Real Name | Ajin Abraham |
---|---|
Email address | private |
Website | www.ajinabraham.com |
First Active | 2012-02-12 |
Last Active | 2017-02-09 |
Whitepaper called Exploiting Node.js Deserialization Bug for Remote Code Execution.
e4c44e481083277da9666876b87977b4453bd1a4aa528dd77e259494519b7b2a
Mobile Security Framework (MobSF) is an all-in-one open source mobile application (Android/iOS) automated pen-testing framework capable of performing static and dynamic analysis. It can be used for effective and fast security analysis of Android and iOS Applications and supports both binaries (APK & IPA) and zipped source code. MobSF can also do Web API Security testing with it's API Fuzzer that performs Information Gathering, analyze Security Headers, identify Mobile API specific vulnerabilities like XXE, SSRF, Path Traversal, IDOR, and other logical issues related to Session Management and API Rate Limiting.
700cdd3f3460d4db512a15ccc778012b27d14b9d9019961e561b1b27ac8ed277
Mobile Security Framework (MobSF) is an all-in-one open source mobile application (Android/iOS) automated pen-testing framework capable of performing static and dynamic analysis. It can be used for effective and fast security analysis of Android and iOS Applications and supports both binaries (APK & IPA) and zipped source code. MobSF can also do Web API Security testing with it's API Fuzzer that performs Information Gathering, analyze Security Headers, identify Mobile API specific vulnerabilities like XXE, SSRF, Path Traversal, IDOR, and other logical issues related to Session Management and API Rate Limiting.
9a9189b4d7fe03495edaca2f8d76a9fbb34f18d666bd43cc24ac1ab1a8d428dd
Mobile Security Framework (MobSF) is an all-in-one open source mobile application (Android/iOS) automated pen-testing framework capable of performing static and dynamic analysis. It can be used for effective and fast security analysis of Android and iOS Applications and supports both binaries (APK and IPA) and zipped source code. MobSF can also do Web API Security testing with it's API Fuzzer that performs Information Gathering, analyze Security Headers, identify Mobile API specific vulnerabilities like XXE, SSRF, Path Traversal, IDOR, and other logical issues related to Session Management and API Rate Limiting.
215db863dcdeca863fb174fd724d9d0cdd0c4653f30eb69dab71e49afcaeda6c
KMPlayer version 3.9.1.130 suffers from an integer division by zero denial of service vulnerability.
46e4225ba329eb3a05698c03f7d702576a31704dd6310911a1965c1518569b5d
WordPress Clean and Simple contact Form plugin version 4.4.0 suffers from a cross site scripting vulnerability.
1d91c931536f21ad20aa07da813acd456f8bec8475ff5a7c8e9689ecb7f54ede
Proof of concept code for the MTS MBlaze 3G Wi-Fi Modem that suffers from credential theft, login bypass, password reset, and cross site request forgery vulnerabilities.
c237b06e1b37e1e0e5a7bab3e3cb3740e9813d5c396e49c2dd6218c589c8f199
The Ultimate XSS Protection Cheat Sheet for Developers is a compilation of information available on XSS Protection from various organizations, researchers, websites, and the author's own experience.
9da5be71c2cceab610824325136d4b2dabd4ac994b7960647f2c0966354aed07
OWASP Xenotix XSS Exploit Framework is an advanced Cross Site Scripting (XSS) vulnerability detection and exploitation framework. It provides Zero False Positive scan results with its unique Triple Browser Engine (Trident, WebKit, and Gecko) embedded scanner. It is claimed to have the world’s 2nd largest XSS Payloads of about 1500+ distinctive XSS Payloads for effective XSS vulnerability detection and WAF Bypass. It is incorporated with a feature rich Information Gathering module for target Reconnaissance. The Exploit Framework includes highly offensive XSS exploitation modules for Penetration Testing and Proof of Concept creation.
ec7eae73fb105951ed22898d881dae39b54e162988b8fdc8b9fc11276d59d8f0
Xenotix is a keylogger for windows that is written in Python. It has the ability to send logs remotely.
16bbf9e5e1780a33332509ebf9181a4f9de56d922e037343ce45e5b75909227f
This paper discusses a number of ways through which hackers can use Mozilla Firefox as a platform to run there malicious pieces of code with privileges and features.
13625ce6c755c96192b50c4a415d4bee4bd21c7137c469ce62b2ea3b7d46cc76
This is a whitepaper called Detecting and Exploiting XSS with Xenotix XSS Exploit Framework.
59617105598315038569fcdcfa35beec89bf540f72b53763cb4364b163e8cd38
This is a whitepaper that was written for beginners learning how to write shellcode.
4408a4e26d5d0e08d0400d47fc4b5fbdc7ea9f4db3d206e9f0a533805edf17ed
Xenotix KeylogX is a keylogger add-on for Mozilla Firefox. It captures and logs keystrokes sent to the browser and you simply type alt-X to retrieve the data from the logfile.
67b0971f10df230d180133c5c89d059079a85c82d7ef454d272f3decf994a478
Whitepaper called Wi-Fi Security with Wi-Fi Protection Plus. Wi-Fi P+ is a new security architecture proposed by the authors.
a1796ef5991f37e305255cca3db5c7cb382fdf8cc9c174e0f73caebf4c6d9270