Questions about this topic? Sign up to ask in the talk tab.
Difference between revisions of "Main Page"
From NetSec
(→Tools) |
GertieUbpgdd (Talk | contribs) |
||
Line 1: | Line 1: | ||
− | {{info|<center>More tools and articles coming in '''June'''. Until then, you can get involved by joining [[IRC]] or subscribing to [http://www.reddit.com/r/blackhat /r/blackhat].</center> | + | {{info|<center>More tools and articles coming in '''June'''. Until then, you can get involved by joining [[IRC]] or subscribing to [http://www.reddit.com/r/blackhat /r/blackhat].</center>}} |
− | |||
+ | {{social}} | ||
+ | |||
+ | |||
+ | <center><table style="border:.5em solid #aaaaaa; border-radius:.9em; -o-border-radius:radius|.9em; -icab-border-radius:.9em; -khtml-border-radius:.9em; -moz-border-radius:.9em; -webkit-border-radius:.9em; background-color:background|#dddddd; width:100%;"><tr><td> | ||
+ | <center><big>'''Articles'''</big> | ||
+ | |||
+ | ---- | ||
− | |||
'''Exploitation:''' | '''Exploitation:''' | ||
Line 13: | Line 18: | ||
[[Ascii shellcode]] • [[C]] • [[CPP|C++]] • [[Perl]] • [[Python]] • [[LUA]] • [[Polymorphic]] • [[Bash book|The bash book]] | [[Ascii shellcode]] • [[C]] • [[CPP|C++]] • [[Perl]] • [[Python]] • [[LUA]] • [[Polymorphic]] • [[Bash book|The bash book]] | ||
− | + | <small>([[Special:AllPages|All Pages]])</small></center></td></tr></table></center> | |
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | |||
− | |||
− | ''Rickroll your friends with forged image redirects'' | + | {|style="border:.5em solid #aaaaaa; border-radius:.9em; -o-border-radius:radius|.9em; -icab-border-radius:.9em; -khtml-border-radius:.9em; -moz-border-radius:.9em; -webkit-border-radius:.9em; background-color:background|#dddddd; width:100%;" |
+ | !colspan="6" align="center"|<big>'''Tools</big> | ||
+ | |- | ||
+ | |valign="top"|'''[[Vanguard]]''' | ||
+ | |valign="top"|''[[Web Exploitation|web application vulnerability]] testing engine written in [[perl]] with LibWhisker2 support'' | ||
+ | | | ||
+ | |valign="top"|'''[[Jynx2]]''' | ||
+ | |valign="top"|''Version 2.0 of the classic [[LD_Preload]] userland rootkit written in [[C]]'' | ||
+ | |- | ||
+ | |valign="top"|'''[[Bleeding Life]]''' | ||
+ | |valign="top"|''[[PHP]] and [[MySQL]] based browser [[buffer overflow]] exploit pack'' | ||
+ | | | ||
+ | |valign="top"|'''[[Kolkata]]''' | ||
+ | |valign="top"|''Configurable [[perl]] scanner that analyzes [[cryptography|checksums]] to perform fingerprinting on web applications with static file analysis'' | ||
+ | |- | ||
+ | |valign="top"|'''[[GScrape]]''' | ||
+ | |valign="top"|''Google scraper written [[perl]] for rapidly identifying vulnerable websites and generating statistics'' | ||
+ | | | ||
+ | |valign="top"|'''[[Lfi_autopwn.pl]]''' | ||
+ | |valign="top"|''Given a [[File inclusion|file inclusion]] vulnerability, this [[Perl]] script will spawn a shell'' | ||
+ | |- | ||
+ | |valign="top"|'''[[MySql 5 Enumeration|Mysql5 enumerator]]''' | ||
+ | |valign="top"|''Automatically map contents or query a remote database given a URL vulnerable to [[SQL injection]] with this [[perl]] script'' | ||
+ | | | ||
+ | |valign="top"|'''[http://chokepoint.net/?id=5 Social Network Redirection Utility]''' | ||
+ | |valign="top"|''Rickroll your friends with forged image redirects'' | ||
− | + | |} | |
− | + |
Revision as of 07:08, 9 May 2012
Exploitation: Stack overflows • SQL injection • XSS • Cookies • File inclusion • Command injection • XSCF • Cold Fusion Hacking Programming: Ascii shellcode • C • C++ • Perl • Python • LUA • Polymorphic • The bash book (All Pages) |
Tools | |||||
---|---|---|---|---|---|
Vanguard | web application vulnerability testing engine written in perl with LibWhisker2 support | Jynx2 | Version 2.0 of the classic LD_Preload userland rootkit written in C | ||
Bleeding Life | PHP and MySQL based browser buffer overflow exploit pack | Kolkata | Configurable perl scanner that analyzes checksums to perform fingerprinting on web applications with static file analysis | ||
GScrape | Google scraper written perl for rapidly identifying vulnerable websites and generating statistics | Lfi_autopwn.pl | Given a file inclusion vulnerability, this Perl script will spawn a shell | ||
Mysql5 enumerator | Automatically map contents or query a remote database given a URL vulnerable to SQL injection with this perl script | Social Network Redirection Utility | Rickroll your friends with forged image redirects |