what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 51 - 75 of 442 RSS Feed

Files

Rootkit Hunter 1.4.0
Posted May 1, 2012
Authored by Michael Boelen | Site rootkit.nl

Rootkit Hunter scans files and systems for known and unknown rootkits, backdoors, and sniffers. The package contains one shell script, a few text-based databases, and optional Perl modules. It should run on almost every Unix variety except Solaris and NetBSD.

Changes: This release adds eleven bugfixes, seven changes, and five new items.
tags | tool, shell, perl, integrity, rootkit
systems | netbsd, unix, solaris
SHA-256 | a891c0b900417f2980f0e9afcdb10d1fd5581703be2587a92c90c7631b8814dc
SQLMAP - Automatic SQL Injection Tool 0.9
Posted Apr 11, 2011
Authored by Bernardo Damele | Site sqlmap.org

sqlmap is an open source command-line automatic SQL injection tool. Its goal is to detect and take advantage of SQL injection vulnerabilities in web applications. Once it detects one or more SQL injections on the target host, the user can choose among a variety of options to perform an extensive back-end database management system fingerprint, retrieve DBMS session user and database, enumerate users, password hashes, privileges, databases, dump entire or user's specified DBMS tables/columns, run his own SQL statement, read or write either text or binary files on the file system, execute arbitrary commands on the operating system, establish an out-of-band stateful connection between the attacker box and the database server via Metasploit payload stager, database stored procedure buffer overflow exploitation or SMB relay attack and more.

Changes: Rewritten SQL injection detection engine. Added full support for both time-based blind SQL injection and error-based SQL injection techniques. Various other support added.
tags | web, overflow, arbitrary, vulnerability, sql injection
systems | unix
SHA-256 | 9c76666d0555620329d949aca87571825adb8fcda9cd564e6410e1d2b6228c55
Security Auditor's Research Assistant (SARA) 7.9.2a
Posted Apr 10, 2011
Authored by Advanced Research Corporation | Site www-arc.com

Security Auditor's Research Assistant (SARA) is a security analysis tool based on the SATAN model. It is updated twice a month to address the latest threats. Checks for common old holes, backdoors, trust relationships, default cgi, common logins, open shares, and much more.

Changes: Assorted bugfixes and updates to detect newer potential security issues.
tags | tool, cgi, scanner
systems | linux, unix
SHA-256 | 4f6734be7ebcb6915b3be8941eceac5de5f8d76c53fb96a2efab212596f57290
Unhide Forensic Tool 20110113
Posted Feb 7, 2011
Authored by YJesus | Site unhide-forensics.info

Unhide is a forensic tool to find hidden processes and TCP/UDP ports that are hidden via rootkits, LKMs, or other techniques.

Changes: New tests added. Unhide is more modular.
tags | udp, tcp
systems | linux, unix
SHA-256 | 21ef6128232d02bba981acdf20f92b92258189f0660c4dac9a8d2dfdcc83e6ab
Rootkit Hunter 1.3.8
Posted Nov 18, 2010
Authored by Michael Boelen | Site rootkit.nl

Rootkit Hunter scans files and systems for known and unknown rootkits, backdoors, and sniffers. The package contains one shell script, a few text-based databases, and optional Perl modules. It should run on almost every Unix variety except Solaris and NetBSD.

Changes: The change log lists 24 bug fixes, 29 changes and 18 new items.
tags | tool, shell, perl, integrity, rootkit
systems | netbsd, unix, solaris
SHA-256 | fb1fb8bac53bab476142b5556140c59d589bc0f45d3dc058f400f2edada77a33
Nessus XMLRPC Perl Interface 0.30
Posted May 22, 2010
Authored by kost

Net::Nessus::XMLRPC is Perl interface for communication with the Nessus scanner over XMLRPC. It lets you start, stop, pause, and resume scans. It can display the progress and status of scans, download reports, etc.

Changes: Functions for report handling and management were added. hashref instead of hash is now being used for almost all functions calls.
tags | tool, scanner, perl
systems | unix
SHA-256 | 69bf9416c346bce5e509461249497120472ce22459c65ae80f73ce5b047aa9f5
Nessus XMLRPC Perl Interface 0.20
Posted Apr 7, 2010
Authored by kost

Net::Nessus::XMLRPC is Perl interface for communication with the Nessus scanner over XMLRPC. It lets you start, stop, pause, and resume scans. It can display the progress and status of scans, download reports, etc.

Changes: This release adds functions/methods for handling of users (adding, deleting, listing, and changing passwords).
tags | tool, scanner, perl
systems | unix
SHA-256 | 6dcf2abb958c424a69a56523daeec1fd0661b4b65ac7bcc7874067f594a840cd
Nessus XMLRPC Perl Interface 0.10
Posted Apr 2, 2010
Authored by kost

Net::Nessus::XMLRPC is Perl interface for communication with the Nessus scanner over XMLRPC. It lets you start, stop, pause, and resume scans. It can display the progress and status of scans, download reports, etc.

Changes: This release adds functions/methods for policy handling, It adds support for importing the report. It adds a logoff function and support for it in the destructor. There are small fixes, debug support, and small enhancements.
tags | tool, scanner, perl
systems | unix
SHA-256 | 3db56fc50057641219e24236b93965fae4c7889dfa4ca7353f4b7b9078689e28
Nessus XMLRPC Perl Interface
Posted Mar 22, 2010
Authored by kost

Net::Nessus::XMLRPC is Perl interface for communication with the Nessus scanner over XMLRPC. It lets you start, stop, pause, and resume scans. It can display the progress and status of scans, download reports, etc.

Changes: Better default examples and more examples were added. License and prerequisites were added to the meta information.
tags | tool, scanner, perl
systems | unix
SHA-256 | fc3c63c44ec69d7a51687d08ceebb46c359afa40388d8fcba09713d3ff9b38a1
SQLMAP - Automatic SQL Injection Tool 0.8
Posted Mar 16, 2010
Authored by Bernardo Damele | Site sqlmap.org

sqlmap is an open source command-line automatic SQL injection tool. Its goal is to detect and take advantage of SQL injection vulnerabilities in web applications. Once it detects one or more SQL injections on the target host, the user can choose among a variety of options to perform an extensive back-end database management system fingerprint, retrieve DBMS session user and database, enumerate users, password hashes, privileges, databases, dump entire or user's specified DBMS tables/columns, run his own SQL statement, read or write either text or binary files on the file system, execute arbitrary commands on the operating system, establish an out-of-band stateful connection between the attacker box and the database server via Metasploit payload stager, database stored procedure buffer overflow exploitation or SMB relay attack and more.

Changes: Support to enumerate and dump all database tables. Support to parse -C when fetching columns of a table. Support for takeover features on PostgreSQL 8.4. Various other improvements and tweaks.
tags | web, overflow, arbitrary, vulnerability, sql injection
systems | unix
SHA-256 | 7e815be1c57fe444aa3aa1d74c19fa2f05fe4a28a56ab7185596070d893e360f
Nessus XML-RPC Ruby Library 0.3
Posted Mar 8, 2010
Authored by Vlatko Kosturjak | Site rubyforge.org

nessus-xmlrpc is a Ruby library for the Nessus XML-RPC interface. It comes with an example command line program that shows how easy it is to interact with the Nessus scanner.

Changes: Mostly speed improvements (will use keepalive and nokogiri if available). Support for some new functions. Better documentation.
tags | tool, scanner, ruby
systems | unix
SHA-256 | 4f237befc1fd17197d282b0402cd578e29edc55eb97eb0fc7c973eeee6e1157f
Nessus XML-RPC Ruby Library 0.2
Posted Feb 28, 2010
Authored by Vlatko Kosturjak | Site rubyforge.org

nessus-xmlrpc is a Ruby library for the Nessus XML-RPC interface. It comes with an example command line program that shows how easy it is to interact with the Nessus scanner.

Changes: This is mostly a new features release. The --list-policy and --status command line options were added to the CLI interface.
tags | tool, scanner, ruby
systems | unix
SHA-256 | aaa41b2e737a47acb3a43275676f69f0fe448af0a79bd103442d6b5f680aa75e
Rootkit Hunter 1.3.6
Posted Nov 30, 2009
Authored by Michael Boelen | Site rootkit.nl

Rootkit Hunter scans files and systems for known and unknown rootkits, backdoors, and sniffers. The package contains one shell script, a few text-based databases, and optional Perl modules. It should run on almost every Unix variety except Solaris and NetBSD.

Changes: This release offers more ease of use and improved checks. The changelog lists 29 additions including 9 configuration options and details for 12 rootkits, 29 changes including improvements for 15 rootkit checks, and 22 bugfixes.
tags | tool, shell, perl, integrity, rootkit
systems | netbsd, unix, solaris
SHA-256 | e3f5e21307e4876da4bc4a1521a86f1cda93ad22d4c77366876d7c170dcefc10
Check Rootkit 0.49
Posted Jul 30, 2009
Authored by Nelson Murilo | Site chkrootkit.org

Chkrootkit checks locally for signs of a rootkit. Chkrootkit includes ifpromisc.c to check and see if the interface is in promisc mode, chklastlog.c to check lastlog for deletions, and chkwtmp.c to check wtmp for deletions, strings.c for quick and dirty strings replacement, check_wtmpx.c to check for wtmpx deletions and the files chkproc.c and chkdirs.c to check for LKM trojans. Tested on Linux 2.0.x, 2.2.x and 2.4.x, FreeBSD 2.2.x, 3.x, 4.x, and 5.x, BSDI, OpenBSD 2.6, 2.7, 2.8, 2.9, 3.0 and 3.1, NetBSD 1.5.2 and Solaris 2.5.1, 2.6 and 8.0, and HP-UX 11.

Changes: New and enhanced tests, minor bug fixes.
tags | tool, trojan, integrity, rootkit
systems | linux, netbsd, unix, solaris, freebsd, openbsd, hpux
SHA-256 | ccb87be09e8923d51f450a167f484414f70c36c942f8ef5b9e5e4a69b7baa17f
SQLMAP - Automatic SQL Injection Tool
Posted Jul 28, 2009
Authored by Bernardo Damele | Site sqlmap.org

sqlmap is an open source command-line automatic SQL injection tool. Its goal is to detect and take advantage of SQL injection vulnerabilities in web applications. Once it detects one or more SQL injections on the target host, the user can choose among a variety of options to perform an extensive back-end database management system fingerprint, retrieve DBMS session user and database, enumerate users, password hashes, privileges, databases, dump entire or user's specified DBMS tables/columns, run his own SQL statement, read or write either text or binary files on the file system, execute arbitrary commands on the operating system, establish an out-of-band stateful connection between the attacker box and the database server via Metasploit payload stager, database stored procedure buffer overflow exploitation or SMB relay attack and more.

Changes: Adapted Metasploit wrapping functions to work with latest 3.3 development version too. Adjusted code to make sqlmap 0.7 to work again on Mac OSX too. Various other tweaks and improvements.
tags | web, overflow, arbitrary, vulnerability, sql injection
systems | unix
SHA-256 | 064615194602c26710703b3deed8a2816ed54cc60be8158ba43dfffed85c1e3b
Curuncula Rootkit Detection
Posted Apr 23, 2009
Authored by Giuseppe Cocomazzi

Curuncula is a tool shipped as a loadable kernel module that aims to detect rootkits based on the Intel debugging support facilities. Rootkits that set the GD access flag are also detected. It makes use of the "last branch recording" mechanism provided by the Intel architecture. Support both the 2.4 and 2.6 Linux kernels.

tags | kernel
systems | linux, unix
SHA-256 | 358c454416617a5a76f1a8e046a24cfa9948c7d532567c2d6f497a38218ed5a1
SQLMAP - Automatic SQL Injection Tool
Posted Apr 22, 2009
Authored by Bernardo Damele | Site sqlmap.org

sqlmap is an open source command-line automatic SQL injection tool. Its goal is to detect and take advantage of SQL injection vulnerabilities in web applications. Once it detects one or more SQL injections on the target host, the user can choose among a variety of options to perform an extensive back-end database management system fingerprint, retrieve DBMS session user and database, enumerate users, password hashes, privileges, databases, dump entire or user's specified DBMS tables/columns, run his own SQL statement, read or write either text or binary files on the file system, execute arbitrary commands on the operating system, establish an out-of-band stateful connection between the attacker box and the database server via Metasploit payload stager, database stored procedure buffer overflow exploitation or SMB relay attack and more.

Changes: New features as described at the presentation given at Black Hat Europe.
tags | web, overflow, arbitrary, vulnerability, sql injection
systems | unix
SHA-256 | facfe914f0de39c5a38ffe08fd1294e7b88ddeab5eeeaa9496833b49f71fa5b8
SQLMAP - Automatic SQL Injection Tool
Posted Feb 4, 2009
Authored by Bernardo Damele, Daniele Bellucci | Site sqlmap.org

sqlmap is an open source command-line automatic SQL injection tool developed in Python. Its goal is to detect and take advantage of SQL injection vulnerabilities on web applications. Once it detects one or more SQL injections on the target host, the user can choose among a variety of options to perform an extensive back-end database management system fingerprint, retrieve DBMS session user and database, enumerate users, password hashes, privileges, databases, dump entire or user's specific DBMS tables/columns, run his own SQL statement, read specific files on the file system and more.

Changes: Major enhancement to make the comparison algorithm work properly. Major speed increase in DBMS basic fingerprint. Added internal support to forge CASE statements. Various other additions and improvements.
tags | web, vulnerability, sql injection, python
systems | unix
SHA-256 | deea059d31091c2d800c35dbd47b454d15ccca8ffbad0c5ba4ba9e1b58746265
Rootkit Hunter 1.3.4 Is Released
Posted Dec 31, 2008
Authored by Michael Boelen | Site rootkit.nl

Rootkit Hunter scans files and systems for known and unknown rootkits, backdoors, and sniffers. The package contains one shell script, a few text-based databases, and optional Perl modules. It should run on almost every Unix variety except Solaris and NetBSD.

Changes: The changelog for this release is packed listing 4 new additions, 8 changes, and 9 bug fixes.
tags | tool, shell, perl, integrity, rootkit
systems | netbsd, unix, solaris
SHA-256 | d85d179850fee8ab04bc1733680c9c6dd8a1577975c12554db9c52bf4f7c50ba
SQLMAP - Automatic SQL Injection Tool
Posted Dec 22, 2008
Authored by Bernardo Damele, Daniele Bellucci | Site sqlmap.org

sqlmap is an automatic SQL injection tool developed in Python. Its goal is to detect and take advantage of SQL injection vulnerabilities on web applications. Once it detects one or more SQL injections on the target host, the user can choose among a variety of options to perform an extensive back-end database management system fingerprint, retrieve DBMS session user and database, enumerate users, password hashes, privileges, databases, dump entire or user's specific DBMS tables/columns, run his own SQL SELECT statement, read specific files on the file system and much more.

Changes: Multiple major bug fixes and a handful of minor fixes.
tags | web, vulnerability, sql injection, python
systems | unix
SHA-256 | fd47be9ac455b207a54a975f54d8a5e80fbc48844992b666e5c976e55a1f96d7
SQLMAP - Automatic SQL Injection Tool
Posted Nov 5, 2008
Authored by Bernardo Damele, Daniele Bellucci | Site sqlmap.org

sqlmap is an automatic SQL injection tool developed in Python. Its goal is to detect and take advantage of SQL injection vulnerabilities on web applications. Once it detects one or more SQL injections on the target host, the user can choose among a variety of options to perform an extensive back-end database management system fingerprint, retrieve DBMS session user and database, enumerate users, password hashes, privileges, databases, dump entire or user's specific DBMS tables/columns, run his own SQL SELECT statement, read specific files on the file system and much more.

Changes: Multiple major bug fixes and a handful of minor fixes.
tags | web, vulnerability, sql injection, python
systems | unix
SHA-256 | 88fc937ae2b316657d98efae05bba9f15d3823c3a78d7a9f4c5a244f2333ddad
SQLMAP - Automatic SQL Injection Tool
Posted Oct 21, 2008
Authored by Bernardo Damele, Daniele Bellucci | Site sqlmap.org

sqlmap is an automatic SQL injection tool developed in Python. Its goal is to detect and take advantage of SQL injection vulnerabilities on web applications. Once it detects one or more SQL injections on the target host, the user can choose among a variety of options to perform an extensive back-end database management system fingerprint, retrieve DBMS session user and database, enumerate users, password hashes, privileges, databases, dump entire or user's specific DBMS tables/columns, run his own SQL SELECT statement, read specific files on the file system and much more.

Changes: Major bug fix to blind SQL injection bisection algorithm to handle an exception. Added a Metasploit Framework 3 auxiliary module to run sqlmap. Other additions and bug fixes.
tags | web, vulnerability, sql injection, python
systems | unix
SHA-256 | d6b7e45015e2226774d298a56d321bed91d79bc32fb419ae257be2f1063f03eb
SQLMAP - Automatic SQL Injection Tool
Posted Sep 3, 2008
Authored by Bernardo Damele, Daniele Bellucci | Site sqlmap.org

sqlmap is an automatic SQL injection tool developed in Python. Its goal is to detect and take advantage of SQL injection vulnerabilities on web applications. Once it detects one or more SQL injections on the target host, the user can choose among a variety of options to perform an extensive back-end database management system fingerprint, retrieve DBMS session user and database, enumerate users, password hashes, privileges, databases, dump entire or user's specific DBMS tables/columns, run his own SQL SELECT statement, read specific files on the file system and much more.

tags | web, vulnerability, sql injection, python
systems | unix
SHA-256 | 3c24955ec014ce95d653b0dc141b0bb3bd940d7d9792bb6de87c749c6713f04c
sara-7.8.1.tgz
Posted Aug 29, 2008
Authored by Advanced Research Corporation | Site www-arc.com

Security Auditor's Research Assistant (SARA) is a security analysis tool based on the SATAN model. It is updated twice a month to address the latest threats. Checks for common old holes, backdoors, trust relationships, default cgi, common logins, open shares, and much more.

Changes: Various changes and additions.
tags | tool, cgi, scanner
systems | unix
SHA-256 | cc994308e211e00f3605f8cf45a45ced5a82c28524f0a4062e2064e0e92d0177
sara-7.5.7.tgz
Posted Jul 10, 2008
Authored by Advanced Research Corporation | Site www-arc.com

Security Auditor's Research Assistant (SARA) is a security analysis tool based on the SATAN model. It is updated twice a month to address the latest threats. Checks for common old holes, backdoors, trust relationships, default cgi, common logins, open shares, and much more.

Changes: Added option to stop domain password guessing for windows machines.
tags | tool, cgi, scanner
systems | unix
SHA-256 | 95bf85f54b41a50308767171e078bf378360f1209faaa56ebca454574246b7d7
Page 3 of 18
Back12345Next

Top Authors In Last 30 Days

Recent News

News RSS Feed
Life Imitates xkcd Comic As Florida Gang Beats Crypto Password From Retiree
Posted Sep 20, 2024

tags | headline, cybercrime, data loss, cryptography
1 In 10 Orgs Dumping Their Security Vendors After CrowdStrike Outage
Posted Sep 20, 2024

tags | headline, denial of service
Cyber Crooks Strut Away With Haute Couture Harvey Nichols Data
Posted Sep 20, 2024

tags | headline, hacker, privacy, britain, cybercrime, data loss, fraud
Noise Storms: Massive Amounts Of Spoofed Web Traffic Linked To China
Posted Sep 20, 2024

tags | headline, china
Tor Network Denies Report That Anonymity Is Completely Canceled
Posted Sep 20, 2024

tags | headline, government, privacy, cryptography
Marko Polo Hackers Found To Be Running Dozens Of Scams
Posted Sep 20, 2024

tags | headline, hacker, cybercrime, fraud, phish, cryptography
Re-Opened Three Mile Island Will Power AI Datacenters Under New Deal
Posted Sep 20, 2024

tags | headline, microsoft, botnet
Social Media Users Lack Control Over Data Used By AI, US FTC Says
Posted Sep 19, 2024

tags | headline, government, privacy, usa, data loss, botnet
Hackers Demand $6 Million From Seattle Airport Operators
Posted Sep 19, 2024

tags | headline, hacker, cybercrime, data loss, fraud, cryptography
Recent WhatsUp Gold Vulnerabilities Possibly Exploited In Ransomware Attacks
Posted Sep 19, 2024

tags | headline, malware, cybercrime, flaw, cryptography
View More News →
packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close