Questions about this topic? Sign up to ask in the talk tab.

Difference between revisions of "Tools"

From NetSec
Jump to: navigation, search
(Created page with " * Vanguard - <i>web application vulnerability testing engine written in Perl</i> * Jynx - <i>LD_Preload rootkit written in C.</i> * [[Bl...")
 
Line 1: Line 1:
 
 
* [[Vanguard]] - <i>[[Web Exploitation|web application vulnerability]] testing engine written in [[Perl]]</i>
 
* [[Vanguard]] - <i>[[Web Exploitation|web application vulnerability]] testing engine written in [[Perl]]</i>
 
* [[Jynx]] - <i>[[LD_Preload]] rootkit written in [[C]].</i>
 
* [[Jynx]] - <i>[[LD_Preload]] rootkit written in [[C]].</i>
Line 5: Line 4:
 
* [[GScrape]] - <i>[[Perl]] based google scraper for finding [[Web Exploitation|vulnerable websites]]</i>
 
* [[GScrape]] - <i>[[Perl]] based google scraper for finding [[Web Exploitation|vulnerable websites]]</i>
 
* [[Wordpress Fingerprinting]] - <i>demonstration of a way to use [[Cryptography|checksums]] of files to fingerprint a remote [[web applications|web application]]</i>
 
* [[Wordpress Fingerprinting]] - <i>demonstration of a way to use [[Cryptography|checksums]] of files to fingerprint a remote [[web applications|web application]]</i>
* [[Lfi_autopwn.pl]] - <i>automatically spawn a shell using a [[File Inclusion]] exploit, written in [[Perl]].</i>
+
* [[Lfi_autopwn.pl]] - <i>automatically spawn a shell using a [[File inclusion]] exploit, written in [[Perl]].</i>
 
* [[MySql 5 Enumeration]] - <i>automatically map the contents of a remote database given a URL vulnerable to [[SQL injection]], written in [[Perl]]</i>
 
* [[MySql 5 Enumeration]] - <i>automatically map the contents of a remote database given a URL vulnerable to [[SQL injection]], written in [[Perl]]</i>

Revision as of 03:33, 12 March 2012