exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 51 - 75 of 177 RSS Feed

Files

arpalert-0.4.15.tar.gz
Posted Dec 3, 2005
Authored by Thierry Fournier | Site perso.numericable.fr

arpalert uses ARP address monitoring to help prevent unauthorized connections on the local network. If an illegal connection is detected, a program or script is launched, which could be used to send an alert message, for example.

Changes: One bug fix and some code rewrites.
tags | local
systems | unix
SHA-256 | 8808dfc169757701cdb0c29529dd1b913bd7e9c782a794f0a4b161062047ac20
arpalert-0.4.14.tar.gz
Posted Nov 15, 2005
Authored by Thierry Fournier | Site perso.numericable.fr

arpalert uses ARP address monitoring to help prevent unauthorized connections on the local network. If an illegal connection is detected, a program or script is launched, which could be used to send an alert message, for example.

Changes: Flood detection and some small tweaks.
tags | local
systems | unix
SHA-256 | 9fa6dbc00464a0c332d3c31d644bbd9d9931dcbc6876e1f570c7d708602285ac
vr-10.0b.tar.gz
Posted Nov 2, 2005
Site visualware.com

VisualRoute is a traceroute tool which displays a map of the path to the destination server by looking up the geographical location of each traceroute hop. The network service provider is identified for each hop, and instant domain and network whois information enable quick problem or abuse reporting.

Changes: See the changelog.
systems | unix
SHA-256 | 2db0fc895cb8f4652f3daf2ecf8d693cff12eb3130f327c005064fa6daf44441
arpalert-0.4.13.tar.gz
Posted Nov 1, 2005
Authored by Thierry Fournier | Site perso.numericable.fr

arpalert uses ARP address monitoring to help prevent unauthorized connections on the local network. If an illegal connection is detected, a program or script is launched, which could be used to send an alert message, for example.

Changes: Small bug fix and command line errors had verbosity added.
tags | local
systems | unix
SHA-256 | 9bfb12da950f19a0f8d4d72432c0ef3df379fd765630c710fa97aab5a220fddf
look_for_hidden_files.tar.gz
Posted Nov 1, 2005
Authored by Piotr Sobolewski | Site rozrywka.jawsieci.pl

look_for_hidden_files is a script which uses debugfs to read the contents of the filesystem without using the kernel's filesystem support and then compares the resulting list with the analogous output from ls. If there is a discrepancy, it indicates some sort of trouble, most likely invasion of the system by a malicious intruder.

tags | kernel
systems | unix
SHA-256 | 50f3d1a95d7e9a46cd6bb0a9d23a73156c732008394c738db3b8e0202c854e93
arpalert-0.4.12.tar.gz
Posted Oct 31, 2005
Authored by Thierry Fournier | Site perso.numericable.fr

arpalert uses ARP address monitoring to help prevent unauthorized connections on the local network. If an illegal connection is detected, a program or script is launched, which could be used to send an alert message, for example.

Changes: Unauthorized request detection. STDOUT logging when not in daemon mode. Various bug fixes.
tags | local
systems | unix
SHA-256 | f8d521924fc1bf17556f75651ad1ffe9444beac125f44dbea47636b558c1b73f
arpalert-0.4.11.tar.gz
Posted Oct 12, 2005
Authored by Thierry Fournier | Site perso.numericable.fr

arpalert uses ARP address monitoring to help prevent unauthorized connections on the local network. If an illegal connection is detected, a program or script is launched, which could be used to send an alert message, for example.

Changes: Now uses privilege separation and a chroot. Ported to various BSDs.
tags | local
systems | unix
SHA-256 | a8a3511b4e96672440462995513f0b3217988917cd4e47999dc3c2b6ea24253a
portcheck.pl.txt
Posted Aug 31, 2005
Site rst.void.ru

Simple and efficient port scanning utility to audit what ports are open on a machine. Works much like netstat without having to trust netstat.

systems | unix
SHA-256 | d82b6fbf527183bbc75ad70635488c19834d003b841acb9c88a06612ff13c43f
vr-9.3f.tar.gz
Posted Aug 5, 2005
Site visualware.com

VisualRoute is a traceroute tool which displays a map of the path to the destination server by looking up the geographical location of each traceroute hop. The network service provider is identified for each hop, and instant domain and network whois information enable quick problem or abuse reporting.

Changes: See the changelog.
systems | unix
SHA-256 | 0ffdcf647e685c3c695704b311bc39652f1ac645a754254653099bb1380e33a2
arpalert-0.4.10.tar.gz
Posted Jul 21, 2005
Authored by Thierry Fournier | Site perso.numericable.fr

arpalert uses ARP address monitoring to help prevent unauthorized connections on the local network. If an illegal connection is detected, a program or script is launched, which could be used to send an alert message, for example.

Changes: Added the man page.
tags | local
systems | unix
SHA-256 | 85f68830d30e27cbdd69eb2279a9825aac020830b7de5e3524c00948f8178daa
arpalert-0.4.9.tar.gz
Posted Jul 19, 2005
Authored by Thierry Fournier | Site perso.numericable.fr

arpalert uses ARP address monitoring to help prevent unauthorized connections on the local network. If an illegal connection is detected, a program or script is launched, which could be used to send an alert message, for example.

Changes: Bug fix.
tags | local
systems | unix
SHA-256 | 6ba38868cc96eae79b4764eba2bcb770fa874f27d731774ec234fdf9eb9f988d
arpalert-0.4.7.tar.gz
Posted Jul 12, 2005
Authored by Thierry Fournier | Site perso.numericable.fr

arpalert uses ARP address monitoring to help prevent unauthorized connections on the local network. If an illegal connection is detected, a program or script is launched, which could be used to send an alert message, for example.

Changes: Added an alert.
tags | local
systems | unix
SHA-256 | ca1333d85a5718316557bd95003212429c40990b2389791daae0519c2e764750
vr-9.3d.tar.gz
Posted Jul 7, 2005
Site visualware.com

VisualRoute is a traceroute tool which displays a map of the path to the destination server by looking up the geographical location of each traceroute hop. The network service provider is identified for each hop, and instant domain and network whois information enable quick problem or abuse reporting.

Changes: See the changelog.
systems | unix
SHA-256 | c39e995f5dc2478ad8a0c7851aa01c3382b0f694edf74b506b3e4c40229dec64
arpalert-0.4.5.tar.gz
Posted Jun 29, 2005
Authored by Thierry Fournier | Site perso.numericable.fr

arpalert uses ARP address monitoring to help prevent unauthorized connections on the local network. If an illegal connection is detected, a program or script is launched, which could be used to send an alert message, for example.

Changes: Bug fix release.
tags | local
systems | unix
SHA-256 | 5dcc2a411aa6868377d0406fd8e9e3ceb491aac8e1ac663e04999da13522c7e2
arpalert-0.4.4.tar.gz
Posted Jun 20, 2005
Authored by Thierry Fournier | Site perso.numericable.fr

arpalert uses ARP address monitoring to help prevent unauthorized connections on the local network. If an illegal connection is detected, a program or script is launched, which could be used to send an alert message, for example.

tags | local
systems | unix
SHA-256 | 27b11a8257640ddee911ed02c6b2be6078e43dff5eab97f037a5171277b154a5
vr-9.3c.tar.gz
Posted Jun 1, 2005
Site visualware.com

VisualRoute is a traceroute tool which displays a map of the path to the destination server by looking up the geographical location of each traceroute hop. The network service provider is identified for each hop, and instant domain and network whois information enable quick problem or abuse reporting.

Changes: Maintenance Release.
systems | unix
SHA-256 | 2e843d3352ba65a6785170a2978a23c0e1d08982e6e90e315c9ddbe7d9ee22ca
ifchk-0.95b4.tar.gz
Posted Jun 1, 2005
Authored by noorg | Site noorg.org

Ifchk is a network interface promiscuous mode detection tool that reports on the operational state of all configured interfaces present on the system. In addition, it will disable those interfaces found to be promiscuous if told to do so. Per-interface statistics can also be displayed, allowing administrators to perform traffic trend analysis, which could be an aid in the identification of possible inconsistencies or spikes in network traffic volume that may warrant further investigation.

Changes: Minimal updates.
systems | unix
SHA-256 | 53c9119449e8abd7a546074918d558c0dbee08c6851f5d742192f9d4a6c9f98d
netleak-0.1a.tgz
Posted Jan 18, 2005
Authored by Jonas | Site netleak.sourceforge.net

Network Leak Finder is a collection of small Perl scripts that detects connectivity between network segments. It is mostly useful to detect leaks in large organizations that have private network segments physically separated or firewalled from the Internet.

tags | perl
systems | unix
SHA-256 | dc97597188f017613ab2b39f6c6da83a4f198d6ab814b13504c993ba1995e6d1
ifchk-0.95b3.tar.gz
Posted Jan 6, 2005
Authored by noorg | Site noorg.org

Ifchk is a network interface promiscuous mode detection tool that reports on the operational state of all configured interfaces present on the system. In addition, it will disable those interfaces found to be promiscuous if told to do so. Per-interface statistics can also be displayed, allowing administrators to perform traffic trend analysis, which could be an aid in the identification of possible inconsistencies or spikes in network traffic volume that may warrant further investigation.

Changes: Minimal updates.
systems | unix
SHA-256 | ce7f6a107c0e49df5ee8181fc2d13b8ed5da34db9446020cac7c1f8f82df3397
bglimiter-0.1.tar.gz
Posted Jan 5, 2005
Authored by Albert S. Causing | Site coderhythms.com

Utility for limiting background processes on a per user basis on BSD platforms.

systems | unix, bsd
SHA-256 | 87efdec9a8c8dc19cc2e6a8efa2f03d19a8c4748eaee2b3c1d798bb7c86f4153
arpalert.tar.gz
Posted Dec 12, 2004
Authored by Thierry Fournier | Site perso.numericable.fr

arpalert uses ARP address monitoring to help prevent unauthorized connections on the local network. If an illegal connection is detected, a program or script is launched, which could be used to send an alert message, for example.

tags | local
systems | unix
SHA-256 | b8955ae8ecdf629bea2a66cf408810c212bf51f264a111e850a2ffccbc273765
xscreensaver-4.18.tar.gz
Posted Nov 11, 2004
Authored by Jamie Zawinski | Site jwz.org

XScreenSaver is a modular screen saver and locker for the X Window System. It is highly customizable and allows the use of any program that can draw on the root window as a display mode. It is also more stable than xlock and has more than 150 modes.

Changes: Oops, pay no attention to the man behind the curtain.
tags | root
systems | unix
SHA-256 | 26c217a35c5382d69ad6392dbb870448fd936dd1105f44894c3652d59bfc2ed0
apache_1.3.33.tar.gz
Posted Oct 29, 2004
Site apache.org

Apache is the most popular webserver on the Internet, quite possibly the best in terms of security, functionality, efficiency, and speed.

Changes: This release addresses security issues related to mod_include and mod_proxy.
systems | unix
advisories | CVE-2004-0492, CVE-2004-0940
SHA-256 | c7327891a6dba926e97d701463f9877fa164757189d192aac8d52100bf2a2484
SpAD-0.1.tgz
Posted Oct 27, 2004
Authored by Leandro Sagliocco | Site logiman.com

Speaker Alarm Dir watches a selected directory and plays a custom PC speaker sound when a file is added or removed.

systems | unix
SHA-256 | 3e3a3c0eafb2b4f955d485d225fd6a78a40f3e6f712d19637cc17589fc965d7b
ifchk-0.95b2.tar.gz
Posted Oct 27, 2004
Authored by noorg | Site noorg.org

Ifchk is a network interface promiscuous mode detection tool that reports on the operational state of all configured interfaces present on the system. In addition, it will disable those interfaces found to be promiscuous if told to do so. Per-interface statistics can also be displayed, allowing administrators to perform traffic trend analysis, which could be an aid in the identification of possible inconsistencies or spikes in network traffic volume that may warrant further investigation.

systems | unix
SHA-256 | 831a4f304c8d235334dd1e8ae673404ee23c34646ce4e58b36ff8c407db0fc32
Page 3 of 8
Back12345Next

Top Authors In Last 30 Days

Recent News

News RSS Feed
Google Patches Critical Chrome Vulnerability
Posted Apr 24, 2024

tags | headline, flaw, google, patch, chrome
Hackers Are Using Developing Countries For Ransomware Practice
Posted Apr 24, 2024

tags | headline, hacker, malware, cybercrime, fraud, cryptography
Authorities Investigate LabHost Users After Phishing Service Shutdown
Posted Apr 23, 2024

tags | headline, cybercrime, fraud, phish
Windows Vulnerability Reported By The NSA Exploited To Install Russian Malware
Posted Apr 23, 2024

tags | headline, government, microsoft, usa, russia, flaw, cyberwar, spyware, nsa
UnitedHealth Admits Breach Could Cover Substantial Proportion Of People In America
Posted Apr 23, 2024

tags | headline, hacker, privacy, data loss
Microsoft DRM Hack Could Allow Movie Downloads From Streaming
Posted Apr 23, 2024

tags | headline, microsoft, flaw, pirate
Over A Million Neighbourhood Watch Members Exposed
Posted Apr 23, 2024

tags | headline, privacy, britain, data loss
MITRE Hacked By State Sponsored Group Via Ivanti Zero Days
Posted Apr 23, 2024

tags | headline, hacker, government
Russia's Sandworm APT Linked To Attack On Texas Water Plant
Posted Apr 18, 2024

tags | headline, malware, usa, russia, cyberwar, scada
EU Tells Meta It Can't Paywall Privacy
Posted Apr 18, 2024

tags | headline, government, privacy, facebook, social
View More News →
packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close