Questions about this topic? Sign up to ask in the talk tab.
Difference between revisions of "User:Mike/Sandbox"
From NetSec
GertieUbpgdd (Talk | contribs) (Regular table) |
GertieUbpgdd (Talk | contribs) |
||
Line 14: | Line 14: | ||
'''Programming:''' | '''Programming:''' | ||
− | [[Ascii shellcode]] • [[C]] • [[CPP|C++]] • [[Perl]] • [[Python]] • [[LUA]] • [[Polymorphic]] • [[Bash book|The bash book]]</table> | + | [[Ascii shellcode]] • [[C]] • [[CPP|C++]] • [[Perl]] • [[Python]] • [[LUA]] • [[Polymorphic]] • [[Bash book|The bash book]]</td></tr></table> |
+ | </center> | ||
− | + | {|style="border:.5em solid #aaaaaa; border-radius:.9em; -o-border-radius:radius|.9em; -icab-border-radius:.9em; -khtml-border-radius:.9em; -moz-border-radius:.9em; -webkit-border-radius:.9em; background-color:background|#dddddd; width:100%;" | |
− | '''[[Vanguard]]''' | + | !colspan="6" align="right"|<big>'''Tools</big> |
− | + | |- | |
− | ''[[Web Exploitation|web application vulnerability]] testing engine written in [[perl]] with LibWhisker2 support'' | + | |valign="top"|'''[[Vanguard]]''' |
− | + | |valign="top"|''[[Web Exploitation|web application vulnerability]] testing engine written in [[perl]] with LibWhisker2 support'' | |
− | '''[[Jynx2]]''' | + | | |
− | + | |valign="top"|'''[[Jynx2]]''' | |
− | ''Version 2.0 of the classic [[LD_Preload]] userland rootkit written in [[C]]'' | + | |valign="top"|''Version 2.0 of the classic [[LD_Preload]] userland rootkit written in [[C]]'' |
− | + | | | |
− | '''[[Bleeding Life]]''' | + | |valign="top"|'''[[Bleeding Life]]''' |
− | + | |valign="top"|''[[PHP]] and [[MySQL]] based browser [[buffer overflow]] exploit pack'' | |
− | ''[[PHP]] and [[MySQL]] based browser [[buffer overflow]] exploit pack'' | + | |- |
− | + | |valign="top"|'''[[Kolkata]]''' | |
− | '''[[Kolkata]]''' | + | |valign="top"|''Configurable [[perl]] scanner that analyzes [[cryptography|checksums]] to perform fingerprinting on web applications with static file analysis'' |
− | + | | | |
− | ''Configurable [[perl]] scanner that analyzes [[cryptography|checksums]] to perform fingerprinting on web applications with static file analysis'' | + | |valign="top"|'''[[GScrape]]''' |
− | + | |valign="top"|''Google scraper written [[perl]] for rapidly identifying vulnerable websites and generating statistics'' | |
− | '''[[GScrape]]''' | + | | |
− | + | |valign="top"|'''[[Lfi_autopwn.pl]]''' | |
− | ''Google scraper written [[perl]] for rapidly identifying vulnerable websites and generating statistics'' | + | |valign="top"|''Given a [[File inclusion|file inclusion]] vulnerability, this [[Perl]] script will spawn a shell'' |
− | + | |- | |
− | '''[[Lfi_autopwn.pl]]''' | + | |valign="top"|'''[[MySql 5 Enumeration|Mysql5 enumerator]]''' |
− | + | |valign="top"|''Automatically map contents or query a remote database given a URL vulnerable to [[SQL injection]] with this [[perl]] script'' | |
− | ''Given a [[File inclusion|file inclusion]] vulnerability, this [[Perl]] script will spawn a shell'' | + | | |
− | + | |valign="top"|'''[http://chokepoint.net/?id=5 Social Network Redirection Utility]''' | |
− | '''[[MySql 5 Enumeration|Mysql5 enumerator]]''' | + | |valign="top"|''Rickroll your friends with forged image redirects'' |
− | + | | | |
− | ''Automatically map contents or query a remote database given a URL vulnerable to [[SQL injection]] with this [[perl]] script'' | + | |valign="top"|([[Special:AllPages|All Pages]]) |
− | + | |} | |
− | '''[http://chokepoint.net/?id=5 Social Network Redirection Utility]''' | + | |
− | + | ||
− | ''Rickroll your friends with forged image redirects'' | + | |
− | + | ||
− | ([ | + | |
− | + |
Revision as of 06:53, 9 May 2012
Articles Exploitation: Stack overflows • SQL injection • XSS • Cookies • File inclusion • Command injection • XSCF • Cold Fusion Hacking Programming: Ascii shellcode • C • C++ • Perl • Python • LUA • Polymorphic • The bash book |
Tools | |||||||
---|---|---|---|---|---|---|---|
Vanguard | web application vulnerability testing engine written in perl with LibWhisker2 support | Jynx2 | Version 2.0 of the classic LD_Preload userland rootkit written in C | Bleeding Life | PHP and MySQL based browser buffer overflow exploit pack | ||
Kolkata | Configurable perl scanner that analyzes checksums to perform fingerprinting on web applications with static file analysis | GScrape | Google scraper written perl for rapidly identifying vulnerable websites and generating statistics | Lfi_autopwn.pl | Given a file inclusion vulnerability, this Perl script will spawn a shell | ||
Mysql5 enumerator | Automatically map contents or query a remote database given a URL vulnerable to SQL injection with this perl script | Social Network Redirection Utility | Rickroll your friends with forged image redirects | (All Pages) |