Difference between revisions of "Main Page"
Line 45: | Line 45: | ||
'''[[Interpreted languages]]''' | '''[[Interpreted languages]]''' | ||
− | [[Perl]] • [[Python]] • [[PHP]] • [[Ruby]] • [[LUA]] • [[Bash book|The bash book]] • [[SQL Orientation]] • [[Polymorphic|Examples of | + | [[Perl]] • [[Python]] • [[PHP]] • [[Ruby]] • [[LUA]] • [[Bash book|The bash book]] • [[SQL Orientation]] • [[Polymorphic|Examples of polymorphism]] |
Revision as of 05:11, 3 August 2012
|
|
shellcode • countermeasures • administration • exploitation • programming assembly • linux assembly • C • C++ Stack overflows • null-free shellcode • 32-bit ascii shellcode • 64-bit alphanumeric shellcode • unsafe string replacement Perl • Python • PHP • Ruby • LUA • The bash book • SQL Orientation • Examples of polymorphism SQL injection • XSS • Cookies • File inclusion • Command injection • CSRF • XSRF • XSCF • Coldfusion hacking • SQL Backdoors
|
Tools
| |||||
---|---|---|---|---|---|
Vanguard | web application vulnerability testing engine written in perl with LibWhisker2 support | Jynx2 | Version 2.0 of the classic LD_Preload userland rootkit written in C | ||
Bleeding Life | PHP and MySQL based browser buffer overflow exploit pack | Kolkata | Configurable perl scanner that analyzes checksums to perform fingerprinting on web applications with static file analysis | ||
GScrape | Google scraper written perl for rapidly identifying vulnerable websites and generating statistics | Lfi_autopwn.pl | Given a file inclusion vulnerability, this Perl script will spawn a shell | ||
Mysql5 enumerator | Automatically map contents or query a remote database given a URL vulnerable to SQL injection with this perl script | Social Network Redirection Utility | Rickroll your friends with content-forged image redirects |