Questions about this topic? Sign up to ask in the talk tab.
Difference between revisions of "Template:InHouse"
From NetSec
Line 1: | Line 1: | ||
{{code|text=<center><i><b>This is a tool made by one or more of our wiki staff.</b></i></center>}}{{notice|We have more tools coming soon! Look forward to '''Jynx2''' and '''chimera Live CD'''.}}{{info|Offensive security tools developed by our wiki staff:{{code|text= | {{code|text=<center><i><b>This is a tool made by one or more of our wiki staff.</b></i></center>}}{{notice|We have more tools coming soon! Look forward to '''Jynx2''' and '''chimera Live CD'''.}}{{info|Offensive security tools developed by our wiki staff:{{code|text= | ||
* [[Vanguard]] - <i>[[Web Exploitation|web application vulnerability]] testing engine written in [[Perl]]</i> | * [[Vanguard]] - <i>[[Web Exploitation|web application vulnerability]] testing engine written in [[Perl]]</i> | ||
− | * [[Jynx]] - <i>[[LD_Preload]] rootkit written in [[C]].</i> | + | * [[Jynx Rootkit]] - <i>[[LD_Preload]] rootkit written in [[C]].</i> |
* [[Bleeding Life]] - <i>[[PHP]] and [[MySQL]] powered web browser [[Buffer Overflows|buffer overflow]] exploit pack</i> | * [[Bleeding Life]] - <i>[[PHP]] and [[MySQL]] powered web browser [[Buffer Overflows|buffer overflow]] exploit pack</i> | ||
* [[GScrape]] - <i>[[Perl]] based google scraper for finding [[Web Exploitation|vulnerable websites]]</i> | * [[GScrape]] - <i>[[Perl]] based google scraper for finding [[Web Exploitation|vulnerable websites]]</i> |
Revision as of 04:11, 12 March 2012
|
Notice: We have more tools coming soon! Look forward to Jynx2 and chimera Live CD.
Offensive security tools developed by our wiki staff:
|
It is a crime to use these tools against remote machines without written authorization from the owners |