|Penetration Testing Mailing List
While this list is intended for "professionals", participants frequenly disclose techniques and strategies that would be useful to anyone with a practical interest in security and network auditing.
[HITB-Announce] HITB Magazine Issue 010
Hafez Kamal (May 14)
A small reminder that article submissions for HITB Magazine Issue 010
are due tomorrow (15th May 2013). If you're interested in submitting
please send your > 3000 word article to editorial () hackinthebox org
Topics of interest include, but are not limited to the following:
Next generation attacks and exploits
Apple / OS X security vulnerabilities
SS7/Backbone telephony networks
SpiderFoot 2.0 released
Steve Micallef (May 10)
SpiderFoot is a free, open-source footprinting tool, enabling you to
perform various scans against a given domain name in order to obtain
information such as sub-domains, e-mail addresses, owned netblocks, web
server versions and so on. The main objective of SpiderFoot is to
automate the footprinting process to the greatest extent possible,
freeing up a penetration tester's time to focus their efforts on the
WASC Announcement: Static Analysis Technologies Evaluation Criteria Published
announcements (May 10)
The Web Application Security Consortium (WASC) is pleased to announce the
Static Analysis Technologies Evaluation Criteria. The goal of the SATEC
project is to create a vendor-neutral set of criteria to help guide
application security professionals during the process of acquiring a
static code analysis technology that is intended to be used during
source-code driven security programs. This document provides a
comprehensive list of criteria that...
Ruxcon 2013 Call For Papers
cfp (May 07)
Ruxcon 2013 Call For Presentations
Melbourne, Australia, October 26th-27th
CQ Function Centre
The Ruxcon team is pleased to announce the Call For Presentations for Ruxcon 2013.
This year the conference will take place over the weekend of the 26th and 27th
of October at the CQ Function Centre, Melbourne, Australia.
.[x]. About Ruxcon .[x].
Ruxcon is ia premier technical computer security conference...
[TOOL] TOPERA v2 released
cr0hn (May 07)
We just released TOPERA v2:
TOPERA is a new security tool for IPv6, with the particularity that their attacks can't be detected by Snort.
This new version of TOPERA include these improvements:
1 - Slow HTTP attacks (Slowloris over IPv6).
2 - Improved TCP port scanner.
New project page:
[HITB-Announce] #HITB2013KUL Call for Papers
Hafez Kamal (May 01)
Hi everyone - This is a Call for Papers for the 11th annual HITB
Security Conference in Malaysia, #HITB2013KUL which takes place on the
16th and 17th of October in Kuala Lumpur.
Keynote speakers for the conference will be Joe Sullivan (Chief Security
Officer, Facebook) and Andy Ellis (Chief Security Officer, Akamai)
We're looking for talks that are highly technical, but most importantly,
material which is new and cutting edge. Submissions...
Breakpoint 2013 Call For Papers
cfp (May 01)
Breakpoint 2013 Call For Papers
Melbourne, Australia, October 24th-25th
.[x]. Introduction .[x].
The Ruxcon team is pleased to announce Call For Papers for Breakpoint 2013.
Breakpoint showcases the work of expert security researchers from around the
world on a wide range of topics. This conference is organised by the Ruxcon
team and offers a specialised security conference to...
Arachni v0.4.2 has been released (Open Source Web Application Security Scanner Framework)
Tasos Laskos (Apr 29)
This is just to let you know that there's a new version of Arachni.
Arachni is a modular and high-performance (Open Source) Web Application Security Scanner Framework written in Ruby.
The change-log is quite sizeable but the gist is:
* Brand new web interface -- allowing for team collaboration.
* Significant decreases in memory usage.
* Issue remarks – Providing extra context to logged issues.
* Improved payloads...
TXDNS v2.4 released
Arley Silveira (Apr 17)
TXDNS v 2.4 is out and available to download from
This new version adds support for reverse grinding.
txdns -r 10-20.1.60-70.1-254,192.168.15.0/24
This list is sponsored by: Information Assurance Certification Review Board
Prove to peers and potential employers without...
A survey on qunatifying severity of vulnerabilities in softwares
Khalid Khan Afridi (Apr 17)
I am currently performing my master thesis on the topic of quantifying the
As you have done significant work in this area, I would be glad if you
could spare a few
minutes of your time to answer a survey on the topic. It should not
require more than 15-20
minutes to complete.
The survey can be found at: http://secsurvey.ics.kth.se/index.php
Thank you for your attention!
Hackersh 0.1 Release Announcement
Itzik Kotler (Apr 03)
I am pleased to announce the first version of Hackersh
Hackersh ("Hacker Shell") is a free and open source shell (command
interpreter) written in Python with built-in security commands, and
out-of-the-box wrappers for various security tools, using Pythonect as
its scripting engine. Pythonect is a new, experimental,
general-purpose high-level dataflow programming language based on
Python. It aims to...
Dozens of other network security lists are archived at