lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <200408310440.52799.michel@cycom.se>
From: michel at cycom.se (Michel Blomgren)
Subject: Gwee ported to Win32

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Gwee (generic web exploitation engine) has been ported to Microsoft Windows 
(x86), the 1.36 version tarball comes with gwee.exe - precompiled with https 
support.

Get it at:   http://tigerteam.se/dl/gwee/

gwee (Generic Web Exploitation Engine) can be used to exploit input validation 
vulnerabilities in web scripts, such as Perl CGIs, PHP, etc. gwee is much 
like an exploit, except more general-purpose. It features several reverse 
(connecting) shellcodes (x86 Linux, FreeBSD, NetBSD, Perl script (universal), 
Python script (universal)), 4 methods of injecting (executing) them, built-in 
http/https client and built-in server (listener) for receiving connections 
(and remote shell) from injected shellcodes.

- -- 
Michel Blomgren
http://tigerteam.se
______________________________________________
PGP: http://www.cycom.se/misc/pubkeymichel.asc
886A 7B17 1747 6C82 7A7E
EAC0 A3F1 2943 101C 18FA
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.2.2 (GNU/Linux)

iD8DBQFBM+Uto/EpQxAcGPoRAuOxAKCEY/+VTnXTiSUK2dPVKmcZlP9JcQCfRD9l
IA0g9iA/QzLyM9WybfBNqQg=
=MBTZ
-----END PGP SIGNATURE-----


Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ