exploit the possibilities
Showing 51 - 75 of 455 RSS Feed

Files

Nessus XML-RPC Ruby Library 0.3
Posted Mar 8, 2010
Authored by Vlatko Kosturjak | Site rubyforge.org

nessus-xmlrpc is a Ruby library for the Nessus XML-RPC interface. It comes with an example command line program that shows how easy it is to interact with the Nessus scanner.

Changes: Mostly speed improvements (will use keepalive and nokogiri if available). Support for some new functions. Better documentation.
tags | tool, scanner, ruby
systems | unix
MD5 | 23bdc28e21bcf552777d338a9f54b94e
Nessus XML-RPC Ruby Library 0.2
Posted Feb 28, 2010
Authored by Vlatko Kosturjak | Site rubyforge.org

nessus-xmlrpc is a Ruby library for the Nessus XML-RPC interface. It comes with an example command line program that shows how easy it is to interact with the Nessus scanner.

Changes: This is mostly a new features release. The --list-policy and --status command line options were added to the CLI interface.
tags | tool, scanner, ruby
systems | unix
MD5 | 28a82d080b358ca0958109d6de57e170
Rootkit Hunter 1.3.6
Posted Nov 30, 2009
Authored by Michael Boelen | Site rootkit.nl

Rootkit Hunter scans files and systems for known and unknown rootkits, backdoors, and sniffers. The package contains one shell script, a few text-based databases, and optional Perl modules. It should run on almost every Unix variety except Solaris and NetBSD.

Changes: This release offers more ease of use and improved checks. The changelog lists 29 additions including 9 configuration options and details for 12 rootkits, 29 changes including improvements for 15 rootkit checks, and 22 bugfixes.
tags | tool, shell, perl, integrity, rootkit
systems | netbsd, unix, solaris
MD5 | 41bd92b1ea0803401c4a45215c8293a2
Check Rootkit 0.49
Posted Jul 30, 2009
Authored by Nelson Murilo | Site chkrootkit.org

Chkrootkit checks locally for signs of a rootkit. Chkrootkit includes ifpromisc.c to check and see if the interface is in promisc mode, chklastlog.c to check lastlog for deletions, and chkwtmp.c to check wtmp for deletions, strings.c for quick and dirty strings replacement, check_wtmpx.c to check for wtmpx deletions and the files chkproc.c and chkdirs.c to check for LKM trojans. Tested on Linux 2.0.x, 2.2.x and 2.4.x, FreeBSD 2.2.x, 3.x, 4.x, and 5.x, BSDI, OpenBSD 2.6, 2.7, 2.8, 2.9, 3.0 and 3.1, NetBSD 1.5.2 and Solaris 2.5.1, 2.6 and 8.0, and HP-UX 11.

Changes: New and enhanced tests, minor bug fixes.
tags | tool, trojan, integrity, rootkit
systems | linux, netbsd, unix, solaris, freebsd, openbsd, hpux
MD5 | 304d840d52840689e0ab0af56d6d3a18
SQLMAP - Automatic SQL Injection Tool
Posted Jul 28, 2009
Authored by Bernardo Damele | Site sqlmap.org

sqlmap is an open source command-line automatic SQL injection tool. Its goal is to detect and take advantage of SQL injection vulnerabilities in web applications. Once it detects one or more SQL injections on the target host, the user can choose among a variety of options to perform an extensive back-end database management system fingerprint, retrieve DBMS session user and database, enumerate users, password hashes, privileges, databases, dump entire or user's specified DBMS tables/columns, run his own SQL statement, read or write either text or binary files on the file system, execute arbitrary commands on the operating system, establish an out-of-band stateful connection between the attacker box and the database server via Metasploit payload stager, database stored procedure buffer overflow exploitation or SMB relay attack and more.

Changes: Adapted Metasploit wrapping functions to work with latest 3.3 development version too. Adjusted code to make sqlmap 0.7 to work again on Mac OSX too. Various other tweaks and improvements.
tags | web, overflow, arbitrary, vulnerability, sql injection
systems | unix
MD5 | edb1a625fb18b0b8aae2fc15a66a055e
Curuncula Rootkit Detection
Posted Apr 23, 2009
Authored by Giuseppe Cocomazzi

Curuncula is a tool shipped as a loadable kernel module that aims to detect rootkits based on the Intel debugging support facilities. Rootkits that set the GD access flag are also detected. It makes use of the "last branch recording" mechanism provided by the Intel architecture. Support both the 2.4 and 2.6 Linux kernels.

tags | kernel
systems | linux, unix
MD5 | 45435a5c2788ef4e37926b909a998c12
SQLMAP - Automatic SQL Injection Tool
Posted Apr 22, 2009
Authored by Bernardo Damele | Site sqlmap.org

sqlmap is an open source command-line automatic SQL injection tool. Its goal is to detect and take advantage of SQL injection vulnerabilities in web applications. Once it detects one or more SQL injections on the target host, the user can choose among a variety of options to perform an extensive back-end database management system fingerprint, retrieve DBMS session user and database, enumerate users, password hashes, privileges, databases, dump entire or user's specified DBMS tables/columns, run his own SQL statement, read or write either text or binary files on the file system, execute arbitrary commands on the operating system, establish an out-of-band stateful connection between the attacker box and the database server via Metasploit payload stager, database stored procedure buffer overflow exploitation or SMB relay attack and more.

Changes: New features as described at the presentation given at Black Hat Europe.
tags | web, overflow, arbitrary, vulnerability, sql injection
systems | unix
MD5 | e29f0ce962ca55cf04fb2f730ab39d56
SQLMAP - Automatic SQL Injection Tool
Posted Feb 4, 2009
Authored by Bernardo Damele, Daniele Bellucci | Site sqlmap.org

sqlmap is an open source command-line automatic SQL injection tool developed in Python. Its goal is to detect and take advantage of SQL injection vulnerabilities on web applications. Once it detects one or more SQL injections on the target host, the user can choose among a variety of options to perform an extensive back-end database management system fingerprint, retrieve DBMS session user and database, enumerate users, password hashes, privileges, databases, dump entire or user's specific DBMS tables/columns, run his own SQL statement, read specific files on the file system and more.

Changes: Major enhancement to make the comparison algorithm work properly. Major speed increase in DBMS basic fingerprint. Added internal support to forge CASE statements. Various other additions and improvements.
tags | web, vulnerability, sql injection, python
systems | unix
MD5 | 39bd2ada1279314c9d908301683b4c9f
Rootkit Hunter 1.3.4 Is Released
Posted Dec 31, 2008
Authored by Michael Boelen | Site rootkit.nl

Rootkit Hunter scans files and systems for known and unknown rootkits, backdoors, and sniffers. The package contains one shell script, a few text-based databases, and optional Perl modules. It should run on almost every Unix variety except Solaris and NetBSD.

Changes: The changelog for this release is packed listing 4 new additions, 8 changes, and 9 bug fixes.
tags | tool, shell, perl, integrity, rootkit
systems | netbsd, unix, solaris
MD5 | 31eaacc4d01ad138d1a4283f105088e6
SQLMAP - Automatic SQL Injection Tool
Posted Dec 22, 2008
Authored by Bernardo Damele, Daniele Bellucci | Site sqlmap.org

sqlmap is an automatic SQL injection tool developed in Python. Its goal is to detect and take advantage of SQL injection vulnerabilities on web applications. Once it detects one or more SQL injections on the target host, the user can choose among a variety of options to perform an extensive back-end database management system fingerprint, retrieve DBMS session user and database, enumerate users, password hashes, privileges, databases, dump entire or user's specific DBMS tables/columns, run his own SQL SELECT statement, read specific files on the file system and much more.

Changes: Multiple major bug fixes and a handful of minor fixes.
tags | web, vulnerability, sql injection, python
systems | unix
MD5 | 3528f77794e8d2081900f4c9c124ea1a
SQLMAP - Automatic SQL Injection Tool
Posted Nov 5, 2008
Authored by Bernardo Damele, Daniele Bellucci | Site sqlmap.org

sqlmap is an automatic SQL injection tool developed in Python. Its goal is to detect and take advantage of SQL injection vulnerabilities on web applications. Once it detects one or more SQL injections on the target host, the user can choose among a variety of options to perform an extensive back-end database management system fingerprint, retrieve DBMS session user and database, enumerate users, password hashes, privileges, databases, dump entire or user's specific DBMS tables/columns, run his own SQL SELECT statement, read specific files on the file system and much more.

Changes: Multiple major bug fixes and a handful of minor fixes.
tags | web, vulnerability, sql injection, python
systems | unix
MD5 | 7876a218016633ec964bccc1450f1f3d
SQLMAP - Automatic SQL Injection Tool
Posted Oct 21, 2008
Authored by Bernardo Damele, Daniele Bellucci | Site sqlmap.org

sqlmap is an automatic SQL injection tool developed in Python. Its goal is to detect and take advantage of SQL injection vulnerabilities on web applications. Once it detects one or more SQL injections on the target host, the user can choose among a variety of options to perform an extensive back-end database management system fingerprint, retrieve DBMS session user and database, enumerate users, password hashes, privileges, databases, dump entire or user's specific DBMS tables/columns, run his own SQL SELECT statement, read specific files on the file system and much more.

Changes: Major bug fix to blind SQL injection bisection algorithm to handle an exception. Added a Metasploit Framework 3 auxiliary module to run sqlmap. Other additions and bug fixes.
tags | web, vulnerability, sql injection, python
systems | unix
MD5 | e48ced32ed7aef1926b7b5cb706977a4
SQLMAP - Automatic SQL Injection Tool
Posted Sep 3, 2008
Authored by Bernardo Damele, Daniele Bellucci | Site sqlmap.org

sqlmap is an automatic SQL injection tool developed in Python. Its goal is to detect and take advantage of SQL injection vulnerabilities on web applications. Once it detects one or more SQL injections on the target host, the user can choose among a variety of options to perform an extensive back-end database management system fingerprint, retrieve DBMS session user and database, enumerate users, password hashes, privileges, databases, dump entire or user's specific DBMS tables/columns, run his own SQL SELECT statement, read specific files on the file system and much more.

tags | web, vulnerability, sql injection, python
systems | unix
MD5 | 9bfa100d13de408c21fc43bb0aba7149
sara-7.8.1.tgz
Posted Aug 29, 2008
Authored by Advanced Research Corporation | Site www-arc.com

Security Auditor's Research Assistant (SARA) is a security analysis tool based on the SATAN model. It is updated twice a month to address the latest threats. Checks for common old holes, backdoors, trust relationships, default cgi, common logins, open shares, and much more.

Changes: Various changes and additions.
tags | tool, cgi, scanner
systems | unix
MD5 | 8127e08b1ff85620eb093c95e357543b
sara-7.5.7.tgz
Posted Jul 10, 2008
Authored by Advanced Research Corporation | Site www-arc.com

Security Auditor's Research Assistant (SARA) is a security analysis tool based on the SATAN model. It is updated twice a month to address the latest threats. Checks for common old holes, backdoors, trust relationships, default cgi, common logins, open shares, and much more.

Changes: Added option to stop domain password guessing for windows machines.
tags | tool, cgi, scanner
systems | unix
MD5 | c5eeb4d1234ad517b71548975b5bafa7
unhide20080519.tgz
Posted Jun 28, 2008
Authored by YJesus | Site security-projects.com

Unhide is a forensic tool to find hidden processes and TCP/UDP ports that are hidden via rootkits, LKMs, or other techniques.

Changes: Fixed a race condition and added man pages.
tags | udp, tcp
systems | unix
MD5 | 1194ec0f89c6f28e8eb64fb66836f70f
chkrootkit-0.48.tar.gz
Posted Jan 3, 2008
Authored by Nelson Murilo | Site chkrootkit.org

Chkrootkit checks locally for signs of a rootkit. Chkrootkit includes ifpromisc.c to check and see if the interface is in promisc mode, chklastlog.c to check lastlog for deletions, and chkwtmp.c to check wtmp for deletions, strings.c for quick and dirty strings replacement, check_wtmpx.c to check for wtmpx deletions and the files chkproc.c and chkdirs.c to check for LKM trojans. Tested on Linux 2.0.x, 2.2.x and 2.4.x, FreeBSD 2.2.x, 3.x, 4.x, and 5.x, BSDI, OpenBSD 2.6, 2.7, 2.8, 2.9, 3.0 and 3.1, NetBSD 1.5.2 and Solaris 2.5.1, 2.6 and 8.0, and HP-UX 11.

Changes: New and enhanced tests, minor bug fixes.
tags | tool, trojan, integrity, rootkit
systems | linux, netbsd, unix, solaris, freebsd, openbsd, hpux
MD5 | de8b8b5013e7faa2b66c0e33c59677e8
SQLMAP - Automatic SQL Injection Tool
Posted Nov 5, 2007
Authored by Bernardo Damele, Daniele Bellucci | Site sqlmap.org

sqlmap is an automatic blind SQL injection tool, developed in python, capable to perform an active database management system fingerprint, enumerate entire remote databases and much more. The aim of this project is to implement a fully functional database management system tool which takes advantages of web application programming security flaws which lead to SQL injection vulnerabilities.

Changes: Added support for Oracle database management system. Extended inband SQL injection functionality. Added some support and a fuzzer. Many other changes, see the changelog.
tags | remote, web, vulnerability, sql injection, python
systems | unix
MD5 | 74ceaecd24f830b9b23ec27c90e25f5b
rkhunter-1.3.0.tar.gz
Posted Sep 25, 2007
Authored by Michael Boelen | Site rootkit.nl

Rootkit Hunter scans files and systems for known and unknown rootkits, backdoors, and sniffers. The package contains one shell script, a few text-based databases, and optional Perl modules. It should run on almost every Unix variety except Solaris and NetBSD.

Changes: The changelog for this release is packed listing over 30 new features, 47 changes and 16 bugfixes.
tags | tool, shell, perl, integrity, rootkit
systems | netbsd, unix, solaris
MD5 | 89a4628c6378fdf3331d5a43b975d967
SQLMAP - Automatic SQL Injection Tool
Posted Jun 15, 2007
Authored by Bernardo Damele, Daniele Bellucci | Site sqlmap.org

sqlmap is an automatic blind SQL injection tool, developed in python, capable to perform an active database management system fingerprint, enumerate entire remote databases and much more. The aim of this project is to implement a fully functional database management system tool which takes advantages of web application programming security flaws which lead to SQL injection vulnerabilities.

tags | remote, web, vulnerability, sql injection, python
systems | unix
MD5 | 3e0fe474042a961b432d6e736a8ac85b
SQLMAP - Automatic SQL Injection Tool
Posted Jan 22, 2007
Authored by Bernardo Damele, Daniele Bellucci | Site sqlmap.org

sqlmap is an automatic blind SQL injection tool capable of enumerating entire remote databases, performing an active database fingerprint and much more. The aim of this project is to implement a fully functional database mapper tool which takes advantages of web application security flaws.

tags | remote, web, sql injection
systems | unix
MD5 | 560ec282310cd8a634a421abb409522d
SQLMAP - Automatic SQL Injection Tool
Posted Dec 15, 2006
Authored by Bernardo Damele, Daniele Bellucci | Site sqlmap.org

sqlmap is an automatic blind SQL injection tool capable of enumerating entire remote databases, performing an active database fingerprint and much more. The aim of this project is to implement a fully functional database mapper tool which takes advantages of web application security flaws.

tags | remote, web, sql injection
systems | unix
MD5 | 94d732f19b5f4d8e71c4f4aed8f353ef
PandoraFMS-1.2.tar.gz
Posted Dec 12, 2006
Authored by Sancho Lerena, Raul Mateos, Esteban Sanchez, Jonathan Barajas, Joss Navarro, Antonio Dos Santos | Site pandora.sourceforge.net

Pandora is a monitoring system designed to watch systems and applications. It allows auditing of any element of a system, from a network interface being down to a defacement in a web site. Included in this tarball are PandoraFMS_Agent_UNIX-1.2.0.tar.gz, PandoraFMS_Agent_Windows_src-1.2.0.zip, PandoraFMS_Console-1.2.0.tar.gz, PandoraFMS_Documentation-1.2.0.zip, PandoraFMS_Server-1.2.0.tar.gz, and PandoraFMS_Windows_Agent_Setup-1.2-0.exe. These files make up the server, web console, and various agents to be used in the PandoraFMS.

tags | web
systems | unix
MD5 | 5d0adc6aa3ad594dee2be7d292d628d4
pirana-0.3.1.tar.gz
Posted Dec 6, 2006
Authored by Jean-Sebastien Guay-Leroux | Site guay-leroux.com

PIRANA is an exploitation framework that tests the security of a email content filter. By means of a vulnerability database, the content filter to be tested will be bombarded by various emails containing a malicious payload intended to compromise the computing platform. PIRANA's goal is to test whether or not any vulnerability exists on the content filtering platform.

Changes: Added uulib exploitation module and bindshell type of shellcode. Cleanup in the exploit codes. Modifications to the manpage, how the shellcode generator was called, and the README.
systems | unix
MD5 | 5e0aba05b87c5a85cd827b9c583d9943
sara-7.0.3.tgz
Posted Nov 2, 2006
Authored by Advanced Research Corporation | Site www-arc.com

Security Auditor's Research Assistant (SARA) is a security analysis tool based on the SATAN model. It is updated twice a month to address the latest threats. Checks for common old holes, backdoors, trust relationships, default cgi, common logins, open shares, and much more.

Changes: Various bug fixes.
tags | tool, cgi, scanner
systems | unix
MD5 | 19c74bcd8261a4dcf440257b53617218
Page 3 of 19
Back12345Next

Top Authors In Last 30 Days

Recent News

News RSS Feed
Swinburne University Confirms Over 5,000 Individuals Affected In Data Breach
Posted Apr 16, 2021

tags | headline, privacy, data loss
Bitcoin Tumbles After Turkey Bans Crypto Payments Citing Risks
Posted Apr 16, 2021

tags | headline, government, bank, turkey, cryptography
US Imposes Sanctions On Russia Over Cyber Attacks
Posted Apr 15, 2021

tags | headline, hacker, government, usa, russia, data loss, cyberwar, military
Stories Of Dealing With Ransomware Gangs
Posted Apr 15, 2021

tags | headline, malware, cryptography
Google Releases Chrome 90 With HTTPS By Default
Posted Apr 15, 2021

tags | headline, privacy, google, chrome, cryptography
Is It Still Possible To Run Malware In A Browser Using JavaScript And Rowhammer? Yes, Yes It Is
Posted Apr 15, 2021

tags | headline, malware, flaw, mozilla, firefox
FBI Deletes Web Shells From Hundreds Of Compromised Microsoft Exchange Servers Before Alerting Admins
Posted Apr 14, 2021

tags | headline, hacker, government, microsoft, email, usa, flaw, fbi, backdoor
Facebook Will Not Notify More Than 530M Users Exposed In 2019 Breach
Posted Apr 14, 2021

tags | headline, privacy, data loss, facebook, social
Reddit Takes Bug Bounty Program Public
Posted Apr 14, 2021

tags | headline, hacker, social
100,000 Google Sites Used To Install SolarMarket RAT
Posted Apr 14, 2021

tags | headline, malware, google
View More News →
packet storm

© 2020 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close