scara Posted July 13, 2006 Report Posted July 13, 2006 This program is what is known as an "exploiter". It can be used to probe websites for possible vulnerabilities based on user-customisable pre-defined lists. This is a follow up to the popular -=[Triton 0.3]=- program with a great number of improvements.This program should only be used against sites where you have the permission to do so."Quemadmodum gladius neminem occidit, occidentis telum est." ..... or something like that :@ http://www.project2025.com/images/screensh..._screenshot.jpgsreenshotsi download:http://www.project2025.com/Triton.zip Quote