• Skip to content
  • Skip to primary sidebar
  • Skip to secondary sidebar
  • Google Dorks
  • Shodan Queries
  • Malware Sources

PenTestIT

Your source for all things Information Security!

You are here: Home / Archives for SQL injection

Syntribos: An Open Source API Security Testing Tool

Posted: 8 months ago by @pentestit 3579 views

Syntribos: An Open Source API Security Testing Tool

Web application security testing is a multi-faceted and yet important domains today. A few years ago, it was only the front end security tests and then came the backend. As newer endpoints are being exposed, it becomes imperative to test their security too. Syntribos is one such tool that helps you test the security of your APIs. Read more about Syntribos: An Open Source API Security Testing Tool

UPDATE: Leviathan Framework v0.1.2!

Posted: 8 months ago by @pentestit 2442 views

UPDATE: Leviathan Framework v0.1.2!

I seem to have missed about two updates made to the this mass audit toolkit. My last post about the Leviathan Framework can be found here. We now have the latest - Leviathan Framework v0.1.2! Read more about UPDATE: Leviathan Framework v0.1.2!

UPDATE: WPSeku v0.2.1!

Posted: 10 months ago by @pentestit 1708 views
Updated: July 1, 2017 at 2:45 am

UPDATE: WPSeku v0.2.1!

Since my initial post about WPSeku was about v0.1.0, an updated was made by the author and a new version was released. This post is an attempt at mentioning the changes made to the tool. Read more about UPDATE: WPSeku v0.2.1!

FOCA: Fingerprinting & Organisation with Collected Archives!

Posted: 11 months ago by @pentestit 4583 views
Updated: October 10, 2017 at 3:00 am

FOCA: Fingerprinting & Organisation with Collected Archives!

There are a few tools OSINT tools that I wrote about in the old PenTestIT blog that I still remember. FOCA is one of them and it has only gotten better with time and has a lot of features and plugins since I last looked at it. Read more about FOCA: Fingerprinting & Organisation with Collected Archives!

RouterSploit: The Metasploit For Routers!

Posted: 11 months ago by @pentestit 7195 views
Updated: July 3, 2017 at 3:59 am

RouterSploit: The Metasploit For Routers!

There are exploitation frameworks and then there is Metasploit. Though it has a few modules targeted towards embedded devices, it is your "general purpose" framework. If you are looking at a comprehensive embedded devices/router exploitation framework you now have RouterSploit! Read more about RouterSploit: The Metasploit For Routers!

WPSeku: A Simple WordPress Security Scanner!

Posted: 11 months ago by @pentestit 2606 views

WPSeku: A Simple WordPress Security Scanner!

There are a lot of open source WordPress security scanners out there right now and WPSeku is one more of them. Since it's release about a month ago, it has a few static cross-site scripting, local file inclusion and SQL injection strings which it tries to leverage while scanning a website. Read more about WPSeku: A Simple WordPress Security Scanner!

Leviathan: An All In One Security Audit Toolkit!

Posted: 12 months ago by @pentestit 2437 views
Updated: May 1, 2017 at 11:47 pm

Leviathan: An All In One Security Audit Toolkit!

Fresh off the GitHub repository - Leviathan, an open source, wide-range  security audit toolkit that helps you with service discovery, brute force, SQL injection detection and running custom exploit. One of the guys behind this project is Utku Sen. If you remember he was the one who wrote open source ransomware - EDA2 and Hidden Tear. Read more about Leviathan: An All In One Security Audit Toolkit!

  • Page 1
  • Page 2
  • Next Page »

Primary Sidebar

Recent Posts

  • List of Adversary Emulation Tools
  • UPDATE: OWASP Dependency-Check 3.1.2
  • AutoSploit = Shodan/Censys/Zoomeye + Metasploit
  • Apache JMeter RMI Code Execution PoC (CVE-2018-1297)
  • UPDATE: Prowler 2.0 Beta

Featured Post

List of Adversary Emulation Tools

List of Adversary Emulation Tools

April 15, 2018 By Black Leave a Comment

Every once in a while, the security industry brings forth a new buzz word and introduces terminologies that sound über cool and generate lot’s of interest. One such word going around now-a-days is automated “adversary emulation“. Let’s first understand what this really means. Adversary emulation/simulation offers a method to test a network’s resilience against anRead more about List of Adversary Emulation Tools

Secondary Sidebar

Categories

  • Docker Security
  • Fuzzing
  • Malware Analysis
  • Open Source
  • OSINT
  • Penetration Testing
  • Reverse Engineering
  • Site News
  • Tool Updates
  • Tools
  • Vulnerability Assessment
  • Web Application Security
  • Wireless

Archives

  • April 2018
  • March 2018
  • February 2018
  • January 2018
  • December 2017
  • November 2017
  • October 2017
  • September 2017
  • August 2017
  • July 2017
  • June 2017
  • May 2017
  • April 2017
  • March 2017

Tags

Anchore APT2 Brute Force CloudFlare Cross-Site Scripting Cuckoo Sandbox DataSploit docker dockerscan docker scan FOCA Kali Linux Local File Inclusion malware malware analysis man-in-the-middle Metadata Metasploit Microsoft Windows MicroSploit Nmap open source OSINT OSRFramework OWASP OWASP Dependency-Check penetration testing penetration testing toolkit PowerMeta PowerShell PowerSploit python Raspberry Pi RedSnarf reverse engineering Short Post software composition analysis SQL injection Sysdig Falco vulnerability assessment Web Application Security WiFi Wireshark WordPress WPXF

Copyright © 2018 - PenTestIT | Information shared to be used for LEGAL purposes only!