Wednesday, 27 August 2008

Triton

This program is what is known as an "exploiter". It can be used to probe websites for possible vulnerabilities based on user-customisable pre-defined lists. This is a follow up to the popular -=[Triton 0.3]=- program with a great number of improvements.

This program should only be used against sites where you have the permission to do so.

Written By Rhino

Download:

http://project2025.com/Triton.zip


No comments: