Difference between revisions of "Main Page"
AlizaLorenzo (Talk | contribs) |
|||
Line 1: | Line 1: | ||
− | |||
{{info|<center>'''Get involved''' by signing up for and contributing to this wiki, joining [[IRC]] or subscribing to [http://reddit.blackhatacademy.org /r/blackhat]! <br />Brought to you by [http://blackhatacademy.org Blackhat Academy]</center>}} | {{info|<center>'''Get involved''' by signing up for and contributing to this wiki, joining [[IRC]] or subscribing to [http://reddit.blackhatacademy.org /r/blackhat]! <br />Brought to you by [http://blackhatacademy.org Blackhat Academy]</center>}} | ||
Revision as of 04:09, 28 June 2012
Brought to you by Blackhat Academy |
|
|
Exploitation: Stack overflows • SQL injection • XSS • Cookies • File inclusion • Command injection • XSCF • Coldfusion hacking • Web exploitation Programming: Ascii shellcode • C • C++ • Perl • Python • LUA • Polymorphic • The bash book • SQL Backdoors
|
Tools | |||||
---|---|---|---|---|---|
Vanguard | web application vulnerability testing engine written in perl with LibWhisker2 support | Jynx2 | Version 2.0 of the classic LD_Preload userland rootkit written in C | ||
Bleeding Life | PHP and MySQL based browser buffer overflow exploit pack | Kolkata | Configurable perl scanner that analyzes checksums to perform fingerprinting on web applications with static file analysis | ||
GScrape | Google scraper written perl for rapidly identifying vulnerable websites and generating statistics | Lfi_autopwn.pl | Given a file inclusion vulnerability, this Perl script will spawn a shell | ||
Mysql5 enumerator | Automatically map contents or query a remote database given a URL vulnerable to SQL injection with this perl script | Social Network Redirection Utility | Rickroll your friends with content-forged image redirects |