Security List Network™
Follow Us on FacebookFollow Us on Google+Follow Us on TwitterFollow Us on Pinterest
Menu
  • Home
  • About Us
  • Security Archives
  • Partners
Menu
  • Automation
  • Browser
  • Brute Force
  • Code Scripting
  • Cryptography
  • Encryption
  • Exploits
  • Framework
  • Linux Security Distros
  • Mobile Applications Tools
    • Android Tools
    • iPhone Tools
  • Networking
    • Bluetooth
    • Monitoring/System Administrator
    • Network Mapping/Scanner
    • Packet Sniffer/Sniffing
    • Internet Security
    • Spoofing/Spoofer
    • Wireless/wifi
  • Penetration Test
    • BenchMark
    • Cross Site Scripting(XSS)
    • Fuzzer/Fuzzing
    • Sql Injection
    • Stress Testing
  • Security Tools
    • Anti Malware/Virus – Malware Analysis
    • Firewall
    • Intrussion Detection and Prevention System(IDS/IPS)
    • Registry Analysis

SITEMAP

Archives

Browse: Home   /   Oracle
WLT3Serial - Native Java-based deserialization exploits for WebLogic T3 (and T3S) listeners.

WLT3Serial – Native Java-based deserialization exploits for WebLogic T3 (and T3S) listeners.

November 28, 2017
eldad
Exploits

WLT3Serial is an Native Java-based deserialization exploit for WebLogic T3 (and T3S) listeners (as outlined HERE). Requires third-party dependencies ysoserial and wlthint3client. Advantages/Disadvantages compared to…

Read Article →
Dex-Oracle ~ Dalvik deobfuscator which uses limited execution to improve semantic analysis .

Dex-Oracle ~ Dalvik deobfuscator which uses limited execution to improve semantic analysis .

October 30, 2017
Mr.Trojans
Android Tools, Anti Malware/Virus - Malware Analysis

How it Works Dex-Oracle? Oracle takes Android apps (APK), Dalvik executables (DEX), and Smali files as inputs. First, if the input is an APK or…

Read Article →
Pip3line - raw byte manipulation and interception framework.

Pip3line – raw byte manipulation and interception framework.

October 15, 2017
Infosec
Framework, Networking, Penetration Test, Security Tools

Pip3line is a raw bytes manipulation utility, able to apply well known and less well known transformations from anywhere to anywhere (almost). Its main usefulness…

Read Article →
libinjection fuzzer - is a tool to fuzz MySQL database query to find libinjection bypass.

libinjection fuzzer – is a tool to fuzz MySQL database query to find libinjection bypass.

October 9, 2017
EL-Capitan
Code Scripting, Fuzzer/Fuzzing, Sql Injection

libinjection fuzzer is a tool logs found bypasses, valid blocked queries and rest of requests to file for future analysis. Database should be already set…

Read Article →
WAF_Bypass_Helper - WAF bypass generator helper.

WAF_Bypass_Helper – WAF bypass generator helper.

August 13, 2017
Fragile
Firewall, Penetration Test

LEGAL DISCLAMER The author does not hold any responsibility about the bad use of this script, remember that attacking targets without prior concent its ilegal…

Read Article →
PoC of the Poodle Attack against SSL/TLS

poodle-Poc ~ Poodle (Padding Oracle On Downgraded Legacy Encryption) attack.

July 31, 2017
Fragile
Cryptography, Encryption, Penetration Test

poodle-PoC is PoC explore the cryptography behind the attack, it can be assimilate to the MiTM. Poodle allow you to retrieve plaintext messages if the…

Read Article →
DBShield - Database firewall.

DBShield – Database firewall.

March 29, 2017
Terry
Code Scripting, Firewall

DBShield a Protects your data by inspecting incoming queries from your application server and rejecting abnormal ones. Databases Support: + DB2 + MariaDB + MySQL…

Read Article →
python_gdork_sqli - find sql Injection.

python_gdork_sqli – find sql Injection.

January 21, 2017
Infosec
Code Scripting, Penetration Test

python_gdork_sqli is a python script is developed to show, how many vulnerables websites, which are laying around on the web. The main focus of the…

Read Article →
1 2 … 8 Next →

Copyright © 2019

Powered by Worldwide CyberSecurity Team.

  • Digital Forensics
  • Networking
  • Penetration Test
  • Security Tools