Questions about this topic? Sign up to ask in the talk tab.
Difference between revisions of "Tools"
From NetSec
(→Dev team) |
(→Offensive security tools developed by our staff) |
||
Line 2: | Line 2: | ||
==Offensive security tools developed by our staff== | ==Offensive security tools developed by our staff== | ||
− | |||
* [[Vanguard]] - <i>[[Web Exploitation|web application vulnerability]] testing engine written in [[Perl]]</i> | * [[Vanguard]] - <i>[[Web Exploitation|web application vulnerability]] testing engine written in [[Perl]]</i> | ||
* [[Jynx]] - <i>[[LD_Preload]] rootkit written in [[C]].</i> | * [[Jynx]] - <i>[[LD_Preload]] rootkit written in [[C]].</i> |
Revision as of 08:10, 4 June 2012
|
Notice: We have more tools coming soon! Look forward to Jynx2 and chimera Live CD.
Offensive security tools developed by our staff
- Vanguard - web application vulnerability testing engine written in Perl
- Jynx - LD_Preload rootkit written in C.
- Bleeding Life - PHP and MySQL powered web browser buffer overflow exploit pack
- GScrape - Perl based google scraper for finding vulnerable websites
- Kolkata Configurable perl scanner that analyzes checksums to perform fingerprinting on web applications with static file analysis
- Lfi_autopwn.pl - automatically spawn a shell using a File inclusion exploit, written in Perl.
- MySql 5 Enumeration - automatically map the contents of a remote database given a URL vulnerable to SQL injection, written in Perl
- Social Network Forgery Utility - Rickroll your friends with this PHP content forgery generation utility.
It is a crime to use these tools against remote machines without written authorization from the owners |