Monday, February 6, 2012

Web Application Analysis

Contents

1 Backdoors
2 CMS Scanners
3 Database Assessment
3.1 MS-SQL
3.2 MYSQL
3.3 Oracle
3.4 SQL Injection Frameworks
4 Fingerprinting
5 Fuzzers
6 Proxies
7 Scanners
8 Security Training Environments and Programs
9 Testing Frameworks
10 Web Browser Assessment
11 Web Browser Plugins

Backdoors

XSS Shell 

CMS Scanners

CMS Explorer
OWASP Joomla Vulnerability Scanner
Plecost-wordpress-fingerprinter
WPScan 

Database Assessment

MS-SQL

DBPwAudit
Metacoretex
Mssqlfp
MSSQLScan
multiinjector
Pblind
SA Exploiter
SQLbrute
SQLiX
SQLMap
SQL Ninja 

MYSQL 

DBPwAudit
Metacoretex
MYSQLAudit
MySploit
Pblind
SQLCheck
SQLData
SQLiX
SQLMap
Sqlsus
UDF 

Oracle

DBPwAudit
Metacoretex
Opquery
Opwg
Oscanner
Ose
Otnsctl
Pblind
SQLbrute
SQLiX
SQLMap 

SQL Injection Frameworks

BSQL Hacker 

Fingerprinting

Wafp 

Fuzzers

FuzzDb
OWASP ZAP
PowerFuzzer
Wfuzz 

Proxies

Burpsuite
Fiddler
OWASP ZAP
Paros Proxy
ProxyStrike
Ratproxy
Webscarab 

Scanners

CSRFTester
Curl
DFF Scanner
DirBuster
Grabber
Grendel Scan
Httprint
Jmeter
Lbd
List Urls
Mini Mysqlat0r
Netsparker Community Edition
Nikto
OpenAcunetix
OWASP ZAP
SecuBat
Skipfish
SoapUI
Swfintruder
W3AF
Wapiti
WebRaider
Webshag
WMAT
x5s
Xsss
Yokoso! 

Security Training Environments and Programs

DVWA
Jarlsberg
Web Security Dojo 

Testing Frameworks

Bizploit
Sahi
Websecurify 

Web Browser Assessment

Beef
Browser Fuzzer 3 (bf3)
Browser Rider 

Web Browser Plugins

Groundspeed
X06D 

No comments: