Friday, 11. May 2012
security.anti-abuse.com - xss
Date submitted: 14/12/2011
Date published: 10/05/2012

URL:
http://pastebin.com/mHjUghPv

by
Atmon3r

Permalink

 


Friday, 4. May 2012
MOBILedit - Forensic
MOBILedit! Forensic is the world's most trusted phone investigation tool. Highly rated by the National Institute of Standards and Technology, MOBILedit! Forensic is the primary mobile device investigation tool used in over 70 countries. Simply connect a phone and MOBILedit! Forensic extracts all content and generates a forensic report ready for courtroom presentation. These tamper-proof, flawless reports are used in hundreds of courtrooms every day.

Download
http://www.mobiledit.com/downloads.htm?show=8

Permalink

 


Revelo – Javascript Deobfuscator
While this tool does have some protections built into it, it may execute malicious code that could harm your computer so use it in a virtual machine. It’s been tested to run on Windows XP. There’s a helper document inside the zip file which includes safe samples to play with.

Features:
* Analyze a script quickly by loading a file or pasting in Javascript code
* Includes several methods to deobfuscate Javascript
* Includes a built-in browser proxy which displays the URL of outgoing requests
* Displays the Document Object Model (DOM) elements
* Includes a packet sniffer which logs incoming and outgoing requests
* Includes a software firewall to prevent the program from accessing Internet content accidentally
* Ability to act as a web proxy to catch and block redirects
* Beautifies Javascript code to make it more readable
* Ability to clear the browser cookies
* Ability to spoof the user-agent string

Download
http://www.mediafire.com/?6rdb8bwjo9jdylj

by
darryl

Permalink

 


HackBar 1.6.1 - Add-on
This toolbar will help you in testing sql injections, XSS holes and site security. It is NOT a tool for executing standard exploits and it will NOT teach you how to hack a site. Its main purpose is to help a developer do security audits on his code. If you know what your doing, this toolbar will help you do it faster.

Download
https://addons.mozilla.org/en-US/firefox/addon/hackbar/

"
# Load url ( alt a )
This loads the url of the current page into the textarea.

# Split url ( alt s )
When this button is clicked, the url/text in the textarea will be split into multiple lines using the ? and & character

# Execute ( alt x, ctrl enter )
This will execute the current url in the textarea, i mostly use ctrl+enter

# INT -1 ( alt - )
First select a number in the textarea and press this button, the number will be lowered by 1 and the url will be loaded.

# INT +1 ( alt + )
Again first select a number in the textarea and press this button, 1 will be added to the number and the url will be loaded.

# HEX -1 ( control alt - )
First select a number in the textarea and press this button, the number will be lowered by 1 and the url will be loaded.

# HEX +1 ( control alt + )
Again first select a number in the textarea and press this button, 1 will be added to the number and the url will be loaded.

# MD5 Hash ( alt m )
this is a standard hashing method, often used as an encryption method for passwords. It will MD5 hash the currently selected string.

# SHA-1/256
this is a standard hashing method, often used as an encryption method for passwords. It will SHA-1/256 hash the currently selected string.

# MySQL CHAR() ( alt y )
If quotes are escaped but you did find an SQL injection thats exploitable, you can use this button to convert lets say:
load_file('/etc/passwd') --> load_file(CHAR(47, 101, 116, 99, 47, 112, 97, 115, 115, 119, 100))
Thus omiting the use of quotes to load a file.
You can also use this on
WHERE foo LIKE ('%bar%') --> WHERE foo LIKE (CHAR(37, 98, 97, 114, 37))

# MsSQL CHAR() ( alt q )
Same story as MySQL CHAR(), MsSQL has a slightly different CHAR syntax
--> WHERE foo LIKE ( CHAR(37) + CHAR(98) + CHAR(97) + CHAR(114) + CHAR(37))

# Base64 encode / decode
Base64 encoding ( UU ) is often used to store data (like a return url etc.) This will help you to read those values.

# URLencode / decode
This will encode or decode the currently selected characters to url safe characters. I mostly use it to end a query with # (%23) when in a pseudo path where i cant use /* or
"
by
amarjit

Permalink

 


Trend Micro Titanium Antivirus Plus 2012 - free
Strong, fast and easy-to-use security– Trend Micro Titanium Antivirus Plus 2012 provides essential protection so you can email and surf the web hassle free. Titanium uses cloud technology to proactively stop viruses and spyware before they reach your computer, so it won’t slow you down. It’s the same technology we use to protect some of the world’s biggest businesses, now available to you.

Download
https://store.trendmicro-europe.com/store?Action=buy&Currency=GBP&Locale=en_GB&OfferID=12254304609&Pgm=78737900&SiteID=tmoemem&ThemeID=1283700&productID=239744300&quantity=1&resid=T6N2IQoHAtQAADi4MNIAAAAR&rests=1336112673668

Permalink

 


ZoneAlarm Internet Security 2013 - free
ZoneAlarm has two-way firewall that operates quietly in the background, monitoring incoming and outgoing traffic to and from a PC and the Internet. It blocks hackers from getting into a PC and stops them from launching attacks, stealing information, and sending data back to their home servers to conduct malicious activities.
ZoneAlarm comes with a powerful antivirus engine scan which detects, and removes any malicious programs. To further insulate a user’s system, ZoneAlarm’s OSFirewall adds an additional layer of protection by spotting and stopping any suspicious behavior and new attacks.

Download
http://download.zonealarm.com/bin/free/1001_za/zaSetupWeb_102_047_000.exe

Permalink

 


Tuesday, 1. May 2012
The File Type Identifier
FiletypeID is written in Python, based on PyQt4 and TrIDLib. From our initial use, it seems that it is a GUI for TrID. TrID is a utility designed to identify file types from their binary signatures, that uses a database of definitions which describe recurring patterns for supported file types. Somewhat like PeID, but with lesser features. Since TrID uses an expandable database it will never be out of date. It has about 4697 file type definitions as of now.

Download
https://code.google.com/p/filetypeid/downloads/list

Permalink

 


Subterfuge - Man in the Middle Attack Framework
Subterfuge is a framework to take the now familiar art of Man-in-the-Middle attack and make it as simple as point and shoot. It has a beautiful, easy to use interface that produces a more transparent and effective attack. This is what sets Subterfuge apart from other attack tools. It demonstrates vulnerabilities in the ARP Protocol by harvesting credentials that go across the network, and even exploiting machines through race conditions. Subterfuge is a small but, effective credential-harvesting program which exploits a vulnerability in the inherently trusting Address Resolution Protocol.

Download
http://code.google.com/p/subterfuge/downloads/list

Permalink

 


Monday, 30. April 2012
maxisploit-scanner
This tool has three purposes :

1. SQL injection :

a)Error based: it scans for vulnerable websites based on common SQL errors for variety of databases.

b)Difference (true/false) scan: it scans for sites that do not display SQL errors but yet are vulnerable , the concept behind this scan is true / false query to the database which will give different answers which will then be scanned and in case of difference in length and content site will be considered vulnerable.

2.XSS scanner : it encrypts XSS vector and tries to scan result from web server , if XSS vector is found inside source than site is vulnerable. It only uses GET request to web server. NOTE: It will scan for XSS vector but it will not test if alert or any other event really happened.

3. Admin scanner : it scans for admin login locations , based on default list or any other that you have supplied.Response code 200 and 306 is considered success.

4. Shared hosting scanner : it send request to sameip.org and then parses html for pages

Download
http://code.google.com/p/maxisploit-scanner/downloads/list

Permalink

 


Saturday, 28. April 2012
BackBox Linux 2.05 released!
"The BackBox team is proud to announce the release 2.05 of BackBox Linux. The new release include features such as Ubuntu 11.04, Linux Kernel 2.6.38 and Xfce 4.8.0. The ISO images (32bit & 64bit)"

Download
http://www.backbox.org/downloads

BackBox is a GNU/Linux distribution based on Ubuntu. It has been developed to perform penetration tests and security assessments. Designed to be fast, easy to use and provide a minimal yet complete desktop environment, thanks to its own software repositories, always being updated to the latest stable version of the most used and best known ethical hacking tools.

Permalink

 


Dirfuzz
This is a tool for directory discovery of web applications, by default it uses a dictionary
based approach which is in data/fdirs.txt it can also use the crawler module to find links
up to 1 level of depth.

Info
https://github.com/matugm/dirfuzz/#readme

Download
https://github.com/matugm/dirfuzz/tarball/master

Permalink

 


Router WPS Backdoor
Some 100,000 routers of type Speedport W921V, W504V and W723V are affected in Germany alone. What makes things worse is the fact that in order to exploit the backdoor, no button has to be pushed on the device itself and on some of the affected routers, the backdoor PIN ("12345670") is still working even after WPS has been disabled by the user. The only currently known remedy for those models is to disable Wi-Fi altogether. Since all Arcadyan routers share the same software platform, more models might be affected.

Permalink