Tag: Command Line Tool

WifiScanner

WifiScanner is a tool that has been designed to discover wireless node (i.e access point and wireless clients). It is distributed under the GPL License. It work with CISCO® card and prism card with hostap driver or wlan-ng driver, prism54g, Hermes/Orinoco, Atheros, Centrino, … An IDS system is integrated to detect anomaly like MAC usurpation. …

Continue reading

Permanent link to this article: https://www.darknessgate.com/2012/07/26/wifiscanner/

The Mole

The Mole is an automatic SQL Injection exploitation tool. Only by providing a vulnerable URL and a valid string on the site it can detect the injection and exploit it, either by using the union technique or a boolean query based technique. Features Support for injections using Mysql, SQL Server, Postgres and Oracle databases. Command …

Continue reading

Permanent link to this article: https://www.darknessgate.com/2012/07/24/the-mole/

BSQL (Blind SQL) Hacker

BSQL (Blind SQL) Hacker is an automated SQL Injection Framework / Tool designed to exploit SQL injection vulnerabilities virtually in any database. BSQL Hacker aims for experienced users as well as beginners who want to automate SQL Injections (especially Blind SQL Injections). Key Features Easy Mode SQL Injection Wizard Automated Attack Support (database dump) ORACLE …

Continue reading

Permanent link to this article: https://www.darknessgate.com/2012/07/23/bsql-blind-sql-hacker/

SQL Ninja

Sqlninja is a tool targeted to exploit SQL Injection vulnerabilities on a web application that uses Microsoft SQL Server as its back-end. Its main goal is to provide a remote access on the vulnerable DB server, even in a very hostile environment. It should be used by penetration testers to help and automate the process …

Continue reading

Permanent link to this article: https://www.darknessgate.com/2012/07/23/sql-ninja/

SQL injection digger

SQL injection digger is a command line program that looks for SQL injections and common errors in web sites. Current version can perform the following operations: Look for SQL injections and common errors in web site URLs found by performing a google search. Look for SQL injections and common errors in a given URL or …

Continue reading

Permanent link to this article: https://www.darknessgate.com/2012/07/23/sql-injection-digger/

SQLIer

SQLIer takes an SQL Injection vulnerable URL and attempts to determine all the necessary information to build and exploit an SQL Injection hole by itself, requiring no user interaction at all (unless it can’t guess the table/field names correctly). By doing so, SQLIer can build a UNION SELECT query designed to brute force passwords out …

Continue reading

Permanent link to this article: https://www.darknessgate.com/2012/07/23/sqlier/