mirror of
https://github.com/autistic-symposium/sec-pentesting-toolkit.git
synced 2025-06-04 13:19:04 -04:00
Add some fuzzing stuff and wordlists
This commit is contained in:
parent
4261c9c087
commit
4d24e016b8
160 changed files with 7723391 additions and 527 deletions
35
Vulnerabilities_and_Exploits/Payloads/laudanum-0.8/README
Executable file
35
Vulnerabilities_and_Exploits/Payloads/laudanum-0.8/README
Executable file
|
@ -0,0 +1,35 @@
|
|||
Laudanum: Injectable Web Exploit Code v0.4
|
||||
|
||||
By Kevin Johnson <kjohnson@secureideas.net>
|
||||
and the Laudanum Development Team
|
||||
|
||||
Project Website: http://laudanum.secureideas.net
|
||||
Sourceforge Site: http://sourceforge.net/projects/laudanum
|
||||
|
||||
SVN : svn co https://laudanum.svn.sourceforge.net/svnroot/laudanum laudanum
|
||||
|
||||
-------------------------------------------------------------------------------
|
||||
** Copyright (C) 2012 Kevin Johnson and the Laudanum Project Team
|
||||
**
|
||||
** This program is free software; you can redistribute it and/or modify
|
||||
** it under the terms of the GNU General Public License as published by
|
||||
** the Free Software Foundation; either version 2 of the License, or
|
||||
** (at your option) any later version.
|
||||
**
|
||||
** This program is distributed in the hope that it will be useful,
|
||||
** but WITHOUT ANY WARRANTY; without even the implied warranty of
|
||||
** MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
||||
** GNU General Public License for more details.
|
||||
**
|
||||
** You should have received a copy of the GNU General Public License
|
||||
** along with this program; if not, write to the Free Software
|
||||
** Foundation, Inc., 59 Temple Place - Suite 330, Boston, MA 02111-1307, USA.
|
||||
-------------------------------------------------------------------------------
|
||||
|
||||
I. ABOUT
|
||||
_____________________________________
|
||||
Laudanum is a collection of injectable files, designed to be used in a pentest
|
||||
when upload vulnerabilities, administrative interfaces, and SQL injection flaws
|
||||
are found. These files are written in multiple languages for different
|
||||
environments. They provide functionality such as shell, DNS query, LDAP
|
||||
retrieval and others.
|
Loading…
Add table
Add a link
Reference in a new issue