://matthewjharmon.com:80/2015/05/18/security-b-sides-msp-2015 mi-heflin.net, http://mi-heflin.net:80/aggregator/sources/6 mincey.org, http://mincey.org:80/cms/node/14 mitm.co.il, http://mitm.co.il:80/useful-links mitsar.kz, http://mitsar.kz:80/confiq.php mogozobo.com, http://mogozobo.com:80/?p=2236 mohammadar.blogspot.com, http://mohammadar.blogspot.com:80/2013/06/acunetix-web-vulnerability-scanner-v80.html mohit19backtrack.blogspot.in, http://mohit19backtrack.blogspot.in:80/2014/06/top-20-hacking-forums.html momodrock.blogspot.mx, http://momodrock.blogspot.mx:80/2012_02_01_archive.html mondotech.blogspot.co.at, http://mondotech.blogspot.co.at:80 mondotech.blogspot.co.nz, http://mondotech.blogspot.co.nz:80 mono-desktopsupport.blogspot.co.il, http://mono-desktopsupport.blogspot.co.il:80/2012/05/alcatel-x200-usb-hsdpa-modem-windows-7.html mono-desktopsupport.blogspot.com.au, http://mono-desktopsupport.blogspot.com.au:80 mono-desktopsupport.blogspot.com.tr, http://mono-desktopsupport.blogspot.com.tr:80 mono-desktopsupport.blogspot.it, http://mono-desktopsupport.blogspot.it:80/2013/06/alcatel-x200-usb-hsdpa-modem-windows-8.html mrsco.mihanblog.com, http://mrsco.mihanblog.com:80 msack.org, http://msack.org:80 musdi.web.id, http://musdi.web.id:80/msd nakamilounge.de, http://nakamilounge.de:80/2012/08/zend-lucke-in-magento-offenbar-weitgehend-unbekannt-bei-shop-betreibern navigaresicuri.com, http://navigaresicuri.com:80 nazimkaradag.com, http://nazimkaradag.com:80/2014/06/30/haftalik-zaafiyet-raporu-30-haziran-2014 nelregnodiubuntu.blogspot.com, http://nelregnodiubuntu.blogspot.com:80/2013/12/ricercare-in-modo-mirato-files-di-ogni.html netsectr.blogspot.com.tr, http://netsectr.blogspot.com.tr:80/2013/09/how-to-crack-rar-passwords.html netsectr.blogspot.com, http://netsectr.blogspot.com:80/2011/05/another-fine-method-to-exploit-sql.html netsecure-it.de, http://netsecure-it.de:80/content/anatomie-eines-angriffs networksolutionexperts.com, http://networksolutionexperts.com:80/amplified-ddos-attacks-smurf-bang-dns-ntp netwrkspider.blogspot.it, http://netwrkspider.blogspot.it:80 nevsehirden.com, http://nevsehirden.com:80/kategori/genel-secim-2015 nhtc.blogspot.com, http://nhtc.blogspot.com:80/2009/03/internal-network-policies-part-3.html nixploit.com, http://nixploit.com:80/egg-hunters njrahns.com, http://njrahns.com:80/?tag=router nkush.blogspot.com, http://nkush.blogspot.com:80/2011/09/metasploitable-walkthrough.html noobys-journey.blogspot.in, http://noobys-journey.blogspot.in:80 ntwrk.co.za, http://ntwrk.co.za:80/.smileys/11.php/23.txt nuggetz.co.uk, http://nuggetz.co.uk:80/versionhistory.htm oatha.freeiz.com, http://oatha.freeiz.com:80/bookmarks.html odezredes230490.blogspot.com.es, http://odezredes230490.blogspot.com.es:80 omercakir.wordpress.com, http://omercakir.wordpress.com:80/category/basic osvaldohp.blogspot.com, http://osvaldohp.blogspot.com:80/2011/01/alguns-google-dorks.html otx.ir, http://otx.ir:80/blog/?cat=4 ownedpage.blogspot.com, http://ownedpage.blogspot.com:80/2012/11/crack-modem-dan-akun-speedy-dan-pasang.html palatin.as, http://palatin.as:80/tracker/view.php?id=1&history=1 palembangcyber4rt.blogspot.com, http://palembangcyber4rt.blogspot.com:80/2013/03/logika-hacker-dan-carder.html paramountsec.co.uk, http://paramountsec.co.uk:80/links.htm pctamogatas.blogspot.com, http://pctamogatas.blogspot.com:80/2011/01/thunderbird-torolt-fiok-visszaallitasa.html pen-testing-lab.blogspot.com.tr, http://pen-testing-lab.blogspot.com.tr:80/2012_01_08_archive.html pen-testing-lab.blogspot.in, http://pen-testing-lab.blogspot.in:80/2012_01_08_archive.html penetrat0r.com, http://penetrat0r.com:80/kentico-cms-user-disclosure-vulnerability pensec.pl, http://pensec.pl:80/2013/02/02/admin-password-reset-windows-7 pentestguide.nl, http://pentestguide.nl:80 perdisci.com, http://perdisci.com:80/useful-links peyi.in, http://peyi.in:80/2012/01/08/jailbreak-ios-5-0-1-untethered-push-notifications-gvey phong005.blogspot.com, http://phong005.blogspot.com:80/2015/04/ms15-034-tan-cong-toan-quyen-windows.html planetcreator.net, http://planetcreator.net:80/anonymous-myanmar-hacker-attacks-blink-hacker-group poc-hack.blogspot.fr, http://poc-hack.blogspot.fr:80 pointnext.blogspot.com, http://pointnext.blogspot.com:80/2011/10/web-server-e-programmi-cross-compilati.html popshark11.blogspot.com, http://popshark11.blogspot.com:80/2014/03/msisdn-to-user-agent-or-how-i-had.html pr1v4t3.blogspot.com, http://pr1v4t3.blogspot.com:80/2011/09/howto-install-arduino-on-backtrack-5.html pr1v4t3.blogspot.in, http://pr1v4t3.blogspot.in:80 praveen-sutar.blogspot.in, http://praveen-sutar.blogspot.in:80 prince-herman.blogspot.com, http://prince-herman.blogspot.com:80/2013/03/sql-injection-joomla-step-by-step.html proactivedefender.blogspot.fr, http://proactivedefender.blogspot.fr:80 professional-it-services.com, http://professional-it-services.com:80/en/contact programmingethicalhackerway.blogspot.nl, http://programmingethicalhackerway.blogspot.nl:80/2015/07/what-is-variable-variables-for-hackers.html prorebell.blogspot.com, http://prorebell.blogspot.com:80/2010/10/list-dork-mbah-gugel-hack-lagi.html pruebadepenetracion.com.mx, http://pruebadepenetracion.com.mx:80 qqsec.com, http://qqsec.com:80/业界著名的安全审计系统backboxlinux与kali-linux.html qnp.fr, http://quentin.qnp.fr:80/links/?page=4 rahmadkurniawan.org, http://rahmadkurniawan.org:80 raidersec.blogspot.ae, http://raidersec.blogspot.ae:80/p/resources.html raidersec.blogspot.com.es, http://raidersec.blogspot.com.es:80/p/resources.html ramiephillips.com, http://ramiephillips.com:80/links.html ranjankumar.in, http://ranjankumar.in:80/2013/07/16/mobile-security-pointers rastamouse.me, http://rastamouse.me:80/blog/2014/kioptrix-2014 rce4fun.blogspot.in, http://rce4fun.blogspot.in:80/2014_05_01_archive.html realpentesting.blogspot.com, http://realpentesting.blogspot.com:80/p/advisories.html reelix.blogspot.co.uk, http://reelix.blogspot.co.uk:80/2013/07/passwordspro-3122-crack.html reelix.blogspot.com.es, http://reelix.blogspot.com.es:80/2013/05/mirc-732-crack.html remote-execution.blogspot.com, http://remote-execution.blogspot.com:80/2011/10/blog-coruja-de-ti-foi-invadido.html reyogsec.blogspot.com, http://reyogsec.blogspot.com:80/2012/08/hotel-booking-portal-v01-sqli.html ri0t-control.blogspot.com, http://ri0t-control.blogspot.com:80/2013/10/zodiac-v010-part-ii.html rizasah1n.blogspot.com, http://rizasah1n.blogspot.com:80/2014/10/wordpress-timthumb-exploitation.html rollanwar.blogspot.com.es, http://rollanwar.blogspot.com.es:80 ruinedsec.wordpress.com, http://ruinedsec.wordpress.com:80/2013/04/03/wordpress-themes-exploits-are-in-action-wpscan rupeshvermahacktheworld.blogspot.in, http://rupeshvermahacktheworld.blogspot.in:80/2011/04/tutorial-hacking-linux-with-armitage.html rwbnetsec.com, http://rwbnetsec.com:80/distccd rwsp.org, http://rwsp.org:80/projects/136-defending-the-castle.html s-crib.com, http://s-crib.com:80/category/passwords s4mpl3d.me, http://s4mpl3d.me:80/? sa-mp.by, http://sa-mp.by:80/wiki/index.php/История_разработок saltalug.org.ar, http://saltalug.org.ar:80/aggregator/categories/1 saltedhash.co.il, http://saltedhash.co.il:80/tools samiux.blogspot.ae, http://samiux.blogspot.ae:80/2012/12/howto-simple-buffer-overflow-exploit.html samiux.blogspot.co.nz, http://samiux.blogspot.co.nz:80/2015/08/howto-install-nodejs-0127-on-ubuntu.html samiux.blogspot.co.uk, http://samiux.blogspot.co.uk:80/2013/05/howto-burp-suite-on-ubuntu-desktop-1204.html samiux.blogspot.com.ar, http://samiux.blogspot.com.ar:80/2015/11/howto-quick-audit-your-android-devices.html samiux.blogspot.com.au, http://samiux.blogspot.com.au:80/2014/03/howto-perfect-dual-boot-kali-linux-106.html samiux.blogspot.com.br, http://samiux.blogspot.com.br:80/2013/03/howto-bitcoin-mining-with-nvidia.html samiux.blogspot.com.es, http://samiux.blogspot.com.es:80/2010/03/howto-dd-wrt-on-tp-link-tl-wr1043nd.html samiux.blogspot.gr, http://samiux.blogspot.gr:80/2013/05/howto-tor-and-proxychains-on-ubuntu.html samiux.blogspot.ie, http://samiux.blogspot.ie:80/2013/06/howto-dirbuster-on-ubuntu-desktop-1204.html samiux.blogspot.it, http://samiux.blogspot.it:80/2012/01/howto-create-normal-user-on-mysql-and.html samiux.blogspot.sg, http://samiux.blogspot.sg:80 sarginhukuk.com, http://sarginhukuk.com:80/dokumanlar/kode.php sayedachmady.blogspot.com, http://sayedachmady.blogspot.com:80/2013/08/antena-wifi-rakitan.html scx020c07c.blogspot.ae, http://scx020c07c.blogspot.ae:80/2012/10/hacking-dvwa-and-got-root.html scx020c07c.blogspot.com, http://scx020c07c.blogspot.com:80/2012/10/hacking-dvwa-and-got-root.html scx020c07c.blogspot.in, http://scx020c07c.blogspot.in:80/2012/09/information-gathering-advanced.html scxo2oco71.blogspot.com, http://scxo2oco71.blogspot.com:80/2012/09/reverse-engineering-easy-rm-to-mp3.html sec-worldweb.blogspot.com, http://sec-worldweb.blogspot.com:80/2013/06/blog-post_752.html sec4ever.blogsky.com, http://sec4ever.blogsky.com:80 sec4ever.net, http://sec4ever.net:80/?p=524 secinn.appspot.com, http://secinn.appspot.com:80/planet/mirror?sig=663e464553bd333ecb21e9397363d0c9 secpluse.com, http://secpluse.com:80/archives/2664.html secsavvy.com, http://secsavvy.com:80 securedeath.com, http://securedeath.com:80 securingyour.info, http://securingyour.info:80 security-geek.in, http://security-geek.in:80/blog/2014/02 security-geeks.blogspot.in, http://security-geeks.blogspot.in:80 security-geeks.blogspot.mx, http://security-geeks.blogspot.mx:80 security-is-just-an-illusion.blogspot.ae, http://security-is-just-an-illusion.blogspot.ae:80/2013/03/android-sqlmap-beta.html security-is-just-an-illusion.blogspot.ba, http://security-is-just-an-illusion.blogspot.ba:80/2014/01/bwapp-xml-and-xpath-injection.html security-is-just-an-illusion.blogspot.com, http://security-is-just-an-illusion.blogspot.com:80/2013/01/dante-socks5-server-debian.html security-obscurity.blogspot.com.tr, http://security-obscurity.blogspot.com.tr:80/2011/12/ubuntu-server-local-privilege.html security-obscurity.blogspot.com, http://security-obscurity.blogspot.com:80/2012/11/wordpress-cookie-grabber.html security-sh3ll.blogspot.be, http://security-sh3ll.blogspot.be:80/2012/03/sqlmap-gui-automatic-sql-injection-and.html security-sh3ll.blogspot.com.tr, http://security-sh3ll.blogspot.com.tr:80/2011/05/safe3-sql-injector-v81-released.html security-sh3ll.blogspot.com, http://security-sh3ll.blogspot.com:80/2009/07/fake-openssh-0-day-dont-run-0pen0wnc.html security-sh3ll.blogspot.ie, http://security-sh3ll.blogspot.ie:80 igcode.com, http://security.igcode.com:80/2014/11/module-2-footprinting-using-google-part-2 securityattack.com.br, http://securityattack.com.br:80/emails-do-governo-igrejas-e-empresas-vulneraveis-em-ano-de-eleicao securityera.org, http://securityera.org:80 securityflux.com, http://securityflux.com:80 securityhorror.blogspot.com, http://securityhorror.blogspot.com:80/p/mini-penetration-testing-framework.html securityhorror.blogspot.se, http://securityhorror.blogspot.se:80/2012_04_08_archive.html securitypadawan.blogspot.com.es, http://securitypadawan.blogspot.com.es:80/2011_10_01_archive.html securitypadawan.blogspot.in, http://securitypadawan.blogspot.in:80/2011/10/attacking-metasploitable-part-3.html securityrealwebblog.blogspot.com, http://securityrealwebblog.blogspot.com:80/2012/01/blade-api-monitor-3692-unicode-stack.html securitythroughobscurity.blog.com, http://securitythroughobscurity.blog.com:80 sens-space.blogspot.in, http://sens-space.blogspot.in:80 serpentsembrace.wordpress.com, http://serpentsembrace.wordpress.com:80/2011/08/11/gentoo-releases-11-2-livedvd-to-crickets shelldaemon.com, http://shelldaemon.com:80/2014/08/5-ways-to-improve-your-hacking-skills.html shellup.rozblog.com, http://shellup.rozblog.com:80 shiryu92.com, http://shiryu92.com:80/index.php/author/shiryu silosec.org, http://silosec.org:80/w/doku.php?id=links simonganiere.ch, http://simonganiere.ch:80/2013/09/07/dfir-challenge-issa-2013-my-answers sinhvienthuctap.info, http://sinhvienthuctap.info:80/tuyen-dung/sinh-vien-thuc-tap/de-tai-thuc-tap.html sinirsizforum.net, http://sinirsizforum.net:80/bilgi-arsivi/wordpress-3-9-1-csrf-vulnerability-acigi-2014.html siyahinci.com.tr, http://siyahinci.com.tr:80/siyah-inci/basinda-biz slayerowner.blogspot.com.br, http://slayerowner.blogspot.com.br:80 slayerowner.blogspot.com, http://slayerowner.blogspot.com:80/2013/11/cve-2012-2122-mysql-remote-root.html socialhacked.blogspot.com.tr, http://socialhacked.blogspot.com.tr:80 soft-genius.blogspot.in, http://soft-genius.blogspot.in:80 software-security.mihanblog.com, http://software-security.mihanblog.com:80 solveseek.com, http://solveseek.com:80/tags/Mac%20OS%20X%20Lion%20Server songmaya.com, http://songmaya.com:80/2015/06/03/আপনি-হ্যাকিং-শিখতে-চান sourcetags.weebly.com, http://sourcetags.weebly.com:80/contact.html spithack.loxblog.com, http://spithack.loxblog.com:80/post/45/جدید%20ترین%20دورک%20های%20گوگل%20هکینگ spokane2600.org, http://spokane2600.org:80/vuln-list/3bc257e246f0edd3b44aa39f9a86914e sqlsql.blogfa.com, http://sqlsql.blogfa.com:80/author-sqlsql.aspx sseguranca.blogspot.com, http://sseguranca.blogspot.com:80/2010/07/0day-lnk-infocon-amarelo-senha-default.html sss-id-sumatera.blogspot.com, http://sss-id-sumatera.blogspot.com:80/2013/12/merebah-nama-rootbt-terminal-linux.html stanovlenie.org.ua, http://stanovlenie.org.ua:80/egghunter-mixin stealthisblog.fr, http://stealthisblog.fr:80/2009/12 stephenjkennedy.me, http://stephenjkennedy.me:80/?page_id=27 stupidc0de.org, http://stupidc0de.org:80/forum sucure.net, http://sucure.net:80/?author=1 aretimes.com, http://support.aretimes.com:80/view.php?id=102 sw0rd.net, http://sw0rd.net:80 securetalk.info, http://t153955.security-full-disclosure.securetalk.info:80/varnish-2-1-5-3-0-3-dos-in-vry-create-while-parsing-vary-header-t153955.html teamhackaholic.blogspot.in, http://teamhackaholic.blogspot.in:80/2011/11/website-hacking-remote-file-inclusion_03.html teamkennington.com, http://teamkennington.com:80 techtrigger.wordpress.com, http://techtrigger.wordpress.com:80/2012/02/04/basic-vlsm-packet-tracer-activity tecland.com.br, http://tecland.com.br:80/category/geral tekwizz123.blogspot.co.uk, http://tekwizz123.blogspot.co.uk:80 tekwizz123.blogspot.fr, http://tekwizz123.blogspot.fr:80 templesec.blogspot.com.es, http://templesec.blogspot.com.es:80/2013/04/25-tiendas-online-y-la-pagina.html teraforum.ro, http://teraforum.ro:80/forum/index.php?topic=6532.0 tescilweb.com, http://tescilweb.com:80/dokumanlar/kode.php teu-informatico.blogspot.com.ar, http://teu-informatico.blogspot.com.ar:80/2010/01/clonar-sim-softwarevideo-y-manual.html teu-informatico.blogspot.fr, http://teu-informatico.blogspot.fr:80/2009/04/cardable-sites-collection.html th3-r4v3n.blogspot.com.es, http://th3-r4v3n.blogspot.com.es:80/2014/07/escalar-privilegios-en-linux-y-windows.html the-grand-gamer.blogspot.com, http://the-grand-gamer.blogspot.com:80/2013/02/google-dorks-lists.html the-grand-gamer.blogspot.gr, http://the-grand-gamer.blogspot.gr:80 theevilbit.blogspot.com.au, http://theevilbit.blogspot.com.au:80 theevilbit.blogspot.com.br, http://theevilbit.blogspot.com.br:80 theevilbit.blogspot.com.es, http://theevilbit.blogspot.com.es:80 theevilbit.blogspot.com.tr, http://theevilbit.blogspot.com.tr:80 thehackersmedia.blogspot.fr, http://thehackersmedia.blogspot.fr:80/2011_09_01_archive.html thehackersmedia.blogspot.in, http://thehackersmedia.blogspot.in:80/2011/09/brucon-agnitio-workshop-slides-and_22.html thehackersview.blogspot.in, http://thehackersview.blogspot.in:80/2011_10_01_archive.html thehackerworld.com, http://thehackerworld.com:80 thembits.blogspot.com, http://thembits.blogspot.com:80/2014/02/php-cgi-exploitation-never-dies.html thembits.blogspot.in, http://thembits.blogspot.in:80 thenewartofwar.eu, http://thenewartofwar.eu:80 thepcn3rd.blogspot.com, http://thepcn3rd.blogspot.com:80/2015/03/whats-in-honeypot-cve-2014-4019-attack.html thoiquentot.com, http://thoiquentot.com:80 thought4theday.yolasite.com, http://thought4theday.yolasite.com:80/index/category/Philosophy thriftstorehacker.com, http://thriftstorehacker.com:80/2012/october/index.html tic-seguridad.blogspot.com, http://tic-seguridad.blogspot.com:80/2011/01/dos-nuevos-virus-utilizan-facebook-para.html timture.com, http://timture.com:80/link.html tinkerhaven.no-ip.org, http://tinkerhaven.no-ip.org:8888/practice-test.html tn-security.blogspot.com, http://tn-security.blogspot.com:80/2011/08/injection-sql-avec-backtrack-5.html tnmtoan.blogspot.com, http://tnmtoan.blogspot.com:80/2013/12/nmap-nse.html tntcastle.net, http://tntcastle.net:80/2012/09/ubuntu下将vim配置为python-ide tntsecurite.ca, http://tntsecurite.ca:80 trancek.es, http://trancek.es:80 tty0x80.wordpress.com, http://tty0x80.wordpress.com:80 tutorialhalk.com, http://tutorialhalk.com:80/2014/04/google-dorks-hackers-database.html ulkuhaber.net, http://ulkuhaber.net:80/wp-includes/class-wp-site.php uncompiled.com, http://uncompiled.com:80 unconciousmind.blogspot.com, http://unconciousmind.blogspot.com:80/2011/09/wordpress-count-per-day-plugin-217-sql.html undergroundhub.blogspot.in, http://undergroundhub.blogspot.in:80 vallejo.cc, http://vallejo.cc:80/stuff velshare.blogspot.in, http://velshare.blogspot.in:80 vickigroup.wordpress.com, http://vickigroup.wordpress.com:80/2010/11/23/tấn-cong-va-phong-thủ-hệ-thống-phần-3 vigasis.com, http://vigasis.com:80/default.aspx vikingworx.com, http://vikingworx.com:80/news/SecurityNotification-20121002.10.html vip-tech.pl, http://vip-tech.pl:80/luki-w-routerach-modemach vse-ochen-prosto.ru, http://vse-ochen-prosto.ru:80/na-zametku-gde-mozhno-smotret-dorki.html walhaseb.com, http://walhaseb.com:80/archives/84 wawaseb.com, http://wawaseb.com:80/lutile/wsl55.php web-schell.de, http://web-schell.de:80 webapp-security.com, http://webapp-security.com:80/2012/04 webexploiters.blogspot.co.uk, http://webexploiters.blogspot.co.uk:80/2012/02/tim-thumb-wordpress-exploit.html webkartali.com, http://webkartali.com:80/?p=153 webwararmy.blogspot.in, http://webwararmy.blogspot.in:80/2015_02_01_archive.html windowsir.blogspot.ca, http://windowsir.blogspot.ca:80/2010_07_01_archive.html wnccnwebdev.com, http://wnccnwebdev.com:80/wordpress-security-tips wodzinski.waw.pl, http://wodzinski.waw.pl:80/Blog_Categories/SecCase wpmu-tutorials.de, http://wpmu-tutorials.de:80 xakep4t.my1.ru, http://xakep4t.my1.ru:80/news/knocked_out_aol_how_the_aol_servers_were_hacked/2011-04-16-24 xclose.de, http://xclose.de:80 xspid3r.blogspot.fr, http://xspid3r.blogspot.fr:80 xuanhun521.com, http://xuanhun521.com:80/Blog/2014/8/15/kali-linux-web-渗透测试--第四课-google-hack-实战 yaroo.loxblog.com, http://yaroo.loxblog.com:80 youdeface.com, http://youdeface.com:80 yunuscadirci.com, http://yunuscadirci.com:80/?q=Airties%20UPnP%20Zafiyeti%20ile%20Internet%20Uzerinden%20ic%20Aga%20Erisim%20-%202009 zenyang.org, http://zenyang.org:80/links.html zer03s.blog.com, http://zer03s.blog.com:80/exploit-untuk-cms-lokomedia zer0code.de, http://zer0code.de:80/?cat=1 zerialkiller.blogspot.co.il, http://zerialkiller.blogspot.co.il:80/2011/07/hack-facebook-backtrack-5-gerix-wifi.html zerialkiller.blogspot.com.es, http://zerialkiller.blogspot.com.es:80 zerialkiller.blogspot.mx, http://zerialkiller.blogspot.mx:80/2015/08/cve-2015-5477-bind9-tkey-remote-assert.html zeroacidx100.blogspot.in, http://zeroacidx100.blogspot.in:80 zerotiernetworks.tumblr.com, http://zerotiernetworks.tumblr.com:80/page/2 zinatullin.com, http://zinatullin.com:80/category/penetration-test znuny.ch, http://znuny.ch:80 znuny.com, http://znuny.com:80