exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 76 - 100 of 444 RSS Feed

Files

advchk-0.92.tar.gz
Posted Oct 5, 2006
Authored by Stephan Schmieder | Site advchk.unixgu.ru

Advchk (Advisory Check) reads security advisories so you do not have to. Advchk gathers security advisories using RSS feeds, compares them to a list of known services, and alerts you if you are vulnerable. Since adding hosts and services by hand would be quite a boring task, advchk leverages nmap for automatic service and version discovery.

systems | unix
SHA-256 | 3b0a45e1c28c4ec7e8daa6104c43b6514e974cc5cb2f3f15b1871c741e8ce724
stone-2.3c.tar.gz
Posted Oct 5, 2006
Authored by Hiroaki Sengoku | Site gcd.org

Stone is an application layer TCP/IP packet repeater. It repeats TCP and UDP packets from the inside of a firewall to the outside or vice versa. It is simple, supports OpenSSL for encrypting and decrypting packets, performing client and server verifications, and sending a substring of the subject of the certificate to the destination, can operate as an HTTP proxy, and performs POP to APOP conversion. It also supports IPv6 and can convert between IPv4 and IPv6 each other.

tags | web, udp, tcp
systems | unix
SHA-256 | 2ef3f63f1ccdb86f00251ca40cb3f99fefa1cbe21858fbc3af92b5c2b0d8ef3f
advchk-0.9.tar.gz
Posted Sep 16, 2006
Authored by Stephan Schmieder | Site advchk.unixgu.ru

Advchk (Advisory Check) reads security advisories so you do not have to. Advchk gathers security advisories using RSS feeds, compares them to a list of known services, and alerts you if you are vulnerable. Since adding hosts and services by hand would be quite a boring task, advchk leverages nmap for automatic service and version discovery.

systems | unix
SHA-256 | e35d5c1dc1a555251834e05e78af310b90c1f406a65c401623c817549bef03ce
rfdump-1.4.tar.gz
Posted Sep 13, 2006
Authored by lgrunwald | Site rfdump.org

RFDump is a tool to detect RFID-Tags and show their meta information: Tag ID, Tag Type, manufacturer etc. The user data memory of a tag can be displayed and modified using either a Hex or an ASCII editor. Tag contents can be stored and loaded using a specific XML format. This effectively allows the copy of data from one tag to another. In addition, the integrated cookie feature demonstrates how easy it is for a company to abuse RFID technology to spy on their customers. RFDump works with the ACG Multi-Tag Reader or similar card reader hardware. The tags that are supported for reading, writing, and editing are ISO 15693, ISO 14443 A, ISO 14443 B, SR176(1,2), Tag-it®, and I-Code®.

systems | unix
SHA-256 | 7498a996213ebdc50a5e8e3265ec4080704960ac9f7d16d6ddabc4aaf0850dcd
iodine-0.3.2.tar.gz
Posted Sep 13, 2006
Authored by Yarrick | Site code.kryo.se

iodine is a piece of software that lets you tunnel IPv4 data through a DNS server. This can be useful in situations where Internet access is firewalled, but DNS queries are allowed. It needs a TUN/TAP device to operate. The bandwidth is asymmetrical with limited upstream and up to 1 Mbit/s downstream.

Changes: Support for NetBSD. Fixed potential security problems. Name parsing routines rewritten. Various other enhancements.
systems | unix
SHA-256 | 56ad5cc2710bd119ec123934078b222b03d7c3bbf0fc025077bfcb350cdc92ab
wesley-fixed.tar.gz
Posted Aug 27, 2006
Authored by Craig Heffner

Wesley is a fake DHCP server that implements various features like invisible redirection of connections and MAC filtering for singling out a specific host or not replying to DHCP requests from security scanners.

Changes: Fixed a segmentation fault.
systems | unix
SHA-256 | c4e69c01df48f32cae5b7ddcc7ffe8d28a867fdcc1d5ea4244ff74b7a234eb78
iodine-0.3.1.tar.gz
Posted Aug 3, 2006
Authored by Yarrick | Site code.kryo.se

iodine is a piece of software that lets you tunnel IPv4 data through a DNS server. This can be useful in situations where Internet access is firewalled, but DNS queries are allowed. It needs a TUN/TAP device to operate. The bandwidth is asymmetrical with limited upstream and up to 1 Mbit/s downstream.

systems | unix
SHA-256 | ca611ba1da2df2c1b536b8029429a67f256e813f7eb9ce21589516f7964e320d
MassMXScanner-0.1b.tar.gz
Posted Jul 24, 2006
Authored by Vagner Rodrigues Fernandes

Simple php script that perform a massive MX look up for a given list of IPs.

tags | php
systems | unix
SHA-256 | 4659be37f7b6a979d3ff68238f8016b12e20716d56ea0330b0e55e005254c70e
advchk-0.31.tar.gz
Posted Jul 12, 2006
Authored by Stephan Schmieder | Site advchk.unixgu.ru

Advchk (Advisory Check) reads security advisories so you do not have to. Advchk gathers security advisories using RSS feeds, compares them to a list of known services, and alerts you if you are vulnerable. Since adding hosts and services by hand would be quite a boring task, advchk leverages nmap for automatic service and version discovery.

systems | unix
SHA-256 | 2b851eb6af088365188b6b91e8861626ba23db195e3e829b9edac5f059841ff4
combina-0.4.1_src.tar.gz
Posted Jun 26, 2006
Authored by Danilo Cicerone | Site digitazero.org

combina is a password generator that uses three different algorithms based on combinatorial analysis. It implements the permutation without repetition, permutation with repetition (the famous brute force), and combination without repetition. It supports an unlimited number of characters in the input and MD5 password hashes.

Changes: Man page added.
systems | unix
SHA-256 | a313f066748d1b4d5b8b6adeaa0e04dea09846bf2ec02cead1a4a6f3104c6d0c
advchk-0.3.tar.gz
Posted Jun 20, 2006
Authored by Stephan Schmieder | Site advchk.unixgu.ru

Advchk (Advisory Check) reads security advisories so you do not have to. Advchk gathers security advisories using RSS feeds, compares them to a list of known services, and alerts you if you are vulnerable. Since adding hosts and services by hand would be quite a boring task, advchk leverages nmap for automatic service and version discovery.

systems | unix
SHA-256 | 45b07b6f71821eee24de1739a4399a2fb88581e8b4d3e86fb5be3014a2de4316
wondjina.tar.gz
Posted Jun 15, 2006
Authored by Maarten Van Horenbeeck

Wondjina is basic proof of concept Perl code to show that binary files can be tunneled in a stealthy manner by using the HTTP/1.1 "entity tag" as a covert channel.

tags | web, perl, proof of concept
systems | unix
SHA-256 | 11dfdc9aa4906fd793861ee27ec16ec9252bfdd67d10ad6d05e4aa74aa9f3811
sdc.tgz
Posted May 22, 2006
Authored by Claes M Nyberg | Site signedness.org

SDC, or Self Decrypting Binary Generator, creates self decrypting binaries for common operating systems and architectures. The target file is encrypted using Blowfish in Cipher text Feedback Mode (CFB) and appended to an executable which reads itself and attempts to decrypt the appended data when it is run. Targets: Linux x86 (ELF), Windows x86 (PE-COFF), OpenBSD x86 (ELF), OpenBSD arm (ELF), OpenBSD sparc64 (ELF), FreeBSD x86 (ELF), NetBSD x86 (ELF), Solaris sparc (ELF).

tags | x86
systems | linux, netbsd, windows, unix, solaris, freebsd, openbsd
SHA-256 | f8223b21d9e0665d1c51a15c3ff8648c9be5ab04838d19b5a89c5059b1b40aff
touch2v2.c
Posted May 21, 2006
Authored by Ighighi

Touch2 is a utility which modifies the ctime. Touch(1) can be used to change the last-access & last-modification times on the files (or directories) you read or modify, but doing this will change the last-inode-change time to the current time. Touch2 can be run after touch(1) or other commands.

systems | unix
SHA-256 | beaa155ed43ff7c33a27410bfd5934b0bbf58517b6f6e389227e99ed03714bf0
DMitry-1.3a.tar.gz
Posted May 17, 2006
Authored by James Greig | Site mor-pah.net

DMitry (Deepmagic Information Gathering Tool) is a UNIX/(GNU)Linux Command Line Application coded in C. DMitry has the ability to gather as much information as possible about a host. Base functionality is able to gather possible subdomains, email addresses, uptime information, tcp port scan, whois lookups, and more.

Changes: two malloc issues addressed, fixed the netcraft function output, dmitrybot removed.
tags | tcp
systems | linux, unix
SHA-256 | f335321a092cdc708f3222ce732299289b799602076f22e1942ed152b0f17e43
combina-0.4.0_src.tar.gz
Posted May 9, 2006
Authored by Danilo Cicerone | Site digitazero.org

combina is a password generator that uses three different algorithms based on combinatorial analysis. It implements the permutation without repetition, permutation with repetition (the famous brute force), and combination without repetition. It supports an unlimited number of characters in the input and MD5 password hashes.

Changes: The algorithm for Combination without repetition was added.
systems | unix
SHA-256 | f4f839004ad233f896c7e7db673a6c5f72c5e42af415571ad2ab3493fe0dccbc
combina-0.3.7_src.tar.gz
Posted Apr 29, 2006
Authored by Danilo Cicerone | Site digitazero.org

combina is a password generator that uses three different algorithms based on combinatorial analysis. It implements the permutation without repetition, permutation with repetition (the famous brute force), and combination without repetition. It supports an unlimited number of characters in the input and MD5 password hashes.

systems | unix
SHA-256 | 9e70a93540ea4231de8613c2ff5e528cf3e0db0897fa3a3f95acf1df0df50b15
AIMadmin-01.tar.gz
Posted Feb 16, 2006
Authored by grimR | Site crypt.cc

AIM Admin: A perl script designed to accept and execute commands via the AOL Instant Messenger service. Supports crypted passwords and sends back the output of all commands.

tags | perl
systems | unix
SHA-256 | 2f0dceb8a4ac1a32a697f0a2d02db93a269402ef63f052b363983131ed147041
0.2a1.tgz
Posted Dec 29, 2005
Authored by Adam Gleave | Site metawire.org

Arri provides an interface for accessing arrays in a safe manner that means that it is impossible to cause an overflow and, if the array is set to hard (it normally is), truncation. In addition to simply providing an interface for handling arrays, it also provides interfaces for using the arrays such as an IO API.

tags | overflow
systems | unix
SHA-256 | 15ea6a61c07655d09a0585cc3729145aac56ac5e0a5ca02b1d268af5c47fd466
p3scan-2.3.2.tar.gz
Posted Dec 28, 2005
Authored by Alan DeKok | Site striker.ottawa.on.ca

Pscan checks C source code for problematic uses of printf style functions such as "sprintf(buffer, variable)", which have been the source of many security holes. It does not check for buffer overflows or other misuse of function parameters.

Changes: Update RipMIME to 1.4.0.6. Various bug fixes.
tags | overflow
systems | unix
SHA-256 | 570bdf87132b23120339e247809dc2cf37c2735d504f4e1072528c04d940bb5f
wesley.tar.gz
Posted Nov 30, 2005
Authored by Craig Heffner

Wesley is a fake DHCP server that implements various features like invisible redirection of connections and MAC filtering for singling out a specific host or not replying to DHCP requests from security scanners.

systems | unix
SHA-256 | 4141b12cdfa4abc4b138353a5f8f09ad7ae2721a53d307cfb78905670c2d665c
p3scan-2.3.1.tar.gz
Posted Nov 20, 2005
Authored by laitcg | Site p3scan.sourceforge.net

Pop 3 scan is a full transparent proxy server for POP3 clients. It runs on a Linux box with iptables (for port redirection). It can be used to provide POP3 email scanning from the Internet to any internal network, and is ideal for helping to protect your Other OS LAN from harm, especially when used in conjunction with a firewall and other Internet proxy servers. It is designed to enable scanning of incoming email messages for viruses, worms, trojans, spam, and harmful attachments. Because viewing HTML email can enable a spammer to validate an email address (via Web bugs), it can also provide HTML stripping.

Changes: Bug fix release.
tags | worm, web, trojan
systems | linux, unix
SHA-256 | 2c51185caddde414de13f7de9b94986145a6519deac1de655f38538113122329
herodot.tar.bz2
Posted Nov 8, 2005
Authored by Piotr Sobolewski | Site rozrywka.jawsieci.pl

Herodot is a tool that parses the timeline of filesystem activity created by mactime and adds human readable descriptions to it. It also understands that later changes of some mac tags hide earlier changes.

systems | unix
SHA-256 | e855f365e9aae9d99d0e69d5a3b263fa17380a16ce8c0182a68fdd6d4a323a9b
rfdump-1.3.tar.gz
Posted Oct 31, 2005
Authored by lgrunwald | Site rfdump.org

RFDump is a tool to detect RFID-Tags and show their meta information: Tag ID, Tag Type, manufacturer etc. The user data memory of a tag can be displayed and modified using either a Hex or an ASCII editor. Tag contents can be stored and loaded using a specific XML format. This effectively allows the copy of data from one tag to another. In addition, the integrated cookie feature demonstrates how easy it is for a company to abuse RFID technology to spy on their customers. RFDump works with the ACG Multi-Tag Reader or similar card reader hardware. The tags that are supported for reading, writing, and editing are ISO 15693, ISO 14443 A, ISO 14443 B, SR176(1,2), Tag-it®, and I-Code®.

systems | unix
SHA-256 | eb450c46669fb731fdd577fcb8a90ec71a889b1404c8bf88ae1b78d2611fd0b6
p3scan-2.2.1.tar.gz
Posted Sep 23, 2005
Authored by laitcg | Site p3scan.sourceforge.net

Pop 3 scan is a full transparent proxy server for POP3 clients. It runs on a Linux box with iptables (for port redirection). It can be used to provide POP3 email scanning from the Internet to any internal network, and is ideal for helping to protect your Other OS LAN from harm, especially when used in conjunction with a firewall and other Internet proxy servers. It is designed to enable scanning of incoming email messages for viruses, worms, trojans, spam, and harmful attachments. Because viewing HTML email can enable a spammer to validate an email address (via Web bugs), it can also provide HTML stripping.

Changes: Made TOP command processing an option. Fixed ability to not use ripmime library. Various other tweaks.
tags | worm, web, trojan
systems | linux, unix
SHA-256 | f2542177fa45fe9ad6bb30fd647614d25ee68588559f91895f366bef1983cb98
Page 4 of 18
Back23456Next

Top Authors In Last 30 Days

Recent News

News RSS Feed
Google Patches Critical Chrome Vulnerability
Posted Apr 24, 2024

tags | headline, flaw, google, patch, chrome
Hackers Are Using Developing Countries For Ransomware Practice
Posted Apr 24, 2024

tags | headline, hacker, malware, cybercrime, fraud, cryptography
Authorities Investigate LabHost Users After Phishing Service Shutdown
Posted Apr 23, 2024

tags | headline, cybercrime, fraud, phish
Windows Vulnerability Reported By The NSA Exploited To Install Russian Malware
Posted Apr 23, 2024

tags | headline, government, microsoft, usa, russia, flaw, cyberwar, spyware, nsa
UnitedHealth Admits Breach Could Cover Substantial Proportion Of People In America
Posted Apr 23, 2024

tags | headline, hacker, privacy, data loss
Microsoft DRM Hack Could Allow Movie Downloads From Streaming
Posted Apr 23, 2024

tags | headline, microsoft, flaw, pirate
Over A Million Neighbourhood Watch Members Exposed
Posted Apr 23, 2024

tags | headline, privacy, britain, data loss
MITRE Hacked By State Sponsored Group Via Ivanti Zero Days
Posted Apr 23, 2024

tags | headline, hacker, government
Russia's Sandworm APT Linked To Attack On Texas Water Plant
Posted Apr 18, 2024

tags | headline, malware, usa, russia, cyberwar, scada
EU Tells Meta It Can't Paywall Privacy
Posted Apr 18, 2024

tags | headline, government, privacy, facebook, social
View More News →
packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close