<?xml version="1.0" encoding="iso-8859-1" standalone="yes"?>

<rdf:RDF 
  xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" 
  xmlns:dc="http://purl.org/dc/elements/1.1/"
  xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
  xmlns="http://purl.org/rss/1.0/"
> 

  <channel rdf:about="https://SecurityXploit.blogger.de/">
    <title>SecurityXploit</title>
    <link>https://SecurityXploit.blogger.de/</link>
    <description></description>
    <dc:publisher>Blogger.de</dc:publisher>
    <dc:creator>xploit (mailto:&amp;#112;&amp;#97;&amp;#116;&amp;#116;&amp;#101;&amp;#114;&amp;#64;&amp;#116;&amp;#114;&amp;#97;&amp;#115;&amp;#104;&amp;#45;&amp;#109;&amp;#97;&amp;#105;&amp;#108;&amp;#46;&amp;#99;&amp;#111;&amp;#109;)</dc:creator>
    <dc:date>2012-06-01T13:20:11Z</dc:date>
    <dc:language>en</dc:language>
    <sy:updatePeriod>hourly</sy:updatePeriod>
    <sy:updateFrequency>1</sy:updateFrequency>
    <sy:updateBase>2000-01-01T00:00:00Z</sy:updateBase>
    <items>
      <rdf:Seq>
        <rdf:li rdf:resource="https://SecurityXploit.blogger.de/stories/2070132/" />
        <rdf:li rdf:resource="https://SecurityXploit.blogger.de/stories/2070131/" />
        <rdf:li rdf:resource="https://SecurityXploit.blogger.de/stories/2068407/" />
        <rdf:li rdf:resource="https://SecurityXploit.blogger.de/stories/2062844/" />
        <rdf:li rdf:resource="https://SecurityXploit.blogger.de/stories/2062840/" />
        <rdf:li rdf:resource="https://SecurityXploit.blogger.de/stories/1846665/" />
        <rdf:li rdf:resource="https://SecurityXploit.blogger.de/stories/2059462/" />

         <textinput rdf:resource="https://SecurityXploit.blogger.de/search" />
      </rdf:Seq>
    </items>
  </channel>

  <item rdf:about="https://SecurityXploit.blogger.de/stories/2070132/">
    <title>WiFite v2 - linux</title> 
    <link>https://SecurityXploit.blogger.de/stories/2070132/</link>
    <description>&amp;#8220;WiFite is an automated wireless attack tool. It&amp;#8217;s purpose is to attack multiple WEP and WPA encrypted networks at the same time. This tool is customizable to be automated with only a few arguments. It can be trusted to run without supervision. It was designed for use with pentesting distributions of Linux, such as Backtrack 5 R1, BlackBuntu, BackBox; any Linux distributions with wireless drivers patched for injection. The script appears to also operate with Ubuntu 11/10, Debian 6, and...</description>
    <dc:publisher>Blogger.de</dc:publisher>
    <dc:creator>xploit</dc:creator>
    <dc:subject>Tools</dc:subject>
    <dc:rights>Copyright &#169; 2012 xploit</dc:rights>
    <dc:date>2012-06-01T13:20:11Z</dc:date>
  </item> 
  <item rdf:about="https://SecurityXploit.blogger.de/stories/2070131/">
    <title>Automatic Backup Manager</title> 
    <link>https://SecurityXploit.blogger.de/stories/2070131/</link>
    <description>Automatic Backup Manager supports backing up from local as well as portable devices including external hard drives, USB devices, network, or any other storage device that is compatible with Windows. Automatic Backup Manager tool can be used by everyone no special sklls is required to run this tool.

Download full version FREE
http://www.algologic.in/dailysoftwaregiveaway/automatic-backup-manager-dsg.zip</description>
    <dc:publisher>Blogger.de</dc:publisher>
    <dc:creator>xploit</dc:creator>
    <dc:subject>Tools</dc:subject>
    <dc:rights>Copyright &#169; 2012 xploit</dc:rights>
    <dc:date>2012-06-01T13:18:13Z</dc:date>
  </item> 
  <item rdf:about="https://SecurityXploit.blogger.de/stories/2068407/">
    <title>Micro Niche Websites - Make $100-$5000/mo in Autopilot</title> 
    <link>https://SecurityXploit.blogger.de/stories/2068407/</link>
    <description>Creation of micro niche websites helps in building residual amounts and the process of creation is also simple. Latest trend in earning money online is integrating Google AdSense with micro niche websites. The difficulty in creation of AdSense with Micro niche is moderate.

Start with collecting the keywords and you can take the assistance of keyword search tools to find out the most often searched keywords which have a count lesser than 1000 searches per day and which can yield lesser than 55000...</description>
    <dc:publisher>Blogger.de</dc:publisher>
    <dc:creator>xploit</dc:creator>
    <dc:subject>Jobs</dc:subject>
    <dc:rights>Copyright &#169; 2012 xploit</dc:rights>
    <dc:date>2012-05-29T11:53:19Z</dc:date>
  </item> 
  <item rdf:about="https://SecurityXploit.blogger.de/stories/2062844/">
    <title>web-sorrow - Linux</title> 
    <link>https://SecurityXploit.blogger.de/stories/2062844/</link>
    <description>A perl based tool used for checking a Web server for misconfiguration, version detection, enumeration, and server information. I will build more Functionality in the future. what is&apos;s NOT: Vulnerably scanner, inspection proxy, DDoS tool, exploitation framework. It&apos;s entirely focused on Enumeration and collecting Info on the target server 

EXAMPLES:

basic: perl Wsorrow.pl -host scanme.nmap.org -S

look for login pages: perl Wsorrow.pl -host 192.168.1.1 -auth

CMS intense scan: perl Wsorrow.pl -host...</description>
    <dc:publisher>Blogger.de</dc:publisher>
    <dc:creator>xploit</dc:creator>
    <dc:subject>Pentest</dc:subject>
    <dc:rights>Copyright &#169; 2012 xploit</dc:rights>
    <dc:date>2012-05-19T08:33:52Z</dc:date>
  </item> 
  <item rdf:about="https://SecurityXploit.blogger.de/stories/2062840/">
    <title>ClubHACK Magazine May 2012</title> 
    <link>https://SecurityXploit.blogger.de/stories/2062840/</link>
    <description>Contents:    

Tech Gyan: Steganography over converted channels    
Security and privacy have been a concern for people for centuries. Whether it is private citizens, governments, military, or business, it seems everyone has information that needs to be kept private and out of the hands of unintended third parties. Information wants to be free but it is necessary to keep information private. That need has come about because governments have sensitive information, corporations send confidential financial...</description>
    <dc:publisher>Blogger.de</dc:publisher>
    <dc:creator>xploit</dc:creator>
    <dc:subject>Books change the World</dc:subject>
    <dc:rights>Copyright &#169; 2012 xploit</dc:rights>
    <dc:date>2012-05-19T08:26:03Z</dc:date>
  </item> 
  <item rdf:about="https://SecurityXploit.blogger.de/stories/1846665/">
    <title>SQL Injection Scanners List</title> 
    <link>https://SecurityXploit.blogger.de/stories/1846665/</link>
    <description>WebRaider
Idea of this attack is very simple. Getting a reverse shell from an SQL Injection with one request without using an extra channel such as TFTP, FTP to upload the initial payload.

Download
http://code.google.com/p/webraider/downloads/list

Download PDF
http://www.mavitunasecurity.com/s/research/OneClickOwnage.pdf



Havij  Advanced SQL Injection 
Havij is an automated SQL Injection tool that helps penetration testers to find and exploit SQL Injection vulnerabilities on a web page.

It can...</description>
    <dc:publisher>Blogger.de</dc:publisher>
    <dc:creator>xploit</dc:creator>
    <dc:subject>Pentest</dc:subject>
    <dc:rights>Copyright &#169; 2011 xploit</dc:rights>
    <dc:date>2011-06-30T10:55:25Z</dc:date>
  </item> 
  <item rdf:about="https://SecurityXploit.blogger.de/stories/2059462/">
    <title>BitCoin - 18,000 Bitcoins Stolen</title> 
    <link>https://SecurityXploit.blogger.de/stories/2059462/</link>
    <description>It&amp;#8217;s believed that at least 18,000 BTC ($90,000 or 68,000 EUR) have been stolen.
Many criticized the site&amp;#8217;s owners for keeping such amounts of currency on hosted systems instead of using offline transactions and disconnecting the wallets from the trading infrastructure, especially after the Linode incident.
Zhou maintains that apart from the Bitcoins, the database was also stolen but the passwords was salted and encrypted using bcrypt. Zhou mentions that the stolen bitcoins are likely...</description>
    <dc:publisher>Blogger.de</dc:publisher>
    <dc:creator>xploit</dc:creator>
    <dc:subject>News</dc:subject>
    <dc:rights>Copyright &#169; 2012 xploit</dc:rights>
    <dc:date>2012-05-13T10:20:37Z</dc:date>
  </item> 


   <textinput rdf:about="https://SecurityXploit.blogger.de/search">
      <title>find</title>
      <description>Search this site:</description>
      <name>q</name>
      <link>https://SecurityXploit.blogger.de/search</link>
   </textinput>
</rdf:RDF>
