<?xml version="1.0" encoding="UTF-8"?>
<?xml-stylesheet type='text/xsl' href='/yacysearch.xsl' version='1.0'?>
<rss version="2.0"
    xmlns:yacy="http://www.yacy.net/"
    xmlns:opensearch="http://a9.com/-/spec/opensearch/1.1/"
    xmlns:media="http://search.yahoo.com/mrss/"
    xmlns:atom="http://www.w3.org/2005/Atom"
    xmlns:dc="http://purl.org/dc/elements/1.1/"
    xmlns:geo="http://www.w3.org/2003/01/geo/wgs84_pos#"
>
<channel>
<opensearch:totalResults>19046</opensearch:totalResults>
<opensearch:startIndex>0</opensearch:startIndex>
<opensearch:itemsPerPage>10</opensearch:itemsPerPage>
<title>Astalavista.box.sk security related search engine (since 1994)</title>
<atom:link rel="search" href="/opensearchdescription.xml" type="application/opensearchdescription+xml"/><description>Search Result</description>
<item>
<guid isPermaLink="false">Uvg20d_lzJ3g</guid>
<link>https://www.darknet.org.uk/2010/09/arachni-web-application-vulnerability-scanning-framework/</link>
<yacy:host>www.darknet.org.uk</yacy:host>
<yacy:path>/2010/09/arachni-web-application-vulnerability-scanning-framework/</yacy:path>
<dc:description>Arachni is a feature-full and modular Ruby framework that allows penetration testers and administrators to evaluate the security of web applications. Arachni is smart, it trains itself with every HTTP response it receives during the audit process. Unlike other scanners, Arachni takes into account the dynamic nature of web applications&amp;hellip;</dc:description>
<pubDate>Mon, 21 Jul 2025 21:50:12 +0000</pubDate>
<yacy:size>179944</yacy:size>
<yacy:sizename>175 kbyte</yacy:sizename>
<media:content medium="image" url="https://www.darknet.org.uk/wp-content/uploads/2022/12/cropped-darknet_2022_logo.png"/>
<title>Twitter</title>
<description>Arachni is a feature-full and modular Ruby framework that allows penetration testers and administrators to evaluate the security of web applications. Arachni is smart, it trains itself with every HTTP response it receives during the audit process. Unlike other scanners, Arachni takes into account the dynamic nature of web applications&amp;hellip;</description>
<dc:subject>Arachni is a feature-full and modular Ruby framework that allows penetration testers administrators to evaluate the security of web applications. smart  it trains itself with every HTTP response receives during audit process. Unlike other scanners takes into account dynamic nature applications&amp;hellip;</dc:subject>
</item>
<item>
<guid isPermaLink="false">Ux_vaC_lzJ3g</guid>
<link>https://www.darknet.org.uk/2006/09/impressive-open-source-intrusion-prevention-hlbr/</link>
<yacy:host>www.darknet.org.uk</yacy:host>
<yacy:path>/2006/09/impressive-open-source-intrusion-prevention-hlbr/</yacy:path>
<dc:description>It's good to see work on open source tools in the countermeasure department aswell as the attack and penetration arena. It's a shame since Snort and Nessus have gone semi-commercial. I hope more people invest their time in good IDS, Firewall and IPS systems, I love things like IPCop and&amp;hellip;</dc:description>
<pubDate>Tue, 22 Jul 2025 03:07:28 +0000</pubDate>
<yacy:size>180206</yacy:size>
<yacy:sizename>175 kbyte</yacy:sizename>
<media:content medium="image" url="https://www.darknet.org.uk/wp-content/uploads/2022/12/cropped-darknet_2022_logo.png"/>
<title>Twitter</title>
<description>It's good to see work on open source tools in the countermeasure department aswell as the attack and penetration arena. It's a shame since Snort and Nessus have gone semi-commercial. I hope more people invest their time in good IDS, Firewall and IPS systems, I love things like IPCop and&amp;hellip;</description>
<dc:subject>It's good to see work on open source tools in the countermeasure department aswell as attack and penetration arena. a shame since Snort Nessus have gone semi-commercial. I hope more people invest their time IDS  Firewall IPS systems love things like IPCop and&amp;hellip;</dc:subject>
</item>
<item>
<guid isPermaLink="false">UyRrh7_lzJ3g</guid>
<link>https://www.darknet.org.uk/2018/05/airbash-fully-automated-wpa-psk-handshake-capture-script/</link>
<yacy:host>www.darknet.org.uk</yacy:host>
<yacy:path>/2018/05/airbash-fully-automated-wpa-psk-handshake-capture-script/</yacy:path>
<dc:description>Airbash is a POSIX-compliant, fully automated WPA PSK handshake capture script aimed at penetration testing, it is compatible with Bash and Android Shell.</dc:description>
<pubDate>Tue, 22 Jul 2025 02:27:08 +0000</pubDate>
<yacy:size>179959</yacy:size>
<yacy:sizename>175 kbyte</yacy:sizename>
<media:content medium="image" url="https://www.darknet.org.uk/wp-content/uploads/2022/12/cropped-darknet_2022_logo.png"/>
<title>Twitter</title>
<description>Airbash is a POSIX-compliant, fully automated WPA PSK handshake capture script aimed at penetration testing, it is compatible with Bash and Android Shell.</description>
<dc:subject>Airbash is a POSIX-compliant  fully automated WPA PSK handshake capture script aimed at penetration testing it compatible with Bash and Android Shell.</dc:subject>
</item>
<item>
<guid isPermaLink="false">U2xmQT_lzJ3g</guid>
<link>https://www.darknet.org.uk/2016/08/telegram-hack-possible-nation-state-attack-by-iran/</link>
<yacy:host>www.darknet.org.uk</yacy:host>
<yacy:path>/2016/08/telegram-hack-possible-nation-state-attack-by-iran/</yacy:path>
<dc:description>So there's been a lot of news lately about the Telegram hack and how 15 million accounts were compromised, which is not technically true.</dc:description>
<pubDate>Mon, 21 Jul 2025 22:48:12 +0000</pubDate>
<yacy:size>178010</yacy:size>
<yacy:sizename>173 kbyte</yacy:sizename>
<media:content medium="image" url="https://www.darknet.org.uk/wp-content/uploads/2022/12/cropped-darknet_2022_logo.png"/>
<title>Twitter</title>
<description>So there's been a lot of news lately about the Telegram hack and how 15 million accounts were compromised, which is not technically true.</description>
<dc:subject>So there's been a lot of news lately about the Telegram hack and how 15 million accounts were compromised  which is not technically true.</dc:subject>
</item>
<item>
<guid isPermaLink="false">U_buNC_lzJ3g</guid>
<link>https://www.darknet.org.uk/2006/06/taiwan-kings-of-spam-from-ciphertrust/</link>
<yacy:host>www.darknet.org.uk</yacy:host>
<yacy:path>/2006/06/taiwan-kings-of-spam-from-ciphertrust/</yacy:path>
<dc:description>[ad] Hmm Taiwan are really way ahead of everyone when it comes to being a spam hub, sadly that's nothing to be proud of and generally it's due to a large amount of poorly configured/unsecured servers. Taiwan needs to start doing some vulnerability assessment! Taiwan and Korea have always had&amp;hellip;</dc:description>
<pubDate>Mon, 21 Jul 2025 22:26:31 +0000</pubDate>
<yacy:size>177473</yacy:size>
<yacy:sizename>173 kbyte</yacy:sizename>
<media:content medium="image" url="https://www.darknet.org.uk/wp-content/uploads/2022/12/cropped-darknet_2022_logo.png"/>
<title>Twitter</title>
<description>[ad] Hmm Taiwan are really way ahead of everyone when it comes to being a spam hub, sadly that's nothing to be proud of and generally it's due to a large amount of poorly configured/unsecured servers. Taiwan needs to start doing some vulnerability assessment! Taiwan and Korea have always had&amp;hellip;</description>
<dc:subject>[ad] Hmm Taiwan are really way ahead of everyone when it comes to being a spam hub  sadly that's nothing be proud and generally it's due large amount poorly configured/unsecured servers. needs start doing some vulnerability assessment! Korea have always had&amp;hellip;</dc:subject>
</item>
<item>
<guid isPermaLink="false">U3qfDo_lzJ3g</guid>
<link>https://www.darknet.org.uk/2014/08/xml-quadratic-blowup-attack-blow-wordpress-drupal/</link>
<yacy:host>www.darknet.org.uk</yacy:host>
<yacy:path>/2014/08/xml-quadratic-blowup-attack-blow-wordpress-drupal/</yacy:path>
<dc:description>An XML Quadratic Blowup Attack vulnerability was found in both WordPress and Drupal by security researcher Nir Goldshlager.</dc:description>
<pubDate>Mon, 21 Jul 2025 22:44:42 +0000</pubDate>
<yacy:size>196257</yacy:size>
<yacy:sizename>191 kbyte</yacy:sizename>
<media:content medium="image" url="https://www.darknet.org.uk/wp-content/uploads/2022/12/cropped-darknet_2022_logo.png"/>
<title>Twitter</title>
<description>An XML Quadratic Blowup Attack vulnerability was found in both WordPress and Drupal by security researcher Nir Goldshlager.</description>
<dc:subject>An XML Quadratic Blowup Attack vulnerability was found in both WordPress and Drupal by security researcher Nir Goldshlager.</dc:subject>
</item>
<item>
<guid isPermaLink="false">VFLKKo_lzJ3g</guid>
<link>https://www.darknet.org.uk/2009/03/proxystrike-v21-released-active-web-application-proxy-tool/</link>
<yacy:host>www.darknet.org.uk</yacy:host>
<yacy:path>/2009/03/proxystrike-v21-released-active-web-application-proxy-tool/</yacy:path>
<dc:description>[ad] In April last year we wrote about ProxyStrike, recently the developer has released a couple of new versions - the latest being v2.1. ProxyStrike is an active Web Application Proxy, is a tool designed to find vulnerabilities while browsing an application. It was created because the problems we faced&amp;hellip;</dc:description>
<pubDate>Tue, 22 Jul 2025 02:16:54 +0000</pubDate>
<yacy:size>182322</yacy:size>
<yacy:sizename>178 kbyte</yacy:sizename>
<media:content medium="image" url="https://www.darknet.org.uk/wp-content/uploads/2022/12/cropped-darknet_2022_logo.png"/>
<title>Twitter</title>
<description>[ad] In April last year we wrote about ProxyStrike, recently the developer has released a couple of new versions - the latest being v2.1. ProxyStrike is an active Web Application Proxy, is a tool designed to find vulnerabilities while browsing an application. It was created because the problems we faced&amp;hellip;</description>
<dc:subject>[ad] In April last year we wrote about ProxyStrike  recently the developer has released a couple of new versions - latest being v2.1. is an active Web Application Proxy tool designed to find vulnerabilities while browsing application. It was created because problems faced&amp;hellip;</dc:subject>
</item>
<item>
<guid isPermaLink="false">VIkJTs_lzJ3g</guid>
<link>https://www.darknet.org.uk/2007/01/eeye-launches-0-day-exploit-tracker/</link>
<yacy:host>www.darknet.org.uk</yacy:host>
<yacy:path>/2007/01/eeye-launches-0-day-exploit-tracker/</yacy:path>
<dc:description>[ad] Ah finally a decent 0-day exploit tracker, one that isn't underground and could be fairly useful to everyone. 0-day as basically stated in the article is an exploit not known publicly or available publicly well before any patches are available, some private groups often have exploits for a year&amp;hellip;</dc:description>
<pubDate>Mon, 21 Jul 2025 22:13:59 +0000</pubDate>
<yacy:size>178413</yacy:size>
<yacy:sizename>174 kbyte</yacy:sizename>
<media:content medium="image" url="https://www.darknet.org.uk/wp-content/uploads/2022/12/cropped-darknet_2022_logo.png"/>
<title>Twitter</title>
<description>[ad] Ah finally a decent 0-day exploit tracker, one that isn't underground and could be fairly useful to everyone. 0-day as basically stated in the article is an exploit not known publicly or available publicly well before any patches are available, some private groups often have exploits for a year&amp;hellip;</description>
<dc:subject>[ad] Ah finally a decent 0-day exploit tracker  one that isn't underground and could be fairly useful to everyone. as basically stated in the article is an not known publicly or available well before any patches are some private groups often have exploits for year&amp;hellip;</dc:subject>
</item>
<item>
<guid isPermaLink="false">VJCN6f_lzJ3g</guid>
<link>https://www.darknet.org.uk/2008/11/samurai-web-testing-framework-web-application-security-livecd/</link>
<yacy:host>www.darknet.org.uk</yacy:host>
<yacy:path>/2008/11/samurai-web-testing-framework-web-application-security-livecd/</yacy:path>
<dc:description>[ad] The Samurai Web Testing Framework is a live linux environment that has been pre-configured to function as a web pen-testing environment. The CD contains the best of the open source and free tools that focus on testing and attacking websites. In developing this environment, we have based our tool&amp;hellip;</dc:description>
<pubDate>Mon, 21 Jul 2025 22:31:43 +0000</pubDate>
<yacy:size>186990</yacy:size>
<yacy:sizename>182 kbyte</yacy:sizename>
<media:content medium="image" url="https://www.darknet.org.uk/wp-content/uploads/2022/12/cropped-darknet_2022_logo.png"/>
<title>Twitter</title>
<description>[ad] The Samurai Web Testing Framework is a live linux environment that has been pre-configured to function as a web pen-testing environment. The CD contains the best of the open source and free tools that focus on testing and attacking websites. In developing this environment, we have based our tool&amp;hellip;</description>
<dc:subject>[ad] The Samurai Web Testing Framework is a live linux environment that has been pre-configured to function as web pen-testing environment. CD contains the best of open source and free tools focus on testing attacking websites. In developing this  we have based our tool&amp;hellip;</dc:subject>
</item>
<item>
<guid isPermaLink="false">VQTBuo_lzJ3g</guid>
<link>https://www.darknet.org.uk/2009/04/winautopwn-windows-autohacking-tool/</link>
<yacy:host>www.darknet.org.uk</yacy:host>
<yacy:path>/2009/04/winautopwn-windows-autohacking-tool/</yacy:path>
<dc:description>[ad] winAUTOPWN is a TooL to Autohack your targets with least possible interaction. The aim of creating winAUTOPWN is not to compete with already existing commercial frameworks like Core Impact (Pro), Immunity Canvas, Metasploit Framework (freeware), etc. which offer autohacks, but to create a free, quick, standalone application which is&amp;hellip;</dc:description>
<pubDate>Tue, 22 Jul 2025 02:17:00 +0000</pubDate>
<yacy:size>189071</yacy:size>
<yacy:sizename>184 kbyte</yacy:sizename>
<media:content medium="image" url="https://www.darknet.org.uk/wp-content/uploads/2022/12/cropped-darknet_2022_logo.png"/>
<title>Twitter</title>
<description>[ad] winAUTOPWN is a TooL to Autohack your targets with least possible interaction. The aim of creating winAUTOPWN is not to compete with already existing commercial frameworks like Core Impact (Pro), Immunity Canvas, Metasploit Framework (freeware), etc. which offer autohacks, but to create a free, quick, standalone application which is&amp;hellip;</description>
<dc:subject>[ad] winAUTOPWN is a TooL to Autohack your targets with least possible interaction. The aim of creating not compete already existing commercial frameworks like Core Impact (Pro)  Immunity Canvas Metasploit Framework (freeware) etc. which offer autohacks but create free quick standalone application is&amp;hellip;</dc:subject>
</item>
<yacy:navigation>
<yacy:facet name="filetypes" displayname="Filetypes" type="String" min="0" max="0" mean="0">
</yacy:facet>
</yacy:navigation>
</channel>
</rss>
