Transparency Myanmar

transparency.myanmar@gmail.com

Negative SEO with Satisfaction Guaranteed
http://www.blackhat.to

  1. NFOHump: Offers up-to-date .NFO files and reviews on the latest pirate software releases.
  2. Phrack Magazine: Digital hacking magazine.
  3. SecTools.Org: List of 75 security tools based on a 2003 vote by hackers.
  4. Metasploit: Find security issues, verify vulnerability mitigations & manage security assessments with Metasploit. Get the worlds best penetration testing software now.
  5. Hakin9: E-magazine offering in-depth looks at both attack and defense techniques and concentrates on difficult technical issues.
  6. Hacked Gadgets: A resource for DIY project documentation as well as general gadget and technology news.
  7. The Hacker News: The Hacker News — most trusted and widely-acknowledged online cyber security news magazine with in-depth technical coverage for cybersecurity.
  8. DEFCON: Information about the largest annual hacker convention in the US, including past speeches, video, archives, and updates on the next upcoming show as well as links and other details.
  9. Black Hat: The Black Hat Briefings have become the biggest and the most important security conference series in the world by sticking to our core value: serving the information security community by delivering timely, actionable security information in a friendly, vendor-neutral environment.
  10. KitPloit: Leading source of Security Tools, Hacking Tools, CyberSecurity and Network Security.
  11. HackRead: HackRead is a News Platform that centers on InfoSec, Cyber Crime, Privacy, Surveillance, and Hacking News with full-scale reviews on Social Media Platforms.
  12. Packet Storm: Information Security Services, News, Files, Tools, Exploits, Advisories and Whitepapers.
  13. SecurityFocus: Provides security information to all members of the security community, from end users, security hobbyists and network administrators to security consultants, IT Managers, CIOs and CSOs.
  14. Exploit DB: An archive of exploits and vulnerable software by Offensive Security. The site collects exploits from submissions and mailing lists and concentrates them in a single database.