skip to main |
skip to sidebar
This program is what is known as an "exploiter". It can be used to probe websites for possible vulnerabilities based on user-customisable pre-defined lists. This is a follow up to the popular -=[Triton 0.3]=- program with a great number of improvements.
This program should only be used against sites where you have the permission to do so.
Written By Rhino
Download:
http://project2025.com/Triton.zip
No comments:
Post a Comment