This is really too bad. I always went to milw0rm first -- even before SANS, etc. simply because I preferred to see the exploits in code. It is one thing to hear how an exploit works, but by actually seeing the zero-days I think it makes you a better pen tester and allows you to absorb some of the style and analytic thought that went into discovering the vulnerability.
I assume someone will take up the slack though. milw0rm was great, but there really wasn't anything that special. If nothing else, we still have metasploit.
Link is to the Google cache with the following message:
"Well, this is my goodbye header for milw0rm. I wish I had the time I did in the past to post exploits, I just don't :(. For the past 3 months I have actually done a pretty crappy job of getting peoples work out fast enough to be proud of, 0 to 72 hours (taking off weekends) isn't fair to the authors on this site. I appreciate and thank everyone for their support in the past.
Be safe, /str0ke"
Is this a white hat site? Are the exploits posted without notice to the newly exploitable? I am obviously not a security guy, anyone here know more about?
It's kinda a script kiddie site that definitely is not blackhat
edit: to clarify it may be used by security professionals but there is no doubt in my mind that it was indeed a script kiddie site especially considering the coverage it got in that community and the hate that incurred from the blackhat community
now zero-days can be really called zero-days, and would have much more value unless another milw0rm like website comes up to dilute the power of zero-days.
I assume someone will take up the slack though. milw0rm was great, but there really wasn't anything that special. If nothing else, we still have metasploit.