AI/LLM

PenTestPrompt

"PenTestPrompt" is a unique tool that enables users to: -

  • Generate highly effective attack prompts with the context of the application - based on the application functionality and potential threats
  • Allows to automate the submission of generated prompts to target application
  • Leverages API key provided by user to generate prompts
  • Logs and analyzes responses using customizable keywords

Whether you're a security researcher, developer, or organization safeguarding an AI-driven solution, "PenTestPrompt" streamlines the security testing process for LLMs specially to uncover prompt injection vulnerability.

With "PenTestPrompt", the entire testing process can become automated as the key features are: -

  • Generate attack prompts targeting the application
  • Automate their submission to the application models’ API
  • Log and evaluate responses and export results
  • Download only the findings marked as vulnerable by response evaluation system or download the entire log of request-response for further analysis (logs are downloaded as CSV for ease in analysis)

Testers have a comprehensive report of the application’s probable prompt injection vulnerability with evidence.

FileInjector

File Injector is a tool designed to aid creation of documents tampered with prompt injection attacks to assess the robustness of AI systems for indirect prompt injection attacks. It lets you embed hidden instructions or prompts within various file types. This way, you can easily create test cases to evaluate how your AI applications handles such embedded commands.

Key Capabilities

  • Multi-Format Input Support: Upload PDFs and/or images to inject malicious prompts in the document.
  • Dual Interface - CLI and UI: Choose the command-line interface for automation, or use a simple web UI for interactive testing, whichever fits your workflow.
  • Injection Customization: Customize injection methods with different text placements, font sizes, document sections, or even steganography techniques to evaluate how your model reacts.
  • Versatile Prompt Input: Select from a library of known malicious prompts, write your own test cases, or upload files containing complex scenarios for robust coverage.

ServerLess

lambdaScanner

Scan & Secure Toolkit

Footprint, Enumerate, Scan, Tunnel, Trace, Watch & Protect Lambda

‘lambdaScanner’ is a Python-based toolkit for penetration testing AWS Lambda functions. It includes a set of boto3-powered scripts that help testers identify security issues in both deployment configurations and function code. The toolkit supports checks for common weaknesses such as overly broad permissions, SQL injection, command execution, and other logic or configuration flaws.

It is not an automated scanner—testers must craft custom requests and payloads according to the event sources (e.g., S3, DynamoDB, SQS, API Gateway) that trigger the Lambda function. This makes the toolkit flexible for evaluating diverse event patterns and payload behaviors.

The package also includes ‘lambdaProtect’, which can be integrated into Lambda functions to safeguard incoming events and outgoing responses by enforcing additional validation controls.

Scan Tools

wsScanner

Web Services Footprinting, Discovery, Enumeration, Scanning and Fuzzing tool

wsScanner is a toolkit for web services scanning and vulnerability detection. It has the following utilities:

  • Discovery Tool - By leveraging a search engine this tool helps one in discovering web services on any particular domain or with a certain name pattern.
  • Vulnerability Detection - Using this tool one can enumerate and profile web services and then follow it up by auto auditing (.NET only). A .NET proxy is created dynamically for the audit module. One can carry out vulnerability scans for data types, SQL injections, LDAP/command injections, buffer checks, brute-forcing SOAP etc. along with leveraging regex patterns for SOAP analysis.
  • Fuzzing - This tool helps in fuzzing different Web 2.0 streams like SOAP, XML-RPC, REST, JSON etc. This module helps in assessing various different web services.
  • UDDI Scan - It is possible to scan UDDI servers using this tool for foot-printing and discovery of web services.

DOMScan (Beta)

DOMScan - Scanning and Analyzing DOM

DOM as seen in all the aforementioned cases needs to be analysed in many aspects. DOMTracer is a tool to capture real time DOM context along with JavaScript’s. One can observe the DOM in detail using this utility. It aids one to fetch interesting entry points and calls made during ‘Dynamic DOM Manipulation’. Using this tool one can identify various vulnerabilities like:

  • DOM based XSS
  • DOM based vulnerable calls
  • Source of abuse and external content loading methods
  • Possible DOM logic and business layer calls
  • Same Origin Bypass calls and usage
  • Mashup usage inside DOM
  • Widget Architecture review using the tool

XAPScan (Beta)

Silverlight Application Scanning and Analysis

XAPScan is a tool to dissect and understand RIA-based applications written using Microsoft’s Silverlight technology. A Silverlight application creates a XAP file including DLLs and other configuration files. It is imperative to understand client side code and to discover possible vulnerabilities associated with it. One can dissect a XAP file and analyse its contents using this tool:

  • Uncompressing the XAP file to extract package details
  • Analysing cross domain and client access policy
  • Disassembling files using ILDASM and performing searches
  • Parsing the configuration file to identify back-end entry points

Web2Fuzz (Beta)

Web 2.0 Application Auto Fuzzing tool

This tool helps in fuzzing next generation applications running on Web/enterprise 2.0 platform. It can be used with Web2Proxy by harvesting JSON, XML, JS-Object etc. from already profiled HTTP requests. By adding various fuzz loads and injecting them into particular requests, one can encode fuzz load in various forms to pollute/poison Web 2.0 streams. It is possible to analyse responses by using various techniques like response behaviour, stream structure or patterns.

This tool contains a sample payload, which along with the attached pdf/slides would help one understand the tool’s behaviour better.

Web2Proxy (Beta)

Web 2.0 Application Proxy, Profiling and Fuzzing tool

This tool helps in assessing next generation applications running on Web/enterprise 2.0 platform. It profiles HTTP requests and responses at runtime by configuring it as proxy. It identifies structures like JSON, XML, XML-RPC etc. along with key HTTP parameters like cookies, login forms, hidden values etc. Based on profile one can take a decision to trap and fuzz requests to identify potential vulnerabilities.

This tool needs .NET framework and is tested on Windows platform.

AppPrint (Beta)

Web, Application Server and Web 2.0 Fingerprinting tool (Beta)

AppPrint scans IP range, IP or host for Web and Application servers. It scans port 80 for a particular target and tries to deduce the banner using httprint methodology. This gives a best guessed banner for the web server. In the next step it uses a method of forced plug-in invoke and scan for application server type. At this point it tries to fingerprint Tomcat, WebLogic, WebSphere, Orion, ColdFusion and Resin. It also fingerprints Web 2.0 libraries and components.

It requires .NET framework installed.

ScanEx (Beta)

ScanEx - Scanning for iframe and script Injections and External References (Beta)

This is a simple utility which runs against a target site and looks for external references and cross domain malicious injections. There are several sites which get manipulated with these type of injections and are eventually compromised. These sites get registered with stopbadware and other databases as well. This tool helps in the initial scan to look for obvious injections which use <iframe> and <script> tags as defined in the regex file.

scanweb2.0

Web 2.0 Fingerprinting, Scanning and Discovery tools

Scanweb2.0 is a set of ruby scripts which can help in assessing Web 2.0 applications. Here is a list of things it can do:

  • Ajaxfinger - It helps in Ajax framework fingerprinting, it is possible to identify frameworks like Atlas, Dojo, GWT etc. using this script.
  • Flashfinger - One can scan a page for RIA component running with Flash and follow-up assessment is possible. It helps in fingerprinting Laszlo framework as well.
  • Scanajax - It scans for XSS entry points into JavaScript and Web 2.0 applications. It is possible to trace these points and discover XSS.
  • Scanatlas - This script will scan page for atlas reference and discover hidden Web Services.
  • Urlgrep - This script will fetch all JavaScript’s and look for hidden URLs residing in Web 2.0 applications.

Static Tools

AppCodeScan 2.0

Application Code Scanning and Tracing tool

This tool is designed to improve the testing capability of White-Box Testing, where one needs to scan the application code completely for various vulnerabilities like XSS, SQL Injection, CRUD/FLS checks etc. This tool, while tracing the code base, aids in discovering these vulnerable points along the code. It mainly works on the following two areas:

  • Code Scanning - One needs to input the target code folder, an XML containing the rules (Supports regex pattern) and a list of file extensions to scan. It will take this information and run against the target folder in depth, scanning each line of the code for a matching pattern. If the expected pattern is found, the tool will report that line of code.
  • Code Tracer - This utility helps in walking through the code base to trace the needed variable/method/function across its entire path in the large code, which aids in negating false positives from the identified pattern.

This tool needs .NET framework support for its execution.

DOMTracer (Beta)

DOMTracer - Firefox Plugin (Trace DOM and JavaScript Calls)

DOM, as seen in all the aforementioned cases, needs to be analysed in many aspects. DOMTracer is a tool to capture real-time DOM context along with JavaScript. One can observe the DOM in detail using this utility. It aids one in fetching interesting entry points and calls made during ‘Dynamic DOM Manipulation’. Various vulnerabilities like DOM-based XSS, vulnerable calls, same-origin bypass calls, etc. can be identified using this tool.

This tool is a Firefox extension written using the XUL Platform and JavaScript language majorly.

ILText

Fetch hardcoded string with call detail from IL

This tool is used in analysing application (web/mobile) .NET assemblies, thick client desktop or Silverlight applications during penetration testing. By analysing, it is possible to determine the internal logic by fetching a hardcoded string within their respective calls or functions. The fetched hardcoded strings like file-path, connection strings, usernames, passwords, crypto usages etc. help in enhancing guided testing across the application by building a threat model, which in turn helps in defining possible attack vectors and their target locations.

IL Text helps in various scenarios where one can supply single or multiple assemblies and select options to grab strings along with their target calls. In the analysis phase, the tool will go to each function call step by step and also display the function names which are called internally. This allows the pen tester to get an idea about the context in which this API or string is implemented in the code. For example: - If one observes a string “test123” in the assembly, it is very difficult to figure out the context in which the string is used from the IL dump but if it is mapped to a function, say “Login” function, then it can be a hardcoded password or possible backdoor.

web2wall

Web Application/Services Firewall - IHTTPModule for Web 2.0 application

Microsoft’s .NET framework includes two interfaces – IHTTPModule and IHTTPHandler. These two interfaces can be leveraged to provide application-level defence customized to application-level, folder-level or variable-level. This can act as the first line of defence, before any incoming request touches the Web Application source code level. This is Web Application defence at the gates, for the .NET framework on IIS.

Web2wall is a simple binary module which can be loaded on one’s Web 2.0 applications. One can defend the application layer code by using regex patterns; this can help in filtering XML and JSON streams.

Mobile

ScanDroid(Beta) - Ruby Script

Scanning Android based apps

ScanDroid reverse engineers an android application – it scans through the code and detects possible vulnerabilities. It points out some interesting entry points and calls, which can be analysed for vulnerabilities by the user. This tool runs on Ruby and using it one can:

  • Extract all the files from the APK file.
  • Convert the files to readable xml formats and the classes to .smali format.
  • Convert classes.dex file to separate .class files.
  • Convert .class files to readable java code.
  • Check the code for possible vulnerabilities.
  • Check the androidmanifest.xml for additional information.

DumpDroid

Security Snapshot - Android

Android is one of the leading operating systems for smart phones and tablets with nearly 80% market share in the smart phone market. With the increase in the use of Android, there is an increase in malware/attack agents attacking Android users and devices with malicious code and intent. With this increase it is imperative to have information and a profile of the device from a system perspective. A periodic scan of the device will help a user to understand and analyse the changes made to the system over a certain period. DumpDroid is a tool that caters to this objective – it quickly scans and builds a profile of the device.

DumpDroid collects information about the device’s current posture and provides a snapshot of the same to the user for analysis. It categorizes information into different sections i.e. OS information, running services information, hardware information, system application information, user installed applications, network information, browser information and call log information. One can quickly go through this report and identify the potential loopholes and permission issues. It marks the applications, of which it is suspicious about, having dangerous permissions so one can decide on its impact. DumpDroid allows running scan by customizing profile and scanning options. DumpDroid presents the report in a simple HTML format.

CHECK DEBUGGABLE

One of the key attribute under ‘Application’ section in a manifest file is ‘Debuggable’ which describes whether the application is in debug mode or not. CheckDebuggable is a Ruby script which takes an APK file, extracted using ‘Apktool’, as input to check whether the ‘Debuggable’ flag is set to true.

In order to run the CheckDebuggable script, the ‘Apktool’ should be in the same directory. For Linux, execute permission should be assigned. This tool runs on Ruby. The command to run the script is: -

CheckDebuggable.rb -f

Example:

CheckDebuggable.rb -f DumpDroid.apk

FSDroid

Mobile application hacking and security is becoming a major concern in today’s world – especially with BYOD and user’s rooting their own devices. The release cycle of mobile applications is quite frequent compared to that of web applications making it imperative to test these applications from the security/privacy standpoint before launching them. Automated scanning of static/dynamic web applications has its own limitations due to which vulnerability detection is not accurate. Hence, manual review of applications plays a key role in vulnerability detection. We can make some tools which would reduce the time for some tedious and time consuming processes.

Amongst mobile attacks and device enumerations, local storage is a key target for attacks and a potential exploit by information harvesting. It affects the security and privacy of the user and corporates. FSDroid is an automated program to penetrate and analyse the local storage of the most widely used mobile platform – Android. FSDroid leverages system calls provided in SDK to monitor file system and help in identifying the files/directories that have been modified/accessed by any target applications. It can be installed on an emulator, with an objective to monitor the file system calls and review the content while the application is running in order to discover potential vulnerabilities.

It is an Android Application and can be installed using:

#adb install FSDroid.apk

New features in version 0.02 (Beta) of FSDroid

  • Recursive Monitoring
  • Assign permission from FSDroid - Selecting an application gives required permission of target application

iAppliScan

Amongst the mobile attack vectors and security weaknesses, local storage and its misuse is considered as a key security concern. Unlike android, iOS does not provide any API to monitor the file system directly. One needs to dig in to the files/directories to find information stored in local storage across applications. Since looking into each file in the directory is a tedious and time consuming process, it would be helpful to have a simple utility to penetrate and analyse the local storage in an iOS platform.

iAppliScan is this automated tool for review of iOS applications. Taking few parameters as input, it gives one pointers to possible vulnerabilities or weaknesses of the applications. The current version of iAppliScan needs a jailbroken device with SSH access to interface. The device and iAppliScan need to be in the same network with access. Some of the interesting features of iAppliScan are:

  • Look for sensitive information in files/directories
  • Find whether particular file exist or not
  • Download file for further analysis
  • Run external command

iAppliScan lets you automate the review of the iOS application with passing few parameters. It gives pointers to possible vulnerabilities or weakness of the application.

New features in version 0.02 (Beta) of iAppliScan

  • Poor cryptography detection - Detects Encoding (Base64, Hex, URL, HTML, GZip) and Hashing (MD5, SHA256, SHA384, SHA512)
  • Load/Save configuration for future use