Exploitation – IT sec catalog – References to vulnerability exploitation stuff

Myne-us: From 0x90 to 0x4c454554 – A journey into exploitation

Abysssec Security Research – Past, present, future of windows exploitationSmash the Stack 2010 – Buffer overflow

The Ethical Hacker Network – Smashing the modern stack for fun and profit

x9090’s Blog – Exploit writting tutorial from basic to intermediate

Opcode – X86 Opcode and instruction reference

Pass the hash – Attacks tools mitigation 33283 (application/pdf Object)
Crack pass – Hash 33219 (application/pdf Object)
Irongeek.com – Password exploitation class
Default Passwords Database – Suspicion breeds confidence
Sinbad Security Blog – MS SQL server password recovery
Medusa::SMBNT – Foofus Networking Services
Foofus.Net Security Stuff – LM/NTLM challenge/ response authentication –
MD5 Crackers – Password recovery, wordlist downloads
Nirsoft.net – Password storage locations for popular windows applications
Online Hash Crack MD5/LM/NTLM/SHA1/MySQL – Passwords recovery – Reverse hash lookup online – hash calculator
MD5 hash – Requested MD5 hash queue
Virus.Org – Default password database
Phenoelit-us.org – Default password list
Electric Alchemy – Cracking passwords in the cloud: Breaking PGP on EC2 with EDPR
DEFCON 2011 – Crack Me if you can
Packet Storm – Word lists
SkullSecurity – Password dictionaries
Index of passwords – Eric Heitzman’s password list
TiGa’s IDA video tutorial site – Video tutorial series on IDA pro
Binary auditing – Fundamentals of binary auditing
visi.kenshoto.com – Debugger and scripts
Radare – Reverse engineering framework
Offensive Computing – Community malicious code research and analysis