...It collects documented techniques for how everyday binaries (e.g. awk, bash, tar, scp) can be abused under constrained conditions. Indexed list of Unix binaries and documented misuse techniques. Examples of command invocations to exploit misconfigurations. Scenarios for privilege escalation, filetransfer, and process spawning. Community contributions to add or refine binary techniques.
Finds all the security information for a given domain name
Domain analyzer is a security analysis tool which automatically discovers and reports information about the given domain. Its main purpose is to analyze domains in an unattended way.
Simple CGI script which allows you to transfer sensitive ascii data (passwords, hashes, pem keys) via HTTPS.
SSL MUST BE implemented by webserver.
Algorithm:
- Paste new data into textarea, submit. You get link
Link consists of three md5 hashes from salt. File, containing your data, named that way. So, it is hard to bruteforce links/files.
- Whenever link being opened, script reads file and prints its content into brower in text/plain content-type.
Automatically verifies md5 and sha1 checksums using either a user entered sum or by searching in a file that can be held locally or remotely via ftp or http.
Open source Penetration Testing Suite for IT professionals and penetration testers. SecTest automates the boring repetitive procedures of penetration testing.