LDAP & XPATH
Blind LDAP Injection Exploitation Tool
Sample application showing practical approach how to exploit Blind LDAP Injection flaw. The tool is intended to be used by IT security researchers and pentesters for educational purposes only.

Download:
http://code.google.com/p/ldap-blind-explorer/downloads/list

Blind XPath Injection Exploitation Tool
Sample application showing practical approach how to exploit Blind XPath Injection flaw. The tool is intended to be used by IT security researchers and pentesters for educational purposes only.

Download:
http://code.google.com/p/xpath-blind-explorer/downloads/list