Tools Category

Web Vulnerability Scan ( Metasploit )

Web Vulnerability Scan (WMAP) Introduce The Metasploit Project is a computer security project that provides information about security vulnerabilities and aids in penetration testing and IDS signature development. Its best-known sub-project is the open source[2] Metasploit Framework, a tool for developing and executing exploit code against a remote target machine. Read more…

Loading

Tools Category

Web Exploit Detector

Tool To Detect Possible Infections (Malicious Code)   The Web Exploit Detector is a Node.js application (and NPM module) used to detect possible infections, malicious code and suspicious files in web hosting environments. This application is intended to be run on web servers hosting one or more websites. Running the Read more…

Loading

Web vulnerability scanning modules in Metasploit

Web vulnerability scanning modules in Metasploit   Information gathering web server scanning module Module auxiliary/scanner/http/http_version Module auxiliary/scanner/http/open_proxy Module auxiliary/scanner/http/robots_txt Module auxiliary/scanner/http/frontpage_login Module auxiliary/admin/http/tomcat_administration Module auxiliary/admin/http/tomcat_utf8_traversal Module auxiliary/scanner/http/options Module auxiliary/scanner/http/drupal_views_user_enum Module auxiliary/scanner/http/scraper Module auxiliary/scanner/http/svn_scanner Module auxiliary/scanner/http/trace Module auxiliary/scanner/http/vhost_scanner Module auxiliary/scanner/http/webdav_internal_ip Module auxiliary/scanner/http/webdav_scanner Module auxiliary/scanner/http/webdav_website_content   File directory scan module Module auxiliary/dos/http/apache_range_dos Read more…

Loading

SQL Injection

What is SQL Injection? SQL injection (SQLi) is an application security weakness that allows attackers to control an application’s database – letting them access or delete data, change an application’s data-driven behavior, and do other undesirable things – by tricking the application into sending unexpected SQL commands. SQL injection weaknesses Read more…

Loading