Monday, 30. January 2012
SQLi google dorker
This is a simple google dorker that will scan google for sites, Then test them for SQLi vulns.

Note: The u1103.exe is UltraSurf (Proxy) So that google does not IP ban you for dorking!


Download
http://dl105.herosh.com/7b33663d04370b24f464dd2377308857/Google.Dorkerv.1.1.rar
http://herosh.com/download/10588061/Google.Dorkerv.1.1.rar.html
http://www.sendspace.com/file/rqbwwm

by
Exidous

Permalink

 


Dark D0rk3r 0.5 - Linux
Dark D0rk3r is a python script that performs dork searching and searches for local file inclusion and SQL injection errors.

Download
http://packetstormsecurity.org/files/download/109171/darkd0rk3r-0.5.py.txt

Permalink

 


Sunday, 29. January 2012
Hcon’s Security Testing Framework
Hcon respects & salutes to all of the freedom fighters of India, without whom we can never be able get our freedom.A tribute to all of the freedom fighters of all the countries we present HconSTF version 0.4 codename ‘Freedom’.Hope this year brings freedom for everyone on the internet form different governments & companies which are making the internet users their slaves.For this purpose HconSTF 0.4 has integrated many functions for anonymity and OSINT.

What it can do ? :
Most of the part of HconSTF is semi-automated but you still need your brain to work it out.
It can be use in all kind of security testing stages, it has tools for conducting tasks like,
1. Information gathering
2. Enumeration & Reconnaissance
3. Vulnerability assessment
4. Exploitation
5. Privilege escalation
6. Reporting
also can be used for web debugging

Download
http://www.hcon.in/downloads.html

Permalink

 


Wednesday, 25. January 2012
Android Network Toolkit (ANTI) - Android
Using Anti is very intuitive - on each run, Anti will map your network, scan for active devices and vulnerabilities, and will display the information accordingly: Green led signals an 'Active device', Yellow led signals "Available ports", and Red led signals "Vulnerability found". Also, each device will have an icon representing the type of the device. When finished scanning, Anti will produce an automatic report specifying which vulnerabilities you have or bad practices used, and how to fix each one of them.

Download
http://www.zimperium.com/anti.html



Permalink

 


Thursday, 19. January 2012
xsusenet - Free Usenet access
Lifetime 1Mbit Free Usenet access

Click to visit promo page and register.
http://www.xsusenet.com/en/
Check you mail box.

Free Usenet Newsleecher Final
http://www.newsleecher.com//?id=download&dlinB=nl_b

Permalink

 


RogueKiller
RogueKiller is a free small program that analyzes the system for rogue software. It works in this regard similar to Fake Antivirus Remover, a program which we have reviewed in the past here on Ghacks. The program scans known rogueware locations, including running processes, the Windows Registry, drivers, the hosts file and the master boot record.
We need to close all other programs running on the system before you start the program. First thing that you may want to do then is to scan the system. Just press 1 on the keyboard and hit enter afterwards to run the scan.

Download
http://www.sur-la-toile.com/RogueKiller/

Permalink

 


UniOFuzz - Linux
UniOFuzz version 0.1.2-beta - the universal fuzzing tool for browsers, web services, files, programs and network services/ports

Download
http://www.nullsecurity.net/tools/uniofuzz.py

Homepage
http://www.nullsecurity.net/tools.html

Permalink

 


Wednesday, 18. January 2012
SecurityXploit Mostreads 2011
Count Date Title Author

1 378 30.06.11 SQL Injection Scanners List xploit
2 299 20.07.11 winAUTOPWN v2.7 xploit
3 287 07.07.11 The Web Application Hacker's Handbook 2nd: Discovering and Exploiting Security Flaws xploit
4 204 28.08.11 Killapache - DDOS tool - Perl xploit
5 191 24.08.11 Upload a php shell xploit
6 182 03.08.11 Facebook password recovery xploit
7 181 15.09.11 Backtrack 5 Wireless Penetration Testing xploit
8 181 30.06.11 Dictionaries & Wordlists xploit
9 164 23.08.11 BING.COM - XSS xploit
10 162 06.07.11 Wifi Cracker 1.5 - Linux xploit

Permalink

 


ClubHack Mag - Jan 2012
This issue covers following articles:-

0x00 Tech Gyan - One Line Facebook
0x01 Tool Gyan - SQLMAP – Automated Sql Injection Testing Tool
0x02 Mom's Guide - Social Networking and its Application Security
0x03 Legal Gyan - Powers of Government under the Information Technology
Act, 2000
0x04 Matriux Vibhag - Setting up and Getting started with Matriux Krypton
0x05 Poster - "I shall use strong password"

Download PDF
http://chmag.in/issue/jan2012.pdf

Permalink

 


Exploit Next Generation SQL Fingerprint v1.12.120115/RC0
For those that are not familiarized with Exploit Next Generation® SQL
Fingerprint, it is a powerful tool which performs version fingerprinting
for:
1. Microsoft SQL Server 2000;
2. Microsoft SQL Server 2005;
3. Microsoft SQL Server 2008; and
4. Microsoft SQL Server 2012.

The Exploit Next Generation® SQL Fingerprint uses well-known techniques
based on several public tools that are capable to identify the Microsoft
SQL Server version (such as: SQLping and SQLver), but, instead of showing
only the "raw version" (i.e., Microsoft SQL Version 10.00.2746), the
Exploit Next Generation® SQL Fingerprint shows the mapped Microsoft SQL
Server version (i.e., Microsoft SQL 2008 SP1 (CU5)).

Download
http://www.4shared.com/zip/legpj3DI/ESF.html

Key ID: 0x4FFC316C
1983 7E8E D6C9 CAF8 4B4F A8C9 A36D FC5B 4FFC 316C

Info
http://nbrito.4shared.com/

Permalink