[<prev] [next>] [day] [month] [year] [list]
Message-ID: <200408310440.52799.michel@cycom.se>
From: michel at cycom.se (Michel Blomgren)
Subject: Gwee ported to Win32
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
Gwee (generic web exploitation engine) has been ported to Microsoft Windows
(x86), the 1.36 version tarball comes with gwee.exe - precompiled with https
support.
Get it at: http://tigerteam.se/dl/gwee/
gwee (Generic Web Exploitation Engine) can be used to exploit input validation
vulnerabilities in web scripts, such as Perl CGIs, PHP, etc. gwee is much
like an exploit, except more general-purpose. It features several reverse
(connecting) shellcodes (x86 Linux, FreeBSD, NetBSD, Perl script (universal),
Python script (universal)), 4 methods of injecting (executing) them, built-in
http/https client and built-in server (listener) for receiving connections
(and remote shell) from injected shellcodes.
- --
Michel Blomgren
http://tigerteam.se
______________________________________________
PGP: http://www.cycom.se/misc/pubkeymichel.asc
886A 7B17 1747 6C82 7A7E
EAC0 A3F1 2943 101C 18FA
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.2.2 (GNU/Linux)
iD8DBQFBM+Uto/EpQxAcGPoRAuOxAKCEY/+VTnXTiSUK2dPVKmcZlP9JcQCfRD9l
IA0g9iA/QzLyM9WybfBNqQg=
=MBTZ
-----END PGP SIGNATURE-----
Powered by blists - more mailing lists