Questions about this topic? Sign up to ask in the talk tab.
Difference between revisions of "Template:InHouse"
From NetSec
Line 1: | Line 1: | ||
− | + | {{notice|We have more tools coming soon! Look forward to '''Chimera Live CD'''.}}{{info|{{PAGENAME}} is one of the offensive security tools developed by our wiki staff:{{code|text= | |
* [[Vanguard]] - <i>[[Web Exploitation|web application vulnerability]] testing engine written in [[Perl]]</i> | * [[Vanguard]] - <i>[[Web Exploitation|web application vulnerability]] testing engine written in [[Perl]]</i> | ||
* [[Jynx2]] - <i>A second version of the classic [[LD_Preload]] [[Jynx Rootkit]] written in [[C]]</i> | * [[Jynx2]] - <i>A second version of the classic [[LD_Preload]] [[Jynx Rootkit]] written in [[C]]</i> | ||
* [[Bleeding Life]] - <i>[[PHP]] and [[MySQL]] powered web browser [[Buffer Overflows|buffer overflow]] exploit pack</i> | * [[Bleeding Life]] - <i>[[PHP]] and [[MySQL]] powered web browser [[Buffer Overflows|buffer overflow]] exploit pack</i> | ||
* [[GScrape]] - <i>[[Perl]] based google scraper for finding [[Web Exploitation|vulnerable websites]]</i> | * [[GScrape]] - <i>[[Perl]] based google scraper for finding [[Web Exploitation|vulnerable websites]]</i> | ||
− | * [[ | + | * [[Kolkata]] - <i>demonstration of a way to use [[Cryptography|checksums]] of files to fingerprint a remote [[web applications|web application]], written in [[Perl]]</i> |
* [[Lfi_autopwn.pl]] - <i>automatically spawn a shell using a [[File inclusion]] exploit, written in [[Perl]].</i> | * [[Lfi_autopwn.pl]] - <i>automatically spawn a shell using a [[File inclusion]] exploit, written in [[Perl]].</i> | ||
* [[MySql 5 Enumeration]] - <i>automatically map the contents of a remote database given a URL vulnerable to [[SQL injection]], written in [[Perl]]</i> | * [[MySql 5 Enumeration]] - <i>automatically map the contents of a remote database given a URL vulnerable to [[SQL injection]], written in [[Perl]]</i> | ||
* [http://chokepoint.net/?id=5 Social Network Forgery Utility] - <i>Rickroll your friends with this [[PHP]] [[XSCF|content forgery]] generation utility.</i>}} }}{{warning|It is a crime to use these tools against remote machines without written authorization from the owners}} | * [http://chokepoint.net/?id=5 Social Network Forgery Utility] - <i>Rickroll your friends with this [[PHP]] [[XSCF|content forgery]] generation utility.</i>}} }}{{warning|It is a crime to use these tools against remote machines without written authorization from the owners}} |
Revision as of 00:36, 28 April 2012
Notice: We have more tools coming soon! Look forward to Chimera Live CD.
InHouse is one of the offensive security tools developed by our wiki staff:
|
It is a crime to use these tools against remote machines without written authorization from the owners |