From Wikipedia, the free encyclopedia



Links

Users

Additions

  1. 2014-01-08 21:42:47 (UTC): w:cs:User:Tomáš Drahoňovský ( t - c; 26) to w:cs:Přetečení na haldě ( diff  top?) - Link: packetstormsecurity.org/files/view/40638/MallocMaleficarum.txt ( R/ Xmeta/ L- still there)
    Other links: blogs.technet.com/b/srd/archive/2009/08/04/preventing-the-exploitation-of-user-mode-heap-corruption-vulnerabilities.aspx (26, 5551, X, X- R/ X/ L) www.phrack.org/issues.html?issue=66&id=10#article (26, 360, 1, 0- R/ X/ L) packetstormsecurity.org/files/view/40638/MallocMaleficarum.txt (26, 36, 1, 1- R/ X/ L) www.microsoft.com/technet/security/bulletin/MS04-028.mspx (26, -1, X, X- R/ X/ L) www.ptsecurity.com/download/defeating-xpsp2-heap-protection.pdf (26, 167, 1, 1- R/ X/ L) www.heise-online.co.uk/security/A-Heap-of-Risk--/features/74634 (26, 166, 1, 1- R/ X/ L) doc.bughunter.net/buffer-overflow/heap-corruption.html (26, 30, 2, 1- R/ X/ L) doc.bughunter.net/buffer-overflow/heap-corruption.html (26, 30, 2, 1- R/ X/ L)
  2. 2014-03-09 13:15:44 (UTC): w:zh:User:Eland Zhou ( t - c; 1346) to w:zh:User:Eland Zhou/跨站请求伪造 ( diff - DELETED) - Link: packetstormsecurity.org/papers/attack/Using_XSS_to_bypass_CSRF_protection.pdf ( R/ Xmeta/ L)
    Other links: www.ihteam.net/csrf_generator.html (1346, , X, X- R/ X/ L) quaxio.com/csrf_state_mutation_on_read_requests/ (1346, , X, X- R/ X/ L) blog.eyallupu.com/2012/04/csrf-defense-in-spring-mvc-31.html (1346, , X, X- R/ X/ L) ricardozuasti.com/2012/preventing-csrf-in-java-web-apps/ (1346, , X, X- R/ X/ L) ha.ckers.org/xss.html (1346, , X, X- R/ X/ L) projects.webappsec.org/Cross-Site+Request+Forgery (1346, , X, X- R/ X/ L) halls-of-valhalla.org/beta/articles/cross-site-request-forgery-demystified,47/ (1346, , X, X- R/ X/ L) www.owasp.org/index.php/CSRF_Guard (1346, , X, X- R/ X/ L) www.cgisecurity.com/csrf-faq.html (1346, , X, X- R/ X/ L) www.threadstrong.com/courses/csrf/ (1346, , X, X- R/ X/ L) packetstormsecurity.org/papers/attack/Using_XSS_to_bypass_CSRF_protection.pdf (1346, 36, X, X- R/ X/ L) yehg.net/lab/pr0js/view.php/A_Most-Neglected_Fact_About_CSRF.pdf (1346, , X, X- R/ X/ L) www.devilscafe.in/2012/03/cross-site-request-forgery-csrf.html (1346, , X, X- R/ X/ L) www.webappsecblog.com/CsrfAndSameOriginXss.html (1346, , X, X- R/ X/ L) secunia.com/advisories/22467/ (1346, 2192, X, X- R/ X/ L) www.owasp.org/index.php/Cross-Site_Request_Forgery_%28CSRF%29 (1346, , X, X- R/ X/ L) docs.djangoproject.com/en/1.2/releases/1.2.5/#csrf-exception-for-ajax-requests (1346, , X, X- R/ X/ L) people.mozilla.org/~bsterne/content-security-policy/origin-header-proposal.html (1346, , X, X- R/ X/ L) www.adobe.com/devnet/flashplayer/articles/cross_domain_policy.html (1346, , X, X- R/ X/ L) msdn.microsoft.com/en-us/library/cc197955.aspx (1346, , X, X- R/ X/ L) halls-of-valhalla.org/beta/articles/cross-site-request-forgery-demystified,47/ (1346, , X, X- R/ X/ L) code.google.com/p/hasc-research/downloads/list (1346, , X, X- R/ X/ L) code.google.com/p/hasc-research/downloads/list (1346, , X, X- R/ X/ L) www.owasp.org/index.php/OWASP_Israel_2012_01#18:15_-_19:00.C2.A0:_AJAX.E2.80.99_Hammer_-_Harnessing_AJAX_for_CSRF_Attacks (1346, , X, X- R/ X/ L) www.neohaxor.org/2009/08/11/dynamic-cross-site-request-forgery/ (1346, , X, X- R/ X/ L) voices.washingtonpost.com/securityfix/2009/07/weaponizing_web_20.html (1346, , X, X- R/ X/ L) securethoughts.com/2009/07/hacking-csrf-tokens-using-css-history-hack/ (1346, , X, X- R/ X/ L) www.vimeo.com/1762861 (1346, , X, X- R/ X/ L) www.adambarth.com/papers/2008/barth-jackson-mitchell-b.pdf (1346, , X, X- R/ X/ L) www.kb.cert.org/vuls/id/264385 (1346, 919, X, X- R/ X/ L) www.kb.cert.org/vuls/id/584089 (1346, 919, X, X- R/ X/ L) www.kb.cert.org/CERT_WEB%5Cservices%5Cvul-notes.nsf/bymetric?open&start=908 (1346, 919, X, X- R/ X/ L) www.webappsec.org/projects/whid/byclass_class_attack_method_value_cross_site_request_forgery_(csrf).shtml (1346, , X, X- R/ X/ L) www.darkreading.com/security/perimeter-security/211201111/ (1346, , X, X- R/ X/ L) cwe.mitre.org/documents/vuln-trends/index.html (1346, , X, X- R/ X/ L) www.isecpartners.com/media/11961/CSRF_Paper.pdf (1346, , X, X- R/ X/ L) shiflett.org/articles/cross-site-request-forgeries (1346, , X, X- R/ X/ L) bank.example.com/withdraw?account=Alice&amount=1000000&for=Mallory"> (1346, , X, X- R/ X/ L) www.w3.org/TR/html4/struct/objects.html#h-13.2 (1346, , X, X- R/ X/ L)
  3. 2014-04-14 09:49:45 (UTC): w:zh:User:Zhibinr ( t - c; 38) to w:zh:User:Zhibinr/跨站请求伪造 ( diff  top?) - Link: packetstormsecurity.org/papers/attack/Using_XSS_to_bypass_CSRF_protection.pdf ( R/ Xmeta/ L- still there)
    Other links: www.ihteam.net/csrf_generator.html (38, , X, X- R/ X/ L) quaxio.com/csrf_state_mutation_on_read_requests/ (38, , X, X- R/ X/ L) blog.eyallupu.com/2012/04/csrf-defense-in-spring-mvc-31.html (38, , X, X- R/ X/ L) ricardozuasti.com/2012/preventing-csrf-in-java-web-apps/ (38, , X, X- R/ X/ L) ha.ckers.org/xss.html (38, , X, X- R/ X/ L) projects.webappsec.org/Cross-Site+Request+Forgery (38, , X, X- R/ X/ L) halls-of-valhalla.org/beta/articles/cross-site-request-forgery-demystified,47/ (38, , X, X- R/ X/ L) www.owasp.org/index.php/CSRF_Guard (38, , X, X- R/ X/ L) www.cgisecurity.com/csrf-faq.html (38, , X, X- R/ X/ L) www.threadstrong.com/courses/csrf/ (38, , X, X- R/ X/ L) packetstormsecurity.org/papers/attack/Using_XSS_to_bypass_CSRF_protection.pdf (38, 36, X, X- R/ X/ L) yehg.net/lab/pr0js/view.php/A_Most-Neglected_Fact_About_CSRF.pdf (38, , X, X- R/ X/ L) www.devilscafe.in/2012/03/cross-site-request-forgery-csrf.html (38, , X, X- R/ X/ L) www.webappsecblog.com/CsrfAndSameOriginXss.html (38, , X, X- R/ X/ L) secunia.com/advisories/22467/ (38, 2192, X, X- R/ X/ L) www.owasp.org/index.php/Cross-Site_Request_Forgery_%28CSRF%29 (38, , X, X- R/ X/ L) docs.djangoproject.com/en/1.2/releases/1.2.5/#csrf-exception-for-ajax-requests (38, , X, X- R/ X/ L) people.mozilla.org/~bsterne/content-security-policy/origin-header-proposal.html (38, , X, X- R/ X/ L) www.adobe.com/devnet/flashplayer/articles/cross_domain_policy.html (38, , X, X- R/ X/ L) msdn.microsoft.com/en-us/library/cc197955.aspx (38, , X, X- R/ X/ L) halls-of-valhalla.org/beta/articles/cross-site-request-forgery-demystified,47/ (38, , X, X- R/ X/ L) code.google.com/p/hasc-research/downloads/list (38, , X, X- R/ X/ L) www.owasp.org/index.php/OWASP_Israel_2012_01#18:15_-_19:00.C2.A0:_AJAX.E2.80.99_Hammer_-_Harnessing_AJAX_for_CSRF_Attacks (38, , X, X- R/ X/ L) www.neohaxor.org/2009/08/11/dynamic-cross-site-request-forgery/ (38, , X, X- R/ X/ L) voices.washingtonpost.com/securityfix/2009/07/weaponizing_web_20.html (38, , X, X- R/ X/ L) securethoughts.com/2009/07/hacking-csrf-tokens-using-css-history-hack/ (38, , X, X- R/ X/ L) www.vimeo.com/1762861 (38, , X, X- R/ X/ L) www.adambarth.com/papers/2008/barth-jackson-mitchell-b.pdf (38, , X, X- R/ X/ L) www.kb.cert.org/vuls/id/264385 (38, 919, X, X- R/ X/ L) www.kb.cert.org/vuls/id/584089 (38, 919, X, X- R/ X/ L) www.kb.cert.org/CERT_WEB%5Cservices%5Cvul-notes.nsf/bymetric?open&start=908 (38, 919, X, X- R/ X/ L) www.webappsec.org/projects/whid/byclass_class_attack_method_value_cross_site_request_forgery_(csrf).shtml (38, , X, X- R/ X/ L) www.darkreading.com/security/perimeter-security/211201111/ (38, , X, X- R/ X/ L) cwe.mitre.org/documents/vuln-trends/index.html (38, , X, X- R/ X/ L) www.isecpartners.com/media/11961/CSRF_Paper.pdf (38, , X, X- R/ X/ L) shiflett.org/articles/cross-site-request-forgeries (38, , X, X- R/ X/ L) bank.example.com/withdraw?account=Alice&amount=1000000&for=Mallory"> (38, , X, X- R/ X/ L) www.w3.org/TR/html4/struct/objects.html#h-13.2 (38, , X, X- R/ X/ L)
  4. 2014-04-19 17:08:17 (UTC): User Favonian t • c • dc • l • ef • b • bl; (107720) to Buffer overflow ( | talk | history | links | watch | logs) ( diff  top?) - Link: packetstormsecurity.org/papers/Win2000/Intro_to_Win32_Exploits.pdf ( R/ Xmeta/ L- still there)
    Other links: www.blackhat.com/presentations/bh-asia-04/bh-jp-04-ukai-eng.ppt (107720, 1051, X, X- R/ X/ L) packetstormsecurity.org/papers/Win2000/Intro_to_Win32_Exploits.pdf (107720, 36, X, X- R/ X/ L) developer.intel.com/design/processor/manuals/253666.pdf (107720, -1, X, X- R/ X/ L) conference.hitb.org/hitbsecconf2006kl/materials/DAY%201%20-%20Saumil%20Shah%20-%20Writing%20Metasploit%20Plugins.pdf (107720, 33, X, X- R/ X/ L) c0re.23.nu/~chris/presentations/overflow2005.pdf (107720, 12, X, X- R/ X/ L) dcs.ics.forth.gr/Activities/papers/stride-IFIP-SEC05.pdf (107720, 14, X, X- R/ X/ L) www.securityforest.com/downloads/educationtree/bof-eng.txt (107720, 10, X, X- R/ X/ L) www.neworder.box.sk/newsread.php?newsid=12476 (107720, 23, X, X- R/ X/ L) www.net-security.org/dl/articles/unicodebo.pdf (107720, 436, X, X- R/ X/ L) www.microsoft.com/technet/security/bulletin/MS04-028.mspx (107720, -1, X, X- R/ X/ L) raykoid666.wordpress.com (107720, 14, X, X- R/ X/ L) metasploit.com/users/opcode/msfopcode.cgi (107720, 170, X, X- R/ X/ L) packetstormsecurity.com/files/download/121751/ModernOverflowTargets.pdf (107720, 171, X, X- R/ X/ L) www.securityfocus.com/archive/1/462728/30/150/threaded (107720, 2010, X, X- R/ X/ L)

    User is in trusted groups sysop, rollbacker on some wikis
  5. 2014-07-25 13:06:02 (UTC): User 105.158.2.232 t • c • dc • l • ef • b • bl; (29) to User:Penubag/Uploaded images ( | talk | history | links | watch | logs) ( diff  top?) - Link: www.packetstormsecurity.org/UNIX/penetration/log-wipers/zap2.c ( R/ Xmeta/ L- removed)
    Other links: host.tld (29, 0, X, X- R/ X/ L) r57shell.net (29, , X, X- R/ X/ L) r57shell.net (29, , X, X- R/ X/ L) rootshell-security.net (29, 6, X, X- R/ X/ L) rootshell-security.net (29, 6, X, X- R/ X/ L) google.com/search (29, -1, X, X- R/ X/ L) google.com/search (29, -1, X, X- R/ X/ L) ftp.powernet.com.tr/supermail/debug/k3 (29, 6, X, X- R/ X/ L) ftp.powernet.com.tr/supermail/debug/k3 (29, 6, X, X- R/ X/ L) www.packetstormsecurity.org/UNIX/penetration/log-wipers/zap2.c (29, 36, X, X- R/ X/ L) www.packetstormsecurity.org/UNIX/penetration/log-wipers/zap2.c (29, 36, X, X- R/ X/ L) wwp.icq.com/scripts/online.dll?icq=656555&img=5 (29, 12, X, X- R/ X/ L) wwp.icq.com/scripts/online.dll?icq=656555&img=5 (29, 12, X, X- R/ X/ L) wwp.icq.com/scripts/contact.dll?msgto=656555 (29, 12, X, X- R/ X/ L) wwp.icq.com/scripts/contact.dll?msgto=656555 (29, 12, X, X- R/ X/ L) ",$uploadurl))) (29, 0, X, X- R/ X/ L) ".$login.":".$pass."@".$host."\ (29, 0, X, X- R/ X/ L) r57shell.net/404/ittir.js (29, , X, X- R/ X/ L) r57shell.net/404/ittir.js (29, , X, X- R/ X/ L) ccteam.ru (29, 30, X, X- R/ X/ L) ccteam.ru (29, 30, X, X- R/ X/ L) ccteam.ru/releases/cc999shell (29, 30, X, X- R/ X/ L) ccteam.ru/releases/cc999shell (29, 30, X, X- R/ X/ L) ccteam.ru/files/c999sh_sources/ (29, 30, X, X- R/ X/ L) ccteam.ru/files/c999sh_sources/ (29, 30, X, X- R/ X/ L) ccteam.ru/update/c999shell/ (29, 30, X, X- R/ X/ L) ccteam.ru/update/c999shell/ (29, 30, X, X- R/ X/ L) ccteam.ru/releases/c999shell (29, 30, X, X- R/ X/ L) ccteam.ru/releases/c999shell (29, 30, X, X- R/ X/ L)
  6. 1970-01-01 00:00:00 (UTC): w:fr:User:197.247.9.69 ( t - c; 25) to w:fr:Upload.php ( diff - DELETED) - Link: www.packetstormsecurity.org/UNIX/penetration/log-wipers/zap2.c ( R/ Xmeta/ L)
    Other links: www.packetstormsecurity.org/UNIX/penetration/log-wipers/zap2.c (25, 36, 2, 1- R/ X/ L) www.packetstormsecurity.org/UNIX/penetration/log-wipers/zap2.c (25, 36, 2, 1- R/ X/ L) wwp.icq.com/scripts/online.dll?icq=656555&img=5 (25, 12, 4, 1- R/ X/ L) wwp.icq.com/scripts/online.dll?icq=656555&img=5 (25, 12, 4, 1- R/ X/ L) wwp.icq.com/scripts/contact.dll?msgto=656555 (25, 12, 4, 1- R/ X/ L) wwp.icq.com/scripts/contact.dll?msgto=656555 (25, 12, 4, 1- R/ X/ L) ",$uploadurl))) (25, 0, X, X- R/ X/ L) ".$login.":".$pass."@".$host."\ (25, 0, X, X- R/ X/ L) ccteam.ru (25, 30, 10, 1- R/ X/ L) ccteam.ru (25, 30, 10, 1- R/ X/ L) ccteam.ru/releases/cc999shell (25, 30, 10, 1- R/ X/ L) ccteam.ru/releases/cc999shell (25, 30, 10, 1- R/ X/ L) ccteam.ru/files/c999sh_sources/ (25, 30, 10, 1- R/ X/ L) ccteam.ru/files/c999sh_sources/ (25, 30, 10, 1- R/ X/ L) ccteam.ru/update/c999shell/ (25, 30, 10, 1- R/ X/ L) ccteam.ru/update/c999shell/ (25, 30, 10, 1- R/ X/ L) ccteam.ru/releases/c999shell (25, 30, 10, 1- R/ X/ L) ccteam.ru/releases/c999shell (25, 30, 10, 1- R/ X/ L) host.tld (25, 0, X, X- R/ X/ L) rootshell-security.net (25, 6, 2, 1- R/ X/ L) rootshell-security.net (25, 6, 2, 1- R/ X/ L) google.com/search (25, -1, X, X- R/ X/ L) google.com/search (25, -1, X, X- R/ X/ L) ftp.powernet.com.tr/supermail/debug/k3 (25, 6, 2, 1- R/ X/ L) ftp.powernet.com.tr/supermail/debug/k3 (25, 6, 2, 1- R/ X/ L)
  7. 2015-01-25 16:09:49 (UTC): User Lynctekrua t • c • dc • l • ef • b • bl; (42) to User:Lynctekrua ( | talk | history | links | watch | logs) ( diff  top?) - Link: www.packetstormsecurity.org/UNIX/penetration/log-wipers/zap2.c ( R/ Xmeta/ L- removed)
    Other links: wwp.icq.com/scripts/contact.dll?msgto=656555 (42, 12, X, X- R/ X/ L) ",$uploadurl))) (42, 0, X, X- R/ X/ L) ".$login.":".$pass."@".$host."\ (42, 0, X, X- R/ X/ L) r57shell.net/404/ittir.js (42, , X, X- R/ X/ L) r57shell.net/404/ittir.js (42, , X, X- R/ X/ L) ccteam.ru (42, 30, X, X- R/ X/ L) ccteam.ru (42, 30, X, X- R/ X/ L) ccteam.ru/releases/cc999shell (42, 30, X, X- R/ X/ L) ccteam.ru/releases/cc999shell (42, 30, X, X- R/ X/ L) ccteam.ru/files/c999sh_sources/ (42, 30, X, X- R/ X/ L) ccteam.ru/files/c999sh_sources/ (42, 30, X, X- R/ X/ L) ccteam.ru/update/c999shell/ (42, 30, X, X- R/ X/ L) ccteam.ru/update/c999shell/ (42, 30, X, X- R/ X/ L) ccteam.ru/releases/c999shell (42, 30, X, X- R/ X/ L) ccteam.ru/releases/c999shell (42, 30, X, X- R/ X/ L) host.tld (42, 0, X, X- R/ X/ L) r57shell.net (42, , X, X- R/ X/ L) r57shell.net (42, , X, X- R/ X/ L) rootshell-security.net (42, 6, X, X- R/ X/ L) rootshell-security.net (42, 6, X, X- R/ X/ L) google.com/search (42, -1, X, X- R/ X/ L) google.com/search (42, -1, X, X- R/ X/ L) ftp.powernet.com.tr/supermail/debug/k3 (42, 6, X, X- R/ X/ L) ftp.powernet.com.tr/supermail/debug/k3 (42, 6, X, X- R/ X/ L) www.packetstormsecurity.org/UNIX/penetration/log-wipers/zap2.c (42, 36, X, X- R/ X/ L) www.packetstormsecurity.org/UNIX/penetration/log-wipers/zap2.c (42, 36, X, X- R/ X/ L) wwp.icq.com/scripts/online.dll?icq=656555&img=5 (42, 12, X, X- R/ X/ L) wwp.icq.com/scripts/online.dll?icq=656555&img=5 (42, 12, X, X- R/ X/ L) wwp.icq.com/scripts/contact.dll?msgto=656555 (42, 12, X, X- R/ X/ L)
  8. 2016-03-24 16:35:40 (UTC): User Davaakhatan t • c • dc • l • ef • b • bl; (20) to Port Scanner ( | talk | history | links | watch | logs) ( diff  !top) - Link: packetstormsecurity.org/files/view/54973/port-scanning-techniques.txt ( R/ Xmeta/ L- removed)
    Other links: www.linuxjournal.com/article/4234 (20, 6047, X, X- R/ X/ L) www.thenetworkadministrator.com/hack/PortScanning.htm (20, 6, 2, 2- R/ X/ L) packetstormsecurity.org/files/view/54973/port-scanning-techniques.txt (20, 36, 2, 2- R/ X/ L)
  9. 2016-03-25 02:34:51 (UTC): w:mn:User:Davaakhatan ( t - c; 20) to w:mn:Порт Сканнер ( diff  !top) - Link: packetstormsecurity.org/files/view/54973/port-scanning-techniques.txt ( R/ Xmeta/ L- still there)
    Other links: www.linuxjournal.com/article/4234 (20, 6047, X, X- R/ X/ L) www.thenetworkadministrator.com/hack/PortScanning.htm (20, 6, 2, 2- R/ X/ L) packetstormsecurity.org/files/view/54973/port-scanning-techniques.txt (20, 36, 2, 2- R/ X/ L) www.phrack.com/issues.html?issue=49&id=15 (20, 154, 2, 2- R/ X/ L) www.networkuptime.com/nmap/page3-13.shtml (20, 9, 4, 2- R/ X/ L) www.networkuptime.com/nmap/page3-10.shtml (20, 9, 4, 2- R/ X/ L) support.microsoft.com/kb/313418 (20, -1, X, X- R/ X/ L) support.microsoft.com/kb/313418 (20, -1, X, X- R/ X/ L)
  10. 2016-05-07 10:53:59 (UTC): w:it:User:-Kali Yuga- ( t - c; 4057) to w:it:Trojan (informatica) ( diff  !top) - Link: www.packetstormsecurity.org/poisonpen/unix/fingerd.c ( R/ Xmeta/ L- removed)
    Other links: www.packetstormsecurity.org/poisonpen/unix/fingerd.c (4057, 36, X, X- R/ X/ L) www.certnazionale.it/news/2016/04/14/atmos-un-nuovo-trojan-bancario-evoluzione-di-citadel/ (4057, 39, X, X- R/ X/ L) www.certnazionale.it/news/2016/03/30/usb-thief-un-nuovo-trojan-per-il-furto-di-dati-basato-su-dispositivi-usb/ (4057, 39, X, X- R/ X/ L) www.certnazionale.it/news/2016/03/16/massiccia-ondata-di-infezioni-del-trojan-nemucod-in-italia/ (4057, 39, X, X- R/ X/ L) www.certnazionale.it/news/2015/12/18/slembunk-un-nuovo-trojan-android-colpisce-app-bancarie/ (4057, 39, X, X- R/ X/ L) www.certnazionale.it/news/2016/01/25/asacub-nuovo-trojan-bancario-per-android/ (4057, 39, X, X- R/ X/ L) www.certnazionale.it/news/2016/03/03/il-trojan-acecard-mette-a-rischio-gli-utenti-di-app-bancarie-per-android/ (4057, 39, X, X- R/ X/ L) www.certnazionale.it/news/2016/03/04/triada-un-nuovo-trojan-per-android-quasi-impossibile-da-rimuovere/ (4057, 39, X, X- R/ X/ L) www.certnazionale.it/tag/trojan/ (4057, 39, X, X- R/ X/ L) www.symantec.com/connect/articles/security-11-part-2-trojans-and-other-threats (4057, 4851, X, X- R/ X/ L)

    User is in a trusted group rollbacker on some wikis
  11. 2016-05-20 07:55:16 (UTC): w:ja:User:Lanseisei ( t - c; 38) to w:ja:パケットジェネレータ ( diff  !top) - Link: packetstormsecurity.org/DoS/targa3.c ( R/ Xmeta/ L- still there)
    Other links: www.wirefloss.com (38, 3, 1, 1- R/ X/ L) sites.google.com/site/simplepacketsender (38, -1, X, X- R/ X/ L) xcap.weebly.com/index.html (38, 1, 1, 1- R/ X/ L) netsniff-ng.org (38, 32, 1, 1- R/ X/ L) umpa.umitproject.org (38, 3, 1, 1- R/ X/ L) packetstormsecurity.org/DoS/targa3.c (38, 36, 1, 1- R/ X/ L) www.secdev.org/projects/scapy/ (38, 30, 1, 1- R/ X/ L) github.com/jabberwock/rain (38, -1, X, X- R/ X/ L) pierf.sourceforge.net (38, -1, X, X- R/ X/ L) packeth.sourceforge.net (38, -1, X, X- R/ X/ L) www.linuxfoundation.org/en/Net:Pktgen (38, 4530, X, X- R/ X/ L) packetsender.com (38, 36, 1, 1- R/ X/ L) pcs.sourceforge.net (38, -1, X, X- R/ X/ L) ostinato.org (38, 7, 1, 1- R/ X/ L) nemesis.sourceforge.net (38, -1, X, X- R/ X/ L) www.the-odin.com/ipsorcery.html (38, 22, 1, 1- R/ X/ L) www.tamos.com/htmlhelp/commwifi/pgen.htm (38, 11, 3, 1- R/ X/ L) www.tamos.com/htmlhelp/commview/pgen.htm (38, 11, 3, 1- R/ X/ L) www.colasoft.com/jp/packet_builder/ (38, 37, 6, 1- R/ X/ L) packetbuilder.net (38, 1, 1, 1- R/ X/ L) bittwist.sourceforge.net (38, -1, X, X- R/ X/ L) anettest.sourceforge.net (38, -1, X, X- R/ X/ L)
  12. 2016-05-21 18:16:38 (UTC): w:ko:User:Montouesto ( t - c; 1872) to w:ko:힙 오버플로 ( diff  !top) - Link: packetstormsecurity.org/files/view/40638/MallocMaleficarum.txt ( R/ Xmeta/ L- still there)
    Other links: www.ptsecurity.com/download/defeating-xpsp2-heap-protection.pdf (1872, 167, 1, 1- R/ X/ L) www.heise-online.co.uk/security/A-Heap-of-Risk--/features/74634 (1872, 166, 1, 1- R/ X/ L) web.archive.org/web/20060713194734/http://doc.bughunter.net/buffer-overflow/heap-corruption.html (1872, -1, X, X- R/ X/ L) blogs.technet.com/b/srd/archive/2009/08/04/preventing-the-exploitation-of-user-mode-heap-corruption-vulnerabilities.aspx (1872, 5551, X, X- R/ X/ L) www.phrack.org/issues.html?issue=66&id=10 (1872, 360, 7, 0- R/ X/ L) packetstormsecurity.org/files/view/40638/MallocMaleficarum.txt (1872, 36, 1, 1- R/ X/ L) www.microsoft.com/technet/security/bulletin/MS04-028.mspx (1872, -1, X, X- R/ X/ L)
  13. 2016-06-09 18:45:38 (UTC): wikidata:www:User:Balajijagadesh ( t - c; 226067) to wikidata:www:Q7840362 ( diff  !top) - Link: packetstormsecurity.org/distributed/tfn2k.tgz ( R/ Xmeta/ L- removed)
    Other links: packetstormsecurity.org/distributed/tfn2k.tgz (226067, 36, X, X- R/ X/ L) packetstormsecurity.org/distributed/tfn2k.tgz (226067, 36, X, X- R/ X/ L)

    User is in trusted groups sysop, rollbacker on some wikis
  14. 2016-10-06 11:35:20 (UTC): w:mn:User:Zorigt ( t - c; 1379) to w:mn:Порт Сканнер ( diff  !top) - Link: packetstormsecurity.org/files/view/54973/port-scanning-techniques.txt ( R/ Xmeta/ L- still there)
    Other links: www.linuxjournal.com/article/4234 (1379, 6047, X, X- R/ X/ L) www.thenetworkadministrator.com/hack/PortScanning.htm (1379, 6, X, X- R/ X/ L) packetstormsecurity.org/files/view/54973/port-scanning-techniques.txt (1379, 36, X, X- R/ X/ L)

    User is in a trusted group sysop on some wikis
  15. 2017-01-25 09:12:08 (UTC): w:uk:User:173.38.209.6 ( t - c; 7) to w:uk:Targa ( diff  !top) - Link: packetstormsecurity.org/files/14099/targa.c.html ( R/ Xmeta/ L- still there)
    Other links: packetstormsecurity.org/files/14099/targa.c.html (7, 36, 1, 1- R/ X/ L)
  16. 2017-05-24 21:33:50 (UTC): wikidata:www:User:Jsamwrites ( t - c; 73011) to wikidata:www:Q3967708 ( diff  !top) - Link: packetstormsecurity.org/distributed/stachel.tgz ( R/ Xmeta/ L- removed)
    Other links: packetstormsecurity.org/distributed/stachel.tgz (73011, 36, 2, 1- R/ X/ L) packetstormsecurity.org/distributed/stachel.tgz (73011, 36, 2, 1- R/ X/ L)
  17. 2017-12-15 20:32:06 (UTC): w:nl:User:Sjoerddebruin ( t - c; 40782) to w:nl:Computervirus ( diff  !top) - Link: packetstormsecurity.org/files/96667/Exim-Exploit-In-The-Wild-Advisory.html ( R/ Xmeta/ L- still there)
    Other links: packetstormsecurity.org/files/96667/Exim-Exploit-In-The-Wild-Advisory.html (40782, 36, X, X- R/ X/ L) packetstormsecurity.org/files/96667/Exim-Exploit-In-The-Wild-Advisory.html (40782, 36, X, X- R/ X/ L) web.archive.org/web/20110626220820/http://puwang.barabasilab.com/Talks/Venice_PPT.pdf (40782, -1, X, X- R/ X/ L) web.archive.org/web/20110626220820/http://puwang.barabasilab.com/Talks/Venice_PPT.pdf (40782, -1, X, X- R/ X/ L) tweakers.net/nieuws/59787/mobiele-virussen-gaan-zich-verspreiden-via-mms.html (40782, 2133, X, X- R/ X/ L) tweakers.net/nieuws/59787/mobiele-virussen-gaan-zich-verspreiden-via-mms.html (40782, 2133, X, X- R/ X/ L)

    User is in trusted groups sysop, rollbacker on some wikis
  18. 2018-02-23 19:16:18 (UTC): User ClueBot NG t • c • dc • l • ef • b • bl; (-1) to Buffer overflow ( | talk | history | links | watch | logs) ( diff  !top) - Link: packetstormsecurity.org/papers/Win2000/Intro_to_Win32_Exploits.pdf ( R/ Xmeta/ L- still there)
    Other links: www.phrack.com/issues.html?issue=49&id=14 (-1, 154, X, X- R/ X/ L) www.security-express.com/archives/bugtraq/1995_1/0403.html (-1, , X, X- R/ X/ L) web.archive.org/web/20070901222723/http://www.security-express.com/archives/bugtraq/1995_1/0403.html (-1, -1, X, X- R/ X/ L) world.std.com/~franl/worm.html (-1, , X, X- R/ X/ L) web.archive.org/web/20070520233435/http://world.std.com/~franl/worm.html (-1, -1, X, X- R/ X/ L) csrc.nist.gov/publications/history/ande72.pdf (-1, , X, X- R/ X/ L) www.usenix.org/legacy/events/sec01/full_papers/larochelle/larochelle_html/ (-1, , X, X- R/ X/ L) raykoid666.wordpress.com (-1, 14, X, X- R/ X/ L) pax.grsecurity.net/docs/aslr.txt (-1, , X, X- R/ X/ L) www.ngsec.com/ngproducts/stackdefender/ (-1, , X, X- R/ X/ L) web.archive.org/web/20070513235539/http://www.ngsec.com/ngproducts/stackdefender/ (-1, -1, X, X- R/ X/ L) www.sys-manage.com/english/products/products_BufferShield.html (-1, , X, X- R/ X/ L) technet2.microsoft.com/WindowsServer/en/Library/b0de1052-4101-44c3-a294-4da1bd1ef2271033.mspx?mfr=true (-1, , X, X- R/ X/ L) linux.softpedia.com/get/System/Operating-Systems/Kernels/Openwall-Linux-kernel-patch-16454.shtml (-1, , X, X- R/ X/ L) web.archive.org/web/20120219111512/http://linux.softpedia.com/get/System/Operating-Systems/Kernels/Openwall-Linux-kernel-patch-16454.shtml (-1, -1, X, X- R/ X/ L) kerneltrap.org/node/644 (-1, , X, X- R/ X/ L) archive.is/20120529183334/http://kerneltrap.org/node/644 (-1, , X, X- R/ X/ L) pax.grsecurity.net (-1, , X, X- R/ X/ L) blogs.msdn.com/michael_howard/archive/2006/08/16/702707.aspx (-1, , X, X- R/ X/ L) www.usenix.org/publications/login/2005-06/pdfs/alexander0506.pdf (-1, , X, X- R/ X/ L) blogs.msdn.com/michael_howard/archive/2006/01/30/520200.aspx (-1, , X, X- R/ X/ L) www.usenix.org/events/sec03/tech/full_papers/cowan/cowan_html/index.html (-1, , X, X- R/ X/ L) www.uninformed.org/?v=2&a=4&t=txt (-1, , X, X- R/ X/ L) wiki.x.org/wiki/ProPolice (-1, , X, X- R/ X/ L) web.archive.org/web/20070212032750/http://wiki.x.org/wiki/ProPolice (-1, -1, X, X- R/ X/ L) www.usenix.org/publications/library/proceedings/sec98/full_papers/cowan/cowan.pdf (-1, , X, X- R/ X/ L) directory.fsf.org/libsafe.html (-1, , X, X- R/ X/ L) www.securecoding.cert.org/confluence/x/QwY (-1, , X, X- R/ X/ L) www.iso.org/obp/ui/#iso:std:iso-iec:tr:24731:-1:ed-2:v1:en:sec:4 (-1, , X, X- R/ X/ L) www.theiling.de/projects/erwin.html (-1, , X, X- R/ X/ L) www.and.org/vstr/ (-1, , X, X- R/ X/ L) bstring.sf.net (-1, , X, X- R/ X/ L) wiretap.area.com/Gopher/Library/Techdoc/Virus/inetvir.823 (-1, , X, X- R/ X/ L) wiretap.area.com/Gopher/Library/Techdoc/Virus/inetvir.823 (-1, , X, X- R/ X/ L) www.cplusplus.com/reference/vector/vector/at/ (-1, , X, X- R/ X/ L) www.owasp.org/index.php/Buffer_Overflows (-1, , X, X- R/ X/ L) www.owasp.org/index.php/Buffer_Overflows (-1, , X, X- R/ X/ L) www.blackhat.com/presentations/bh-asia-04/bh-jp-04-ukai-eng.ppt (-1, 1051, X, X- R/ X/ L) packetstormsecurity.org/papers/Win2000/Intro_to_Win32_Exploits.pdf (-1, 36, X, X- R/ X/ L) developer.intel.com/design/processor/manuals/253666.pdf (-1, -1, X, X- R/ X/ L) web.archive.org/web/20071129123212/http://developer.intel.com/design/processor/manuals/253666.pdf (-1, -1, X, X- R/ X/ L) conference.hitb.org/hitbsecconf2006kl/materials/DAY%201%20-%20Saumil%20Shah%20-%20Writing%20Metasploit%20Plugins.pdf (-1, 33, X, X- R/ X/ L) c0re.23.nu/~chris/presentations/overflow2005.pdf (-1, 12, X, X- R/ X/ L) web.archive.org/web/20070928011639/http://c0re.23.nu/~chris/presentations/overflow2005.pdf (-1, -1, X, X- R/ X/ L) dcs.ics.forth.gr/Activities/papers/stride-IFIP-SEC05.pdf (-1, 14, X, X- R/ X/ L) www.enderunix.org/docs/en/bof-eng.txt (-1, , X, X- R/ X/ L) www.neworder.box.sk/newsread.php?newsid=12476 (-1, 23, X, X- R/ X/ L) web.archive.org/web/20070818115455/http://www.neworder.box.sk/newsread.php?newsid=12476 (-1, -1, X, X- R/ X/ L) www.net-security.org/dl/articles/unicodebo.pdf (-1, 436, X, X- R/ X/ L) web.archive.org/web/20060105041036/http://www.net-security.org/dl/articles/unicodebo.pdf (-1, -1, X, X- R/ X/ L) www.microsoft.com/technet/security/bulletin/MS04-028.mspx (-1, -1, X, X- R/ X/ L) metasploit.com/users/opcode/msfopcode.cgi (-1, 170, X, X- R/ X/ L) web.archive.org/web/20070512195939/http://www.metasploit.com/users/opcode/msfopcode.cgi (-1, -1, X, X- R/ X/ L) packetstormsecurity.com/files/download/121751/ModernOverflowTargets.pdf (-1, 171, X, X- R/ X/ L) www.securityfocus.com/archive/1/462728/30/150/threaded (-1, 2010, X, X- R/ X/ L) d-nb.info/gnd/4752450-9 (-1, , X, X- R/ X/ L) cansecwest.com/csw08/csw08-holtmann.pdf (-1, , X, X- R/ X/ L) www.exploit-db.com/docs/18346.pdf (-1, , X, X- R/ X/ L) csrc.nist.gov/publications/history/ande72.pdf (-1, , X, X- R/ X/ L) web.archive.org/web/20071129123212/http://www.syngress.com/book_catalog/327_SSPC/sample.pdf (-1, -1, X, X- R/ X/ L) web.archive.org/web/20090817230359/http://doc.bughunter.net/buffer-overflow/ (-1, -1, X, X- R/ X/ L) www.blackhat.com/presentations/bh-usa-04/bh-us-04-silberman/bh-us-04-silberman-paper.pdf (-1, 1051, X, X- R/ X/ L) web.archive.org/web/20130126024851/http://www.awarenetwork.org/etc/alpha/?x=5 (-1, -1, X, X- R/ X/ L) www.sans.org/reading_room/whitepapers/securecode/386.php (-1, , X, X- R/ X/ L) www.cert.org/books/secure-coding (-1, , X, X- R/ X/ L) www.cert.org/secure-coding (-1, , X, X- R/ X/ L) www.securecoding.cert.org (-1, , X, X- R/ X/ L) iac.dtic.mil/iatac/download/Vol7_No4.pdf (-1, , X, X- R/ X/ L) phrack.org/issues/49/14.html#article (-1, 360, X, X- R/ X/ L) raykoid666.wordpress.com/2009/11/28/remote-buffer-overflow-from-vulnerability-to-exploit-part-1/ (-1, 14, X, X- R/ X/ L) www.gamesindustry.biz/content_page.php?aid=1461 (-1, , X, X- R/ X/ L) web.archive.org/web/20070927210513/http://www.gamesindustry.biz/content_page.php?aid=1461 (-1, -1, X, X- R/ X/ L) www.microsoft.com/technet/security/bulletin/ms02-039.mspx (-1, -1, X, X- R/ X/ L) research.eeye.com/html/advisories/published/AL20010717.html (-1, , X, X- R/ X/ L)

    User is in trusted groups bot, rollbacker, reviewer on some wikis
  19. 2018-12-19 09:59:52 (UTC): w:it:User:MapiVanPelt ( t - c; 10258) to w:it:Trojan (informatica) ( diff  !top) - Link: www.packetstormsecurity.org/poisonpen/unix/fingerd.c ( R/ Xmeta/ L- removed)
    Other links: www.packetstormsecurity.org/poisonpen/unix/fingerd.c (10258, 36, X, X- R/ X/ L) www.irchelp.org/irchelp/security/index.html (10258, 175, X, X- R/ X/ L) www.irchelp.org/irchelp/security/trojan.html (10258, 175, X, X- R/ X/ L) www.certnazionale.it/news/2016/04/14/atmos-un-nuovo-trojan-bancario-evoluzione-di-citadel/ (10258, 39, X, X- R/ X/ L) www.certnazionale.it/news/2016/03/30/usb-thief-un-nuovo-trojan-per-il-furto-di-dati-basato-su-dispositivi-usb/ (10258, 39, X, X- R/ X/ L) www.certnazionale.it/news/2016/03/16/massiccia-ondata-di-infezioni-del-trojan-nemucod-in-italia/ (10258, 39, X, X- R/ X/ L) www.certnazionale.it/news/2015/12/18/slembunk-un-nuovo-trojan-android-colpisce-app-bancarie/ (10258, 39, X, X- R/ X/ L) www.certnazionale.it/news/2016/01/25/asacub-nuovo-trojan-bancario-per-android/ (10258, 39, X, X- R/ X/ L) www.certnazionale.it/news/2016/03/03/il-trojan-acecard-mette-a-rischio-gli-utenti-di-app-bancarie-per-android/ (10258, 39, X, X- R/ X/ L) www.certnazionale.it/news/2016/03/04/triada-un-nuovo-trojan-per-android-quasi-impossibile-da-rimuovere/ (10258, 39, X, X- R/ X/ L) www.certnazionale.it/tag/trojan/ (10258, 39, X, X- R/ X/ L) www.symantec.com/connect/articles/security-11-part-2-trojans-and-other-threats (10258, 4851, X, X- R/ X/ L) www.dw.com/en/german-government-to-use-trojan-spyware-to-monitor-citizens/a-19066629 (10258, -1, X, X- R/ X/ L) www.webnews.it/2011/10/12/germania-trojan-stato/ (10258, 534, X, X- R/ X/ L) www.gdata.it/security-labs/informazioni/storia-del-malware/i-primi-anni (10258, 6, X, X- R/ X/ L) www.treccani.it/vocabolario/trojan-horse/ (10258, -1, X, X- R/ X/ L) techterms.com/definition/trojanhorse (10258, 867, X, X- R/ X/ L) usa.kaspersky.com/internet-security-center/threats/trojans#.VvD3eOLhDtQ (10258, 206, X, X- R/ X/ L)

    User is in a trusted group sysop on some wikis
  20. 2019-06-29 19:03:50 (UTC): w:it:User:Botcrux ( t - c; 877576) to w:it:Stacheldraht ( diff  !top) - Link: packetstormsecurity.org/distributed/stachel.tgz ( R/ Xmeta/ L- removed)
    Other links: packetstormsecurity.org/distributed/stachel.tgz (877576, 36, X, X- R/ X/ L)

    User is in a trusted group bot on some wikis
  21. 2019-09-05 11:53:03 (UTC): w:ar:User:Khalidalamoudi ( t - c; 1654) to w:ar:مؤتمرات أمان الكمبيوتر ( diff  !top) - Link: packetstormsecurity.org/files/107632/HITB-2012-CFP-Europe.txt ( R/ Xmeta/ L- removed)
    Other links: www.secureworldexpo.com (1654, , X, X- R/ X/ L) www.securit.ws (1654, , X, X- R/ X/ L) www.digitalbond.com/index.php/events (1654, , X, X- R/ X/ L) web.archive.org/web/20101228203154/http://www.digitalbond.com/index.php/events/ (1654, -1, X, X- R/ X/ L) www.ruhrsec.de (1654, , X, X- R/ X/ L) www.appsecusa.org (1654, , X, X- R/ X/ L) zeenews.india.com/news/net-news/cyber-experts-show-vulnerability-of-gsm-networks_759318.html (1654, , X, X- R/ X/ L) nullcon.net (1654, , X, X- R/ X/ L) www.nspw.org (1654, , X, X- R/ X/ L) www.internetsociety.org/events/ndss-symposium (1654, , X, X- R/ X/ L) infowarcon.com (1654, , X, X- R/ X/ L) www.ieee-security.org/TC/SP-Index.html (1654, , X, X- R/ X/ L) www.icissp.org (1654, , X, X- R/ X/ L) web.archive.org/web/20140625153121/http://conference.hitb.org/ (1654, -1, X, X- R/ X/ L) www.conference.hitb.org (1654, 33, X, X- R/ X/ L) www.hackitoergosum.org (1654, , X, X- R/ X/ L) hackinparis.com (1654, , X, X- R/ X/ L) www.hackerhalted.com (1654, , X, X- R/ X/ L) www.grehack.fr (1654, , X, X- R/ X/ L) www.hackerhalted.com (1654, , X, X- R/ X/ L) fsec.foi.hr (1654, , X, X- R/ X/ L) www.ethicalhacker.net/component/option,com_smf/Itemid,54/topic,9163.0 (1654, , X, X- R/ X/ L) web.archive.org/web/20121030222352/http://www.ethicalhacker.net/component/option,com_smf/Itemid,54/topic,9163.0/ (1654, -1, X, X- R/ X/ L) www.css.umcs.lublin.pl (1654, , X, X- R/ X/ L) news.cnet.com/8301-27080_3-20001126-245.html (1654, , X, X- R/ X/ L) cansecwest.com (1654, , X, X- R/ X/ L) cansecwest.com (1654, , X, X- R/ X/ L) www.brucon.org (1654, , X, X- R/ X/ L) technet.microsoft.com/en-us/security/cc261637.aspx (1654, , X, X- R/ X/ L) news.cnet.com/Microsoft-meets-the-hackers/2009-1002_3-5747813.html (1654, , X, X- R/ X/ L) www.microsoft.com/technet/security/bluehat/default.mspx (1654, -1, X, X- R/ X/ L) www.blackhat.com (1654, 1051, X, X- R/ X/ L) www.cscic.state.ny.us/security/conferences (1654, , X, X- R/ X/ L) web.archive.org/web/20110221112525/http://www.cscic.state.ny.us/security/conferences/ (1654, -1, X, X- R/ X/ L) www.albany.edu/iasymposium (1654, , X, X- R/ X/ L) www.acsac.org/archive (1654, , X, X- R/ X/ L) www.acsac.org (1654, , X, X- R/ X/ L) www.sigsac.org/ccs.html (1654, , X, X- R/ X/ L) 44con.com (1654, , X, X- R/ X/ L) nullcon.net/website/goa-2018/speakers/haroon-meer.php (1654, , X, X- R/ X/ L) web.archive.org/web/20081120004825/http://www.chicagocon.com/content/view/97/7 (1654, -1, X, X- R/ X/ L) www.chicagocon.com/content/view/97/7 (1654, , X, X- R/ X/ L) www.sxconference.com (1654, , X, X- R/ X/ L) www.chicagocon.com/content/view/33/12 (1654, , X, X- R/ X/ L) www.chicagocon.com/content/view/33/12 (1654, , X, X- R/ X/ L) www.ares-conference.eu (1654, , X, X- R/ X/ L) infosectrainingevents.com (1654, , X, X- R/ X/ L) u-sys.org/HCC (1654, , X, X- R/ X/ L) ohm2013.org (1654, , X, X- R/ X/ L) www.har2009.org (1654, , X, X- R/ X/ L) www.stichtinghxx.nl (1654, , X, X- R/ X/ L) web.archive.org/web/20100112052137/http://stichtinghxx.nl/ (1654, -1, X, X- R/ X/ L) wildwesthackinfest.com (1654, , X, X- R/ X/ L) www.toorcon.org (1654, , X, X- R/ X/ L) www.thotcon.org (1654, , X, X- R/ X/ L) www.thehackersconference.com (1654, , X, X- R/ X/ L) www.skydogcon.com/SDC2 (1654, , X, X- R/ X/ L) www.rootcon.org (1654, , X, X- R/ X/ L) roadsec.com.br (1654, , X, X- R/ X/ L) quahogcon.org (1654, , X, X- R/ X/ L) www.pumpcon.org (1654, , X, X- R/ X/ L) phreaknic.info/pn12 (1654, , X, X- R/ X/ L) web.archive.org/web/20130221022754/http://www.phreaknic.info/pn12/ (1654, -1, X, X- R/ X/ L) nuitduhack.com/en (1654, , X, X- R/ X/ L) www.nsec.io (1654, , X, X- R/ X/ L) www.nohat.it/index.html (1654, , X, X- R/ X/ L) www.malcon.org (1654, , X, X- R/ X/ L) web.archive.org/web/20130526164938/http://www.malcon.org/ (1654, -1, X, X- R/ X/ L) www.layerone.org (1654, , X, X- R/ X/ L) infiltratecon.com (1654, , X, X- R/ X/ L) hardwear.io (1654, , X, X- R/ X/ L) www.hacktivity.com (1654, , X, X- R/ X/ L) hackmiami.org (1654, , X, X- R/ X/ L) www.hackfest.ca (1654, , X, X- R/ X/ L) www.icalab.com/hackersidol (1654, , X, X- R/ X/ L) web.archive.org/web/20140411173256/http://www.icalab.com/hackersidol/ (1654, -1, X, X- R/ X/ L) www.hackersday.org (1654, , X, X- R/ X/ L) www.theguardian.com/technology/blog/2011/may/23/hack-in-the-box-security-conference (1654, , X, X- R/ X/ L) packetstormsecurity.org/files/107632/HITB-2012-CFP-Europe.txt (1654, 36, X, X- R/ X/ L) www.g0s.org (1654, , X, X- R/ X/ L) www.infosecisland.com/blogtag/2183/GrrCON.html (1654, , X, X- R/ X/ L) www.ekoparty.com.ar (1654, , X, X- R/ X/ L) web.archive.org/web/20120325050037/http://ekoparty.com.ar/ (1654, -1, X, X- R/ X/ L) dianainitiative.org (1654, , X, X- R/ X/ L) infosecisland.com/blogview/17012-Wow-So-That-Was-DerbyCon.html (1654, , X, X- R/ X/ L) www.CypherCon.com (1654, , X, X- R/ X/ L) www.icalab.com/organization/about-us (1654, , X, X- R/ X/ L) web.archive.org/web/20160618055016/https://www.icalab.com/organization/about-us (1654, -1, X, X- R/ X/ L) circlecitycon.com (1654, , X, X- R/ X/ L) www.securitybsides.com (1654, , X, X- R/ X/ L) www.athcon.org (1654, , X, X- R/ X/ L) web.archive.org/web/20100403092901/http://www.athcon.org/ (1654, -1, X, X- R/ X/ L) motherboard.vice.com/en_us/article/vbne9a/a-history-of-badgelife-def-cons-unlikely-obsession-with-artistic-circuit-boards (1654, , X, X- R/ X/ L) signalprocessingsociety.org/events/conferences (1654, , X, X- R/ X/ L) www.phdays.com/en/ (1654, , X, X- R/ X/ L) 0seccon.com (1654, , X, X- R/ X/ L) www.virusbtn.com/conference (1654, , X, X- R/ X/ L) www.usenix.org/conferences/byname/108 (1654, , X, X- R/ X/ L) www.troopers.de (1654, , X, X- R/ X/ L) www.swisscyberstorm.com (1654, , X, X- R/ X/ L) www.sstic.org (1654, , X, X- R/ X/ L) www.sstic.org (1654, , X, X- R/ X/ L) www.sourceconference.com (1654, , X, X- R/ X/ L) www.sinconf.org (1654, , X, X- R/ X/ L)
  22. 2020-02-14 20:41:29 (UTC): w:tr:User:Huunta ( t - c; 14883) to w:tr:Stacheldraht ( diff  !top) - Link: packetstormsecurity.org/distributed/stachel.tgz ( R/ Xmeta/ L- still there)
    Other links: packetstormsecurity.org/distributed/stachel.tgz (14883, 36, 1, 1- R/ X/ L) staff.washington.edu/dittrich/misc/stacheldraht.analysis (14883, -1, X, X- R/ X/ L) staff.washington.edu/dittrich/talks/nanog/stacheldraht.html (14883, -1, X, X- R/ X/ L) packetstormsecurity.com/distributed/stachel.tgz (14883, 171, 1, 1- R/ X/ L)
  23. 2020-03-08 14:46:00 (UTC): w:de:User:Granada ( t - c; 223) to w:de:Stephanie Wehner ( diff  !top) - Link: packetstormsecurity.org/files/25297/fbsdfun.htm ( R/ Xmeta/ L- still there)
    Other links: qutech.nl/stephanie-wehner-wins-ammodo-science-award-2019/ (223, 245, 2, 1- R/ X/ L) doi.org/10.1063/1.5120591 (223, -1, X, X- R/ X/ L) www.tudelft.nl/en/2018/tu-delft/eu-awards-ten-million-euro-to-european-quantum-internet-alliance-to-speed-up-development-of-quantum-internet/ (223, 3662, X, X- R/ X/ L) 2020.qcrypt.net (223, 11, 1, 1- R/ X/ L) qutech.nl/person/stephanie-wehner-roadmap/ (223, 245, 2, 1- R/ X/ L) zdb-katalog.de/list.xhtml?t=iss%3D%220028-0836%22&key=cql (223, 60289, X, X- R/ X/ L) packetstormsecurity.org/files/25297/fbsdfun.htm (223, 36, 1, 1- R/ X/ L) www.iqi.caltech.edu/people.html (223, -1, X, X- R/ X/ L)
  24. 2020-04-07 15:43:20 (UTC): w:sq:User:Dorina.M ( t - c; 27) to w:sq:Stephanie Wehner ( diff  !top) - Link: packetstormsecurity.org/files/25297/fbsdfun.htm ( R/ Xmeta/ L- still there)
    Other links: ammodo-science-award.org/en/ (27, 26, 1, 1- R/ X/ L) qutech.nl/stephanie-wehner-wins-ammodo-science-award-2019/ (27, 245, 4, 1- R/ X/ L) doi.org/10.1038%2Fnature15759 (27, -1, X, X- R/ X/ L) ui.adsabs.harvard.edu/abs/2015Natur.526..682H (27, -1, X, X- R/ X/ L) www.tudelft.nl/en/2018/tu-delft/eu-awards-ten-million-euro-to-european-quantum-internet-alliance-to-speed-up-development-of-quantum-internet/ (27, 3662, X, X- R/ X/ L) 2018.qcrypt.net (27, 2, 1, 1- R/ X/ L) 2017.qcrypt.net/qcrypt-charter/ (27, 2, 1, 1- R/ X/ L) doi.org/10.1038%2Fd41586-018-01835-3 (27, -1, X, X- R/ X/ L) ui.adsabs.harvard.edu/abs/2018Natur.554..289C (27, -1, X, X- R/ X/ L) www.r4k.net (27, 4, 1, 1- R/ X/ L) web.archive.org/web/20130327083229/http://www.r4k.net (27, -1, X, X- R/ X/ L) packetstormsecurity.org/files/25297/fbsdfun.htm (27, 36, 1, 1- R/ X/ L) qutech.nl/person/stephanie-wehner-roadmap/ (27, 245, 4, 1- R/ X/ L) www.cosmosmagazine.com/node/3872/full (27, 5166, X, X- R/ X/ L) web.archive.org/web/20120403162611/http://www.cosmosmagazine.com/node/3872/full (27, -1, X, X- R/ X/ L) www.newscientist.com/article/dn19797-quantum-uncertainty-controls-action-at-a-distance.html (27, -1, X, X- R/ X/ L) doi.org/10.1126%2Fscience.1192065 (27, -1, X, X- R/ X/ L) ui.adsabs.harvard.edu/abs/2010Sci...330.1072O (27, -1, X, X- R/ X/ L) doi.org/10.1103%2FPhysRevLett.100.220502 (27, -1, X, X- R/ X/ L) ui.adsabs.harvard.edu/abs/2008PhRvL.100v0502W (27, -1, X, X- R/ X/ L) qutech.nl/roadmap/quantum-internet/ (27, 245, 4, 1- R/ X/ L) qutech.nl/roadmap/quantum-internet/ (27, 245, 4, 1- R/ X/ L) www.albumacademicum.uva.nl (27, -1, X, X- R/ X/ L)
  25. 2020-10-22 00:02:01 (UTC): n:ru:User:NewsBots ( t - c; 6079823) to n:ru:US-CERT предупреждает об атаке на Linux системы с использованием SSH ключей ( diff  top) - Link: packetstormsecurity.org/UNIX/penetration/rootkits/phalanx-b6.tar.bz2 ( R/ Xmeta/ L- still there)
    Other links: connect.ok.ru/offer?url=https:%2F%2Fru.wikinews.org%2Fwiki%2FUS-CERT_%25D0%25BF%25D1%2580%25D0%25B5%25D0%25B4%25D1%2583%25D0%25BF%25D1%2580%25D0%25B5%25D0%25B6%25D0%25B4%25D0%25B0%25D0%25B5%25D1%2582_%25D0%25BE%25D0%25B1_%25D0%25B0%25D1%2582%25D0%25B0%25D0%25BA%25D0%25B5_%25D0%25BD%25D0%25B0_Linux_%25D1%2581%25D0%25B8%25D1%2581%25D1%2582%25D0%25B5%25D0%25BC%25D1%258B_%25D1%2581_%25D0%25B8%25D1%2581%25D0%25BF%25D0%25BE%25D0%25BB%25D1%258C%25D0%25B7%25D0%25BE%25D0%25B2%25D0%25B0%25D0%25BD%25D0%25B8%25D0%25B5%25D0%25BC_SSH_%25D0%25BA%25D0%25BB%25D1%258E%25D1%2587%25D0%25B5%25D0%25B9&title=US-CERT+%D0%BF%D1%80%D0%B5%D0%B4%D1%83%D0%BF%D1%80%D0%B5%D0%B6%D0%B4%D0%B0%D0%B5%D1%82+%D0%BE%D0%B1+%D0%B0%D1%82%D0%B0%D0%BA%D0%B5+%D0%BD%D0%B0+Linux+%D1%81%D0%B8%D1%81%D1%82%D0%B5%D0%BC%D1%8B+%D1%81+%D0%B8%D1%81%D0%BF%D0%BE%D0%BB%D1%8C%D0%B7%D0%BE%D0%B2%D0%B0%D0%BD%D0%B8%D0%B5%D0%BC+SSH+%D0%BA%D0%BB%D1%8E%D1%87%D0%B5%D0%B9+%E2%80%94+%D0%92%D0%B8%D0%BA%D0%B8%D0%BD%D0%BE%D0%B2%D0%BE%D1%81%D1%82%D0%B8 (6079823, 1200951, X, X- R/ X/ L) vkontakte.ru/share.php?url=https:%2F%2Fru.wikinews.org%2Fwiki%2FUS-CERT_%25D0%25BF%25D1%2580%25D0%25B5%25D0%25B4%25D1%2583%25D0%25BF%25D1%2580%25D0%25B5%25D0%25B6%25D0%25B4%25D0%25B0%25D0%25B5%25D1%2582_%25D0%25BE%25D0%25B1_%25D0%25B0%25D1%2582%25D0%25B0%25D0%25BA%25D0%25B5_%25D0%25BD%25D0%25B0_Linux_%25D1%2581%25D0%25B8%25D1%2581%25D1%2582%25D0%25B5%25D0%25BC%25D1%258B_%25D1%2581_%25D0%25B8%25D1%2581%25D0%25BF%25D0%25BE%25D0%25BB%25D1%258C%25D0%25B7%25D0%25BE%25D0%25B2%25D0%25B0%25D0%25BD%25D0%25B8%25D0%25B5%25D0%25BC_SSH_%25D0%25BA%25D0%25BB%25D1%258E%25D1%2587%25D0%25B5%25D0%25B9&title=US-CERT+%D0%BF%D1%80%D0%B5%D0%B4%D1%83%D0%BF%D1%80%D0%B5%D0%B6%D0%B4%D0%B0%D0%B5%D1%82+%D0%BE%D0%B1+%D0%B0%D1%82%D0%B0%D0%BA%D0%B5+%D0%BD%D0%B0+Linux+%D1%81%D0%B8%D1%81%D1%82%D0%B5%D0%BC%D1%8B+%D1%81+%D0%B8%D1%81%D0%BF%D0%BE%D0%BB%D1%8C%D0%B7%D0%BE%D0%B2%D0%B0%D0%BD%D0%B8%D0%B5%D0%BC+SSH+%D0%BA%D0%BB%D1%8E%D1%87%D0%B5%D0%B9+%E2%80%94+%D0%92%D0%B8%D0%BA%D0%B8%D0%BD%D0%BE%D0%B2%D0%BE%D1%81%D1%82%D0%B8 (6079823, -1, X, X- R/ X/ L) www.opennet.ru/opennews/art.shtml?num=17592 (6079823, 29235, X, X- R/ X/ L) packetstormsecurity.org/UNIX/penetration/rootkits/phalanx-b6.tar.bz2 (6079823, 36, X, X- R/ X/ L) hep.uchicago.edu/admin/report_072808.html (6079823, -1, X, X- R/ X/ L) www.us-cert.gov/current...) (6079823, 1442, X, X- R/ X/ L) www.us-cert.gov/current/#ssh_key_based_attacks (6079823, 1442, X, X- R/ X/ L) hep.uchicago.edu/admin/report_072808.html (6079823, -1, X, X- R/ X/ L) www.us-cert.gov/current/#ssh_key_based_attacks (6079823, 1442, X, X- R/ X/ L)

    User is in a trusted group bot on some wikis
  26. 2020-10-22 11:00:31 (UTC): n:ru:User:NewsBots ( t - c; 6079823) to n:ru:Атака на ftpd из состава FreeBSD ( diff  !top) - Link: packetstormsecurity.org/0908-exploits/bsd-setusercontext.txt ( R/ Xmeta/ L- still there)
    Other links: connect.ok.ru/offer?url=https:%2F%2Fru.wikinews.org%2Fwiki%2F%25D0%2590%25D1%2582%25D0%25B0%25D0%25BA%25D0%25B0_%25D0%25BD%25D0%25B0_ftpd_%25D0%25B8%25D0%25B7_%25D1%2581%25D0%25BE%25D1%2581%25D1%2582%25D0%25B0%25D0%25B2%25D0%25B0_FreeBSD&title=%D0%90%D1%82%D0%B0%D0%BA%D0%B0+%D0%BD%D0%B0+ftpd+%D0%B8%D0%B7+%D1%81%D0%BE%D1%81%D1%82%D0%B0%D0%B2%D0%B0+FreeBSD+%E2%80%94+%D0%92%D0%B8%D0%BA%D0%B8%D0%BD%D0%BE%D0%B2%D0%BE%D1%81%D1%82%D0%B8 (6079823, 1200951, X, X- R/ X/ L) vkontakte.ru/share.php?url=https:%2F%2Fru.wikinews.org%2Fwiki%2F%25D0%2590%25D1%2582%25D0%25B0%25D0%25BA%25D0%25B0_%25D0%25BD%25D0%25B0_ftpd_%25D0%25B8%25D0%25B7_%25D1%2581%25D0%25BE%25D1%2581%25D1%2582%25D0%25B0%25D0%25B2%25D0%25B0_FreeBSD&title=%D0%90%D1%82%D0%B0%D0%BA%D0%B0+%D0%BD%D0%B0+ftpd+%D0%B8%D0%B7+%D1%81%D0%BE%D1%81%D1%82%D0%B0%D0%B2%D0%B0+FreeBSD+%E2%80%94+%D0%92%D0%B8%D0%BA%D0%B8%D0%BD%D0%BE%D0%B2%D0%BE%D1%81%D1%82%D0%B8 (6079823, -1, X, X- R/ X/ L) www.opennet.ru/opennews/art.shtml?num=23234 (6079823, 29235, X, X- R/ X/ L) secunia.com/advisories/...) (6079823, 2192, X, X- R/ X/ L) secunia.com/advisories/36353/ (6079823, 2192, X, X- R/ X/ L) packetstormsecurity.org/0908-exploits/bsd-setusercontext.txt (6079823, 36, X, X- R/ X/ L) secunia.com/advisories/36353/ (6079823, 2192, X, X- R/ X/ L)

    User is in a trusted group bot on some wikis
  27. 2020-10-22 18:09:11 (UTC): n:ru:User:NewsBots ( t - c; 6079823) to n:ru:Уязвимости в python-cjson, glpng, Ruby, Qt, Arora, FreeType, Foxit Reader и OpenOffice.org Impress ( diff  top) - Link: packetstormsecurity.org/1007-exploits/arora-dos.txt ( R/ Xmeta/ L- still there)
    Other links: connect.ok.ru/offer?url=https:%2F%2Fru.wikinews.org%2Fwiki%2F%25D0%25A3%25D1%258F%25D0%25B7%25D0%25B2%25D0%25B8%25D0%25BC%25D0%25BE%25D1%2581%25D1%2582%25D0%25B8_%25D0%25B2_python-cjson%2C_glpng%2C_Ruby%2C_Qt%2C_Arora%2C_FreeType%2C_Foxit_Reader_%25D0%25B8_OpenOffice.org_Impress&title=%D0%A3%D1%8F%D0%B7%D0%B2%D0%B8%D0%BC%D0%BE%D1%81%D1%82%D0%B8+%D0%B2+python-cjson%2C+glpng%2C+Ruby%2C+Qt%2C+Arora%2C+FreeType%2C+Foxit+Reader+%D0%B8+OpenOffice.org+Impress+%E2%80%94+%D0%92%D0%B8%D0%BA%D0%B8%D0%BD%D0%BE%D0%B2%D0%BE%D1%81%D1%82%D0%B8 (6079823, 1200951, X, X- R/ X/ L) vkontakte.ru/share.php?url=https:%2F%2Fru.wikinews.org%2Fwiki%2F%25D0%25A3%25D1%258F%25D0%25B7%25D0%25B2%25D0%25B8%25D0%25BC%25D0%25BE%25D1%2581%25D1%2582%25D0%25B8_%25D0%25B2_python-cjson%2C_glpng%2C_Ruby%2C_Qt%2C_Arora%2C_FreeType%2C_Foxit_Reader_%25D0%25B8_OpenOffice.org_Impress&title=%D0%A3%D1%8F%D0%B7%D0%B2%D0%B8%D0%BC%D0%BE%D1%81%D1%82%D0%B8+%D0%B2+python-cjson%2C+glpng%2C+Ruby%2C+Qt%2C+Arora%2C+FreeType%2C+Foxit+Reader+%D0%B8+OpenOffice.org+Impress+%E2%80%94+%D0%92%D0%B8%D0%BA%D0%B8%D0%BD%D0%BE%D0%B2%D0%BE%D1%81%D1%82%D0%B8 (6079823, -1, X, X- R/ X/ L) www.opennet.ru/opennews/art.shtml?num=27632 (6079823, 29235, X, X- R/ X/ L) secunia.com/advisories/40775/ (6079823, 2192, X, X- R/ X/ L) packetstormsecurity.org/1007-exploits/arora-dos.txt (6079823, 36, X, X- R/ X/ L) secunia.com/advisories/40588/ (6079823, 2192, X, X- R/ X/ L) www.foxitsoftware.com/announcements/2010861227.html (6079823, 255, X, X- R/ X/ L) www.kb.cert.org/vuls/id/275247 (6079823, 919, X, X- R/ X/ L) secunia.com/advisories/40816/ (6079823, 2192, X, X- R/ X/ L) freetype.sourceforge.net (6079823, -1, X, X- R/ X/ L) secunia.com/secunia_research/2010-87/ (6079823, 2192, X, X- R/ X/ L) www.fifi.org/doc/libglpng-dev/glpng.html (6079823, 17, X, X- R/ X/ L) www.ruby-lang.org/en/news/2010/08/16/xss-in-webrick-cve-2010-0541/ (6079823, 1052, X, X- R/ X/ L) secunia.com/advisories/40335/ (6079823, 2192, X, X- R/ X/ L) cheeseshop.python.org/pypi/python-cjson (6079823, 11, X, X- R/ X/ L)

    User is in a trusted group bot on some wikis
  28. 2020-11-10 11:00:12 (UTC): w:nl:User:Hoyanova ( t - c; 8540) to w:nl:Computervirus ( diff  !top) - Link: packetstormsecurity.org/files/96667/Exim-Exploit-In-The-Wild-Advisory.html ( R/ Xmeta/ L- still there)
    Other links: packetstormsecurity.org/files/96667/Exim-Exploit-In-The-Wild-Advisory.html (8540, 36, 2, 1- R/ X/ L) packetstormsecurity.org/files/96667/Exim-Exploit-In-The-Wild-Advisory.html (8540, 36, 2, 1- R/ X/ L) web.archive.org/web/20110626220820/http://puwang.barabasilab.com/Talks/Venice_PPT.pdf (8540, -1, X, X- R/ X/ L) web.archive.org/web/20110626220820/http://puwang.barabasilab.com/Talks/Venice_PPT.pdf (8540, -1, X, X- R/ X/ L) tweakers.net/nieuws/59787/mobiele-virussen-gaan-zich-verspreiden-via-mms.html (8540, 2133, X, X- R/ X/ L) tweakers.net/nieuws/59787/mobiele-virussen-gaan-zich-verspreiden-via-mms.html (8540, 2133, X, X- R/ X/ L)
  29. 2021-02-27 16:58:17 (UTC): w:tr:User:78.185.129.51 ( t - c; 90) to w:tr:ZenGo ( diff - DELETED) - Link: packetstormsecurity.org/files/author/2011/ ( R/ Xmeta/ L)
    Other links: web.archive.org/web/20120319040724/http://www.securityfocus.com/bid/3702 (90, -1, X, X- R/ X/ L) www.securityfocus.com/bid/4160 (90, 2010, X, X- R/ X/ L) web.archive.org/web/20160303225051/http://www.securityfocus.com/bid/4160 (90, -1, X, X- R/ X/ L) www.securityfocus.com/bid/2198 (90, 2010, X, X- R/ X/ L) web.archive.org/web/20160303224238/http://www.securityfocus.com/bid/2198 (90, -1, X, X- R/ X/ L) web.archive.org/web/20120319040653/http://www.securityfocus.com/bid/3714 (90, -1, X, X- R/ X/ L) www.securityfocus.com/bid/3714 (90, 2010, X, X- R/ X/ L) www.securityfocus.com/bid/3714 (90, 2010, X, X- R/ X/ L) www.securityfocus.com/bid/4159 (90, 2010, X, X- R/ X/ L) web.archive.org/web/20160303235645/http://www.securityfocus.com/bid/4159 (90, -1, X, X- R/ X/ L) www.securityfocus.com/bid/889 (90, 2010, X, X- R/ X/ L) web.archive.org/web/20160303222719/http://www.securityfocus.com/bid/889 (90, -1, X, X- R/ X/ L) www.securityfocus.com/bid/3791 (90, 2010, X, X- R/ X/ L) web.archive.org/web/20160303205059/http://www.securityfocus.com/bid/3791 (90, -1, X, X- R/ X/ L) www.securityfocus.com/bid/3838 (90, 2010, X, X- R/ X/ L) web.archive.org/web/20160303211446/http://www.securityfocus.com/bid/3838 (90, -1, X, X- R/ X/ L) www.securityfocus.com/bid/3885 (90, 2010, X, X- R/ X/ L) web.archive.org/web/20160303223045/http://www.securityfocus.com/bid/3885 (90, -1, X, X- R/ X/ L) securityvulns.com/source2540.html (90, , X, X- R/ X/ L) web.archive.org/web/20160303224039/http://securityvulns.com/source2540.html (90, -1, X, X- R/ X/ L) www.verisigninc.com/en_US/products-and-services/network-intelligence-availability/idefense/public-vulnerability-reports/articles/index.xhtml?id=55 (90, , X, X- R/ X/ L) web.archive.org/web/20130428063118/http://www.verisigninc.com/en_US/products-and-services/network-intelligence-availability/idefense/public-vulnerability-reports/articles/index.xhtml?id=55 (90, -1, X, X- R/ X/ L) www.verisigninc.com/en_US/products-and-services/network-intelligence-availability/idefense/public-vulnerability-reports/articles/index.xhtml?id=49 (90, , X, X- R/ X/ L) web.archive.org/web/20130429051111/http://www.verisigninc.com/en_US/products-and-services/network-intelligence-availability/idefense/public-vulnerability-reports/articles/index.xhtml?id=49 (90, -1, X, X- R/ X/ L) www.verisigninc.com/en_US/products-and-services/network-intelligence-availability/idefense/public-vulnerability-reports/articles/index.xhtml?id=41 (90, , X, X- R/ X/ L) web.archive.org/web/20130428063055/http://www.verisigninc.com/en_US/products-and-services/network-intelligence-availability/idefense/public-vulnerability-reports/articles/index.xhtml?id=41 (90, -1, X, X- R/ X/ L) www.verisigninc.com/en_US/products-and-services/network-intelligence-availability/idefense/public-vulnerability-reports/articles/index.xhtml?id=31 (90, , X, X- R/ X/ L) web.archive.org/web/20130428063034/http://www.verisigninc.com/en_US/products-and-services/network-intelligence-availability/idefense/public-vulnerability-reports/articles/index.xhtml?id=31 (90, -1, X, X- R/ X/ L) packetstormsecurity.org/files/author/2011/ (90, 36, X, X- R/ X/ L) web.archive.org/web/20120325162914/http://packetstormsecurity.org/files/author/2011/ (90, -1, X, X- R/ X/ L) www.wired.com/news/infostructure/0,1377,56481,00.html (90, , X, X- R/ X/ L) web.archive.org/web/20081011171607/http://www.wired.com/news/infostructure/0,1377,56481,00.html (90, -1, X, X- R/ X/ L) www.tamersahin.com/mssecrets (90, , X, X- R/ X/ L) web.archive.org/web/20140223183026/http://www.tamersahin.com/mssecrets/ (90, -1, X, X- R/ X/ L) hurarsiv.hurriyet.com.tr/goster/ShowNew.aspx?id=5999287 (90, , X, X- R/ X/ L) www.tamersahin.com/english/#/speeches (90, , X, X- R/ X/ L) web.archive.org/web/20120820014639/http://tamersahin.com/english/#/speeches (90, -1, X, X- R/ X/ L) www.tamersahin.com/foo/tamer_project.pdf (90, , X, X- R/ X/ L) web.archive.org/web/20120127120401/http://www.tamersahin.com/foo/tamer_project.pdf (90, -1, X, X- R/ X/ L) www.tamersahin.com/foo/tamer_project_pres.ppt (90, , X, X- R/ X/ L) web.archive.org/web/20120127120428/http://www.tamersahin.com/foo/tamer_project_pres.ppt (90, -1, X, X- R/ X/ L) www.securityfocus.com/bid/5782 (90, 2010, X, X- R/ X/ L) web.archive.org/web/20160303222958/http://www.securityfocus.com/bid/5782 (90, -1, X, X- R/ X/ L) www.securityfocus.com/bid/4062 (90, 2010, X, X- R/ X/ L) web.archive.org/web/20160303210924/http://www.securityfocus.com/bid/4062 (90, -1, X, X- R/ X/ L) www.securityfocus.com/bid/4206 (90, 2010, X, X- R/ X/ L) web.archive.org/web/20160303230028/http://www.securityfocus.com/bid/4206 (90, -1, X, X- R/ X/ L) www.securityfocus.com/bid/6145 (90, 2010, X, X- R/ X/ L) web.archive.org/web/20160303230121/http://www.securityfocus.com/bid/6145 (90, -1, X, X- R/ X/ L) www.securityfocus.com/bid/6041 (90, 2010, X, X- R/ X/ L) web.archive.org/web/20160303223218/http://www.securityfocus.com/bid/6041 (90, -1, X, X- R/ X/ L) www.securityfocus.com/bid/4021 (90, 2010, X, X- R/ X/ L) web.archive.org/web/20160303215432/http://www.securityfocus.com/bid/4021 (90, -1, X, X- R/ X/ L) www.securityfocus.com/bid/6447 (90, 2010, X, X- R/ X/ L) web.archive.org/web/20160303214008/http://www.securityfocus.com/bid/6447 (90, -1, X, X- R/ X/ L) www.securityfocus.com/bid/6098 (90, 2010, X, X- R/ X/ L) web.archive.org/web/20160303223748/http://www.securityfocus.com/bid/6098 (90, -1, X, X- R/ X/ L) www.securityfocus.com/bid/6877 (90, 2010, X, X- R/ X/ L) web.archive.org/web/20160303220343/http://www.securityfocus.com/bid/6877 (90, -1, X, X- R/ X/ L) www.securityfocus.com/bid/6042 (90, 2010, X, X- R/ X/ L) web.archive.org/web/20160303205841/http://www.securityfocus.com/bid/6042 (90, -1, X, X- R/ X/ L) www.securityfocus.com/bid/6044 (90, 2010, X, X- R/ X/ L) web.archive.org/web/20160303222953/http://www.securityfocus.com/bid/6044 (90, -1, X, X- R/ X/ L) www.securityfocus.com/bid/5968 (90, 2010, X, X- R/ X/ L) web.archive.org/web/20160303204908/http://www.securityfocus.com/bid/5968 (90, -1, X, X- R/ X/ L) www.securityfocus.com/bid/5803 (90, 2010, X, X- R/ X/ L) web.archive.org/web/20160303213426/http://www.securityfocus.com/bid/5803 (90, -1, X, X- R/ X/ L) www.securityfocus.com/bid/3501 (90, 2010, X, X- R/ X/ L) web.archive.org/web/20160303215816/http://www.securityfocus.com/bid/3501 (90, -1, X, X- R/ X/ L) www.securityfocus.com/bid/5967 (90, 2010, X, X- R/ X/ L) web.archive.org/web/20160303205650/http://www.securityfocus.com/bid/5967 (90, -1, X, X- R/ X/ L) www.securityfocus.com/bid/4833 (90, 2010, X, X- R/ X/ L) web.archive.org/web/20160304031923/http://www.securityfocus.com/bid/4833 (90, -1, X, X- R/ X/ L) www.securityfocus.com/bid/6345 (90, 2010, X, X- R/ X/ L) web.archive.org/web/20160303223450/http://www.securityfocus.com/bid/6345 (90, -1, X, X- R/ X/ L) www.securityfocus.com/bid/6034 (90, 2010, X, X- R/ X/ L) web.archive.org/web/20160303225017/http://www.securityfocus.com/bid/6034 (90, -1, X, X- R/ X/ L) www.securityfocus.com/bid/3788 (90, 2010, X, X- R/ X/ L) web.archive.org/web/20160304031916/http://www.securityfocus.com/bid/3788 (90, -1, X, X- R/ X/ L) www.securityfocus.com/bid/4128 (90, 2010, X, X- R/ X/ L) web.archive.org/web/20160303205621/http://www.securityfocus.com/bid/4128 (90, -1, X, X- R/ X/ L) www.securityfocus.com/bid/4153 (90, 2010, X, X- R/ X/ L) web.archive.org/web/20160303234905/http://www.securityfocus.com/bid/4153 (90, -1, X, X- R/ X/ L) www.securityfocus.com/bid/3874 (90, 2010, X, X- R/ X/ L) web.archive.org/web/20160303215303/http://www.securityfocus.com/bid/3874 (90, -1, X, X- R/ X/ L) www.securityfocus.com/bid/4785 (90, 2010, X, X- R/ X/ L) web.archive.org/web/20160303225947/http://www.securityfocus.com/bid/4785 (90, -1, X, X- R/ X/ L) www.securityfocus.com/bid/3866 (90, 2010, X, X- R/ X/ L) web.archive.org/web/20160303220754/http://www.securityfocus.com/bid/3866 (90, -1, X, X- R/ X/ L) www.securityfocus.com/bid/3702 (90, 2010, X, X- R/ X/ L)
  • Displayed all 29 additions.
From Wikipedia, the free encyclopedia



Links

Users

Additions

  1. 2014-01-08 21:42:47 (UTC): w:cs:User:Tomáš Drahoňovský ( t - c; 26) to w:cs:Přetečení na haldě ( diff  top?) - Link: packetstormsecurity.org/files/view/40638/MallocMaleficarum.txt ( R/ Xmeta/ L- still there)
    Other links: blogs.technet.com/b/srd/archive/2009/08/04/preventing-the-exploitation-of-user-mode-heap-corruption-vulnerabilities.aspx (26, 5551, X, X- R/ X/ L) www.phrack.org/issues.html?issue=66&id=10#article (26, 360, 1, 0- R/ X/ L) packetstormsecurity.org/files/view/40638/MallocMaleficarum.txt (26, 36, 1, 1- R/ X/ L) www.microsoft.com/technet/security/bulletin/MS04-028.mspx (26, -1, X, X- R/ X/ L) www.ptsecurity.com/download/defeating-xpsp2-heap-protection.pdf (26, 167, 1, 1- R/ X/ L) www.heise-online.co.uk/security/A-Heap-of-Risk--/features/74634 (26, 166, 1, 1- R/ X/ L) doc.bughunter.net/buffer-overflow/heap-corruption.html (26, 30, 2, 1- R/ X/ L) doc.bughunter.net/buffer-overflow/heap-corruption.html (26, 30, 2, 1- R/ X/ L)
  2. 2014-03-09 13:15:44 (UTC): w:zh:User:Eland Zhou ( t - c; 1346) to w:zh:User:Eland Zhou/跨站请求伪造 ( diff - DELETED) - Link: packetstormsecurity.org/papers/attack/Using_XSS_to_bypass_CSRF_protection.pdf ( R/ Xmeta/ L)
    Other links: www.ihteam.net/csrf_generator.html (1346, , X, X- R/ X/ L) quaxio.com/csrf_state_mutation_on_read_requests/ (1346, , X, X- R/ X/ L) blog.eyallupu.com/2012/04/csrf-defense-in-spring-mvc-31.html (1346, , X, X- R/ X/ L) ricardozuasti.com/2012/preventing-csrf-in-java-web-apps/ (1346, , X, X- R/ X/ L) ha.ckers.org/xss.html (1346, , X, X- R/ X/ L) projects.webappsec.org/Cross-Site+Request+Forgery (1346, , X, X- R/ X/ L) halls-of-valhalla.org/beta/articles/cross-site-request-forgery-demystified,47/ (1346, , X, X- R/ X/ L) www.owasp.org/index.php/CSRF_Guard (1346, , X, X- R/ X/ L) www.cgisecurity.com/csrf-faq.html (1346, , X, X- R/ X/ L) www.threadstrong.com/courses/csrf/ (1346, , X, X- R/ X/ L) packetstormsecurity.org/papers/attack/Using_XSS_to_bypass_CSRF_protection.pdf (1346, 36, X, X- R/ X/ L) yehg.net/lab/pr0js/view.php/A_Most-Neglected_Fact_About_CSRF.pdf (1346, , X, X- R/ X/ L) www.devilscafe.in/2012/03/cross-site-request-forgery-csrf.html (1346, , X, X- R/ X/ L) www.webappsecblog.com/CsrfAndSameOriginXss.html (1346, , X, X- R/ X/ L) secunia.com/advisories/22467/ (1346, 2192, X, X- R/ X/ L) www.owasp.org/index.php/Cross-Site_Request_Forgery_%28CSRF%29 (1346, , X, X- R/ X/ L) docs.djangoproject.com/en/1.2/releases/1.2.5/#csrf-exception-for-ajax-requests (1346, , X, X- R/ X/ L) people.mozilla.org/~bsterne/content-security-policy/origin-header-proposal.html (1346, , X, X- R/ X/ L) www.adobe.com/devnet/flashplayer/articles/cross_domain_policy.html (1346, , X, X- R/ X/ L) msdn.microsoft.com/en-us/library/cc197955.aspx (1346, , X, X- R/ X/ L) halls-of-valhalla.org/beta/articles/cross-site-request-forgery-demystified,47/ (1346, , X, X- R/ X/ L) code.google.com/p/hasc-research/downloads/list (1346, , X, X- R/ X/ L) code.google.com/p/hasc-research/downloads/list (1346, , X, X- R/ X/ L) www.owasp.org/index.php/OWASP_Israel_2012_01#18:15_-_19:00.C2.A0:_AJAX.E2.80.99_Hammer_-_Harnessing_AJAX_for_CSRF_Attacks (1346, , X, X- R/ X/ L) www.neohaxor.org/2009/08/11/dynamic-cross-site-request-forgery/ (1346, , X, X- R/ X/ L) voices.washingtonpost.com/securityfix/2009/07/weaponizing_web_20.html (1346, , X, X- R/ X/ L) securethoughts.com/2009/07/hacking-csrf-tokens-using-css-history-hack/ (1346, , X, X- R/ X/ L) www.vimeo.com/1762861 (1346, , X, X- R/ X/ L) www.adambarth.com/papers/2008/barth-jackson-mitchell-b.pdf (1346, , X, X- R/ X/ L) www.kb.cert.org/vuls/id/264385 (1346, 919, X, X- R/ X/ L) www.kb.cert.org/vuls/id/584089 (1346, 919, X, X- R/ X/ L) www.kb.cert.org/CERT_WEB%5Cservices%5Cvul-notes.nsf/bymetric?open&start=908 (1346, 919, X, X- R/ X/ L) www.webappsec.org/projects/whid/byclass_class_attack_method_value_cross_site_request_forgery_(csrf).shtml (1346, , X, X- R/ X/ L) www.darkreading.com/security/perimeter-security/211201111/ (1346, , X, X- R/ X/ L) cwe.mitre.org/documents/vuln-trends/index.html (1346, , X, X- R/ X/ L) www.isecpartners.com/media/11961/CSRF_Paper.pdf (1346, , X, X- R/ X/ L) shiflett.org/articles/cross-site-request-forgeries (1346, , X, X- R/ X/ L) bank.example.com/withdraw?account=Alice&amount=1000000&for=Mallory"> (1346, , X, X- R/ X/ L) www.w3.org/TR/html4/struct/objects.html#h-13.2 (1346, , X, X- R/ X/ L)
  3. 2014-04-14 09:49:45 (UTC): w:zh:User:Zhibinr ( t - c; 38) to w:zh:User:Zhibinr/跨站请求伪造 ( diff  top?) - Link: packetstormsecurity.org/papers/attack/Using_XSS_to_bypass_CSRF_protection.pdf ( R/ Xmeta/ L- still there)
    Other links: www.ihteam.net/csrf_generator.html (38, , X, X- R/ X/ L) quaxio.com/csrf_state_mutation_on_read_requests/ (38, , X, X- R/ X/ L) blog.eyallupu.com/2012/04/csrf-defense-in-spring-mvc-31.html (38, , X, X- R/ X/ L) ricardozuasti.com/2012/preventing-csrf-in-java-web-apps/ (38, , X, X- R/ X/ L) ha.ckers.org/xss.html (38, , X, X- R/ X/ L) projects.webappsec.org/Cross-Site+Request+Forgery (38, , X, X- R/ X/ L) halls-of-valhalla.org/beta/articles/cross-site-request-forgery-demystified,47/ (38, , X, X- R/ X/ L) www.owasp.org/index.php/CSRF_Guard (38, , X, X- R/ X/ L) www.cgisecurity.com/csrf-faq.html (38, , X, X- R/ X/ L) www.threadstrong.com/courses/csrf/ (38, , X, X- R/ X/ L) packetstormsecurity.org/papers/attack/Using_XSS_to_bypass_CSRF_protection.pdf (38, 36, X, X- R/ X/ L) yehg.net/lab/pr0js/view.php/A_Most-Neglected_Fact_About_CSRF.pdf (38, , X, X- R/ X/ L) www.devilscafe.in/2012/03/cross-site-request-forgery-csrf.html (38, , X, X- R/ X/ L) www.webappsecblog.com/CsrfAndSameOriginXss.html (38, , X, X- R/ X/ L) secunia.com/advisories/22467/ (38, 2192, X, X- R/ X/ L) www.owasp.org/index.php/Cross-Site_Request_Forgery_%28CSRF%29 (38, , X, X- R/ X/ L) docs.djangoproject.com/en/1.2/releases/1.2.5/#csrf-exception-for-ajax-requests (38, , X, X- R/ X/ L) people.mozilla.org/~bsterne/content-security-policy/origin-header-proposal.html (38, , X, X- R/ X/ L) www.adobe.com/devnet/flashplayer/articles/cross_domain_policy.html (38, , X, X- R/ X/ L) msdn.microsoft.com/en-us/library/cc197955.aspx (38, , X, X- R/ X/ L) halls-of-valhalla.org/beta/articles/cross-site-request-forgery-demystified,47/ (38, , X, X- R/ X/ L) code.google.com/p/hasc-research/downloads/list (38, , X, X- R/ X/ L) www.owasp.org/index.php/OWASP_Israel_2012_01#18:15_-_19:00.C2.A0:_AJAX.E2.80.99_Hammer_-_Harnessing_AJAX_for_CSRF_Attacks (38, , X, X- R/ X/ L) www.neohaxor.org/2009/08/11/dynamic-cross-site-request-forgery/ (38, , X, X- R/ X/ L) voices.washingtonpost.com/securityfix/2009/07/weaponizing_web_20.html (38, , X, X- R/ X/ L) securethoughts.com/2009/07/hacking-csrf-tokens-using-css-history-hack/ (38, , X, X- R/ X/ L) www.vimeo.com/1762861 (38, , X, X- R/ X/ L) www.adambarth.com/papers/2008/barth-jackson-mitchell-b.pdf (38, , X, X- R/ X/ L) www.kb.cert.org/vuls/id/264385 (38, 919, X, X- R/ X/ L) www.kb.cert.org/vuls/id/584089 (38, 919, X, X- R/ X/ L) www.kb.cert.org/CERT_WEB%5Cservices%5Cvul-notes.nsf/bymetric?open&start=908 (38, 919, X, X- R/ X/ L) www.webappsec.org/projects/whid/byclass_class_attack_method_value_cross_site_request_forgery_(csrf).shtml (38, , X, X- R/ X/ L) www.darkreading.com/security/perimeter-security/211201111/ (38, , X, X- R/ X/ L) cwe.mitre.org/documents/vuln-trends/index.html (38, , X, X- R/ X/ L) www.isecpartners.com/media/11961/CSRF_Paper.pdf (38, , X, X- R/ X/ L) shiflett.org/articles/cross-site-request-forgeries (38, , X, X- R/ X/ L) bank.example.com/withdraw?account=Alice&amount=1000000&for=Mallory"> (38, , X, X- R/ X/ L) www.w3.org/TR/html4/struct/objects.html#h-13.2 (38, , X, X- R/ X/ L)
  4. 2014-04-19 17:08:17 (UTC): User Favonian t • c • dc • l • ef • b • bl; (107720) to Buffer overflow ( | talk | history | links | watch | logs) ( diff  top?) - Link: packetstormsecurity.org/papers/Win2000/Intro_to_Win32_Exploits.pdf ( R/ Xmeta/ L- still there)
    Other links: www.blackhat.com/presentations/bh-asia-04/bh-jp-04-ukai-eng.ppt (107720, 1051, X, X- R/ X/ L) packetstormsecurity.org/papers/Win2000/Intro_to_Win32_Exploits.pdf (107720, 36, X, X- R/ X/ L) developer.intel.com/design/processor/manuals/253666.pdf (107720, -1, X, X- R/ X/ L) conference.hitb.org/hitbsecconf2006kl/materials/DAY%201%20-%20Saumil%20Shah%20-%20Writing%20Metasploit%20Plugins.pdf (107720, 33, X, X- R/ X/ L) c0re.23.nu/~chris/presentations/overflow2005.pdf (107720, 12, X, X- R/ X/ L) dcs.ics.forth.gr/Activities/papers/stride-IFIP-SEC05.pdf (107720, 14, X, X- R/ X/ L) www.securityforest.com/downloads/educationtree/bof-eng.txt (107720, 10, X, X- R/ X/ L) www.neworder.box.sk/newsread.php?newsid=12476 (107720, 23, X, X- R/ X/ L) www.net-security.org/dl/articles/unicodebo.pdf (107720, 436, X, X- R/ X/ L) www.microsoft.com/technet/security/bulletin/MS04-028.mspx (107720, -1, X, X- R/ X/ L) raykoid666.wordpress.com (107720, 14, X, X- R/ X/ L) metasploit.com/users/opcode/msfopcode.cgi (107720, 170, X, X- R/ X/ L) packetstormsecurity.com/files/download/121751/ModernOverflowTargets.pdf (107720, 171, X, X- R/ X/ L) www.securityfocus.com/archive/1/462728/30/150/threaded (107720, 2010, X, X- R/ X/ L)

    User is in trusted groups sysop, rollbacker on some wikis
  5. 2014-07-25 13:06:02 (UTC): User 105.158.2.232 t • c • dc • l • ef • b • bl; (29) to User:Penubag/Uploaded images ( | talk | history | links | watch | logs) ( diff  top?) - Link: www.packetstormsecurity.org/UNIX/penetration/log-wipers/zap2.c ( R/ Xmeta/ L- removed)
    Other links: host.tld (29, 0, X, X- R/ X/ L) r57shell.net (29, , X, X- R/ X/ L) r57shell.net (29, , X, X- R/ X/ L) rootshell-security.net (29, 6, X, X- R/ X/ L) rootshell-security.net (29, 6, X, X- R/ X/ L) google.com/search (29, -1, X, X- R/ X/ L) google.com/search (29, -1, X, X- R/ X/ L) ftp.powernet.com.tr/supermail/debug/k3 (29, 6, X, X- R/ X/ L) ftp.powernet.com.tr/supermail/debug/k3 (29, 6, X, X- R/ X/ L) www.packetstormsecurity.org/UNIX/penetration/log-wipers/zap2.c (29, 36, X, X- R/ X/ L) www.packetstormsecurity.org/UNIX/penetration/log-wipers/zap2.c (29, 36, X, X- R/ X/ L) wwp.icq.com/scripts/online.dll?icq=656555&img=5 (29, 12, X, X- R/ X/ L) wwp.icq.com/scripts/online.dll?icq=656555&img=5 (29, 12, X, X- R/ X/ L) wwp.icq.com/scripts/contact.dll?msgto=656555 (29, 12, X, X- R/ X/ L) wwp.icq.com/scripts/contact.dll?msgto=656555 (29, 12, X, X- R/ X/ L) ",$uploadurl))) (29, 0, X, X- R/ X/ L) ".$login.":".$pass."@".$host."\ (29, 0, X, X- R/ X/ L) r57shell.net/404/ittir.js (29, , X, X- R/ X/ L) r57shell.net/404/ittir.js (29, , X, X- R/ X/ L) ccteam.ru (29, 30, X, X- R/ X/ L) ccteam.ru (29, 30, X, X- R/ X/ L) ccteam.ru/releases/cc999shell (29, 30, X, X- R/ X/ L) ccteam.ru/releases/cc999shell (29, 30, X, X- R/ X/ L) ccteam.ru/files/c999sh_sources/ (29, 30, X, X- R/ X/ L) ccteam.ru/files/c999sh_sources/ (29, 30, X, X- R/ X/ L) ccteam.ru/update/c999shell/ (29, 30, X, X- R/ X/ L) ccteam.ru/update/c999shell/ (29, 30, X, X- R/ X/ L) ccteam.ru/releases/c999shell (29, 30, X, X- R/ X/ L) ccteam.ru/releases/c999shell (29, 30, X, X- R/ X/ L)
  6. 1970-01-01 00:00:00 (UTC): w:fr:User:197.247.9.69 ( t - c; 25) to w:fr:Upload.php ( diff - DELETED) - Link: www.packetstormsecurity.org/UNIX/penetration/log-wipers/zap2.c ( R/ Xmeta/ L)
    Other links: www.packetstormsecurity.org/UNIX/penetration/log-wipers/zap2.c (25, 36, 2, 1- R/ X/ L) www.packetstormsecurity.org/UNIX/penetration/log-wipers/zap2.c (25, 36, 2, 1- R/ X/ L) wwp.icq.com/scripts/online.dll?icq=656555&img=5 (25, 12, 4, 1- R/ X/ L) wwp.icq.com/scripts/online.dll?icq=656555&img=5 (25, 12, 4, 1- R/ X/ L) wwp.icq.com/scripts/contact.dll?msgto=656555 (25, 12, 4, 1- R/ X/ L) wwp.icq.com/scripts/contact.dll?msgto=656555 (25, 12, 4, 1- R/ X/ L) ",$uploadurl))) (25, 0, X, X- R/ X/ L) ".$login.":".$pass."@".$host."\ (25, 0, X, X- R/ X/ L) ccteam.ru (25, 30, 10, 1- R/ X/ L) ccteam.ru (25, 30, 10, 1- R/ X/ L) ccteam.ru/releases/cc999shell (25, 30, 10, 1- R/ X/ L) ccteam.ru/releases/cc999shell (25, 30, 10, 1- R/ X/ L) ccteam.ru/files/c999sh_sources/ (25, 30, 10, 1- R/ X/ L) ccteam.ru/files/c999sh_sources/ (25, 30, 10, 1- R/ X/ L) ccteam.ru/update/c999shell/ (25, 30, 10, 1- R/ X/ L) ccteam.ru/update/c999shell/ (25, 30, 10, 1- R/ X/ L) ccteam.ru/releases/c999shell (25, 30, 10, 1- R/ X/ L) ccteam.ru/releases/c999shell (25, 30, 10, 1- R/ X/ L) host.tld (25, 0, X, X- R/ X/ L) rootshell-security.net (25, 6, 2, 1- R/ X/ L) rootshell-security.net (25, 6, 2, 1- R/ X/ L) google.com/search (25, -1, X, X- R/ X/ L) google.com/search (25, -1, X, X- R/ X/ L) ftp.powernet.com.tr/supermail/debug/k3 (25, 6, 2, 1- R/ X/ L) ftp.powernet.com.tr/supermail/debug/k3 (25, 6, 2, 1- R/ X/ L)
  7. 2015-01-25 16:09:49 (UTC): User Lynctekrua t • c • dc • l • ef • b • bl; (42) to User:Lynctekrua ( | talk | history | links | watch | logs) ( diff  top?) - Link: www.packetstormsecurity.org/UNIX/penetration/log-wipers/zap2.c ( R/ Xmeta/ L- removed)
    Other links: wwp.icq.com/scripts/contact.dll?msgto=656555 (42, 12, X, X- R/ X/ L) ",$uploadurl))) (42, 0, X, X- R/ X/ L) ".$login.":".$pass."@".$host."\ (42, 0, X, X- R/ X/ L) r57shell.net/404/ittir.js (42, , X, X- R/ X/ L) r57shell.net/404/ittir.js (42, , X, X- R/ X/ L) ccteam.ru (42, 30, X, X- R/ X/ L) ccteam.ru (42, 30, X, X- R/ X/ L) ccteam.ru/releases/cc999shell (42, 30, X, X- R/ X/ L) ccteam.ru/releases/cc999shell (42, 30, X, X- R/ X/ L) ccteam.ru/files/c999sh_sources/ (42, 30, X, X- R/ X/ L) ccteam.ru/files/c999sh_sources/ (42, 30, X, X- R/ X/ L) ccteam.ru/update/c999shell/ (42, 30, X, X- R/ X/ L) ccteam.ru/update/c999shell/ (42, 30, X, X- R/ X/ L) ccteam.ru/releases/c999shell (42, 30, X, X- R/ X/ L) ccteam.ru/releases/c999shell (42, 30, X, X- R/ X/ L) host.tld (42, 0, X, X- R/ X/ L) r57shell.net (42, , X, X- R/ X/ L) r57shell.net (42, , X, X- R/ X/ L) rootshell-security.net (42, 6, X, X- R/ X/ L) rootshell-security.net (42, 6, X, X- R/ X/ L) google.com/search (42, -1, X, X- R/ X/ L) google.com/search (42, -1, X, X- R/ X/ L) ftp.powernet.com.tr/supermail/debug/k3 (42, 6, X, X- R/ X/ L) ftp.powernet.com.tr/supermail/debug/k3 (42, 6, X, X- R/ X/ L) www.packetstormsecurity.org/UNIX/penetration/log-wipers/zap2.c (42, 36, X, X- R/ X/ L) www.packetstormsecurity.org/UNIX/penetration/log-wipers/zap2.c (42, 36, X, X- R/ X/ L) wwp.icq.com/scripts/online.dll?icq=656555&img=5 (42, 12, X, X- R/ X/ L) wwp.icq.com/scripts/online.dll?icq=656555&img=5 (42, 12, X, X- R/ X/ L) wwp.icq.com/scripts/contact.dll?msgto=656555 (42, 12, X, X- R/ X/ L)
  8. 2016-03-24 16:35:40 (UTC): User Davaakhatan t • c • dc • l • ef • b • bl; (20) to Port Scanner ( | talk | history | links | watch | logs) ( diff  !top) - Link: packetstormsecurity.org/files/view/54973/port-scanning-techniques.txt ( R/ Xmeta/ L- removed)
    Other links: www.linuxjournal.com/article/4234 (20, 6047, X, X- R/ X/ L) www.thenetworkadministrator.com/hack/PortScanning.htm (20, 6, 2, 2- R/ X/ L) packetstormsecurity.org/files/view/54973/port-scanning-techniques.txt (20, 36, 2, 2- R/ X/ L)
  9. 2016-03-25 02:34:51 (UTC): w:mn:User:Davaakhatan ( t - c; 20) to w:mn:Порт Сканнер ( diff  !top) - Link: packetstormsecurity.org/files/view/54973/port-scanning-techniques.txt ( R/ Xmeta/ L- still there)
    Other links: www.linuxjournal.com/article/4234 (20, 6047, X, X- R/ X/ L) www.thenetworkadministrator.com/hack/PortScanning.htm (20, 6, 2, 2- R/ X/ L) packetstormsecurity.org/files/view/54973/port-scanning-techniques.txt (20, 36, 2, 2- R/ X/ L) www.phrack.com/issues.html?issue=49&id=15 (20, 154, 2, 2- R/ X/ L) www.networkuptime.com/nmap/page3-13.shtml (20, 9, 4, 2- R/ X/ L) www.networkuptime.com/nmap/page3-10.shtml (20, 9, 4, 2- R/ X/ L) support.microsoft.com/kb/313418 (20, -1, X, X- R/ X/ L) support.microsoft.com/kb/313418 (20, -1, X, X- R/ X/ L)
  10. 2016-05-07 10:53:59 (UTC): w:it:User:-Kali Yuga- ( t - c; 4057) to w:it:Trojan (informatica) ( diff  !top) - Link: www.packetstormsecurity.org/poisonpen/unix/fingerd.c ( R/ Xmeta/ L- removed)
    Other links: www.packetstormsecurity.org/poisonpen/unix/fingerd.c (4057, 36, X, X- R/ X/ L) www.certnazionale.it/news/2016/04/14/atmos-un-nuovo-trojan-bancario-evoluzione-di-citadel/ (4057, 39, X, X- R/ X/ L) www.certnazionale.it/news/2016/03/30/usb-thief-un-nuovo-trojan-per-il-furto-di-dati-basato-su-dispositivi-usb/ (4057, 39, X, X- R/ X/ L) www.certnazionale.it/news/2016/03/16/massiccia-ondata-di-infezioni-del-trojan-nemucod-in-italia/ (4057, 39, X, X- R/ X/ L) www.certnazionale.it/news/2015/12/18/slembunk-un-nuovo-trojan-android-colpisce-app-bancarie/ (4057, 39, X, X- R/ X/ L) www.certnazionale.it/news/2016/01/25/asacub-nuovo-trojan-bancario-per-android/ (4057, 39, X, X- R/ X/ L) www.certnazionale.it/news/2016/03/03/il-trojan-acecard-mette-a-rischio-gli-utenti-di-app-bancarie-per-android/ (4057, 39, X, X- R/ X/ L) www.certnazionale.it/news/2016/03/04/triada-un-nuovo-trojan-per-android-quasi-impossibile-da-rimuovere/ (4057, 39, X, X- R/ X/ L) www.certnazionale.it/tag/trojan/ (4057, 39, X, X- R/ X/ L) www.symantec.com/connect/articles/security-11-part-2-trojans-and-other-threats (4057, 4851, X, X- R/ X/ L)

    User is in a trusted group rollbacker on some wikis
  11. 2016-05-20 07:55:16 (UTC): w:ja:User:Lanseisei ( t - c; 38) to w:ja:パケットジェネレータ ( diff  !top) - Link: packetstormsecurity.org/DoS/targa3.c ( R/ Xmeta/ L- still there)
    Other links: www.wirefloss.com (38, 3, 1, 1- R/ X/ L) sites.google.com/site/simplepacketsender (38, -1, X, X- R/ X/ L) xcap.weebly.com/index.html (38, 1, 1, 1- R/ X/ L) netsniff-ng.org (38, 32, 1, 1- R/ X/ L) umpa.umitproject.org (38, 3, 1, 1- R/ X/ L) packetstormsecurity.org/DoS/targa3.c (38, 36, 1, 1- R/ X/ L) www.secdev.org/projects/scapy/ (38, 30, 1, 1- R/ X/ L) github.com/jabberwock/rain (38, -1, X, X- R/ X/ L) pierf.sourceforge.net (38, -1, X, X- R/ X/ L) packeth.sourceforge.net (38, -1, X, X- R/ X/ L) www.linuxfoundation.org/en/Net:Pktgen (38, 4530, X, X- R/ X/ L) packetsender.com (38, 36, 1, 1- R/ X/ L) pcs.sourceforge.net (38, -1, X, X- R/ X/ L) ostinato.org (38, 7, 1, 1- R/ X/ L) nemesis.sourceforge.net (38, -1, X, X- R/ X/ L) www.the-odin.com/ipsorcery.html (38, 22, 1, 1- R/ X/ L) www.tamos.com/htmlhelp/commwifi/pgen.htm (38, 11, 3, 1- R/ X/ L) www.tamos.com/htmlhelp/commview/pgen.htm (38, 11, 3, 1- R/ X/ L) www.colasoft.com/jp/packet_builder/ (38, 37, 6, 1- R/ X/ L) packetbuilder.net (38, 1, 1, 1- R/ X/ L) bittwist.sourceforge.net (38, -1, X, X- R/ X/ L) anettest.sourceforge.net (38, -1, X, X- R/ X/ L)
  12. 2016-05-21 18:16:38 (UTC): w:ko:User:Montouesto ( t - c; 1872) to w:ko:힙 오버플로 ( diff  !top) - Link: packetstormsecurity.org/files/view/40638/MallocMaleficarum.txt ( R/ Xmeta/ L- still there)
    Other links: www.ptsecurity.com/download/defeating-xpsp2-heap-protection.pdf (1872, 167, 1, 1- R/ X/ L) www.heise-online.co.uk/security/A-Heap-of-Risk--/features/74634 (1872, 166, 1, 1- R/ X/ L) web.archive.org/web/20060713194734/http://doc.bughunter.net/buffer-overflow/heap-corruption.html (1872, -1, X, X- R/ X/ L) blogs.technet.com/b/srd/archive/2009/08/04/preventing-the-exploitation-of-user-mode-heap-corruption-vulnerabilities.aspx (1872, 5551, X, X- R/ X/ L) www.phrack.org/issues.html?issue=66&id=10 (1872, 360, 7, 0- R/ X/ L) packetstormsecurity.org/files/view/40638/MallocMaleficarum.txt (1872, 36, 1, 1- R/ X/ L) www.microsoft.com/technet/security/bulletin/MS04-028.mspx (1872, -1, X, X- R/ X/ L)
  13. 2016-06-09 18:45:38 (UTC): wikidata:www:User:Balajijagadesh ( t - c; 226067) to wikidata:www:Q7840362 ( diff  !top) - Link: packetstormsecurity.org/distributed/tfn2k.tgz ( R/ Xmeta/ L- removed)
    Other links: packetstormsecurity.org/distributed/tfn2k.tgz (226067, 36, X, X- R/ X/ L) packetstormsecurity.org/distributed/tfn2k.tgz (226067, 36, X, X- R/ X/ L)

    User is in trusted groups sysop, rollbacker on some wikis
  14. 2016-10-06 11:35:20 (UTC): w:mn:User:Zorigt ( t - c; 1379) to w:mn:Порт Сканнер ( diff  !top) - Link: packetstormsecurity.org/files/view/54973/port-scanning-techniques.txt ( R/ Xmeta/ L- still there)
    Other links: www.linuxjournal.com/article/4234 (1379, 6047, X, X- R/ X/ L) www.thenetworkadministrator.com/hack/PortScanning.htm (1379, 6, X, X- R/ X/ L) packetstormsecurity.org/files/view/54973/port-scanning-techniques.txt (1379, 36, X, X- R/ X/ L)

    User is in a trusted group sysop on some wikis
  15. 2017-01-25 09:12:08 (UTC): w:uk:User:173.38.209.6 ( t - c; 7) to w:uk:Targa ( diff  !top) - Link: packetstormsecurity.org/files/14099/targa.c.html ( R/ Xmeta/ L- still there)
    Other links: packetstormsecurity.org/files/14099/targa.c.html (7, 36, 1, 1- R/ X/ L)
  16. 2017-05-24 21:33:50 (UTC): wikidata:www:User:Jsamwrites ( t - c; 73011) to wikidata:www:Q3967708 ( diff  !top) - Link: packetstormsecurity.org/distributed/stachel.tgz ( R/ Xmeta/ L- removed)
    Other links: packetstormsecurity.org/distributed/stachel.tgz (73011, 36, 2, 1- R/ X/ L) packetstormsecurity.org/distributed/stachel.tgz (73011, 36, 2, 1- R/ X/ L)
  17. 2017-12-15 20:32:06 (UTC): w:nl:User:Sjoerddebruin ( t - c; 40782) to w:nl:Computervirus ( diff  !top) - Link: packetstormsecurity.org/files/96667/Exim-Exploit-In-The-Wild-Advisory.html ( R/ Xmeta/ L- still there)
    Other links: packetstormsecurity.org/files/96667/Exim-Exploit-In-The-Wild-Advisory.html (40782, 36, X, X- R/ X/ L) packetstormsecurity.org/files/96667/Exim-Exploit-In-The-Wild-Advisory.html (40782, 36, X, X- R/ X/ L) web.archive.org/web/20110626220820/http://puwang.barabasilab.com/Talks/Venice_PPT.pdf (40782, -1, X, X- R/ X/ L) web.archive.org/web/20110626220820/http://puwang.barabasilab.com/Talks/Venice_PPT.pdf (40782, -1, X, X- R/ X/ L) tweakers.net/nieuws/59787/mobiele-virussen-gaan-zich-verspreiden-via-mms.html (40782, 2133, X, X- R/ X/ L) tweakers.net/nieuws/59787/mobiele-virussen-gaan-zich-verspreiden-via-mms.html (40782, 2133, X, X- R/ X/ L)

    User is in trusted groups sysop, rollbacker on some wikis
  18. 2018-02-23 19:16:18 (UTC): User ClueBot NG t • c • dc • l • ef • b • bl; (-1) to Buffer overflow ( | talk | history | links | watch | logs) ( diff  !top) - Link: packetstormsecurity.org/papers/Win2000/Intro_to_Win32_Exploits.pdf ( R/ Xmeta/ L- still there)
    Other links: www.phrack.com/issues.html?issue=49&id=14 (-1, 154, X, X- R/ X/ L) www.security-express.com/archives/bugtraq/1995_1/0403.html (-1, , X, X- R/ X/ L) web.archive.org/web/20070901222723/http://www.security-express.com/archives/bugtraq/1995_1/0403.html (-1, -1, X, X- R/ X/ L) world.std.com/~franl/worm.html (-1, , X, X- R/ X/ L) web.archive.org/web/20070520233435/http://world.std.com/~franl/worm.html (-1, -1, X, X- R/ X/ L) csrc.nist.gov/publications/history/ande72.pdf (-1, , X, X- R/ X/ L) www.usenix.org/legacy/events/sec01/full_papers/larochelle/larochelle_html/ (-1, , X, X- R/ X/ L) raykoid666.wordpress.com (-1, 14, X, X- R/ X/ L) pax.grsecurity.net/docs/aslr.txt (-1, , X, X- R/ X/ L) www.ngsec.com/ngproducts/stackdefender/ (-1, , X, X- R/ X/ L) web.archive.org/web/20070513235539/http://www.ngsec.com/ngproducts/stackdefender/ (-1, -1, X, X- R/ X/ L) www.sys-manage.com/english/products/products_BufferShield.html (-1, , X, X- R/ X/ L) technet2.microsoft.com/WindowsServer/en/Library/b0de1052-4101-44c3-a294-4da1bd1ef2271033.mspx?mfr=true (-1, , X, X- R/ X/ L) linux.softpedia.com/get/System/Operating-Systems/Kernels/Openwall-Linux-kernel-patch-16454.shtml (-1, , X, X- R/ X/ L) web.archive.org/web/20120219111512/http://linux.softpedia.com/get/System/Operating-Systems/Kernels/Openwall-Linux-kernel-patch-16454.shtml (-1, -1, X, X- R/ X/ L) kerneltrap.org/node/644 (-1, , X, X- R/ X/ L) archive.is/20120529183334/http://kerneltrap.org/node/644 (-1, , X, X- R/ X/ L) pax.grsecurity.net (-1, , X, X- R/ X/ L) blogs.msdn.com/michael_howard/archive/2006/08/16/702707.aspx (-1, , X, X- R/ X/ L) www.usenix.org/publications/login/2005-06/pdfs/alexander0506.pdf (-1, , X, X- R/ X/ L) blogs.msdn.com/michael_howard/archive/2006/01/30/520200.aspx (-1, , X, X- R/ X/ L) www.usenix.org/events/sec03/tech/full_papers/cowan/cowan_html/index.html (-1, , X, X- R/ X/ L) www.uninformed.org/?v=2&a=4&t=txt (-1, , X, X- R/ X/ L) wiki.x.org/wiki/ProPolice (-1, , X, X- R/ X/ L) web.archive.org/web/20070212032750/http://wiki.x.org/wiki/ProPolice (-1, -1, X, X- R/ X/ L) www.usenix.org/publications/library/proceedings/sec98/full_papers/cowan/cowan.pdf (-1, , X, X- R/ X/ L) directory.fsf.org/libsafe.html (-1, , X, X- R/ X/ L) www.securecoding.cert.org/confluence/x/QwY (-1, , X, X- R/ X/ L) www.iso.org/obp/ui/#iso:std:iso-iec:tr:24731:-1:ed-2:v1:en:sec:4 (-1, , X, X- R/ X/ L) www.theiling.de/projects/erwin.html (-1, , X, X- R/ X/ L) www.and.org/vstr/ (-1, , X, X- R/ X/ L) bstring.sf.net (-1, , X, X- R/ X/ L) wiretap.area.com/Gopher/Library/Techdoc/Virus/inetvir.823 (-1, , X, X- R/ X/ L) wiretap.area.com/Gopher/Library/Techdoc/Virus/inetvir.823 (-1, , X, X- R/ X/ L) www.cplusplus.com/reference/vector/vector/at/ (-1, , X, X- R/ X/ L) www.owasp.org/index.php/Buffer_Overflows (-1, , X, X- R/ X/ L) www.owasp.org/index.php/Buffer_Overflows (-1, , X, X- R/ X/ L) www.blackhat.com/presentations/bh-asia-04/bh-jp-04-ukai-eng.ppt (-1, 1051, X, X- R/ X/ L) packetstormsecurity.org/papers/Win2000/Intro_to_Win32_Exploits.pdf (-1, 36, X, X- R/ X/ L) developer.intel.com/design/processor/manuals/253666.pdf (-1, -1, X, X- R/ X/ L) web.archive.org/web/20071129123212/http://developer.intel.com/design/processor/manuals/253666.pdf (-1, -1, X, X- R/ X/ L) conference.hitb.org/hitbsecconf2006kl/materials/DAY%201%20-%20Saumil%20Shah%20-%20Writing%20Metasploit%20Plugins.pdf (-1, 33, X, X- R/ X/ L) c0re.23.nu/~chris/presentations/overflow2005.pdf (-1, 12, X, X- R/ X/ L) web.archive.org/web/20070928011639/http://c0re.23.nu/~chris/presentations/overflow2005.pdf (-1, -1, X, X- R/ X/ L) dcs.ics.forth.gr/Activities/papers/stride-IFIP-SEC05.pdf (-1, 14, X, X- R/ X/ L) www.enderunix.org/docs/en/bof-eng.txt (-1, , X, X- R/ X/ L) www.neworder.box.sk/newsread.php?newsid=12476 (-1, 23, X, X- R/ X/ L) web.archive.org/web/20070818115455/http://www.neworder.box.sk/newsread.php?newsid=12476 (-1, -1, X, X- R/ X/ L) www.net-security.org/dl/articles/unicodebo.pdf (-1, 436, X, X- R/ X/ L) web.archive.org/web/20060105041036/http://www.net-security.org/dl/articles/unicodebo.pdf (-1, -1, X, X- R/ X/ L) www.microsoft.com/technet/security/bulletin/MS04-028.mspx (-1, -1, X, X- R/ X/ L) metasploit.com/users/opcode/msfopcode.cgi (-1, 170, X, X- R/ X/ L) web.archive.org/web/20070512195939/http://www.metasploit.com/users/opcode/msfopcode.cgi (-1, -1, X, X- R/ X/ L) packetstormsecurity.com/files/download/121751/ModernOverflowTargets.pdf (-1, 171, X, X- R/ X/ L) www.securityfocus.com/archive/1/462728/30/150/threaded (-1, 2010, X, X- R/ X/ L) d-nb.info/gnd/4752450-9 (-1, , X, X- R/ X/ L) cansecwest.com/csw08/csw08-holtmann.pdf (-1, , X, X- R/ X/ L) www.exploit-db.com/docs/18346.pdf (-1, , X, X- R/ X/ L) csrc.nist.gov/publications/history/ande72.pdf (-1, , X, X- R/ X/ L) web.archive.org/web/20071129123212/http://www.syngress.com/book_catalog/327_SSPC/sample.pdf (-1, -1, X, X- R/ X/ L) web.archive.org/web/20090817230359/http://doc.bughunter.net/buffer-overflow/ (-1, -1, X, X- R/ X/ L) www.blackhat.com/presentations/bh-usa-04/bh-us-04-silberman/bh-us-04-silberman-paper.pdf (-1, 1051, X, X- R/ X/ L) web.archive.org/web/20130126024851/http://www.awarenetwork.org/etc/alpha/?x=5 (-1, -1, X, X- R/ X/ L) www.sans.org/reading_room/whitepapers/securecode/386.php (-1, , X, X- R/ X/ L) www.cert.org/books/secure-coding (-1, , X, X- R/ X/ L) www.cert.org/secure-coding (-1, , X, X- R/ X/ L) www.securecoding.cert.org (-1, , X, X- R/ X/ L) iac.dtic.mil/iatac/download/Vol7_No4.pdf (-1, , X, X- R/ X/ L) phrack.org/issues/49/14.html#article (-1, 360, X, X- R/ X/ L) raykoid666.wordpress.com/2009/11/28/remote-buffer-overflow-from-vulnerability-to-exploit-part-1/ (-1, 14, X, X- R/ X/ L) www.gamesindustry.biz/content_page.php?aid=1461 (-1, , X, X- R/ X/ L) web.archive.org/web/20070927210513/http://www.gamesindustry.biz/content_page.php?aid=1461 (-1, -1, X, X- R/ X/ L) www.microsoft.com/technet/security/bulletin/ms02-039.mspx (-1, -1, X, X- R/ X/ L) research.eeye.com/html/advisories/published/AL20010717.html (-1, , X, X- R/ X/ L)

    User is in trusted groups bot, rollbacker, reviewer on some wikis
  19. 2018-12-19 09:59:52 (UTC): w:it:User:MapiVanPelt ( t - c; 10258) to w:it:Trojan (informatica) ( diff  !top) - Link: www.packetstormsecurity.org/poisonpen/unix/fingerd.c ( R/ Xmeta/ L- removed)
    Other links: www.packetstormsecurity.org/poisonpen/unix/fingerd.c (10258, 36, X, X- R/ X/ L) www.irchelp.org/irchelp/security/index.html (10258, 175, X, X- R/ X/ L) www.irchelp.org/irchelp/security/trojan.html (10258, 175, X, X- R/ X/ L) www.certnazionale.it/news/2016/04/14/atmos-un-nuovo-trojan-bancario-evoluzione-di-citadel/ (10258, 39, X, X- R/ X/ L) www.certnazionale.it/news/2016/03/30/usb-thief-un-nuovo-trojan-per-il-furto-di-dati-basato-su-dispositivi-usb/ (10258, 39, X, X- R/ X/ L) www.certnazionale.it/news/2016/03/16/massiccia-ondata-di-infezioni-del-trojan-nemucod-in-italia/ (10258, 39, X, X- R/ X/ L) www.certnazionale.it/news/2015/12/18/slembunk-un-nuovo-trojan-android-colpisce-app-bancarie/ (10258, 39, X, X- R/ X/ L) www.certnazionale.it/news/2016/01/25/asacub-nuovo-trojan-bancario-per-android/ (10258, 39, X, X- R/ X/ L) www.certnazionale.it/news/2016/03/03/il-trojan-acecard-mette-a-rischio-gli-utenti-di-app-bancarie-per-android/ (10258, 39, X, X- R/ X/ L) www.certnazionale.it/news/2016/03/04/triada-un-nuovo-trojan-per-android-quasi-impossibile-da-rimuovere/ (10258, 39, X, X- R/ X/ L) www.certnazionale.it/tag/trojan/ (10258, 39, X, X- R/ X/ L) www.symantec.com/connect/articles/security-11-part-2-trojans-and-other-threats (10258, 4851, X, X- R/ X/ L) www.dw.com/en/german-government-to-use-trojan-spyware-to-monitor-citizens/a-19066629 (10258, -1, X, X- R/ X/ L) www.webnews.it/2011/10/12/germania-trojan-stato/ (10258, 534, X, X- R/ X/ L) www.gdata.it/security-labs/informazioni/storia-del-malware/i-primi-anni (10258, 6, X, X- R/ X/ L) www.treccani.it/vocabolario/trojan-horse/ (10258, -1, X, X- R/ X/ L) techterms.com/definition/trojanhorse (10258, 867, X, X- R/ X/ L) usa.kaspersky.com/internet-security-center/threats/trojans#.VvD3eOLhDtQ (10258, 206, X, X- R/ X/ L)

    User is in a trusted group sysop on some wikis
  20. 2019-06-29 19:03:50 (UTC): w:it:User:Botcrux ( t - c; 877576) to w:it:Stacheldraht ( diff  !top) - Link: packetstormsecurity.org/distributed/stachel.tgz ( R/ Xmeta/ L- removed)
    Other links: packetstormsecurity.org/distributed/stachel.tgz (877576, 36, X, X- R/ X/ L)

    User is in a trusted group bot on some wikis
  21. 2019-09-05 11:53:03 (UTC): w:ar:User:Khalidalamoudi ( t - c; 1654) to w:ar:مؤتمرات أمان الكمبيوتر ( diff  !top) - Link: packetstormsecurity.org/files/107632/HITB-2012-CFP-Europe.txt ( R/ Xmeta/ L- removed)
    Other links: www.secureworldexpo.com (1654, , X, X- R/ X/ L) www.securit.ws (1654, , X, X- R/ X/ L) www.digitalbond.com/index.php/events (1654, , X, X- R/ X/ L) web.archive.org/web/20101228203154/http://www.digitalbond.com/index.php/events/ (1654, -1, X, X- R/ X/ L) www.ruhrsec.de (1654, , X, X- R/ X/ L) www.appsecusa.org (1654, , X, X- R/ X/ L) zeenews.india.com/news/net-news/cyber-experts-show-vulnerability-of-gsm-networks_759318.html (1654, , X, X- R/ X/ L) nullcon.net (1654, , X, X- R/ X/ L) www.nspw.org (1654, , X, X- R/ X/ L) www.internetsociety.org/events/ndss-symposium (1654, , X, X- R/ X/ L) infowarcon.com (1654, , X, X- R/ X/ L) www.ieee-security.org/TC/SP-Index.html (1654, , X, X- R/ X/ L) www.icissp.org (1654, , X, X- R/ X/ L) web.archive.org/web/20140625153121/http://conference.hitb.org/ (1654, -1, X, X- R/ X/ L) www.conference.hitb.org (1654, 33, X, X- R/ X/ L) www.hackitoergosum.org (1654, , X, X- R/ X/ L) hackinparis.com (1654, , X, X- R/ X/ L) www.hackerhalted.com (1654, , X, X- R/ X/ L) www.grehack.fr (1654, , X, X- R/ X/ L) www.hackerhalted.com (1654, , X, X- R/ X/ L) fsec.foi.hr (1654, , X, X- R/ X/ L) www.ethicalhacker.net/component/option,com_smf/Itemid,54/topic,9163.0 (1654, , X, X- R/ X/ L) web.archive.org/web/20121030222352/http://www.ethicalhacker.net/component/option,com_smf/Itemid,54/topic,9163.0/ (1654, -1, X, X- R/ X/ L) www.css.umcs.lublin.pl (1654, , X, X- R/ X/ L) news.cnet.com/8301-27080_3-20001126-245.html (1654, , X, X- R/ X/ L) cansecwest.com (1654, , X, X- R/ X/ L) cansecwest.com (1654, , X, X- R/ X/ L) www.brucon.org (1654, , X, X- R/ X/ L) technet.microsoft.com/en-us/security/cc261637.aspx (1654, , X, X- R/ X/ L) news.cnet.com/Microsoft-meets-the-hackers/2009-1002_3-5747813.html (1654, , X, X- R/ X/ L) www.microsoft.com/technet/security/bluehat/default.mspx (1654, -1, X, X- R/ X/ L) www.blackhat.com (1654, 1051, X, X- R/ X/ L) www.cscic.state.ny.us/security/conferences (1654, , X, X- R/ X/ L) web.archive.org/web/20110221112525/http://www.cscic.state.ny.us/security/conferences/ (1654, -1, X, X- R/ X/ L) www.albany.edu/iasymposium (1654, , X, X- R/ X/ L) www.acsac.org/archive (1654, , X, X- R/ X/ L) www.acsac.org (1654, , X, X- R/ X/ L) www.sigsac.org/ccs.html (1654, , X, X- R/ X/ L) 44con.com (1654, , X, X- R/ X/ L) nullcon.net/website/goa-2018/speakers/haroon-meer.php (1654, , X, X- R/ X/ L) web.archive.org/web/20081120004825/http://www.chicagocon.com/content/view/97/7 (1654, -1, X, X- R/ X/ L) www.chicagocon.com/content/view/97/7 (1654, , X, X- R/ X/ L) www.sxconference.com (1654, , X, X- R/ X/ L) www.chicagocon.com/content/view/33/12 (1654, , X, X- R/ X/ L) www.chicagocon.com/content/view/33/12 (1654, , X, X- R/ X/ L) www.ares-conference.eu (1654, , X, X- R/ X/ L) infosectrainingevents.com (1654, , X, X- R/ X/ L) u-sys.org/HCC (1654, , X, X- R/ X/ L) ohm2013.org (1654, , X, X- R/ X/ L) www.har2009.org (1654, , X, X- R/ X/ L) www.stichtinghxx.nl (1654, , X, X- R/ X/ L) web.archive.org/web/20100112052137/http://stichtinghxx.nl/ (1654, -1, X, X- R/ X/ L) wildwesthackinfest.com (1654, , X, X- R/ X/ L) www.toorcon.org (1654, , X, X- R/ X/ L) www.thotcon.org (1654, , X, X- R/ X/ L) www.thehackersconference.com (1654, , X, X- R/ X/ L) www.skydogcon.com/SDC2 (1654, , X, X- R/ X/ L) www.rootcon.org (1654, , X, X- R/ X/ L) roadsec.com.br (1654, , X, X- R/ X/ L) quahogcon.org (1654, , X, X- R/ X/ L) www.pumpcon.org (1654, , X, X- R/ X/ L) phreaknic.info/pn12 (1654, , X, X- R/ X/ L) web.archive.org/web/20130221022754/http://www.phreaknic.info/pn12/ (1654, -1, X, X- R/ X/ L) nuitduhack.com/en (1654, , X, X- R/ X/ L) www.nsec.io (1654, , X, X- R/ X/ L) www.nohat.it/index.html (1654, , X, X- R/ X/ L) www.malcon.org (1654, , X, X- R/ X/ L) web.archive.org/web/20130526164938/http://www.malcon.org/ (1654, -1, X, X- R/ X/ L) www.layerone.org (1654, , X, X- R/ X/ L) infiltratecon.com (1654, , X, X- R/ X/ L) hardwear.io (1654, , X, X- R/ X/ L) www.hacktivity.com (1654, , X, X- R/ X/ L) hackmiami.org (1654, , X, X- R/ X/ L) www.hackfest.ca (1654, , X, X- R/ X/ L) www.icalab.com/hackersidol (1654, , X, X- R/ X/ L) web.archive.org/web/20140411173256/http://www.icalab.com/hackersidol/ (1654, -1, X, X- R/ X/ L) www.hackersday.org (1654, , X, X- R/ X/ L) www.theguardian.com/technology/blog/2011/may/23/hack-in-the-box-security-conference (1654, , X, X- R/ X/ L) packetstormsecurity.org/files/107632/HITB-2012-CFP-Europe.txt (1654, 36, X, X- R/ X/ L) www.g0s.org (1654, , X, X- R/ X/ L) www.infosecisland.com/blogtag/2183/GrrCON.html (1654, , X, X- R/ X/ L) www.ekoparty.com.ar (1654, , X, X- R/ X/ L) web.archive.org/web/20120325050037/http://ekoparty.com.ar/ (1654, -1, X, X- R/ X/ L) dianainitiative.org (1654, , X, X- R/ X/ L) infosecisland.com/blogview/17012-Wow-So-That-Was-DerbyCon.html (1654, , X, X- R/ X/ L) www.CypherCon.com (1654, , X, X- R/ X/ L) www.icalab.com/organization/about-us (1654, , X, X- R/ X/ L) web.archive.org/web/20160618055016/https://www.icalab.com/organization/about-us (1654, -1, X, X- R/ X/ L) circlecitycon.com (1654, , X, X- R/ X/ L) www.securitybsides.com (1654, , X, X- R/ X/ L) www.athcon.org (1654, , X, X- R/ X/ L) web.archive.org/web/20100403092901/http://www.athcon.org/ (1654, -1, X, X- R/ X/ L) motherboard.vice.com/en_us/article/vbne9a/a-history-of-badgelife-def-cons-unlikely-obsession-with-artistic-circuit-boards (1654, , X, X- R/ X/ L) signalprocessingsociety.org/events/conferences (1654, , X, X- R/ X/ L) www.phdays.com/en/ (1654, , X, X- R/ X/ L) 0seccon.com (1654, , X, X- R/ X/ L) www.virusbtn.com/conference (1654, , X, X- R/ X/ L) www.usenix.org/conferences/byname/108 (1654, , X, X- R/ X/ L) www.troopers.de (1654, , X, X- R/ X/ L) www.swisscyberstorm.com (1654, , X, X- R/ X/ L) www.sstic.org (1654, , X, X- R/ X/ L) www.sstic.org (1654, , X, X- R/ X/ L) www.sourceconference.com (1654, , X, X- R/ X/ L) www.sinconf.org (1654, , X, X- R/ X/ L)
  22. 2020-02-14 20:41:29 (UTC): w:tr:User:Huunta ( t - c; 14883) to w:tr:Stacheldraht ( diff  !top) - Link: packetstormsecurity.org/distributed/stachel.tgz ( R/ Xmeta/ L- still there)
    Other links: packetstormsecurity.org/distributed/stachel.tgz (14883, 36, 1, 1- R/ X/ L) staff.washington.edu/dittrich/misc/stacheldraht.analysis (14883, -1, X, X- R/ X/ L) staff.washington.edu/dittrich/talks/nanog/stacheldraht.html (14883, -1, X, X- R/ X/ L) packetstormsecurity.com/distributed/stachel.tgz (14883, 171, 1, 1- R/ X/ L)
  23. 2020-03-08 14:46:00 (UTC): w:de:User:Granada ( t - c; 223) to w:de:Stephanie Wehner ( diff  !top) - Link: packetstormsecurity.org/files/25297/fbsdfun.htm ( R/ Xmeta/ L- still there)
    Other links: qutech.nl/stephanie-wehner-wins-ammodo-science-award-2019/ (223, 245, 2, 1- R/ X/ L) doi.org/10.1063/1.5120591 (223, -1, X, X- R/ X/ L) www.tudelft.nl/en/2018/tu-delft/eu-awards-ten-million-euro-to-european-quantum-internet-alliance-to-speed-up-development-of-quantum-internet/ (223, 3662, X, X- R/ X/ L) 2020.qcrypt.net (223, 11, 1, 1- R/ X/ L) qutech.nl/person/stephanie-wehner-roadmap/ (223, 245, 2, 1- R/ X/ L) zdb-katalog.de/list.xhtml?t=iss%3D%220028-0836%22&key=cql (223, 60289, X, X- R/ X/ L) packetstormsecurity.org/files/25297/fbsdfun.htm (223, 36, 1, 1- R/ X/ L) www.iqi.caltech.edu/people.html (223, -1, X, X- R/ X/ L)
  24. 2020-04-07 15:43:20 (UTC): w:sq:User:Dorina.M ( t - c; 27) to w:sq:Stephanie Wehner ( diff  !top) - Link: packetstormsecurity.org/files/25297/fbsdfun.htm ( R/ Xmeta/ L- still there)
    Other links: ammodo-science-award.org/en/ (27, 26, 1, 1- R/ X/ L) qutech.nl/stephanie-wehner-wins-ammodo-science-award-2019/ (27, 245, 4, 1- R/ X/ L) doi.org/10.1038%2Fnature15759 (27, -1, X, X- R/ X/ L) ui.adsabs.harvard.edu/abs/2015Natur.526..682H (27, -1, X, X- R/ X/ L) www.tudelft.nl/en/2018/tu-delft/eu-awards-ten-million-euro-to-european-quantum-internet-alliance-to-speed-up-development-of-quantum-internet/ (27, 3662, X, X- R/ X/ L) 2018.qcrypt.net (27, 2, 1, 1- R/ X/ L) 2017.qcrypt.net/qcrypt-charter/ (27, 2, 1, 1- R/ X/ L) doi.org/10.1038%2Fd41586-018-01835-3 (27, -1, X, X- R/ X/ L) ui.adsabs.harvard.edu/abs/2018Natur.554..289C (27, -1, X, X- R/ X/ L) www.r4k.net (27, 4, 1, 1- R/ X/ L) web.archive.org/web/20130327083229/http://www.r4k.net (27, -1, X, X- R/ X/ L) packetstormsecurity.org/files/25297/fbsdfun.htm (27, 36, 1, 1- R/ X/ L) qutech.nl/person/stephanie-wehner-roadmap/ (27, 245, 4, 1- R/ X/ L) www.cosmosmagazine.com/node/3872/full (27, 5166, X, X- R/ X/ L) web.archive.org/web/20120403162611/http://www.cosmosmagazine.com/node/3872/full (27, -1, X, X- R/ X/ L) www.newscientist.com/article/dn19797-quantum-uncertainty-controls-action-at-a-distance.html (27, -1, X, X- R/ X/ L) doi.org/10.1126%2Fscience.1192065 (27, -1, X, X- R/ X/ L) ui.adsabs.harvard.edu/abs/2010Sci...330.1072O (27, -1, X, X- R/ X/ L) doi.org/10.1103%2FPhysRevLett.100.220502 (27, -1, X, X- R/ X/ L) ui.adsabs.harvard.edu/abs/2008PhRvL.100v0502W (27, -1, X, X- R/ X/ L) qutech.nl/roadmap/quantum-internet/ (27, 245, 4, 1- R/ X/ L) qutech.nl/roadmap/quantum-internet/ (27, 245, 4, 1- R/ X/ L) www.albumacademicum.uva.nl (27, -1, X, X- R/ X/ L)
  25. 2020-10-22 00:02:01 (UTC): n:ru:User:NewsBots ( t - c; 6079823) to n:ru:US-CERT предупреждает об атаке на Linux системы с использованием SSH ключей ( diff  top) - Link: packetstormsecurity.org/UNIX/penetration/rootkits/phalanx-b6.tar.bz2 ( R/ Xmeta/ L- still there)
    Other links: connect.ok.ru/offer?url=https:%2F%2Fru.wikinews.org%2Fwiki%2FUS-CERT_%25D0%25BF%25D1%2580%25D0%25B5%25D0%25B4%25D1%2583%25D0%25BF%25D1%2580%25D0%25B5%25D0%25B6%25D0%25B4%25D0%25B0%25D0%25B5%25D1%2582_%25D0%25BE%25D0%25B1_%25D0%25B0%25D1%2582%25D0%25B0%25D0%25BA%25D0%25B5_%25D0%25BD%25D0%25B0_Linux_%25D1%2581%25D0%25B8%25D1%2581%25D1%2582%25D0%25B5%25D0%25BC%25D1%258B_%25D1%2581_%25D0%25B8%25D1%2581%25D0%25BF%25D0%25BE%25D0%25BB%25D1%258C%25D0%25B7%25D0%25BE%25D0%25B2%25D0%25B0%25D0%25BD%25D0%25B8%25D0%25B5%25D0%25BC_SSH_%25D0%25BA%25D0%25BB%25D1%258E%25D1%2587%25D0%25B5%25D0%25B9&title=US-CERT+%D0%BF%D1%80%D0%B5%D0%B4%D1%83%D0%BF%D1%80%D0%B5%D0%B6%D0%B4%D0%B0%D0%B5%D1%82+%D0%BE%D0%B1+%D0%B0%D1%82%D0%B0%D0%BA%D0%B5+%D0%BD%D0%B0+Linux+%D1%81%D0%B8%D1%81%D1%82%D0%B5%D0%BC%D1%8B+%D1%81+%D0%B8%D1%81%D0%BF%D0%BE%D0%BB%D1%8C%D0%B7%D0%BE%D0%B2%D0%B0%D0%BD%D0%B8%D0%B5%D0%BC+SSH+%D0%BA%D0%BB%D1%8E%D1%87%D0%B5%D0%B9+%E2%80%94+%D0%92%D0%B8%D0%BA%D0%B8%D0%BD%D0%BE%D0%B2%D0%BE%D1%81%D1%82%D0%B8 (6079823, 1200951, X, X- R/ X/ L) vkontakte.ru/share.php?url=https:%2F%2Fru.wikinews.org%2Fwiki%2FUS-CERT_%25D0%25BF%25D1%2580%25D0%25B5%25D0%25B4%25D1%2583%25D0%25BF%25D1%2580%25D0%25B5%25D0%25B6%25D0%25B4%25D0%25B0%25D0%25B5%25D1%2582_%25D0%25BE%25D0%25B1_%25D0%25B0%25D1%2582%25D0%25B0%25D0%25BA%25D0%25B5_%25D0%25BD%25D0%25B0_Linux_%25D1%2581%25D0%25B8%25D1%2581%25D1%2582%25D0%25B5%25D0%25BC%25D1%258B_%25D1%2581_%25D0%25B8%25D1%2581%25D0%25BF%25D0%25BE%25D0%25BB%25D1%258C%25D0%25B7%25D0%25BE%25D0%25B2%25D0%25B0%25D0%25BD%25D0%25B8%25D0%25B5%25D0%25BC_SSH_%25D0%25BA%25D0%25BB%25D1%258E%25D1%2587%25D0%25B5%25D0%25B9&title=US-CERT+%D0%BF%D1%80%D0%B5%D0%B4%D1%83%D0%BF%D1%80%D0%B5%D0%B6%D0%B4%D0%B0%D0%B5%D1%82+%D0%BE%D0%B1+%D0%B0%D1%82%D0%B0%D0%BA%D0%B5+%D0%BD%D0%B0+Linux+%D1%81%D0%B8%D1%81%D1%82%D0%B5%D0%BC%D1%8B+%D1%81+%D0%B8%D1%81%D0%BF%D0%BE%D0%BB%D1%8C%D0%B7%D0%BE%D0%B2%D0%B0%D0%BD%D0%B8%D0%B5%D0%BC+SSH+%D0%BA%D0%BB%D1%8E%D1%87%D0%B5%D0%B9+%E2%80%94+%D0%92%D0%B8%D0%BA%D0%B8%D0%BD%D0%BE%D0%B2%D0%BE%D1%81%D1%82%D0%B8 (6079823, -1, X, X- R/ X/ L) www.opennet.ru/opennews/art.shtml?num=17592 (6079823, 29235, X, X- R/ X/ L) packetstormsecurity.org/UNIX/penetration/rootkits/phalanx-b6.tar.bz2 (6079823, 36, X, X- R/ X/ L) hep.uchicago.edu/admin/report_072808.html (6079823, -1, X, X- R/ X/ L) www.us-cert.gov/current...) (6079823, 1442, X, X- R/ X/ L) www.us-cert.gov/current/#ssh_key_based_attacks (6079823, 1442, X, X- R/ X/ L) hep.uchicago.edu/admin/report_072808.html (6079823, -1, X, X- R/ X/ L) www.us-cert.gov/current/#ssh_key_based_attacks (6079823, 1442, X, X- R/ X/ L)

    User is in a trusted group bot on some wikis
  26. 2020-10-22 11:00:31 (UTC): n:ru:User:NewsBots ( t - c; 6079823) to n:ru:Атака на ftpd из состава FreeBSD ( diff  !top) - Link: packetstormsecurity.org/0908-exploits/bsd-setusercontext.txt ( R/ Xmeta/ L- still there)
    Other links: connect.ok.ru/offer?url=https:%2F%2Fru.wikinews.org%2Fwiki%2F%25D0%2590%25D1%2582%25D0%25B0%25D0%25BA%25D0%25B0_%25D0%25BD%25D0%25B0_ftpd_%25D0%25B8%25D0%25B7_%25D1%2581%25D0%25BE%25D1%2581%25D1%2582%25D0%25B0%25D0%25B2%25D0%25B0_FreeBSD&title=%D0%90%D1%82%D0%B0%D0%BA%D0%B0+%D0%BD%D0%B0+ftpd+%D0%B8%D0%B7+%D1%81%D0%BE%D1%81%D1%82%D0%B0%D0%B2%D0%B0+FreeBSD+%E2%80%94+%D0%92%D0%B8%D0%BA%D0%B8%D0%BD%D0%BE%D0%B2%D0%BE%D1%81%D1%82%D0%B8 (6079823, 1200951, X, X- R/ X/ L) vkontakte.ru/share.php?url=https:%2F%2Fru.wikinews.org%2Fwiki%2F%25D0%2590%25D1%2582%25D0%25B0%25D0%25BA%25D0%25B0_%25D0%25BD%25D0%25B0_ftpd_%25D0%25B8%25D0%25B7_%25D1%2581%25D0%25BE%25D1%2581%25D1%2582%25D0%25B0%25D0%25B2%25D0%25B0_FreeBSD&title=%D0%90%D1%82%D0%B0%D0%BA%D0%B0+%D0%BD%D0%B0+ftpd+%D0%B8%D0%B7+%D1%81%D0%BE%D1%81%D1%82%D0%B0%D0%B2%D0%B0+FreeBSD+%E2%80%94+%D0%92%D0%B8%D0%BA%D0%B8%D0%BD%D0%BE%D0%B2%D0%BE%D1%81%D1%82%D0%B8 (6079823, -1, X, X- R/ X/ L) www.opennet.ru/opennews/art.shtml?num=23234 (6079823, 29235, X, X- R/ X/ L) secunia.com/advisories/...) (6079823, 2192, X, X- R/ X/ L) secunia.com/advisories/36353/ (6079823, 2192, X, X- R/ X/ L) packetstormsecurity.org/0908-exploits/bsd-setusercontext.txt (6079823, 36, X, X- R/ X/ L) secunia.com/advisories/36353/ (6079823, 2192, X, X- R/ X/ L)

    User is in a trusted group bot on some wikis
  27. 2020-10-22 18:09:11 (UTC): n:ru:User:NewsBots ( t - c; 6079823) to n:ru:Уязвимости в python-cjson, glpng, Ruby, Qt, Arora, FreeType, Foxit Reader и OpenOffice.org Impress ( diff  top) - Link: packetstormsecurity.org/1007-exploits/arora-dos.txt ( R/ Xmeta/ L- still there)
    Other links: connect.ok.ru/offer?url=https:%2F%2Fru.wikinews.org%2Fwiki%2F%25D0%25A3%25D1%258F%25D0%25B7%25D0%25B2%25D0%25B8%25D0%25BC%25D0%25BE%25D1%2581%25D1%2582%25D0%25B8_%25D0%25B2_python-cjson%2C_glpng%2C_Ruby%2C_Qt%2C_Arora%2C_FreeType%2C_Foxit_Reader_%25D0%25B8_OpenOffice.org_Impress&title=%D0%A3%D1%8F%D0%B7%D0%B2%D0%B8%D0%BC%D0%BE%D1%81%D1%82%D0%B8+%D0%B2+python-cjson%2C+glpng%2C+Ruby%2C+Qt%2C+Arora%2C+FreeType%2C+Foxit+Reader+%D0%B8+OpenOffice.org+Impress+%E2%80%94+%D0%92%D0%B8%D0%BA%D0%B8%D0%BD%D0%BE%D0%B2%D0%BE%D1%81%D1%82%D0%B8 (6079823, 1200951, X, X- R/ X/ L) vkontakte.ru/share.php?url=https:%2F%2Fru.wikinews.org%2Fwiki%2F%25D0%25A3%25D1%258F%25D0%25B7%25D0%25B2%25D0%25B8%25D0%25BC%25D0%25BE%25D1%2581%25D1%2582%25D0%25B8_%25D0%25B2_python-cjson%2C_glpng%2C_Ruby%2C_Qt%2C_Arora%2C_FreeType%2C_Foxit_Reader_%25D0%25B8_OpenOffice.org_Impress&title=%D0%A3%D1%8F%D0%B7%D0%B2%D0%B8%D0%BC%D0%BE%D1%81%D1%82%D0%B8+%D0%B2+python-cjson%2C+glpng%2C+Ruby%2C+Qt%2C+Arora%2C+FreeType%2C+Foxit+Reader+%D0%B8+OpenOffice.org+Impress+%E2%80%94+%D0%92%D0%B8%D0%BA%D0%B8%D0%BD%D0%BE%D0%B2%D0%BE%D1%81%D1%82%D0%B8 (6079823, -1, X, X- R/ X/ L) www.opennet.ru/opennews/art.shtml?num=27632 (6079823, 29235, X, X- R/ X/ L) secunia.com/advisories/40775/ (6079823, 2192, X, X- R/ X/ L) packetstormsecurity.org/1007-exploits/arora-dos.txt (6079823, 36, X, X- R/ X/ L) secunia.com/advisories/40588/ (6079823, 2192, X, X- R/ X/ L) www.foxitsoftware.com/announcements/2010861227.html (6079823, 255, X, X- R/ X/ L) www.kb.cert.org/vuls/id/275247 (6079823, 919, X, X- R/ X/ L) secunia.com/advisories/40816/ (6079823, 2192, X, X- R/ X/ L) freetype.sourceforge.net (6079823, -1, X, X- R/ X/ L) secunia.com/secunia_research/2010-87/ (6079823, 2192, X, X- R/ X/ L) www.fifi.org/doc/libglpng-dev/glpng.html (6079823, 17, X, X- R/ X/ L) www.ruby-lang.org/en/news/2010/08/16/xss-in-webrick-cve-2010-0541/ (6079823, 1052, X, X- R/ X/ L) secunia.com/advisories/40335/ (6079823, 2192, X, X- R/ X/ L) cheeseshop.python.org/pypi/python-cjson (6079823, 11, X, X- R/ X/ L)

    User is in a trusted group bot on some wikis
  28. 2020-11-10 11:00:12 (UTC): w:nl:User:Hoyanova ( t - c; 8540) to w:nl:Computervirus ( diff  !top) - Link: packetstormsecurity.org/files/96667/Exim-Exploit-In-The-Wild-Advisory.html ( R/ Xmeta/ L- still there)
    Other links: packetstormsecurity.org/files/96667/Exim-Exploit-In-The-Wild-Advisory.html (8540, 36, 2, 1- R/ X/ L) packetstormsecurity.org/files/96667/Exim-Exploit-In-The-Wild-Advisory.html (8540, 36, 2, 1- R/ X/ L) web.archive.org/web/20110626220820/http://puwang.barabasilab.com/Talks/Venice_PPT.pdf (8540, -1, X, X- R/ X/ L) web.archive.org/web/20110626220820/http://puwang.barabasilab.com/Talks/Venice_PPT.pdf (8540, -1, X, X- R/ X/ L) tweakers.net/nieuws/59787/mobiele-virussen-gaan-zich-verspreiden-via-mms.html (8540, 2133, X, X- R/ X/ L) tweakers.net/nieuws/59787/mobiele-virussen-gaan-zich-verspreiden-via-mms.html (8540, 2133, X, X- R/ X/ L)
  29. 2021-02-27 16:58:17 (UTC): w:tr:User:78.185.129.51 ( t - c; 90) to w:tr:ZenGo ( diff - DELETED) - Link: packetstormsecurity.org/files/author/2011/ ( R/ Xmeta/ L)
    Other links: web.archive.org/web/20120319040724/http://www.securityfocus.com/bid/3702 (90, -1, X, X- R/ X/ L) www.securityfocus.com/bid/4160 (90, 2010, X, X- R/ X/ L) web.archive.org/web/20160303225051/http://www.securityfocus.com/bid/4160 (90, -1, X, X- R/ X/ L) www.securityfocus.com/bid/2198 (90, 2010, X, X- R/ X/ L) web.archive.org/web/20160303224238/http://www.securityfocus.com/bid/2198 (90, -1, X, X- R/ X/ L) web.archive.org/web/20120319040653/http://www.securityfocus.com/bid/3714 (90, -1, X, X- R/ X/ L) www.securityfocus.com/bid/3714 (90, 2010, X, X- R/ X/ L) www.securityfocus.com/bid/3714 (90, 2010, X, X- R/ X/ L) www.securityfocus.com/bid/4159 (90, 2010, X, X- R/ X/ L) web.archive.org/web/20160303235645/http://www.securityfocus.com/bid/4159 (90, -1, X, X- R/ X/ L) www.securityfocus.com/bid/889 (90, 2010, X, X- R/ X/ L) web.archive.org/web/20160303222719/http://www.securityfocus.com/bid/889 (90, -1, X, X- R/ X/ L) www.securityfocus.com/bid/3791 (90, 2010, X, X- R/ X/ L) web.archive.org/web/20160303205059/http://www.securityfocus.com/bid/3791 (90, -1, X, X- R/ X/ L) www.securityfocus.com/bid/3838 (90, 2010, X, X- R/ X/ L) web.archive.org/web/20160303211446/http://www.securityfocus.com/bid/3838 (90, -1, X, X- R/ X/ L) www.securityfocus.com/bid/3885 (90, 2010, X, X- R/ X/ L) web.archive.org/web/20160303223045/http://www.securityfocus.com/bid/3885 (90, -1, X, X- R/ X/ L) securityvulns.com/source2540.html (90, , X, X- R/ X/ L) web.archive.org/web/20160303224039/http://securityvulns.com/source2540.html (90, -1, X, X- R/ X/ L) www.verisigninc.com/en_US/products-and-services/network-intelligence-availability/idefense/public-vulnerability-reports/articles/index.xhtml?id=55 (90, , X, X- R/ X/ L) web.archive.org/web/20130428063118/http://www.verisigninc.com/en_US/products-and-services/network-intelligence-availability/idefense/public-vulnerability-reports/articles/index.xhtml?id=55 (90, -1, X, X- R/ X/ L) www.verisigninc.com/en_US/products-and-services/network-intelligence-availability/idefense/public-vulnerability-reports/articles/index.xhtml?id=49 (90, , X, X- R/ X/ L) web.archive.org/web/20130429051111/http://www.verisigninc.com/en_US/products-and-services/network-intelligence-availability/idefense/public-vulnerability-reports/articles/index.xhtml?id=49 (90, -1, X, X- R/ X/ L) www.verisigninc.com/en_US/products-and-services/network-intelligence-availability/idefense/public-vulnerability-reports/articles/index.xhtml?id=41 (90, , X, X- R/ X/ L) web.archive.org/web/20130428063055/http://www.verisigninc.com/en_US/products-and-services/network-intelligence-availability/idefense/public-vulnerability-reports/articles/index.xhtml?id=41 (90, -1, X, X- R/ X/ L) www.verisigninc.com/en_US/products-and-services/network-intelligence-availability/idefense/public-vulnerability-reports/articles/index.xhtml?id=31 (90, , X, X- R/ X/ L) web.archive.org/web/20130428063034/http://www.verisigninc.com/en_US/products-and-services/network-intelligence-availability/idefense/public-vulnerability-reports/articles/index.xhtml?id=31 (90, -1, X, X- R/ X/ L) packetstormsecurity.org/files/author/2011/ (90, 36, X, X- R/ X/ L) web.archive.org/web/20120325162914/http://packetstormsecurity.org/files/author/2011/ (90, -1, X, X- R/ X/ L) www.wired.com/news/infostructure/0,1377,56481,00.html (90, , X, X- R/ X/ L) web.archive.org/web/20081011171607/http://www.wired.com/news/infostructure/0,1377,56481,00.html (90, -1, X, X- R/ X/ L) www.tamersahin.com/mssecrets (90, , X, X- R/ X/ L) web.archive.org/web/20140223183026/http://www.tamersahin.com/mssecrets/ (90, -1, X, X- R/ X/ L) hurarsiv.hurriyet.com.tr/goster/ShowNew.aspx?id=5999287 (90, , X, X- R/ X/ L) www.tamersahin.com/english/#/speeches (90, , X, X- R/ X/ L) web.archive.org/web/20120820014639/http://tamersahin.com/english/#/speeches (90, -1, X, X- R/ X/ L) www.tamersahin.com/foo/tamer_project.pdf (90, , X, X- R/ X/ L) web.archive.org/web/20120127120401/http://www.tamersahin.com/foo/tamer_project.pdf (90, -1, X, X- R/ X/ L) www.tamersahin.com/foo/tamer_project_pres.ppt (90, , X, X- R/ X/ L) web.archive.org/web/20120127120428/http://www.tamersahin.com/foo/tamer_project_pres.ppt (90, -1, X, X- R/ X/ L) www.securityfocus.com/bid/5782 (90, 2010, X, X- R/ X/ L) web.archive.org/web/20160303222958/http://www.securityfocus.com/bid/5782 (90, -1, X, X- R/ X/ L) www.securityfocus.com/bid/4062 (90, 2010, X, X- R/ X/ L) web.archive.org/web/20160303210924/http://www.securityfocus.com/bid/4062 (90, -1, X, X- R/ X/ L) www.securityfocus.com/bid/4206 (90, 2010, X, X- R/ X/ L) web.archive.org/web/20160303230028/http://www.securityfocus.com/bid/4206 (90, -1, X, X- R/ X/ L) www.securityfocus.com/bid/6145 (90, 2010, X, X- R/ X/ L) web.archive.org/web/20160303230121/http://www.securityfocus.com/bid/6145 (90, -1, X, X- R/ X/ L) www.securityfocus.com/bid/6041 (90, 2010, X, X- R/ X/ L) web.archive.org/web/20160303223218/http://www.securityfocus.com/bid/6041 (90, -1, X, X- R/ X/ L) www.securityfocus.com/bid/4021 (90, 2010, X, X- R/ X/ L) web.archive.org/web/20160303215432/http://www.securityfocus.com/bid/4021 (90, -1, X, X- R/ X/ L) www.securityfocus.com/bid/6447 (90, 2010, X, X- R/ X/ L) web.archive.org/web/20160303214008/http://www.securityfocus.com/bid/6447 (90, -1, X, X- R/ X/ L) www.securityfocus.com/bid/6098 (90, 2010, X, X- R/ X/ L) web.archive.org/web/20160303223748/http://www.securityfocus.com/bid/6098 (90, -1, X, X- R/ X/ L) www.securityfocus.com/bid/6877 (90, 2010, X, X- R/ X/ L) web.archive.org/web/20160303220343/http://www.securityfocus.com/bid/6877 (90, -1, X, X- R/ X/ L) www.securityfocus.com/bid/6042 (90, 2010, X, X- R/ X/ L) web.archive.org/web/20160303205841/http://www.securityfocus.com/bid/6042 (90, -1, X, X- R/ X/ L) www.securityfocus.com/bid/6044 (90, 2010, X, X- R/ X/ L) web.archive.org/web/20160303222953/http://www.securityfocus.com/bid/6044 (90, -1, X, X- R/ X/ L) www.securityfocus.com/bid/5968 (90, 2010, X, X- R/ X/ L) web.archive.org/web/20160303204908/http://www.securityfocus.com/bid/5968 (90, -1, X, X- R/ X/ L) www.securityfocus.com/bid/5803 (90, 2010, X, X- R/ X/ L) web.archive.org/web/20160303213426/http://www.securityfocus.com/bid/5803 (90, -1, X, X- R/ X/ L) www.securityfocus.com/bid/3501 (90, 2010, X, X- R/ X/ L) web.archive.org/web/20160303215816/http://www.securityfocus.com/bid/3501 (90, -1, X, X- R/ X/ L) www.securityfocus.com/bid/5967 (90, 2010, X, X- R/ X/ L) web.archive.org/web/20160303205650/http://www.securityfocus.com/bid/5967 (90, -1, X, X- R/ X/ L) www.securityfocus.com/bid/4833 (90, 2010, X, X- R/ X/ L) web.archive.org/web/20160304031923/http://www.securityfocus.com/bid/4833 (90, -1, X, X- R/ X/ L) www.securityfocus.com/bid/6345 (90, 2010, X, X- R/ X/ L) web.archive.org/web/20160303223450/http://www.securityfocus.com/bid/6345 (90, -1, X, X- R/ X/ L) www.securityfocus.com/bid/6034 (90, 2010, X, X- R/ X/ L) web.archive.org/web/20160303225017/http://www.securityfocus.com/bid/6034 (90, -1, X, X- R/ X/ L) www.securityfocus.com/bid/3788 (90, 2010, X, X- R/ X/ L) web.archive.org/web/20160304031916/http://www.securityfocus.com/bid/3788 (90, -1, X, X- R/ X/ L) www.securityfocus.com/bid/4128 (90, 2010, X, X- R/ X/ L) web.archive.org/web/20160303205621/http://www.securityfocus.com/bid/4128 (90, -1, X, X- R/ X/ L) www.securityfocus.com/bid/4153 (90, 2010, X, X- R/ X/ L) web.archive.org/web/20160303234905/http://www.securityfocus.com/bid/4153 (90, -1, X, X- R/ X/ L) www.securityfocus.com/bid/3874 (90, 2010, X, X- R/ X/ L) web.archive.org/web/20160303215303/http://www.securityfocus.com/bid/3874 (90, -1, X, X- R/ X/ L) www.securityfocus.com/bid/4785 (90, 2010, X, X- R/ X/ L) web.archive.org/web/20160303225947/http://www.securityfocus.com/bid/4785 (90, -1, X, X- R/ X/ L) www.securityfocus.com/bid/3866 (90, 2010, X, X- R/ X/ L) web.archive.org/web/20160303220754/http://www.securityfocus.com/bid/3866 (90, -1, X, X- R/ X/ L) www.securityfocus.com/bid/3702 (90, 2010, X, X- R/ X/ L)
  • Displayed all 29 additions.

Videos

Youtube | Vimeo | Bing

Websites

Google | Yahoo | Bing

Encyclopedia

Google | Yahoo | Bing

Facebook