spacer

Web Hacking Survival Kit

spacer
When doing a manual security assessment of a web application you generally only require a web browser and a local proxy server that allows you to trap and modify requests. Aside from those basic tools, there are a few tools and resources that come in handy. The following  pages are dedicated to the tools and resources I use, or that I find useful.

  • Pentesting Tools
    • Browser Extensions
  • News and Blogs

This site does not condone malicious hacking of websites. The details, descriptions, tools and links provided are intended for auditing and educational purposes. Using this information for bad intent is, well… bad.

Share this:

  • Email
  • Print
  • Copyright © 2015 | WordPress Theme by MH Themes

    gipoco.com is neither affiliated with the authors of this page nor responsible for its contents. This is a safe-cache copy of the original web site.