Quantcast
Channel: Web Security Research - Lab
Viewing all 76 articles
Browse latest View live

XSScrapy.py XSS Vulnerability Spider

$
0
0
XSScrapy.py XSS Vulnerability Spider

İnstall Secenekleri İki Tür Yolu Var

Yol 1 
apt-get install python-pip ( Kali 2.7 Olursa )  



cd xsscrapy

pip install -r requirements.txt

Yol 2 

root@kali$ unzip dosya 



 


Kullanımı : 
python xsscrapy.py -u http://example.com


python xsscrapy.py -u http//example.com/login -l loginname -p pa$$word (Vulnerable.txt) Kayıt eder

 



http://sectoolmarket.com/reflected-cross-site-scripting-detection-accuracy-unified-list.html



[Fing] Tool for Network Scan and Analysis for iPhone

$
0
0



Highlight of features: 
+ Discovers all devices connected to a Wi-Fi network. No limitation! 
+ Displays the MAC Address and up-to-date Vendor names. 
+ Customize names, icons and notes. 
+ Wake On LAN. Switch on your cable-connected devices.
+ History of all discovered networks. You can review and edit your past scans at any time, also offline. 
+ Checks the availability of Internet connection, reporting the geographic location of the ISP (Internet Service Provider). 
+ Share a detailed report of any scan via email
+ Search devices by IP, MAC, Name, Vendor and Notes
+ In-app settings
+ Scans the open ports to find available services. It uses a fast engine that supports hundreds of well-known ports, that you can customize with your own
+ Translates IP addresses to its Domain Names, and reverse 
+ Works also with hosts outside your local network
+ Tracks when a device has gone UP or DOWN, keeping disconnected devices in the list.
+ Discovers NetBIOS names.
+ Supports identification by IP address. Allows to customize nodes hidden behind a network switch.
+ Can sort devices by IP, MAC, Name, Vendor, State, Last Change.
+ Free of charge, Free of Ads 
+ Integrates with Fingbox to sync and backup your customizations, merge networks with multiple access points, monitor remote networks via Fingbox Sentinels, get notifications of changes, and much more.

Fing is born from the ashes of the famous Look@LAN, with a brand-new engine that makes it even faster and smarter! Available also for Windows, Mac OS X, Linux and more platforms!

[IPhone Analyzer] IPhone Forensics Tool

$
0
0


iPhone Analzyer allows you to forensically examine or recover date from in iOS device. It principally works byimporting backups produced by iTunes or third party software, and providing you with a rich interface to explore,analyse and recover data in human readable formats. Because it works from the backup files everything is forensically safe, and no changes are made to the original data.

Features

  • Supports iOS 2, iOS 3, iOS 4 and iOS 5 devices
  • Multi-platform (Java based) product, supported on Linux, Windows and Mac
  • Fast, powerful search across device including regular expressions
  • Integrated mapping supports visualisation of geo-tagged information, including google maps searches, photos, and cell-sites and wifi locations observed by the device (the infamous "locationd" data)
  • Integrated support for text messages, voicemail, address book entries, photos (including metadata), call records and many many others
  • Recovery of "deleted" sqlite records (records that have been tagged as deleted, but have not yet been purged by the device can often be recovered),/li>
  • Integrated visualisation of plist and sqlite files
  • Includes support for off-line mapping, supporting mapping on computers not connected to the Internet
  • Support for KML export and direct export to Google Earth
  • Browse the device file structure, navigate directly to key files or explore the device using concepts such as "who", "when", "what" and "where".
  • Analyse jail broken device directly over SSH without need for backup (experimental)

[Introspy] Security profiling for blackbox iOS

$
0
0


Blackbox tool to help understand what an iOS application is doing at runtime and assist in the identification of potential security issues.

The tracer can be installed on a jailbroken device to hook and log security-sensitive iOS APIs called by applications running on the device. The tool records details of relevant API calls, including arguments and return values and persists them in a database. Additionally, the calls are also sent to the Console for real-time analysis.

How Introspy works

The tool comprises two separate components: Introspy-iOS and Introspy-Analyzer.

Introspy-iOS is a tracer that can be installed on a jailbroken iOS device. It will hook security-sensitive APIs called by a given application, including functions related to cryptography, IPCs, data storage / protection, networking, and user privacy. The call details are all recorded and persisted in a SQLite database on the device

This database can then be fed to Introspy-Analyzer, which generates an HTML report displaying all recorded calls, plus a list of potential vulnerabilities affecting the application.


[DVIA] Damn Vulnerable iOS Application

$
0
0


Damn Vulnerable iOS App (DVIA) is an iOS application that is damn vulnerable. Its main goal is to provide a platform to mobile security enthusiasts/professionals or students to test their iOS penetration testing skills in a legal environment.

This application covers all the common vulnerabilities found in iOS applications (following OWASP top 10 mobile risks) and contains several challenges that the user can try.

Vulnerabilities and Challenges Included
  • Insecure Data Storage
  • Jailbreak Detection
  • Runtime Manipulation
  • Transport Layer Security
  • Client Side Injection
  • Information Disclosure
  • Broken Cryptography
  • Application Patching

All these vulnerabilities and their solutions have been tested upto IOS 7.0.4.
Every challenge/vulnerability has a link for a tutorial that users can read to learn more on that topic.





[WS_FTP Password Decryptor] Recover FTP login passwords stored by WS_FTP

$
0
0

WS_FTP Password Decryptor is the FREE software to instantly recover FTP login passwords stored by WS_FTP - one of the popular FTP client application.

WS_FTP stores the password for all the past FTP sessions in the "ws_ftp.ini" file so that user don't have to enter it every time. WS_FTP Password Decryptor makes it easy to quickly scan & decrypt all these encrypted FTP login passwords. 

It presents both GUI as well as command line interface which will be useful for Penetration Testers & Forensic investigators.  You can either use it to automatically recover the stored passwords from local system or recover passwords from remote machine by manually feeding WS_FTP "ws_ftp.ini" file.

It works on most of the Windows platforms starting from Windows XP to latest operating system, Windows 8.

Features
Here are main features of WS_FTP Password Decryptor
  •  Instantly scan and recover all stored FTP login passwords from WS_FTP.

  •  Comes with both GUI interface & Command-line version.

  •  Useful for Penetration testers as well as Forensic investigators.

  •  Recover WS_FTP passwords from local as well as remote system.

  •  Save the recovered password list to HTML file for transferring to other system or for future use.

  •  Easier and faster to use with its enhanced user friendly GUI interface.

  •  Support for local Installation and uninstallation of the software.





Screenshots
Here are the screenshots of WS_FTPPasswordDecryptor
Screenshot 1:WS_FTP Password Decryptor is showing the recovered ftp login passwords. Passwords are not shown being sensitive data, you can turn on by clicking on 'Show Password' button below.
WS_FTPPasswordDecryptor showing recovered passwords
Screenshot 2:  Command line usage of WS_FTPPasswordDecryptor showing various examples.
WS_FTPPasswordDecryptor
Screenshot 3:  Exported list of of recovered ftp login passwords by WS_FTPPasswordDecryptor in HTML format.
Exported IM Accounts to HTML






FREE Download WS_FTP Password Decryptor v1.5 
  
License  : Freeware
Platform : Windows XP, 2003, Vista, Windows 7, Windows 8 

Video Beef - Get Protocols And Geolocation

$
0
0



How to get protocols and geo-location using BeEF Browser Exploitation Framework. 

This attack will require Java. In GeoLocation you will get almost full address and latitude and longitude and find the perfect location using Google Map.

[NTFS Permissions Reporter] Display Windows User Access Rights

$
0
0
[NTFS Permissions Reporter] Display Windows User Access Rights

If you are working as a standalone user on a system running one of the latest flavors of the Microsoft Windows operating system, you do not really have much need to assess and verify user permissions on the system. If a PC is shared by many, and maybe even multiple users with administration rights, things may change significantly, as access rights become more difficulty to assess.

The free edition of NTFS Permissions Reporter scans one or multiple of the computer’s hard drives for user permissions, and displays its findings in a report in the end.

NTFS Permissions Reporter Review


When you first start the program after installation, you are asked to select at least one drive, or a specific directory, that you want to scan for user access permissions. It is furthermore possible to exclude directories from being included in the scan, or activate the show members of groups option. Both the filter and email report options, while displayed in the interface, are reserved for users of the standard version of the application.

A click on the run report button in the interface scans the selected directories and drives for user permissions. This may take a while, depending on the amount of folders that need to be scanned, as well as the speed of the PC’s hard drive, and other activities.

The results displays all user groups at the top, highlighting their rights on the drive or directory. NTFS Permissions Reporter furthermore displays scan errors in a log at the bottom of the screen. The tree view allows you to navigate through the folder structure, looking at access rights of specific folders.

When you select a folder, all user groups with access to the folder are displayed. You can click on a user group to see the permissions displayed on the screen in detail.

If you do not want to work with the tree view, you can switch to table view mode instead. This lists all scanned directories in a large table, along with user rights and related information.

You can click on a column header to sort the listing accordingly, for instance by permission, account, or display name.

Reports can be exported to HTML files only in the free version of the program. The standard version of NTFS Permissions Reporter includes additional features, including the option to export to CSV, filters, and full command line support.

The software can only be installed on the system if the Microsoft .NET Framework 4.0 is installed on the system. Compatibility wise, it is compatible with all versions of Windows from Windows XP to the very latest.

Closing Words


If you want to make sure that user access rights on a Windows PC are configured the way they should be, either to check up on a PC’s security, or to make sure that users have sufficient rights to do what they are supposed to do, then NTFS Permissions Reporter is a tool that can aid you in that task.



[DllHijackAuditor] Smart Tool to Audit the Dll Hijacking Vulnerability

$
0
0


Dll Hijack Auditor is the smart tool to Audit against the Dll Hijacking Vulnerability in any Windows application.

This is one of the critical security issue affecting almost all Windows systems. Though most of the apps have been fixed, but still many Windows applications are susceptible to this vulnerability which can allow any attacker to completely take over the system.

DllHijackAuditor helps in discovering all such Vulnerable Dlls in a Windows application which otherwise can lead to successful exploitation resulting in total compromise of the system.

With its simple GUI interface DllHijackAuditor makes it easy for anyone to instantly perform the auditing operation. It also presents detailed technical Audit report which can help the developer in fixing all vulnerable points in the application.

DllHijackAuditor is a standalone portable application which also comes with Installer for local Installation & Uninstallation of software.

It works on wide range of platforms starting from Windows XP to latest operating system, Windows 8.

Features
Here are some of the smart features of DllHijackAuditor,
  • Directly & Instantly audit any Windows Application.
  • Allows complete testing to uncover all Vulnerable points in the target Application
  • Smart Debugger based 'Interception Engine' for consistent and efficent performance without intrusion.
  • Support for specifying as well as auditing of application with custom & multiple Extensions.
  • Timeout Configuration to alter the waiting time for each Application.
  • Generates complete auditing report (in HTML format) about all vulnerable hijack points in the Application.
  • GUI based tool, makes it easy for anyone with minimum knowledge to perform the auditing operation.
  • Does not require any special privilege for auditing of the application (unless target application requires)
  • Free from Antivirus as it does not use any shellcodes or exploit codes which trigger Antivirus to terminate the operation.
  • Fully portable tool which can be run directly on any system.
  • Support for local Installation and uninstallation of the software.    



Here are the screenshots of DllHijackAuditor in action showing various phases of Auditing operation.
 Screenshot 1: DllHijackAuditor ready for the auditing operation
DllHijackAuditor
Screenshot 2: DllHijackAuditor after the completion of Phase 1 (Vulnerability Testing) of auditing operation of WireShark.exe
DllHijackAuditor
Screenshot 3: DllHijackAuditor after the completion of Phase 2 (Exploitation) of auditing operation of WireShark.exe
DllHijackAuditor
Screenshot 4: Complete Audit report generated by DllHijackAuditor as last phase of auditing operation of WireShark.exe
DllHijackAuditor




http://nagareshwar.securityxploded.com/2010/09/11/detecting-slow-dll-hijacking-vulnerability-using-dllhijackauditor/
FREE Download Dll Hijack Auditor v3.0

License  : Freeware
Platform : Windows XP, 2003, Vista, Windows 7, Windows 8

Download 

[DNSChef] Crear y Configurar un DNS Proxy (fake DNS)

$
0
0




DNSChef es una herramienta de seguridad especialmente orientada y destinada a profesionales de Seguridad dedicados a probar los limites de la seguridad de los Sistemas (Pentester) y/o aquellos investigadores que se dedican a analizar las muestras de "Malware".

En cualquiera de los contextos, DNSChef es un software capaz de ejecutar un DNS Proxy (también conocido como fake DNS), es decir, todo un sistema para manipular las tramas de peticiones / respuestas del protocolo DNS.

Con DNS Proxy puede interceptarse una petición DNS a un dominio ejemplo: www.miblog.com y redireccionar ese dominio a una IP local donde poder analizarla, o incluso inyectar una puerta trasera aprovechando alguna vulnerabilidad del navegador WEB.

La versión 0.2 ha introducido soporte para IPv6 por lo que hace de esta una herramienta muy interesante para probar la seguridad de los sistema con soporte IPv6.

Esta aplicación se encuentra desarrollada en Python por lo que puede ser ejecutada en cualquier plataforma que interprete dicho lenguaje de programación.

Cuando se ejecuta dnschef sin ningún tipo de parámetro esta funciona por defecto en el modo de proxy:
# ./dnschef.py

____
||version 0.2 ||/_|
__||_________||_____||_
/_` |'_ \/ __|/ __| '_\/_\_|
|(_||||\__\(__||||__/|
\__,_|_||_|___/\___|_||_|\___|_|
iphelix@thesprawl.org

[*]DNSChefstartedoninterface: 127.0.0.1
[*]Usingthefollowingnameservers: 8.8.8.8
[*]Noparameterswerespecified.Runninginfullproxymode

Por ejemplo, si se hace una simple consulta DNS tal que:
$ host-tAthesprawl.org
thesprawl.orghasaddress 108.59.3.64

La aplicación mostrará una entrada tal que así:
[23:54:03] 127.0.0.1:proxyingtheresponseoftype'A'forthesprawl.org

Para más detalles, sobre la configuración y su utilización recomiendo visitar la página web del proyecto:

http://thesprawl.org/projects/dnschef/

PENTBOX Suite Pentesting Windows Linux Android

$
0
0

PENTBOX: Suite Pentesting - Windows | Linux | Android

Pentbox es una Suite que contiene herramientas para pentesting, entre sus herramientas podemos destacar las siguientes:

1.- Herramientas de Criptográfia.
2.- Herramientas de Redes.
3.- Herramientas Extra.


Esta suite de seguridad informática esta disponible tanto para plataforma Windows, Freebsd, Linux, Osx, entre otros.

Contiene herramientas de las cuales se puede aprovechar mucho, una de las herramientas que mas me llamó la atención fue la herramienta de “Implementacion de un Honeypot” donde podemos simular un puerto abierto y esperar que el atacante se ponga a escanear o atacar dicho puerto, entonces la herramienta nos dará el aviso de una posible intrusión por parte de un atacante sin que este lo note.

Capturas de la herramienta corriendo en diferentes plataformas:
 
Pentbox en Windows: 



Pentbox en Gnu/Linux:






Pentbox en Android


[NetShareMonitor] Network File Share Monitoring Software

[SoftPerfect WiFi Guard] Proteger y Detectar Quién se Conecta a tu Red Wifi

[Wireshark v1.12.0] Network Protocol Analyzer.

Http-enum Automated HTTP Enumeration Tool - Nullsecurity Team http-enum.py


jSQL SQLi Auto Tool

JSQL v0.3 Java Tool Automatic Database İnjection - code.google.com

Paypal Buy Bitcoin Bug Dork - paypal.com bitcoin.org

$
0
0


checkout.asp?UserID=
checkout.asp?cartid=
checkout.cfm?UserID=
checkout.cfm?cartid=
checkout.php?UserID=
checkout.php?cartid=
checkout1.asp?cartid=
checkout1.cfm?cartid=
checkout1.php?cartid=
checkout_confirmed.asp?order_id=
checkout_confirmed.cfm?order_id=
checkout_confirmed.php?order_id=
db/CART/product_details.asp?product_id=
db/CART/product_details.php?product_id=
eshop.php?id=
estore/products.php?cat=
garden_equipment/Fruit-Cage/product.asp?pr=
garden_equipment/Fruit-Cage/product.php?pr=
garden_equipment/pest-weed-control/product.asp?pr=
garden_equipment/pest-weed-control/product.php?pr=
getbook.asp?bookid=
getbook.cfm?bookid=
getbook.php?bookid=
giftDetail.asp?id=
giftDetail.cfm?id=
giftDetail.php?id=
giftshop/product.php?proid=
global/product/product.asp?gubun=
global/product/product.php?gubun=
goods_detail.asp?data=
goods_detail.php?data=
goods_detail.php?goodsIdx=
inurl: prod_detail.php?id=
inurl: prod_detail.php?id=
inurl: prod_info.php?id=
inurl: prod_info.php?id=
inurl: product-item.php?id=
inurl: product-item.php?id=
inurl: product.php?id=
inurl: product.php?id=
inurl: product_ranges_view.php?ID=
inurl: product_ranges_view.php?id=
inurl: productdetail.php?id=
inurl: productdetail.php?id=
inurl: productinfo.php?id=
inurl: productinfo.php?id=
inurl: produit.php?id=
inurl: produit.php?id=
inurl:shop.php?do=part&id=
inurl:shop.php?do=part&id=
inurl:shop_category.php?id=
inurl:shopping.php?id=
inurl:shopping.php?id=
inurl:view_product.php?id=
inurl:view_product.php?id=
irbeautina/product_detail.asp?product_id=
irbeautina/product_detail.php?product_id=
item.asp?eid=
item.asp?id=
item.asp?iid=
item.asp?item_id=
item.asp?itemid=
item.asp?model=
item.asp?prodtype=
item.asp?shopcd=
item.asp?sub_id=
item.cfm?eid=
item.cfm?item_id=
item.cfm?itemid=
item.cfm?model=
item.cfm?prodtype=
item.cfm?shopcd=
item.php?SKU=
item.php?cat=
item.php?code=
item.php?eid=
item.php?id=
item.php?iid=
item.php?item=
item.php?item_id=
item.php?itemid=
item.php?model=
item.php?prodtype=
item.php?shopcd=
item.php?sub_id=
item/detail.php?num=
item/wpa-storefront-the-ultimate-wpecommerce-theme/discussion/61891?page=
itemDesc.asp?CartId=
itemDesc.cfm?CartId=
itemDesc.php?CartId=
item_book.asp?CAT=
item_book.php?CAT=
item_details.asp?catid=
item_details.cfm?catid=
item_details.php?catid=
item_id=
item_list.asp?cat_id=
item_list.asp?maingroup
item_list.cfm?maingroup
item_list.php?cat_id=
item_list.php?maingroup
item_show.asp?code_no=
item_show.asp?id=
item_show.asp?lid=
item_show.cfm?code_no=
item_show.php?code_no=
item_show.php?id=
item_show.php?itemID=
item_show.php?lid=
itemdetail.asp?item=
itemdetail.cfm?item=
itemdetail.php?item=
itemdetails.asp?catalogid=
itemdetails.cfm?catalogid=
itemdetails.php?catalogid=
itemlist.php?categoryID=
kr/product/product.php?gubun=
kshop/home.php?cat=
kshop/product.asp?productid=
kshop/product.php?productid=
order-now.php?prodid=
order.asp?BookID=
order.asp?id=
order.asp?item_ID=
order.asp?lotid=
order.cfm?BookID=
order.cfm?id=
order.cfm?item_ID=
order.php?BookID=
order.php?id=
order.php?item_ID=
order.php?l= order.php?l=
order.php?lang= order.php?lang=
order.php?list= order.php?list=
order.php?ln= order.php?ln=
order.php?p= order.php?p=
order.php?pag= order.php?pag=
order.php?page= order.php?page=
order.php?pg= order.php?pg=
order.php?wp= .php?wp=
order.php?wp= order.php?wp=
order/cart/index.php?maincat_id=
prod.asp?cat=
prod.php?cat=
prod.php?prod= .php?prod=”
prodView.asp?idProduct=
prodView.cfm?idProduct=
prodView.php?idProduct=
prod_detail.php?id=
prod_details.php?id=
prod_details.php?products_id=
prod_indiv.php?groupid=
prod_info.php?id=
prod_show.asp?id=
prod_show.asp?prodid=
prodbycat.asp?intCatalogID=
prodbycat.cfm?intCatalogID=
prodbycat.php?intCatalogID=
proddetail.php?prod=
proddetail.php?prod= .php?prod=”
proddetails_print.php?prodid=
prodetails.asp?prodid=
prodetails.cfm?prodid=
prodetails.php?prodid=
prodlist.asp?catid=
prodlist.cfm?catid=
prodlist.php?catid=
prodotti.asp?id_cat=
prodotti.php?id_cat=
prodrev.php?cat=
product-detail.php?prodid=
product-details.php?prodID=
product-info.php?cat=
product-item.php?id=
product-list.asp?category_id=
product-list.asp?cid=
product-list.asp?id=
product-list.php?category_id=
product-list.php?cid=
product-list.php?id=
product-range.asp?rangeID=
product-range.php?rangeID=
product.asp?****=
product.asp?ItemID=
product.asp?bid=
product.asp?bookID=
product.asp?cat=
product.asp?id=
product.asp?id_h=
product.asp?intProdID=
product.asp?intProductID=
product.asp?pid=
product.asp?prd=
product.asp?prodid=
product.asp?product=
product.asp?product_id=
product.asp?productid=
product.asp?shopprodid=
product.asp?sku=
product.cfm?bookID=
product.cfm?intProdID=
product.php?****=
product.php?ItemId=
product.php?bid=
product.php?bookID=
product.php?brand=
product.php?c=
product.php?cat=
product.php?cat_id=
product.php?fdProductId=
product.php?id=
product.php?id_h=
product.php?inid=
product.php?intProdID=
product.php?intProductID=
product.php?lang=
product.php?par=
product.php?pcid=
product.php?pid=
product.php?pl=
product.php?prd=
product.php?prod_num=
product.php?prodid=
product.php?product=
product.php?product_id=
product.php?product_no=
product.php?productid=
product.php?products_id=
product.php?proid=
product.php?rangeid=
product.php?shopprodid=
product.php?sku=
product.search.php?proid=
product/detail.asp?id=
product/detail.php?id=
product/list.asp?pid=
product/list.php?pid=
product/product.asp?cate=
product/product.asp?product_no=
product/product.php?cate=
product/product.php?product_no=
product2.php?id=
product3.php?id=
productDetail.php?prodId=
productDetails.asp?idProduct=
productDetails.cfm?idProduct=
productDetails.php?idProduct=
productDisplay.asp
productDisplay.cfm
productDisplay.php
productList.asp?cat=
productList.php?cat=
productList.php?id=
product_customed.php?pid=
product_detail.asp?product_id=
product_detail.cfm?id=
product_detail.php?id=
product_detail.php?prodid=
product_detail.php?product_id=
product_details.asp?id=
product_details.asp?prodid=
product_details.asp?product_id=
product_details.php?id=
product_details.php?prodID=
product_details.php?product_id=
product_guide/company_detail.php?id=
product_info.asp?id=
product_info.asp?item_id=
product_info.asp?products_id=
product_info.cfm?item_id=
product_info.php?id=
product_info.php?item_id=
product_info.php?products_id=
product_page.php?id=
product_ranges_view.asp?ID=
product_ranges_view.php?ID=
product_reviews.php?feature_id=
productdetail.php?id=
productdetails.php?prodId=
productinfo.asp?item=
productinfo.cfm?item=
productinfo.php?id=
productinfo.php?item=
productlist.asp?ViewType=Category&CategoryID=
productlist.asp?fid=
productlist.asp?grpid=
productlist.asp?id=
productlist.asp?tid=
productlist.cfm?ViewType=Category&CategoryID=
productlist.php?ViewType=Category&CategoryID=
productlist.php?fid=
productlist.php?grpid=
productlist.php?tid=
productpage.asp
productpage.cfm
productpage.php
productpage.php?ID=
products-display-details.asp?prodid=
products-display-details.php?prodid=
products.asp?DepartmentID=
products.asp?ID=
products.asp?act=
products.asp?cat=
products.asp?cat_id=
products.asp?categoryID=
products.asp?catid=
products.asp?groupid=
products.asp?keyword=
products.asp?openparent=
products.asp?p=
products.asp?rub=
products.asp?type=
products.cfm?ID=
products.cfm?keyword=
products.html?file=
products.php?DepartmentID=
products.php?act=
products.php?area_id=
products.php?cat=
products.php?catId=
products.php?cat_id=
products.php?categoryID=
products.php?cid=
products.php?groupid=
products.php?id=
products.php?keyword=
products.php?mainID=
products.php?openparent=
products.php?p=
products.php?page=
products.php?parent=
products.php?prod= .php?prod=”
products.php?req=
products.php?rub=
products.php?*******=
products.php?sku=
products.php?sub=
products.php?subgroupid=
products.php?type=
products/?catID=
products/Blitzball.htm?id=
products/card.asp?prodID=
products/card.php?prodID=
products/category.php?id=
products/display_product.php?product_id=
products/index.asp?rangeid=
products/index.php?cat=
products/index.php?rangeid=
products/item_show.php?itemId=
products/model.php?id=
products/parts/detail.asp?id=
products/parts/detail.php?id=
products/product-list.asp?id=
products/product-list.php?id=
products/product.asp?id=
products/product.asp?pid=
products/product.php?article=
products/product.php?id=
products/product.php?pid=
products/productdetails.php?prodID=
products/products.asp?p=
products/products.php?cat=
products/products.php?p=
products/testimony.php?id=
products/treedirectory.asp?id=
productsByCategory.asp?intCatalogID=
productsByCategory.cfm?intCatalogID=
productsByCategory.php?intCatalogID=
products_category.asp?CategoryID=
products_category.cfm?CategoryID=
products_category.php?CategoryID=
products_connections_detail.php?cat_id=
products_detail.asp?CategoryID=
products_detail.cfm?CategoryID=
products_detail.php?CategoryID=
products_detail.php?id=
productsview.asp?proid=
productsview.php?proid=
productview.php?id=
produit.php?id=
produit.php?prod= .php?prod=”
produkt.php?prod= .php?prod=”
shop.asp?a=
shop.asp?action=
shop.asp?bookid=
shop.asp?cartID=
shop.asp?id=
shop.cfm?a=
shop.cfm?action=
shop.cfm?bookid=
shop.cfm?cartID=
shop.php?a=
shop.php?action=
shop.php?bookid=
shop.php?cartID=
shop.php?do=part&id=
shop.php?id_cat=
shop.php?prod= .php?prod=”
shop.pl/page=
shop.pl/page= shop.pl/page=
shop/books_detail.asp?bookID=
shop/books_detail.php?bookID=
shop/category.asp?cat_id=
shop/category.php?cat_id=
shop/eventshop/product_detail.asp?itemid=
shop/eventshop/product_detail.php?itemid=
shop/home.php?cat=
shop/index.asp?cPath=
shop/index.php?cPath=
shop/index.php?cat_id=
shop/pages.php?page=
shop/product.php?id=
shop/product_details.php?ProdID=
shop/products.php?cat=
shop/products.php?cat_id=
shop/products.php?p=
shop/shop.php?id=
shop_category.php?id=
shop_details.asp?prodid=
shop_details.cfm?prodid=
shop_details.php?prodid=
shop_display_products.asp?cat_id=
shop_display_products.php?cat_id=
shopaddtocart.asp
shopaddtocart.asp?catalogid=
shopaddtocart.cfm
shopaddtocart.cfm?catalogid=
shopaddtocart.php
shopaddtocart.php?catalogid=
shopbasket.asp?bookid=
shopbasket.cfm?bookid=
shopbasket.php?bookid=
shopbycategory.asp?catid=
shopbycategory.cfm?catid=
shopbycategory.php?catid=
shopcafe-shop-product.asp?bookId=
shopcafe-shop-product.php?bookId=
shopcart.asp?title=
shopcart.cfm?title=
shopcart.php?title=
shopcreatorder.asp
shopcreatorder.cfm
shopcreatorder.php
shopcurrency.asp?cid=
shopcurrency.cfm?cid=
shopcurrency.php?cid=
shopdc.asp?bookid=
shopdc.cfm?bookid=
shopdc.php?bookid=
shopdisplaycategories.asp
shopdisplaycategories.cfm
shopdisplaycategories.php
shopdisplayproduct.asp?catalogid=
shopdisplayproduct.cfm?catalogid=
shopdisplayproduct.php?catalogid=
shopdisplayproducts.asp
shopdisplayproducts.cfm
shopdisplayproducts.php
shopexd.asp
shopexd.asp?catalogid=
shopexd.cfm
shopexd.cfm?catalogid=
shopexd.php
shopexd.php?catalogid=
shopping.php?id=
shopping/index.php?id=
shopping_article.php?id=
shopping_basket.asp?cartID=
shopping_basket.cfm?cartID=
shopping_basket.php?cartID=
shopprojectlogin.asp
shopprojectlogin.cfm
shopprojectlogin.php
shopquery.asp?catalogid=
shopquery.cfm?catalogid=
shopquery.php?catalogid=
shopremoveitem.asp?cartid=
shopremoveitem.cfm?cartid=
shopremoveitem.php?cartid=
shopreviewadd.asp?id=
shopreviewadd.cfm?id=
shopreviewadd.php?id=
shopreviewlist.asp?id=
shopreviewlist.cfm?id=
shopreviewlist.php?id=
shoptellafriend.asp?id=
shoptellafriend.cfm?id=
shoptellafriend.php?id=
shopthanks.asp
shopthanks.cfm
shopthanks.php
shopwelcome.asp?title=
shopwelcome.cfm?title=
shopwelcome.php?title=
shoutbox/expanded.php filetypep:hp
shoutbox/expanded.php?conf=
shoutbox/expanded.php?conf=
show-book.asp?id=
show-book.php?id=
show.asp?id=
show.php?*root*=
show.php?abre=
show.php?adresa=
show.php?b=
show.php?base_dir=
show.php?channel=
show.php?chapter=
show.php?cmd=
show.php?corpo=
show.php?d=
show.php?disp=
show.php?filepath=
show.php?get=
show.php?go=
show.php?header=
show.php?home=
show.php?id=
show.php?inc=
show.php?incl=
show.php?include=
show.php?index=
show.php?ir=
show.php?item=
show.php?j=
show.php?ki=
show.php?l=
show.php?left=
show.php?loader=
show.php?m=
show.php?mid=
show.php?middlePart=
show.php?modo=
show.php?module=
show.php?my=
show.php?n=
show.php?nivel=
show.php?oldal=
show.php?page1= .php?page1=”
show.php?page=
show.php?pageweb=
show.php?pagina=
show.php?param=
show.php?path=
show.php?play=
show.php?pname=
show.php?pre=
show.php?product= .php?product=
show.php?product= show.php?product=
show.php?qry=
show.php?r=
show.php?read=
show.php?recipe=
show.php?redirect=
show.php?seccion=
show.php?second=
show.php?sp=
show.php?thispage=
show.php?to=
show.php?type=
show.php?x=
show.php?xlink=
show.php?z=
showPage.php?type=
showStore.asp?catID=
showStore.cfm?catID=
showStore.php?catID=
show_an.php?id=
show_bug.cgi?id=
show_cv.php?id=
show_item.asp?id=
show_item.cfm?id=
show_item.php?id=
show_item_details.asp?item_id=
show_item_details.cfm?item_id=
show_item_details.php?item_id=
show_news.php?cutepath=
show_news.php?id=
show_prod.php?p=
show_upload.php?id=
showbook.asp?bookid=
showbook.cfm?bookid=
showbook.php?bookid=
showfeature.asp?id=
showfeature.php?id=
showimg.php?id=
showmedia.php?id=
showproduct.asp?cat=
showproduct.asp?prodid=
showproduct.asp?productId=
showproduct.php?cat=
showproduct.php?prodid=
showproduct.php?productId=
showproducts.php?cid=
stockists_list.asp?area_id=
stockists_list.php?area_id=
store-detail.php?ID=
store-details.asp?id=
store-details.cfm?id=
store-details.php?id=
store.asp?cat_id=
store.asp?id=
store.cfm?id=
store.php?cat_id=
store.php?id=
store/customer/product.php?productid=
store/default.asp?cPath=
store/default.php?cPath=
store/description.asp?iddesc=
store/description.php?iddesc=
store/detail.php?prodid=
store/home.asp?cat=
store/home.php?cat=
store/index.asp?cat_id=
store/index.php?cat_id=
store/item.php?id=
store/mcart.php?ID=
store/news_story.php?id=
store/product.asp?productid=
store/product.php?productid=
store/products.php?cat_id=
store/showcat.php?cat_id=
store/store.php?cat_id=
store/store_detail.php?id=
store/view_items.asp?id=
store/view_items.php?id=
store_bycat.asp?id=
store_bycat.cfm?id=
store_bycat.php?id=
store_listing.asp?id=
store_listing.cfm?id=
store_listing.php?id=
store_prod_details.php?ProdID=
storefront.asp?id=
storefront.cfm?id=
storefront.php?id=
storefronts.asp?title=
storefronts.cfm?title=
storefronts.php?title=
storeitem.asp?item=
storeitem.cfm?item=
storeitem.php?item=
storemanager/contents/item.asp?page_code=
storemanager/contents/item.php?page_code=
viewCart.asp?userID=
viewCart.cfm?userID=
viewCart.php?userID=
viewcart.asp?CartId=
viewcart.cfm?CartId=
viewcart.php?CartId=
x/product.php?productid=
xcart/home.php?cat=
xcart/product.php?productid

SHA256 Salted Hash Kracker - securityxploded.com

Password Sniffer Console Password Sniffing Tool Email, Web FTP Login Passwords

Viewing all 76 articles
Browse latest View live