Archive | Programming

Advertisements


20 August 2007 | 19,842 views

Immunity Debugger v1.0 (immdbg) Release – Download it Now!

After almost a year of intensive development and internal use, Immunity (The guys who bought us CANVAS) has announced the public release of Immunity Debugger v1.0. The main objective for this tool was to combine the best of commandline based and GUI based debuggers. Immunity Debugger is a powerful new way to write exploits, analyze […]

Continue Reading


01 August 2007 | 17,028 views

Security Freak Video Lectures – Hacking, Programming, Networking & More

A while back a reader e-mailed us about a new site they have called Security Freak, the site is about informatin security education and is mostly using video lectures to illustrate and convey the lessons. Security-Freak.net is an attempt to lower the entry barrier for starting computer security research. The author has noticed that during […]

Continue Reading


10 July 2007 | 17,378 views

PowerShell – More than the command prompt

For this article you should thank Patrick Ogenstad and his comment on my post , because I did not know about PowerShell until he mentioned about it… so a white point for him =) The parts that will follow are snippets from the Getting Started document that comes with it… Abstract Windows PowerShellâ„¢ is a […]

Continue Reading


03 July 2007 | 11,424 views

Selenium – JavaScript Web Application Security Testing Tool

Selenium is a test tool for web applications. Selenium tests run directly in a browser, just as real users do. And they run in Internet Explorer, Mozilla and Firefox on Windows, Linux, and Macintosh. No other test tool covers such a wide array of platforms. Browser compatibility testing. Test your application to see if it […]

Continue Reading


14 June 2007 | 6,233 views

Fuzzled – PERL Fuzzing Framework

There has been an explosion of fuzzing tools lately, quite a few we have mentioned here on Darknet. Someone else noticed this, and wondered where is the Perl framework to complete the family? With that in mind he spent the last few months working on something that should fill the gap – Fuzzled. Fuzzled is […]

Continue Reading


17 May 2007 | 10,410 views

ISIC – IP Stack Integrity & Stability Checker

ISIC is a suite of utilities to exercise the stability of an IP Stack and its component stacks (TCP, UDP, ICMP et. al.) It generates piles of pseudo random packets of the target protocol. The packets be given tendencies to conform to. Ie 50% of the packets generated can have IP Options. 25% of the […]

Continue Reading


28 April 2007 | 16,166 views

login (security through obscurity) – weird PHP script

This was the idea with which I have won the regional web apps contest… well actually I did a CMS but the security part of it was the most appreciated. Maybe because it was weird, you’ll see… Classical Login scripts What exactly do classical login scripts do… they get the password from the database by […]

Continue Reading


23 April 2007 | 13,700 views

LLTD – Link Layer Topology Discovery Protocol

Gomor released a LLTD (Link Layer Topology Discovery Protocol) implementation written in Perl (using Net::Frame framework). You may use this two modules to write fuzzers, or anything. You can find the modules here: Net Frame LLTD

Continue Reading


10 January 2007 | 8,952 views

AttackAPI 2.0 Alpha – JavaScript Hacking Suite

AttackAPI provides simple and intuitive web programmable interface for composing attack vectors with JavaScript and other client (and server) related technologies. The current release supports several browser based attacking techniques, simple but powerful JavaScript console and powerful attack channel and associated API for controlling zombies. AttackAPI 2.0 branch is a lot better then the 1.x. […]

Continue Reading


13 December 2006 | 8,420 views

Backframe (Formerly Backweb) JavaScript Attack Console

There has been a recent release of Backframe (Formerly Backweb) Attack Console. Backframe Attack Console was started as an experiment to create a full featured attack console for exploiting web browsers, web users and remote applications. Those who are familiar with XSS Proxy or even BEEF might already be familiar with the core principles of […]

Continue Reading


Advertisements