A collection of web pages vulnerable to SQL injection flaws and more:
- conf/ - operating system configuration files used by deployment.sh.
- dbs/ - standalone databases for some database management systems (e.g. Microsoft Access).
- libs/ - web API libraries to connect to the database management system, perform the provided statement and return its output.
- schema/ - SQL used to create the test database, a test table and populate it with test entries.
- Other directories - vulnerable pages for each database management system.
- deployment.sh - A bash script to deploy from scratch a fully-fledged Linux (Debian or Ubuntu) machine with all the relevant database management systems installed and configured, ready to be targeted.
You might also like:
- Hackode - Android App For Hackers
- Hackers Wanted (Documentary Film)
- DotDotPwn - Directory Traversal Fuzzer
- Snort - OpenSource Network Intrusion Detection Tool
- Weevely - Weaponized Web Shell
- Pentoo - Gentoo-Based Linux Distribution For Penetration Testers
- evasi0n - Jailbreak Tool For iOS 6, 7 Devices
- SSLyze - Tool For Analysing SSL/TLS Configurations
- Advanced Windows Service Manager - Tool For Analyzing Windows Services
- SoftPerfect WiFi Guard - Tool For Detecting & Alerting WiFi Network Intrusions
- BlindElephant - Web Application Fingerprinter
- theHarvester - Tool For Gathering Target Information (E-mail accounts, subdomain names, open ports and etc.)
- Automater - Tool For Analyzing URLs/Domains, IP Addresses, and Md5 Hashes
This post first appeared on Effect Hacking - Hacking Tools, How To Guides An, please read the originial post: here