exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 351 - 375 of 1,391 RSS Feed

Files

Exploit Next Generation SQL Fingerprint 1.42.24-102144
Posted Dec 24, 2012
Authored by Nelson Brito | Site code.google.com

The Exploit Next Generation® SQL Fingerprint tool uses a combination of crafted packets for SQL Server Resolution Protocol (SSRP) and Tabular Data Stream Protocol (TDS) (protocols natively used by Microsoft SQL Server) to accurately perform version fingerprinting and determine the exact Microsoft SQL Server version.

Changes: This is the Perl version.
tags | tool, scanner, protocol
systems | linux, unix
SHA-256 | a9da9389d828f4a7b3af5d779e87fb3ae513be7cc7645331252f6b8c668f4c79
Topera IPv6 Port Scanner 0.0.2
Posted Dec 20, 2012
Authored by Daniel Garcia, Rafa Sanchez | Site code.google.com

Topera is a brand new TCP port scanner under IPv6, with the particularity that these scans are not detected by Snort.

Changes: Various bug fixes.
tags | tool, scanner, tcp
systems | unix
SHA-256 | 591c744698ada00f812cd2bae062173152d060dc4796b746a1157dcf07e16e57
WordPress Pingback Port Scanner
Posted Dec 14, 2012
Authored by FireFart

WordPress version 3.5 has the XML-RPC interface enabled by default. This tool uses the Pingback API to perform portscanning.

tags | tool, scanner
systems | unix
SHA-256 | 4e148f46aa9ea85dd8ac723066ebdb2a21047032dde632464b55d619c9359123
Control Panel Finder Script
Posted Dec 14, 2012
Authored by Amir Masoud

This is a simple script that looks for administrative web interfaces.

tags | tool, web, scanner
systems | unix
SHA-256 | 8b38d74ef497e3a86e7bc96c10d42b6295ff2d4263d94398896acce9df4f3109
Fwknop Port Knocking Utility 2.0.4
Posted Dec 11, 2012
Authored by Michael Rash | Site cipherdyne.org

fwknop implements an authorization scheme that requires only a single encrypted packet to communicate various pieces of information, including desired access through a Netfilter policy and/or specific commands to execute on the target system. The main application of this program is to protect services such as SSH with an additional layer of security in order to make the exploitation of vulnerabilities much more difficult. The authorization server works by passively monitoring authorization packets via libpcap.

Changes: On the server side, this release adds a chain_exists() check to SPA rule creation so that if any of the fwknop chains are deleted out from under fwknopd, they will be recreated on the fly. It adds new SPA packet fuzzing capability to the test suite to assist in validation of SPA operations. It adds upstart config for systems running the upstart daemon. An OpenBSD ndbm/gdbm usage bugfix. ICMP type/code client command line arguments have been added for when SPA packets are sent over ICMP.
tags | tool, scanner, vulnerability
systems | unix
SHA-256 | e6a88e969264ff23bd5837a47e5b60b8c4d36fc8a2326c6b377f8447ecf2adea
Telnet Encrypt Key ID Priv8 Scanner
Posted Dec 3, 2012
Authored by Kingcope, John Anderson

This is the telnet encrypt key id priv8 modified version of synscan.

tags | tool, scanner
systems | unix
SHA-256 | 941d0545a6636757939b84f3cf7f19204935caab6241cc3cf55bcb2b2b71ba5e
HostBox SSH 0.1.1
Posted Dec 1, 2012
Authored by Oskar Stridsman | Site stridsmanIT.wordpress.com

HostBox SSH is a python script will scan servers and routers for insecure SSH configurations.

tags | tool, scanner, python
systems | unix
SHA-256 | 66ff8b884cc577d7992b8ab5e5bbaa86a19582ea7720431f16288019bd7f2ea8
v3n0m Scanner 0.1
Posted Nov 28, 2012
Authored by baltazar

v3n0m Scanner is a mutation of smartd0rk3r and can search for 10,446 Google dorks. It then performs several checks for vulnerabilities in the sites.

tags | tool, scanner, vulnerability
systems | unix
SHA-256 | 76aa04ba373e47d64d01e9442b8c29083d7886303ce636a3a5e5ae5f3a1ca0e4
SSH Scan 0.9
Posted Nov 28, 2012
Authored by Weston Henry | Site github.com

sshscan is a horizontal SSH scanner that scans large swaths of IPv4 space for a single SSH user and pass. It uses iplist.txt as the input of IP addresses in the form of X.X.X.X, X.X.X.X/XX, X.X.X.X-X.X.X.X, or X.X.X.X-X with X-X in any octet.

tags | tool, scanner
systems | unix
SHA-256 | a4091d1867acb30417cfb6d1f117763ad5ee9ac54bf8dec47433e19b57fc8de8
Spiga 0.7.5
Posted Nov 28, 2012
Authored by Weston Henry | Site github.com

Spiga is a configurable web resource scanner. spiga.conf provides the functions, actions, and resources for spiga.py.

tags | tool, web, scanner
systems | unix
SHA-256 | d9ff5592ebdf970884de4bb8d74471d5d09b3d7b310612794b04c551c3091ebf
Seringa SQL Injection Framework
Posted Nov 26, 2012
Authored by Paraschiv Andrei | Site github.com

Seringa (Romanian for seringe) is an SQL injection framework featuring high customizability and a user-friendly interface. It is completely open source. Uses the .NET 4.0 framework and Windows Presentation Foundation (WPF) for the GUI. With regard to design it utilizes the Strategy Pattern to distinguish between various SQLi strategies whilst storing other relevant data such as exploits, payloads and patterns in xml files so that the framework can be easily customized from the outside (a manifestation of the Open-Closed Principle).

tags | tool, scanner, sql injection
systems | windows, unix
SHA-256 | 12c6c7ca253db5b9a765be47d038f7aafa4725d090e4409dd3208b0d3aa802e9
HostBox SSH 0.1
Posted Nov 19, 2012
Authored by Oskar Stridsman | Site stridsmanIT.wordpress.com

HostBox SSH is a python script will scan servers and routers for insecure SSH configurations.

tags | tool, scanner, python
systems | unix
SHA-256 | 357b430d5880a2895e02e42da73691c2a1ff1fed1383e9a6c9521150eb847208
IP Phone Scanning Made Easy 0.7
Posted Nov 16, 2012
Authored by Cedric Baillet | Site freecode.com

ISME is a small framework to test IP phones from several editors. It can gather information from IP phone infrastructures, test their web servers for default login/password combinations, and also implement attacks against the systems. ISME has been written in perl with a perl/Tk interface to provide a portable and easy to use tool. Full documentation is also provided.

Changes: Added Cisco phone logout mobility feature abuse. Added multiple exploits.
tags | tool, web, scanner, perl
systems | unix
SHA-256 | 005bb4e3debe6a2d061f32cac8be7405b70d70dd01daa3593789c1e34a3b464e
Directory Scanner Tool
Posted Oct 31, 2012
Authored by Ajith KP

This is a python script that scans webservers looking for administrative directories, php shells, and more.

tags | tool, shell, scanner, php, python
systems | unix
SHA-256 | ff7251ea44de62a616b371d565e92e2f876c702145c837892f6b213ac06e1b31
EAZY Web Scanner
Posted Oct 22, 2012
Authored by r0ckin

This is a small python tool that scans websites to look for PHP shells, backups, admin panels, and more.

tags | tool, shell, scanner, php, python
systems | unix
SHA-256 | eae76aaf398f8283420ca6cccb69d3b75a9e6c4026d44fa9fd0ff9eed3f493d3
Dark D0rk3r 1.0
Posted Oct 15, 2012
Authored by baltazar

Dark D0rk3r is a python script that performs dork searching and searches for local file inclusion and SQL injection errors.

Changes: Added column and table fuzzer.
tags | tool, local, scanner, sql injection, python, file inclusion
systems | unix
SHA-256 | abad4118aa1bd7caa5f21d47d70ee43209c1c04544e2dde8f419bedfff043fe2
Smartd0rk3r Scanner 0.3
Posted Oct 15, 2012
Authored by baltazar, levi

Smartd0rk3r is a python script that performs dork searching and searches for local file inclusion and SQL injection errors. It is based on darkd0rk3r.

Changes: Added column and table fuzzer.
tags | tool, local, scanner, sql injection, python, file inclusion
systems | unix
SHA-256 | 0d06a0a3c09aff5089d2b9aeac9f7115436c6645c436de3784e3837c44fca1bf
Dark D0rk3r 0.9
Posted Oct 11, 2012
Authored by baltazar

Dark D0rk3r is a python script that performs dork searching and searches for local file inclusion and SQL injection errors.

Changes: Various updates.
tags | tool, local, scanner, sql injection, python, file inclusion
systems | unix
SHA-256 | 72521d168ff071da1414d3758c4871bfc735691c5a5cd96ebd42aa755f6e6126
MySQL Login Scanner
Posted Oct 6, 2012
Authored by Kingcope, mu-b, John Anderson

This is a modified version of synscan that checks credentials against MySQL instances and logs the output to mysqljack.pot.

tags | tool, scanner, sql injection
systems | unix
SHA-256 | 24847c2c7a4902a7f34c01a46299bad29d65594d3c31354d49f56ff691b37f51
SinFP3 Fingerprinting Tool 1.00
Posted Sep 27, 2012
Authored by GomoR | Site networecon.com

SinFP3 is a complete framework for network discovery. Its main purpose is to perform active fingerprinting, but it can also do passive fingerprinting. Both modes are available over IPv4 and IPv6. This new version introduces a plugin-based architecture, allowing anyone to develop their own tools around the framework.

tags | tool, scanner
systems | unix
SHA-256 | cc39d157143cb1731e88b425752b9ed94bda6f8c149d27e9242a7ae0ad536412
UK CPNI IPv6 Toolkit 1.2.3
Posted Sep 17, 2012
Authored by Fernando Gont

This toolkit houses various IPv6 tools that have been tested to compile and run on Debian GNU/Linux 6.0, FreeBSD 9.0, NetBSD 5.1, OpenBSD 5.0, Mac OS 10.8.0, and Ubuntu 11.10.

Changes: Various updates and OSes supported.
tags | tool, scanner
systems | linux, netbsd, unix, freebsd, openbsd, debian, ubuntu
SHA-256 | 37fde545740ff58ff27a5cb9590cb1aef36206d163471d31c5f7531f501e90c5
Skipfish Web Application Scanner 2.09b
Posted Sep 13, 2012
Authored by Michal Zalewski | Site code.google.com

Skipfish is a fully automated, active web application security reconnaissance tool. It is high speed, has a low false positive rate, and is easy to use.

Changes: Fixed a crash that could be triggered during 404 fingerprint failures. Signature IDs for detected issues are now stored in the report JSON files. Added mod_status, mod_info, MySQL dump, phpMyAdmin SQL dump and robots.txt signatures. Improved the Flash and Silverlight crossdomain policy signatures to only warn about them when they use wildcards.
tags | tool, web, scanner
systems | linux, unix
SHA-256 | 12ea7c74ed8a3fa29668d95172f46c976997cd393c908a7704b97610bfcd350a
Fwknop Port Knocking Utility 2.0.3
Posted Sep 8, 2012
Authored by Michael Rash | Site cipherdyne.org

fwknop implements an authorization scheme that requires only a single encrypted packet to communicate various pieces of information, including desired access through a Netfilter policy and/or specific commands to execute on the target system. The main application of this program is to protect services such as SSH with an additional layer of security in order to make the exploitation of vulnerabilities much more difficult. The authorization server works by passively monitoring authorization packets via libpcap.

Changes: Several DoS/code execution vulnerabilities for malicious fwknop clients that manage to get past the authentication stage (so such clients must possess a valid encryption key) have been fixed. Permissions and ownership checks have been added to all files consumed by the fwknop client and server. RPM builds have been fixed by including the $(DESTDIR) prefix for uninstall-local and install-exec-hook stages in Makefile.am.
tags | tool, scanner, vulnerability
systems | unix
SHA-256 | f7f306a66c641020e7c7a820eaa3743e2700ddee6e26cca37440db95df56b986
IP Phone Scanning Made Easy 0.6
Posted Sep 1, 2012
Authored by Cedric Baillet | Site freecode.com

ISME is a small framework to test IP phones from several editors. It can gather information from IP phone infrastructures, test their web servers for default login/password combinations, and also implement attacks against the systems. ISME has been written in perl with a perl/Tk interface to provide a portable and easy to use tool. Full documentation is also provided.

tags | tool, web, scanner, perl
systems | linux, unix
SHA-256 | 052944b549e2c683c0e76cceb786430d87744dc8c6db6eb95c053a158d07f5a5
Dark D0rk3r 0.8
Posted Aug 27, 2012
Authored by baltazar

Dark D0rk3r is a python script that performs dork searching and searches for local file inclusion and SQL injection errors.

Changes: Various updates.
tags | tool, local, scanner, sql injection, python, file inclusion
systems | unix
SHA-256 | d5e18476351c15cadf4a4c449aee566b2e265d0424264cd5d1d72bcd319463cd
Page 15 of 56
Back1314151617Next

Top Authors In Last 30 Days

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close