we will try to present through practical tools and methods to identify possible attacks, in addition to using the data to feed a base that will always be consulted in their need when accessing a certain site allowing the hosting of malicious sites in companies of hosting.
This repository was archived by the owner on Apr 17, 2018. It is now read-only.