Questions about this topic? Sign up to ask in the talk tab.
Difference between revisions of "Main Page"
From NetSec
(17 intermediate revisions by 4 users not shown) | |||
Line 1: | Line 1: | ||
− | + | <center><table style="border:.5em solid #aaaaaa; border-radius:.9em; -o-border-radius:radius|.9em; -icab-border-radius:.9em; -khtml-border-radius:.9em; -moz-border-radius:.9em; -webkit-border-radius:.9em; background-color:background|#dddddd; width:100%;"><tr><td> | |
+ | <center><big>'''Articles'''</big> | ||
+ | ---- | ||
+ | ''[[shellcode]] • [[countermeasures]] • [[administration]] • [[exploitation]] • [[programming]]'' | ||
− | |||
− | |||
− | |||
− | |||
− | |||
− | + | '''[[Compiled language]]s''' | |
− | + | [[assembly]] • [[linux assembly]] • [[C]] • [[CPP|C++]] | |
− | |||
− | |||
− | |||
− | |||
− | + | '''[[application|Software]] [[Exploitation]]''' | |
− | ---- | + | [[Buffer overflow|Stack overflows]] • [[Shellcode/Loaders|shellcode loaders]] • [[null-free shellcode]] • 32-bit [[ascii shellcode]] • 64-bit [[Shellcode/Alphanumeric|alphanumeric shellcode]] • [[unsafe string replacement]] • [[Shellcode/Self-modifying|Self-modifying shellcode]] • [[Shellcode/Dynamic|dynamic shellcode]] • [[Shellcode/Socket-reuse|socket reuse]] |
− | |||
− | |||
− | |||
− | |||
+ | '''[[Interpreted languages]]''' | ||
− | + | [[Perl]] • [[Python]] • [[PHP]] • [[Ruby]] • [[LUA]] • [[Bash book|The bash book]] • [[SQL Orientation]] • [[Polymorphic|Examples of polymorphism]] | |
− | + | ||
− | |||
− | '''Exploitation | + | '''[[Web Exploitation]]''' |
− | + | [[SQL injection]] • [[XSS]] • [[Cookies]] • [[File inclusion]] • [[Command Injection|Command injection]] • [[CSRF]] • [[XSRF]] • [[XSCF]] • [[Cold Fusion Hacking|Coldfusion hacking]] • [[SQL Backdoors]] | |
− | |||
− | [[ | + | <small>([[:Category:Indexing|The Index]]) ([[:Category:Requested_maintenance|Contribute]])</small></center></td></tr></table></center> |
− | + | ||
− | + | ||
Line 47: | Line 33: | ||
{|style="border:.5em solid #aaaaaa; border-radius:.9em; -o-border-radius:radius|.9em; -icab-border-radius:.9em; -khtml-border-radius:.9em; -moz-border-radius:.9em; -webkit-border-radius:.9em; background-color:background|#dddddd; width:100%;" | {|style="border:.5em solid #aaaaaa; border-radius:.9em; -o-border-radius:radius|.9em; -icab-border-radius:.9em; -khtml-border-radius:.9em; -moz-border-radius:.9em; -webkit-border-radius:.9em; background-color:background|#dddddd; width:100%;" | ||
!colspan="6" align="center"|<big>'''Tools</big> | !colspan="6" align="center"|<big>'''Tools</big> | ||
+ | ---- | ||
|- | |- | ||
|valign="top"|'''[[Vanguard]]''' | |valign="top"|'''[[Vanguard]]''' | ||
Line 61: | Line 48: | ||
|- | |- | ||
|valign="top"|'''[[GScrape]]''' | |valign="top"|'''[[GScrape]]''' | ||
− | |valign="top"|''Google scraper written [[perl]] for rapidly identifying vulnerable websites and generating statistics'' | + | |valign="top"|''Google scraper written in [[perl]] for rapidly identifying vulnerable websites and generating statistics'' |
| | | | ||
|valign="top"|'''[[Lfi_autopwn.pl]]''' | |valign="top"|'''[[Lfi_autopwn.pl]]''' |
Latest revision as of 03:10, 4 June 2015
shellcode • countermeasures • administration • exploitation • programming
assembly • linux assembly • C • C++ Stack overflows • shellcode loaders • null-free shellcode • 32-bit ascii shellcode • 64-bit alphanumeric shellcode • unsafe string replacement • Self-modifying shellcode • dynamic shellcode • socket reuse Perl • Python • PHP • Ruby • LUA • The bash book • SQL Orientation • Examples of polymorphism SQL injection • XSS • Cookies • File inclusion • Command injection • CSRF • XSRF • XSCF • Coldfusion hacking • SQL Backdoors
|
Tools
| |||||
---|---|---|---|---|---|
Vanguard | web application vulnerability testing engine written in perl with LibWhisker2 support | Jynx2 | Version 2.0 of the classic LD_Preload userland rootkit written in C | ||
Bleeding Life | PHP and MySQL based browser buffer overflow exploit pack | Kolkata | Configurable perl scanner that analyzes checksums to perform fingerprinting on web applications with static file analysis | ||
GScrape | Google scraper written in perl for rapidly identifying vulnerable websites and generating statistics | Lfi_autopwn.pl | Given a file inclusion vulnerability, this Perl script will spawn a shell | ||
Mysql5 enumerator | Automatically map contents or query a remote database given a URL vulnerable to SQL injection with this perl script | Social Network Redirection Utility | Rickroll your friends with content-forged image redirects |