10.6. Exploitation/Detection¶
10.6.1. Database Injection¶
10.6.2. Unstructured database injection¶
10.6.3. Database exploits¶
ODAT Oracle Database Attacking Tool
10.6.4. XSS¶
10.6.5. SSRF¶
10.6.6. Template Injection¶
10.6.7. HTTP Request Smuggling¶
smuggler An HTTP Request Smuggling / Desync testing tool written in Python
h2cSmuggler HTTP Request Smuggling over HTTP/2 Cleartext (h2c)
10.6.8. Command Injection¶
10.6.9. PHP¶
Chankro Herramienta para evadir disable_functions y open_basedir
10.6.10. LFI¶
10.6.11. struts¶
10.6.12. CMS¶
TPscan one-click ThinkPHP vulnerability detection
dedecmscan dream weaving full version vulnerability scan
10.6.13. Java Frameworks¶
ShiroScan Shiro<=1.2.4 Deserialization Detection Tool
fastjson rce tool fastjson command execution tool
10.6.15. DNS Data Extraction¶
10.6.16. DNS Tunneling¶
10.6.17. DNS Shell¶
10.6.18. XXE¶
DTD Finder List DTDs and generate XXE payloads using those local DTDs
10.6.19. Deserialization¶
10.6.19.1. Java Deserialization¶
Java Serialization Dumper A tool to dump Java serialization streams in a more human readable form
marshalsec Java Unmarshaller Security - Turning your data into code execution
gadgetinspector A byte code analyzer for finding deserialization gadget chains in Java applications
fastjsonScan fastjson vulnerability burp plugin
10.6.19.2. .NET Deserialization¶
viewgen ASP.NET ViewState Generator
10.6.20. JNDI¶
Rogue JNDI A malicious LDAP server for JNDI injection attacks
10.6.21. Port Hack¶
10.6.22. JWT¶
10.6.23. Wireless¶
10.6.24. Man-in-the-middle attacks¶
Responder Responder is a LLMNR, NBT-NS and MDNS poisoner, with built-in HTTP/SMB/MSSQL/FTP/LDAP rogue authentication server supporting NTLMv1/NTLMv2/LMv2, Extended Security NTLMSSP and Basic HTTP authentication.
toxy Hackable HTTP proxy for resiliency testing and simulated network conditions
bettercap The Swiss Army knife for 802.11, BLE and Ethernet networks reconnaissance and MITM attacks
10.6.25. DHCP¶
10.6.26. DDoS¶
10.6.27. Regular expressions¶
Regexploit Find regular expressions which are vulnerable to ReDoS
10.6.28. Shellcode¶
go shellcode A repository of Windows Shellcode runners and supporting utilities
10.6.29. Ultraviolet¶
10.6.30. Utilizing the Platform¶
10.6.31. Exploit Libraries¶
thc ipv6 IPv6 attack toolkit
10.6.32. Exploit Frameworks¶
10.6.33. Windows¶
PyWSUS a standalone implementation of a legitimate WSUS server which sends malicious responses to clients