


The Mole uses a command based interface, allowing the user to indicate the action he wants to perform easily. Only by providing a vulnerable URL and a valid string on the site it can detect the injection and exploit it, either by using the union technique or a Boolean query based technique. Mole is an automatic SQL Injection exploitation tool. The Mole: Automatic SQL Injection Exploitation Tool Search additional details about a specific USB device based on its VID and/or PID.When installed with -s flag create crypted storages (7zip archives) to automatically backup and accumulate USB events with the help of crontab scheduler.

Search for “violation events” based on the auth.json: show (or generate another JSON with) USB devices that do appear in history and do NOT appear in the auth.json.Generate a list of authorized (trusted) USB devices as a JSON (call it auth.json).Export gathered information as a JSON dump (and open such dumps, of course).Usbrip (derived from “USB Ripper”, not “USB R.I.P.” astonished) is an open source forensics tool with CLI interface that lets you keep track of USB device artifacts (aka USB event history, “Connected” and “Disconnected” events) on Linux machines. Simple command line forensics tool for tracking USB device artifacts (history of USB events) on GNU/Linux. Hacking Tools > All the tools are related to find security network and framework vulnerability.
