Questions about this topic? Sign up to ask in the talk tab.
Difference between revisions of "Tools"
From NetSec
(10 intermediate revisions by 2 users not shown) | |||
Line 1: | Line 1: | ||
− | + | <center>We have more tools coming soon! Look forward to '''Jynx2''' and '''chimera Live CD'''.</center> | |
+ | |||
+ | ==Offensive security tools developed by our staff== | ||
* [[Vanguard]] - <i>[[Web Exploitation|web application vulnerability]] testing engine written in [[Perl]]</i> | * [[Vanguard]] - <i>[[Web Exploitation|web application vulnerability]] testing engine written in [[Perl]]</i> | ||
* [[Jynx]] - <i>[[LD_Preload]] rootkit written in [[C]].</i> | * [[Jynx]] - <i>[[LD_Preload]] rootkit written in [[C]].</i> | ||
* [[Bleeding Life]] - <i>[[PHP]] and [[MySQL]] powered web browser [[Buffer Overflows|buffer overflow]] exploit pack</i> | * [[Bleeding Life]] - <i>[[PHP]] and [[MySQL]] powered web browser [[Buffer Overflows|buffer overflow]] exploit pack</i> | ||
* [[GScrape]] - <i>[[Perl]] based google scraper for finding [[Web Exploitation|vulnerable websites]]</i> | * [[GScrape]] - <i>[[Perl]] based google scraper for finding [[Web Exploitation|vulnerable websites]]</i> | ||
− | * [[ | + | * [[Kolkata]] <i>Configurable perl scanner that analyzes checksums to perform fingerprinting on web applications with static file analysis</i> |
* [[Lfi_autopwn.pl]] - <i>automatically spawn a shell using a [[File inclusion]] exploit, written in [[Perl]].</i> | * [[Lfi_autopwn.pl]] - <i>automatically spawn a shell using a [[File inclusion]] exploit, written in [[Perl]].</i> | ||
* [[MySql 5 Enumeration]] - <i>automatically map the contents of a remote database given a URL vulnerable to [[SQL injection]], written in [[Perl]]</i> | * [[MySql 5 Enumeration]] - <i>automatically map the contents of a remote database given a URL vulnerable to [[SQL injection]], written in [[Perl]]</i> | ||
* [http://chokepoint.net/?id=5 Social Network Forgery Utility] - <i>Rickroll your friends with this [[PHP]] [[XSCF|content forgery]] generation utility.</i> | * [http://chokepoint.net/?id=5 Social Network Forgery Utility] - <i>Rickroll your friends with this [[PHP]] [[XSCF|content forgery]] generation utility.</i> | ||
+ | |||
+ | {{warning|<center>It is a crime to use these tools against remote machines without written authorization from the owners.</center>}} | ||
+ | |||
+ | ==Development team== | ||
+ | *[[User:ErrorProne|ErrorProne]] | ||
+ | *[[User:fxm|fxm]] | ||
+ | *[[User:Hatter|hatter]] | ||
+ | *[[User:Teknical|teknical]] | ||
+ | *[[User:Trep|trep]] | ||
+ | *[[User:Xochipilli|xo]] | ||
+ | |||
+ | [[Category:Software]] |
Latest revision as of 11:37, 7 June 2012
Offensive security tools developed by our staff
- Vanguard - web application vulnerability testing engine written in Perl
- Jynx - LD_Preload rootkit written in C.
- Bleeding Life - PHP and MySQL powered web browser buffer overflow exploit pack
- GScrape - Perl based google scraper for finding vulnerable websites
- Kolkata Configurable perl scanner that analyzes checksums to perform fingerprinting on web applications with static file analysis
- Lfi_autopwn.pl - automatically spawn a shell using a File inclusion exploit, written in Perl.
- MySql 5 Enumeration - automatically map the contents of a remote database given a URL vulnerable to SQL injection, written in Perl
- Social Network Forgery Utility - Rickroll your friends with this PHP content forgery generation utility.