skip to main | skip to sidebar

Thougts to Share! Share Some Thoughts!

W3AF

"W3AF is a Web Application Attack and Audit Framework. The project goal is to create a framework to find and exploit web application vulnerabilities that is easy to use and extend. This project is currently hosted at SourceForge." read more...

Website: http://w3af.sourceforge.net

Related links


  • Pentest Tools For Android
  • Hacker Tools Free
  • Hacker Security Tools
  • Hacking App
  • Hacking Tools Github
  • Pentest Tools Open Source
  • Pentest Tools Android
  • Pentest Recon Tools
  • Pentest Tools Android
  • Pentest Tools Download
  • Pentest Box Tools Download
  • Black Hat Hacker Tools
  • What Are Hacking Tools
  • Hacking Tools Github
  • Pentest Tools For Windows
  • How To Hack
  • Pentest Box Tools Download
  • Pentest Tools List
  • Pentest Tools For Ubuntu
  • Pentest Tools Review
  • Hack Tools
  • Hack Tools Pc
  • Pentest Tools Apk

沒有留言:

張貼留言

較新的文章 較舊的文章 首頁
訂閱: 張貼留言 (Atom)

Acrostic Poems

An acrostic poem is very easy to write. It can be about any subject. This kind of poem can be written in different ways, but the simplest form is to put the letters that spell your subject down the side of your page. When you have done this then you go back to each letter and think of a word , phrase or sentence that starts with that letter and describes your subject. Here are some of the poems written by the students using their names.

Current Events

CE blogger is a place for readers to speak out about topics in the news. It is sponsored by Weekly Reader. There are a variety of topics for the students to choose, from news roundup to strange pictures. The senior 1 A/F students have been posting their comments since last December (2007). Here are some more of the well-written comments.

All About Harry Potter!

In our senior one textbook, there is a lesson introducing Ms. J. K. Rowling and her Harry Potter series. Most of the students have read the H.P.s and have vivid memory about the stories. At the same time, they are asked to comment on some of the issues mentioned in the books.

Heros

The first assignment for the students was to find a hero of his/her own. I hope these young people can visualize what a hero is like and realized their own potential to become great men and women too.

Thoughts to Share!

Students read and gave feedbacks to their friends' heroes. Many of the shared comments are surrounding the idea of courage and determination. One mentioned that it is the attitude makes a hero. Deep inside of you, there is a hero waiting to be awaken.

Sharings

  • ►  2025 (51)
    • ►  6月 (1)
    • ►  5月 (3)
    • ►  4月 (4)
    • ►  3月 (6)
    • ►  2月 (6)
    • ►  1月 (31)
  • ►  2024 (51)
    • ►  11月 (1)
    • ►  10月 (2)
    • ►  9月 (1)
    • ►  8月 (2)
    • ►  6月 (3)
    • ►  5月 (1)
    • ►  2月 (3)
    • ►  1月 (38)
  • ►  2023 (69)
    • ►  12月 (1)
    • ►  10月 (1)
    • ►  9月 (1)
    • ►  8月 (6)
    • ►  7月 (7)
    • ►  6月 (20)
    • ►  5月 (33)
  • ►  2022 (2)
    • ►  9月 (1)
    • ►  8月 (1)
  • ►  2021 (20)
    • ►  12月 (3)
    • ►  11月 (6)
    • ►  10月 (3)
    • ►  9月 (8)
  • ▼  2020 (438)
    • ►  9月 (5)
    • ►  8月 (98)
    • ►  7月 (103)
    • ►  6月 (24)
    • ►  5月 (90)
    • ▼  4月 (66)
      • Michele Palmisano is a new friend suggestion for you
      • Part I. Russian APT - APT28 Collection Of Samples...
      • Wireless Scenarios Part 1: EAP-Radius JTR Hashcat,...
      • How To Change Facebook’s Default Theme To Any Colo...
      • 📷 Vielga Wennida added a new photo
      • Diggy - Extract Enpoints From APK Files
      • Ethical Hackers Platform: How To Install A bWAPP I...
      • Massimo Vinci is a new friend suggestion for you
      • OSIF: An Open Source Facebook Information Gatherin...
      • How To Download Torrents Files Directly To Your An...
      • Blockchain Exploitation Labs - Part 2 Hacking Bloc...
      • One Reason Why InfoSec Sucked In The Past 20 Years...
      • Osueta: A Simple Python Script To Exploit The Open...
      • 📷 Francesco Palumbo added a new photo
      • Playing With TLS-Attacker
      • Scanning TLS Server Configurations With Burp Suite
      • $$$ Bug Bounty $$$
      • The Pillager 0.7 Release
      • Why SaaS Opens The Door To So Many Cyber Threats (...
      • JoomlaScan - Tool To Find The Components Installed...
      • Networking | Routing And Switching | Tutorial 4 | ...
      • Practical Bleichenbacher Attacks On IPsec IKE
      • W3AF
      • Practical Dictionary Attack On IPsec IKE
      • How To Pass Your Online Accounts After Death – 3 M...
      • Hacktronian: All In One Hacking Tools Installer Fo...
      • Top 20 Best Free Hacking Apps For Android |2019|
      • LEGALITY OF ETHICAL HACKING
      • OWASP Web 2.0 Project Update
      • How To Hack Facebook Messenger Conversation
      • S2 Dynamic Tracer And Decompiler For Gdb
      • 📄 Ayu Thira Putri shared DO NANAN AH's post
      • HOW TO BOOST UP BROWSING SPEED?
      • How To Secure Your Home Against "Internet Of Thing...
      • 📷 Bulex Eva Anax Timah added a new photo
      • Exploit-Me
      • Ask And You Shall Receive
      • Encuentros Virtuales Con "Hackers" En @0xWord Y Mi...
      • Removing Windows OS Passwords With CHNTPW On Kali ...
      • KillShot: A PenTesting Framework, Information Gath...
      • How To Start | How To Become An Ethical Hacker
      • Webkiller Tool | Information Gathering | Github
      • Dell Releases A New Cybersecurity Utility To Detec...
      • 🔗 Bulex Eva Anax Timah shared a link
      • Structure Part I: The Basics
      • Hacking Everything With RF And Software Defined Ra...
      • ShodanEye: Collect Infomation About All Devices Co...
      • HOW TO BECOME A CERTIFIED ETHICAL HACKER
      • How To Install Metasploit In Termux
      • WiFiJammer: Amazing Wi-Fi Tool
      • Learning Web Pentesting With DVWA Part 4: XSS (Cro...
      • How To Start | How To Become An Ethical Hacker
      • HOW TO BOOST UP BROWSING SPEED?
      • Recovering Data From An Old Encrypted Time Machine...
      • HOW TO HACK A PC REMOTELY WITH METASPLOIT?
      • 🔗 Bulex Eva Anax Timah shared a link
      • Practical Bleichenbacher Attacks On IPsec IKE
      • Printer Security
      • inBINcible Writeup - Golang Binary Reversing
      • 🔗 Antonio Caforio shared a link
      • Building My New Gaming Rig
      • PUBG MOBILE 0.13.0 APK+OBB Free Download
      • Luigi Giordano is a new friend suggestion for you
      • Romina Pergolesi Due is a new friend suggestion fo...
      • You're now friends with Laura Airo! See her photos...
      • Armando Sapio is a new friend suggestion for you
    • ►  3月 (32)
    • ►  2月 (20)
  • ►  2019 (1130)
    • ►  12月 (10)
    • ►  11月 (63)
    • ►  10月 (1)
    • ►  9月 (173)
    • ►  8月 (311)
    • ►  7月 (282)
    • ►  6月 (223)
    • ►  5月 (52)
    • ►  4月 (3)
    • ►  3月 (12)
  • ►  2018 (6)
    • ►  6月 (3)
    • ►  4月 (1)
    • ►  1月 (2)
  • ►  2017 (46)
    • ►  12月 (12)
    • ►  11月 (4)
    • ►  10月 (13)
    • ►  9月 (9)
    • ►  8月 (1)
    • ►  7月 (6)
    • ►  6月 (1)
  • ►  2016 (5)
    • ►  7月 (1)
    • ►  1月 (4)
  • ►  2015 (2)
    • ►  4月 (2)
  • ►  2014 (8)
    • ►  4月 (2)
    • ►  3月 (4)
    • ►  1月 (2)
  • ►  2013 (3)
    • ►  8月 (2)
    • ►  1月 (1)
  • ►  2012 (1)
    • ►  9月 (1)
  • ►  2009 (3)
    • ►  10月 (1)
    • ►  9月 (1)
    • ►  6月 (1)
  • ►  2008 (97)
    • ►  10月 (4)
    • ►  9月 (11)
    • ►  5月 (37)
    • ►  3月 (31)
    • ►  2月 (14)
  • ►  2007 (77)
    • ►  11月 (49)
    • ►  10月 (5)
    • ►  9月 (23)