Geekiest Techno News

Archive for the ‘Tools’ Category

TOR Virtual Network Tunneling Tool

Tor is a network of virtual tunnels that allows people and groups to improve their privacy and security on the Internet. It also enables software developers to create new communication tools with built-in privacy features. It provides the foundation for a range of applications that allow organizations and individuals to share information over public networks  [ Read More ]

John The Ripper 1.7.9 Jumbo 5

John the Ripper is a fast password cracker, currently available for many flavors of Unix, Windows, DOS, BeOS, and OpenVMS. Its primary purpose is to detect weak Unix passwords. It supports several crypt(3) password hash types commonly found on Unix systems, as well as Windows LM hashes. On top of this, many other hash types  [ Read More ]

Sqlsus: MySQL injection and Takeover tool

sqlsus is an open source MySQL injection and takeover tool, written in perl. Via a command line interface, you can retrieve the database(s) structure, inject your own SQL queries (even complex ones), download files from the web server, crawl the website for writable directories, upload and control a backdoor, clone the database(s), and much more…  [ Read More ]

Note For Geeks :- If you guys can use this tool they way the developer has designed it, i can guarantee that u will be able to save alot of time while launching phising attacks. Ghost Phisher is a computer security application that comes inbuilt with a Fake DNS Server, Fake DHCP Server, Fake HTTP server  [ Read More ]

WPScan: A WordPress Vulnerability Scanner

Note for l33ts:- WordPress ur goin down baby :p Introduction WPScan is a vulnerability scanner which checks the security of WordPress installations using a black box approach. Download Please download the latest WPScan from  Subversion (SVN) code repository by issuing the following command: svn checkout http://wpscan.googlecode.com/svn/trunk/ ./wpscan Details Username enumeration (from author querystring and location header) Weak  [ Read More ]

This time geek more improvements on the site cloner has been done along with java Repeater being fixed. check out the complete v2.5  Changelog below: ~~~~~~~~~~~~~~~~ version 2.5 ~~~~~~~~~~~~~~~~ rehaul of site cloner, it now injects into body properly and leverages unc, redirection, and others properly redid a few options on repeater.database, unc.database to make  [ Read More ]

XSSer: Cross Site “Scripter”

look g33ks let me just give u a very quick overview about this tool. THis is THE sHIt !!! What is XSSer ? Cross Site “Scripter” is an automatic -framework- to detect, exploit and report XSS vulnerabilities in web-based applications. It contains several options to try to bypass certain filters, and various special techniques of  [ Read More ]

W3AF: Web Application Attack and Audit Framework.

w3af is a Web Application Attack and Audit Framework. The project’s goal is to create a framework to find and exploit web application vulnerabilities that is easy to use and extend. To read our short and long term objectives w3af provides plugin writers with this features: urllib2 wrapper In order to send requests to the  [ Read More ]

PHP Vulnerability Hunter

What is PHP Vulnerability Hunter? This is the application that detected almost all of the web application vulnerabilities listed on the advisories page. PHP Vulnerability Hunter is an advanced automated whitebox fuzz testing tool capable of triggering a wide range of exploitable faults in PHP web applications. Minimal configuration is necessary to begin a scan;  [ Read More ]

The Suricata Engine: IDPE

The Suricata Engine is an Open Source Next Generation Intrusion Detection and Prevention Engine. This engine is not intended to just replace or emulate the existing tools in the industry, but will bring new ideas and technologies to the field. OISF is part of and funded by the Department of Homeland Security’s Directorate for Science and  [ Read More ]