I am a hacker, and this is my manifesto. You may stop this individual, but you can't stop us all... After all, we're all alike.- The Mentor
Language: Experience:
Order by: Name Level Entrances
Currently, There are 334 Article in the DB.

Data Encryption Techniques. R. E. Frazier. EN 1202
CSRF - Cross-Site Request Forgery owasp EN 1788
crytopographg ahmed yaba EN 82
CryptoBytes Dan Boneh & Hovav Shacham EN 1362
Cross-Site Request Forgeries FENiX EN 1238
Cross-Platform Security. Jay Shaw. EN 1256
Cross Site Request Forgeries Chris Shiflett EN 1454
CRLF Injection Attacks Al Berg EN,289483,sid14_gci11... 2568
CRLF Injection Attack. Acunetix. EN 1370
CRLF Injection Attack Acunetix EN 1456
CRLF Injection Ulf Harnhammar. EN 1363
Create function polymorphism in C Miguel Bazdresch EN 1258
Create a secure Linux-based wireless access point Manolis Tzanidakis EN 1389
Cracking Wi-Fi Protected Access «WPA». Seth Fogie EN 1197
Crack Protection. Fate HE 1317
Countering SYN Flood Denial-of-Service Attacks. Ross Oliver. EN 1457
Controlling Privileges Administrator Accounts. Derek Melber. EN 1976
Configuring Windows 7 Steve Friedl EN 1657
Common VPN Security Flaws. Roy Hills. EN 1386
Common Security Problems in the Code of Dynamic Web Applications Sverre H. Huseby EN 1495

Send a new link:

TryThis0ne - Hacking Challenges.
TryThis0ne 2005-2014© :: Codingr :: B~HFH :: cp77fk4r :: There are 12547 accounts in this site. 88572 People has logged on to this site. Design By SBD