Questions about this topic? Sign up to ask in the talk tab.
Difference between revisions of "Template:InHouse"
From NetSec
(Created page with "{| class="wikitable" |- ! The tools or software described in this article were developed in-house by Blackhat Academy staff members. |- |For more articles about tools and softwar...") |
|||
(10 intermediate revisions by 2 users not shown) | |||
Line 1: | Line 1: | ||
− | {| | + | <center>We have more tools coming soon! Look forward to '''Chimera Live CD'''.</center>{{info|<center>These are the offensive security tools developed by [[Staff|our wiki staff]].</center>{{code|text= |
− | + | * [[Vanguard]] - <i>[[Web Exploitation|web application vulnerability]] testing engine written in [[Perl]]</i> | |
− | + | * [[Jynx2]] - <i>A second version of the classic [[LD_Preload]] [[Jynx Rootkit]] written in [[C]]</i> | |
− | |- | + | * [[Bleeding Life]] - <i>[[PHP]] and [[MySQL]] powered web browser [[Buffer Overflows|buffer overflow]] exploit pack</i> |
− | + | * [[GScrape]] - <i>[[Perl]] based google scraper for finding [[Web Exploitation|vulnerable websites]]</i> | |
− | * [ | + | * [[Kolkata]] - <i>Configurable web application fingerprinting engine using file [[Cryptography|checksums]] written in [[Perl]]</i> |
− | * [ | + | * [[Lfi_autopwn.pl]] - <i>automatically spawn a shell using a [[File inclusion]] exploit, written in [[Perl]].</i> |
− | |} | + | * [[MySql 5 Enumeration]] - <i>automatically map the contents of a remote database given a URL vulnerable to [[SQL injection]], written in [[Perl]]</i> |
+ | * [http://chokepoint.net/?id=5 Social Network Forgery Utility] - <i>Rickroll your friends with this [[PHP]] [[XSCF|content forgery]] generation utility.</i>}} }}<noinclude> | ||
+ | |||
+ | [[category:Templates]]</noinclude> |
Latest revision as of 04:58, 9 May 2012
|