Questions about this topic? Sign up to ask in the talk tab.

Difference between revisions of "Tools"

From NetSec
Jump to: navigation, search
Line 7: Line 7:
 
* [[Lfi_autopwn.pl]] - <i>automatically spawn a shell using a [[File inclusion]] exploit, written in [[Perl]].</i>
 
* [[Lfi_autopwn.pl]] - <i>automatically spawn a shell using a [[File inclusion]] exploit, written in [[Perl]].</i>
 
* [[MySql 5 Enumeration]] - <i>automatically map the contents of a remote database given a URL vulnerable to [[SQL injection]], written in [[Perl]]</i>
 
* [[MySql 5 Enumeration]] - <i>automatically map the contents of a remote database given a URL vulnerable to [[SQL injection]], written in [[Perl]]</i>
* [http://chokepoint.net/?id=5 Social Network Forgery Utility] - <i>Rickroll your friends with this [[PHP]] [[XSCF|content forgery]] generation utility.</i>}} }}
+
* [http://chokepoint.net/?id=5 Social Network Forgery Utility] - <i>Rickroll your friends with this [[PHP]] [[XSCF|content forgery]] generation utility.</i>}} }}{{warning|It is a crime to use these tools against remote machines without written authorization from the owners}}
{{warning|It is a crime to use these tools against remote machines without written authorization from the owners}}
+

Revision as of 04:59, 12 March 2012

This is a tool made by one or more of our wiki staff.
Notice: We have more tools coming soon! Look forward to Jynx2 and chimera Live CD.
c3el4.png Offensive security tools developed by our wiki staff:
RPU0j.png It is a crime to use these tools against remote machines without written authorization from the owners