<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
		<id>https://wiki.owasp.org/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=St0rn</id>
		<title>OWASP - User contributions [en]</title>
		<link rel="self" type="application/atom+xml" href="https://wiki.owasp.org/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=St0rn"/>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php/Special:Contributions/St0rn"/>
		<updated>2026-05-01T21:06:32Z</updated>
		<subtitle>User contributions</subtitle>
		<generator>MediaWiki 1.27.2</generator>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Checkfault&amp;diff=188008</id>
		<title>Checkfault</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Checkfault&amp;diff=188008"/>
				<updated>2015-01-13T20:44:47Z</updated>
		
		<summary type="html">&lt;p&gt;St0rn: Created page with &amp;quot;==Description==  Checkfault is a python script for help to exploit writting. This script automatically get the offset to control EBP and EIP Register like Windbg byakugan plug...&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==Description==&lt;br /&gt;
&lt;br /&gt;
Checkfault is a python script for help to exploit writting.&lt;br /&gt;
This script automatically get the offset to control EBP and EIP Register like Windbg byakugan plugin function&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Requirements==&lt;br /&gt;
&lt;br /&gt;
Python, python-ptrace&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Features==&lt;br /&gt;
&lt;br /&gt;
 * Generate a junk automatically&lt;br /&gt;
 * Get EBP and EIP control offset&lt;br /&gt;
 * Two ways to use: &lt;br /&gt;
   - arg: For CLI program who use command line arguments&lt;br /&gt;
   - get: For others&lt;br /&gt;
&lt;br /&gt;
==Usage==&lt;br /&gt;
&lt;br /&gt;
python checkfault.py [Type] [Binary] [Junk_Length]&lt;br /&gt;
&lt;br /&gt;
Type = arg or get&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Download==&lt;br /&gt;
&lt;br /&gt;
http://anbu-pentest.com/tools/checkfault/checkfault.tar&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Category:Non-OWASP_Open_Tool]]&lt;/div&gt;</summary>
		<author><name>St0rn</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=UPnP_Scanner&amp;diff=188007</id>
		<title>UPnP Scanner</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=UPnP_Scanner&amp;diff=188007"/>
				<updated>2015-01-13T20:34:02Z</updated>
		
		<summary type="html">&lt;p&gt;St0rn: Created page with &amp;quot;==Description==  UPnP Scanner is a LAN pentest script for collect UPnP configuration file from target   ==Requirements==  Python, Scapy   ==Features==   * Passive Scan (Sniffi...&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==Description==&lt;br /&gt;
&lt;br /&gt;
UPnP Scanner is a LAN pentest script for collect UPnP configuration file from target&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Requirements==&lt;br /&gt;
&lt;br /&gt;
Python, Scapy&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Features==&lt;br /&gt;
&lt;br /&gt;
 * Passive Scan (Sniffing)&lt;br /&gt;
 * Active Scan  (M-SEARCH Request)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Download==&lt;br /&gt;
&lt;br /&gt;
http://anbu-pentest.com/tools/upnp_scanner/UPnP_Scanner.tar&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Category:Non-OWASP_Open_Tool]]&lt;/div&gt;</summary>
		<author><name>St0rn</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Anbu_:_TCP_Session_Hunter&amp;diff=188006</id>
		<title>Anbu : TCP Session Hunter</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Anbu_:_TCP_Session_Hunter&amp;diff=188006"/>
				<updated>2015-01-13T20:24:52Z</updated>
		
		<summary type="html">&lt;p&gt;St0rn: Created page with &amp;quot;==Description==  Anbu is a network (LAN) pentesting script for RST Hijacking and TCP Session Hijacking   ==Requirements==  Python, Scapy, Xterm, Iptable   ==Demonstration==  h...&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==Description==&lt;br /&gt;
&lt;br /&gt;
Anbu is a network (LAN) pentesting script for RST Hijacking&lt;br /&gt;
and TCP Session Hijacking&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Requirements==&lt;br /&gt;
&lt;br /&gt;
Python, Scapy, Xterm, Iptable&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Demonstration==&lt;br /&gt;
&lt;br /&gt;
https://www.youtube.com/watch?v=3b8WBQreY8U&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Download==&lt;br /&gt;
&lt;br /&gt;
http://anbu-pentest.com/tools/anbu/anbu.tar&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Category:Non-OWASP_Open_Tool]]&lt;/div&gt;</summary>
		<author><name>St0rn</name></author>	</entry>

	</feed>