Questions about this topic? Sign up to ask in the talk tab.
Difference between revisions of "Main Page"
From NetSec
Line 47: | Line 47: | ||
| | | | ||
|valign="top"|'''[http://chokepoint.net/?id=5 Social Network Redirection Utility]''' | |valign="top"|'''[http://chokepoint.net/?id=5 Social Network Redirection Utility]''' | ||
− | |valign="top"|''Rickroll your friends with forged image redirects'' | + | |valign="top"|''Rickroll your friends with [[XSCF|content-forged]] image redirects'' |
|} | |} |
Revision as of 07:12, 9 May 2012
Exploitation: Stack overflows • SQL injection • XSS • Cookies • File inclusion • Command injection • XSCF • Coldfusion hacking • Web exploitation Programming: Ascii shellcode • C • C++ • Perl • Python • LUA • Polymorphic • The bash book • SQL Backdoors (All Pages) |
Tools | |||||
---|---|---|---|---|---|
Vanguard | web application vulnerability testing engine written in perl with LibWhisker2 support | Jynx2 | Version 2.0 of the classic LD_Preload userland rootkit written in C | ||
Bleeding Life | PHP and MySQL based browser buffer overflow exploit pack | Kolkata | Configurable perl scanner that analyzes checksums to perform fingerprinting on web applications with static file analysis | ||
GScrape | Google scraper written perl for rapidly identifying vulnerable websites and generating statistics | Lfi_autopwn.pl | Given a file inclusion vulnerability, this Perl script will spawn a shell | ||
Mysql5 enumerator | Automatically map contents or query a remote database given a URL vulnerable to SQL injection with this perl script | Social Network Redirection Utility | Rickroll your friends with content-forged image redirects |