Questions about this topic? Sign up to ask in the talk tab.

Difference between revisions of "Tools"

From NetSec
Jump to: navigation, search
Line 1: Line 1:
{{code|text=<center><i><b>This is a tool made by one or more of our wiki staff.</b></i></center>}}{{notice|We have more tools coming soon!  Look forward to '''Jynx2''' and '''chimera Live CD'''.}}{{info|Offensive security tools developed by our wiki staff:{{code|text=
+
{{code|text=<center><i><b>This is a tool made by one or more of our wiki staff.</b></i></center>}}{{notice|We have more tools coming soon!  Look forward to '''Jynx2''' and '''chimera Live CD'''.}}
 +
 
 +
==Offensive security tools developed by our staff==
 +
 
 
* [[Vanguard]] - <i>[[Web Exploitation|web application vulnerability]] testing engine written in [[Perl]]</i>
 
* [[Vanguard]] - <i>[[Web Exploitation|web application vulnerability]] testing engine written in [[Perl]]</i>
 
* [[Jynx]] - <i>[[LD_Preload]] rootkit written in [[C]].</i>
 
* [[Jynx]] - <i>[[LD_Preload]] rootkit written in [[C]].</i>
 
* [[Bleeding Life]] - <i>[[PHP]] and [[MySQL]] powered web browser [[Buffer Overflows|buffer overflow]] exploit pack</i>
 
* [[Bleeding Life]] - <i>[[PHP]] and [[MySQL]] powered web browser [[Buffer Overflows|buffer overflow]] exploit pack</i>
 
* [[GScrape]] - <i>[[Perl]] based google scraper for finding [[Web Exploitation|vulnerable websites]]</i>
 
* [[GScrape]] - <i>[[Perl]] based google scraper for finding [[Web Exploitation|vulnerable websites]]</i>
* [[Wordpress Fingerprinting]] - <i>demonstration of a way to use [[Cryptography|checksums]] of files to fingerprint a remote [[web applications|web application]], written in [[Perl]]</i>
+
* [[Kolkata]] <i>Configurable perl scanner that analyzes checksums to perform fingerprinting on web applications with static file analysis</i>
 
* [[Lfi_autopwn.pl]] - <i>automatically spawn a shell using a [[File inclusion]] exploit, written in [[Perl]].</i>
 
* [[Lfi_autopwn.pl]] - <i>automatically spawn a shell using a [[File inclusion]] exploit, written in [[Perl]].</i>
 
* [[MySql 5 Enumeration]] - <i>automatically map the contents of a remote database given a URL vulnerable to [[SQL injection]], written in [[Perl]]</i>
 
* [[MySql 5 Enumeration]] - <i>automatically map the contents of a remote database given a URL vulnerable to [[SQL injection]], written in [[Perl]]</i>
* [http://chokepoint.net/?id=5 Social Network Forgery Utility] - <i>Rickroll your friends with this [[PHP]] [[XSCF|content forgery]] generation utility.</i>}} }}{{warning|It is a crime to use these tools against remote machines without written authorization from the owners}}
+
* [http://chokepoint.net/?id=5 Social Network Forgery Utility] - <i>Rickroll your friends with this [[PHP]] [[XSCF|content forgery]] generation utility.</i>
 +
 
 +
{{warning|It is a crime to use these tools against remote machines without written authorization from the owners}}
 +
 
 +
==Dev team==
 +
*[[User:Abduct|abduct]]
 +
*[[User:ErrorProne|ErrorProne]]
 +
*[[User:fxm|fxm]]
 +
*[[User:Hatter|hatter]]
 +
*[[User:raine|raine]]
 +
*[[User:Teknical|teknical]]
 +
*[[User:Trep|trep]]
 +
*[[User:Xochipilli|xo]]
 +
 
 +
[[Category:Software]]

Revision as of 18:35, 24 May 2012

This is a tool made by one or more of our wiki staff.
Notice: We have more tools coming soon! Look forward to Jynx2 and chimera Live CD.

Offensive security tools developed by our staff

RPU0j.png It is a crime to use these tools against remote machines without written authorization from the owners

Dev team