Exploits Database by Offensive Security July 7, 2017, 4:07 p.m.

The ultimate archive of Exploits, Shellcode, and Security Papers.

hacking security

The Document Which Was Formerly Called The MIT Guide to Lockpicking March 28, 2017, 5:27 p.m.

The theory of lock picking is the theory of exploiting mechanical defects. There are a few basic concepts and definitions but the bulk of the material consists of tricks for opening locks with particular defects or characteristics.

hacking read later interesting

The Hacker's Path Dec. 15, 2010, 1:15 a.m.

programming python ruby hacking web

SecurityTube Jan. 2, 2010, 7:20 p.m.

Computer security videos, including videos of defcon talks.

tutorial video security hacks network programming tutorials networking hacking technology rumblr

Password Recovery Speeds May 6, 2009, 3:55 p.m.

Interesting table of password strength, and approximate time to crack using brute force.

reference web security hack programming passwords cracking hacking encryption