Wednesday, 24. August 2011
Upload a php shell
uploading a shell



IPB Shell uploading

Permalink

 


Sqlmap- Automatic SQL Injection Tool
Automatic tools play an important role in the field of penetration testing, either the test will going to conduct for network or for web application.

Web application penetration testing is very important for the high profile companies and for those services like E-commerce to secure the data of the user.


Key Feature

It support MySQL, Oracle, PostgreSQL and Microsoft SQL Server.
Full support for three SQL injection techniques: inferential blind SQL injection, UNION query (inband) SQL injection and batched queries support.
It support anonymous proxy.
It support http header cookies.
Basic web server software and web application technology fingerprint.
And more....

It available for both windows and linux plate form.

Download
Linux Source: sqlmap-0.9.tar.gz
http://sourceforge.net/projects/sqlmap/files/sqlmap/0.9/sqlmap-0.9.tar.gz/download
Windows Portable: sqlmap-exe.zip
http://downloads.sourceforge.net/sqlmap/sqlmap-0.7_exe.zip

Permalink

 


Uniscan vulnerability scanner - Linux
The Uniscan vulnerability scanner is aimed at information security, which aims at finding vulnerabilities in Web systems. The Uniscan was developed using the Perl programming language to be easier to work with text, has an easy to use regular expressions and is also multi-threaded.

It is dedicated for web application security find vulnerabilities before other do. Can easliy find known vulnerabilities gets regularly updated and bugs and news features are added on regular intervals.

Tutorials to create plug-ins:
http://www.uniscan.com.br/tutorial1.php
http://www.uniscan.com.br/tutorial2.php
http://www.uniscan.com.br/tutorial3.php


Download
http://www.uniscan.com.br/download.html

Permalink

 


INSECT Pro 2.6.1
INSECT can help to build a strong security posture that is easy to use so both professional penetration testers and less experienced security pros will have all the tools they need to reduce costs, proactively find vulnerabilities, assess risk, and check the effectiveness of security defenses.

The latest version includes more than 100 native exploits, 300 metasploit modules and web vulnerability scanner.

Download
http://www.insecurityresearch.com/files/download

Permalink