Matrix of security web scanners
Umfangreiche Softwareliste
This form uses several MD5 databases to look up an MD5 hash and return its original counterpart.
A comparsion of risk estimation from different vendors to actual security bugs
Charlatans in security business
sehr hilfreiche Softwaresammlung wenn man auf fremden Terrain unterwegs ist
what should be checked during a penetration test assignment