Questions about this topic? Sign up to ask in the talk tab.
Difference between revisions of "Tools"
From NetSec
(Created page with " * Vanguard - <i>web application vulnerability testing engine written in Perl</i> * Jynx - <i>LD_Preload rootkit written in C.</i> * [[Bl...") |
|||
Line 1: | Line 1: | ||
− | |||
* [[Vanguard]] - <i>[[Web Exploitation|web application vulnerability]] testing engine written in [[Perl]]</i> | * [[Vanguard]] - <i>[[Web Exploitation|web application vulnerability]] testing engine written in [[Perl]]</i> | ||
* [[Jynx]] - <i>[[LD_Preload]] rootkit written in [[C]].</i> | * [[Jynx]] - <i>[[LD_Preload]] rootkit written in [[C]].</i> | ||
Line 5: | Line 4: | ||
* [[GScrape]] - <i>[[Perl]] based google scraper for finding [[Web Exploitation|vulnerable websites]]</i> | * [[GScrape]] - <i>[[Perl]] based google scraper for finding [[Web Exploitation|vulnerable websites]]</i> | ||
* [[Wordpress Fingerprinting]] - <i>demonstration of a way to use [[Cryptography|checksums]] of files to fingerprint a remote [[web applications|web application]]</i> | * [[Wordpress Fingerprinting]] - <i>demonstration of a way to use [[Cryptography|checksums]] of files to fingerprint a remote [[web applications|web application]]</i> | ||
− | * [[Lfi_autopwn.pl]] - <i>automatically spawn a shell using a [[File | + | * [[Lfi_autopwn.pl]] - <i>automatically spawn a shell using a [[File inclusion]] exploit, written in [[Perl]].</i> |
* [[MySql 5 Enumeration]] - <i>automatically map the contents of a remote database given a URL vulnerable to [[SQL injection]], written in [[Perl]]</i> | * [[MySql 5 Enumeration]] - <i>automatically map the contents of a remote database given a URL vulnerable to [[SQL injection]], written in [[Perl]]</i> |
Revision as of 02:33, 12 March 2012
- Vanguard - web application vulnerability testing engine written in Perl
- Jynx - LD_Preload rootkit written in C.
- Bleeding Life - PHP and MySQL powered web browser buffer overflow exploit pack
- GScrape - Perl based google scraper for finding vulnerable websites
- Wordpress Fingerprinting - demonstration of a way to use checksums of files to fingerprint a remote web application
- Lfi_autopwn.pl - automatically spawn a shell using a File inclusion exploit, written in Perl.
- MySql 5 Enumeration - automatically map the contents of a remote database given a URL vulnerable to SQL injection, written in Perl