Toolkit

Wapiti

Wapiti allows you to audit the security of your web applications.It performs “black-box” scans, i.e. it does not study the source code of the application but will scans the webpages of the deployed webapp, looking for scripts and forms where it can inject data.Once it gets this list, Wapiti acts like a fuzzer, injecting payloads […]

Useful tools to use alongside dedicated solutions when performing application source code vulnerability assessments

Most application source code vulnerability assessments involve reviewing a large volume of source files.In general, this work is performed through a combination of static analysis using dedicated tools such as Fortify and manual dynamic analysis conducted by experienced security consultants.Given the substantial amount of source code that must be manually reviewed during this process, it

Netcat Usage Examples

* Telnet Connection * Server-to-Server Chat * Connect via IPv6 (-6: IPv6, -4: IPv4) * copying a file * Hard Drives & partition Clone * port scanning * Send the “quit” command across the port range to check for responses (version information). * Simple web-page (somepage.html) service