Difference between revisions of "Main Page"
AlizaLorenzo (Talk | contribs) |
|||
Line 74: | Line 74: | ||
|- | |- | ||
|valign="top"|'''[[GScrape]]''' | |valign="top"|'''[[GScrape]]''' | ||
− | |valign="top"|''Google scraper written [[perl]] for rapidly identifying vulnerable websites and generating statistics'' | + | |valign="top"|''Google scraper written in [[perl]] for rapidly identifying vulnerable websites and generating statistics'' |
| | | | ||
|valign="top"|'''[[Lfi_autopwn.pl]]''' | |valign="top"|'''[[Lfi_autopwn.pl]]''' |
Revision as of 22:08, 5 November 2012
|
|
shellcode • countermeasures • administration • exploitation • programming assembly • linux assembly • C • C++ Stack overflows • null-free shellcode • 32-bit ascii shellcode • 64-bit alphanumeric shellcode • unsafe string replacement Perl • Python • PHP • Ruby • LUA • The bash book • SQL Orientation • Examples of polymorphism SQL injection • XSS • Cookies • File inclusion • Command injection • CSRF • XSRF • XSCF • Coldfusion hacking • SQL Backdoors
|
Tools
| |||||
---|---|---|---|---|---|
Vanguard | web application vulnerability testing engine written in perl with LibWhisker2 support | Jynx2 | Version 2.0 of the classic LD_Preload userland rootkit written in C | ||
Bleeding Life | PHP and MySQL based browser buffer overflow exploit pack | Kolkata | Configurable perl scanner that analyzes checksums to perform fingerprinting on web applications with static file analysis | ||
GScrape | Google scraper written in perl for rapidly identifying vulnerable websites and generating statistics | Lfi_autopwn.pl | Given a file inclusion vulnerability, this Perl script will spawn a shell | ||
Mysql5 enumerator | Automatically map contents or query a remote database given a URL vulnerable to SQL injection with this perl script | Social Network Redirection Utility | Rickroll your friends with content-forged image redirects |