exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 201 - 225 of 237 RSS Feed

Files

Nmap Guide
Posted Aug 17, 1999
Authored by Lamont Granquist

NMAP Guide - An excellent guide to using NMAP, providing detailed descriptions of many of the great nmap uses, features, and configurations.

tags | tool, nmap
systems | unix
SHA-256 | cc882d7d7c3f0d6ace5a8e309cf0667bf4d8afa0ce7a5784de5fd8b0ec75c211
nmap.stealth.wrapper
Posted Aug 17, 1999
Authored by spinux

Nmap wrapper that allows for stealthier scanning routines. Features: creating a host/port table and then randomizing it, scanning each host/port combination in a random sequence, easy creation of decoy addresses, parallel scanning with child process management, consolidation of log files into a nlog-style db or MySQL

tags | tool, nmap
systems | unix
SHA-256 | de4db57bedd850aa95e7a496ac44fc4bcb695572e422d61bedb054836beeda34
nwrap
Posted Aug 17, 1999
Authored by spinux

Nmap wrapper that allows for stealthier scanning routines. Features: creating a host/port table and then randomizing it, scanning each host/port combination in a random sequence, easy creation of decoy addresses, parallel scanning with child process management, consolidation of log files into a nlog-style db or MySQL.

Changes: This is an update to the original nwrap prototype script. Nwrap takes a list of addresses and port numbers to scan, adds each host/port combination to a list and randomly shuffles it. Then it launches a specified amount of parallel nmap processes until it empties the list. Currently, the output from each nmap process is just added into a filename hardcoded into the executable (/tmp/nwrap.log) and the scan types/source ports/etc has to be changed by editing the script.
tags | tool, nmap
systems | unix
SHA-256 | e89cdf692810ec03e9802366ab832a64ac33ad9d0f32fa1524ec50f8fabcb44a
nlog-1.5.1.tar.gz
Posted Aug 17, 1999
Authored by H D Moore

Nlog is a set of perl scripts that help you manage your Nmap log files. Included are conversion scripts, a CGI interface, and the documentation to build your own anlaysis applications. The ultimate goal of Nlog is to create a system that provides true database integration for Nmap, with the ability to do automated vulnerability checking, report generation, and graphical output for network status reports. Bugfix release; now completely working, nLog v1.5.2 comes with sample scripts for MySQL integration, statistical anlaysis, and the ability to load a database file remotely via http or ftp.

tags | tool, web, cgi, perl, nmap
systems | unix
SHA-256 | 57cfa236e73a714e9fddca65ee7388f7603405ec986772bcc44d011cb407e355
nlog-1.5.2.tar.gz
Posted Aug 17, 1999
Authored by H D Moore

Nlog is a set of perl scripts that help you manage your Nmap log files. Included are conversion scripts, a CGI interface, and the documentation to build your own anlaysis applications. The ultimate goal of Nlog is to create a system that provides true database integration for Nmap, with the ability to do automated vulnerability checking, report generation, and graphical output for network status reports. Bugfix release; now completely working, nLog v1.5.2 comes with sample scripts for MySQL integration, statistical anlaysis, and the ability to load a database file remotely via http or ftp.

tags | tool, web, cgi, perl, nmap
systems | unix
SHA-256 | b009cf8d7e0233036a4b3919ba61a9e2aed35e28bb31fd32993b23aa51fb103c
nlog-1.5.tgz
Posted Aug 17, 1999
Authored by H D Moore

Nlog is a set of perl scripts that help you manage your Nmap log files. Included are conversion scripts, a CGI interface, and the documentation to build your own anlaysis applications. The ultimate goal of Nlog is to create a system that provides true database integration for Nmap, with the ability to do automated vulnerability checking, report generation, and graphical output for network status reports.

tags | tool, cgi, perl, nmap
systems | unix
SHA-256 | c374baadffc4ab49c7aab7ad4d577f6474d0d3551165f42251e38fa4b8810cf7
nmap-2.05.tgz
Posted Aug 17, 1999
Authored by Fyodor

nmap v2.05 - The Network Mapper - nmap is a utility for port scanning large networks, although it works fine for single hosts. General features include: Vanilla TCP connect() scanning, TCP SYN (half open) scanning, TCP FIN, Xmas, or NULL (stealth) scanning, TCP ftp proxy (bounce attack) scanning, SYN/FIN scanning using IP fragments (bypasses packet filters), UDP raw ICMP port unreachable scanning, ICMP scanning (ping-sweep), TCP Ping scanning, Remote OS Identification by TCP/IP Fingerprinting, and Reverse-ident scanning. Nmap supports a number of performance and reliability features such as dynamic delay time calculations, packet timeout and retransmission, parallel port scanning, detection of down hosts via parallel pings. Nmap also offers flexible target and port specification, decoy scanning, determination of TCP sequence predictability characteristics, and output to machine parseable or human readable log files. This latest release features: Over 25% more OS fingerprints, Nmap now comes with its own nmap-services, Increased the maximum number of OS guesses nmap will make, Random number generation now takes advantage of the /dev/urandom or /dev/random, Machine parseable logs are now more machine parseable, nmap-fingerprintinting-article, CHANGELOG file, updated docs, many bugfixes, code optimizations, much more. This is one of the most useful security tools ever created. Your security/network toolbag is incomplete without nmap! Check out the nmap directory for lots of nmap "add-ons" and accessories.

tags | tool, remote, udp, tcp, nmap
systems | unix
SHA-256 | 97b6cefb891dee3d039781bb9aeb4b3b46694ac866ac84f6a2e086ff1239f38f
Nmap Scanning Utility 2.06
Posted Aug 17, 1999
Authored by Fyodor

This is a recommended upgrade "quick fix" release. New features include: Added the squid proxy to nmap-services, nmap looks in more places for nmap-os-fingerprints, fixed memory allocation bugs, improved compatibility with larger variety of platforms. 315k.

tags | tool, nmap
systems | unix
SHA-256 | 576b795bc90d8a83d416003f2da99959eb2d43cfc054e38ae71703396e63686d
nmap-2.07.tgz
Posted Aug 17, 1999
Authored by Fyodor

his is a platform portability improvement release.

tags | tool, nmap
systems | unix
SHA-256 | e701b01ba34ff042024eaaf0aae54a933196fa9b079422b40c391c3a6d034c92
nmap-2.08.tgz
Posted Aug 17, 1999

bugfix release

tags | tool, nmap
systems | unix
SHA-256 | 0504557626530ed1f4c5ef872578eb4fe5131fa30e058623e88006450e11cdab
nmap.txt
Posted Aug 17, 1999
Authored by Yasholomew Yashinski

nmap.tcl is an eggdrop bot script that facilitates portscanning other IRC users.

tags | tool, nmap
systems | unix
SHA-256 | 53e1e4f40796ad46581375c9992a8fddc895f333a4fb3163600a2f9baaeebe08
nmapstub-1.c
Posted Aug 17, 1999
Authored by rain forest puppy

nmapstub-1.c (shell version) - This file reads in nmap (v2.x human) output, puts it into port and host structures, and then can call whatever routines you want (per host) to check for exploits, etc.

tags | tool, shell, nmap
systems | unix
SHA-256 | 603ab0e39a01c904c74c243d13e5e1dd5507840d7175b8eefb46022e7fe3ff30
nmapstub.pl
Posted Aug 17, 1999
Authored by rain forest puppy

nmapstub.pl (Perl version) - This file reads in nmap (v2.x human) output, puts it into port and host structures, and then can call whatever routines you want (per host) to check for exploits, etc.

tags | tool, perl, nmap
systems | unix
SHA-256 | 9eec95df46627f3dd083c753b015c8efe211bd6294035d83d4a1d8e1e06fc21b
nms2.pl
Posted Aug 17, 1999
Authored by rain forest puppy

Latest release on rfp's perl-based nmap stub. This program reads in nmap output and parses it into easy to use structures that you can use in your code.

tags | tool, perl, nmap
systems | unix
SHA-256 | 778f5df29eb9440ab9cf1fdc25aa0f4d944509189388f05e04b7d2b96d12e843
vnmap.txt
Posted Aug 17, 1999
Authored by izar

Excellent Tcl/Tk/wish-based front end for the nmap network mapper/scanner.

tags | tool, nmap
systems | unix
SHA-256 | 51c69529eabb2cda3c83c81083a9b05ffe8b275e08e996cf98f6ea546033948a
nlog-latest.tgz
Posted Aug 17, 1999
Authored by spinux

NLog v1.1b - NLog is a set of PERL scripts for managing and analyzing your nmap 2.0 log files. It allows you to keep all of your scan logs in a single searchable database. Very useful for daily network security auditing/monitoring.

tags | tool, perl, nmap
systems | unix
SHA-256 | e8c8a32d3563da4691b0dbdc637d1808b41c4fc606115063e8ab2b3ab8a61dd1
nmap-1.60-Beta.tar.gz
Posted Aug 17, 1999

No information is available for this file.

tags | tool, nmap
systems | unix
SHA-256 | bcb05bb063ba05a9e3e6004474de5beee6116bf94819ca480b730b4441153419
nmap-2.01.tgz
Posted Aug 17, 1999

No information is available for this file.

tags | tool, nmap
systems | unix
SHA-256 | e1d1841adbf6adce7bc1f57af1b7ca4b2a4282154e41e26642084cf71b9a113a
nmap-2.02.tgz
Posted Aug 17, 1999

No information is available for this file.

tags | tool, nmap
systems | unix
SHA-256 | b9593bfee366635724d7c78422518255f3697a159438a81865217e0d8886913a
nmap-2.03.tgz
Posted Aug 17, 1999

No information is available for this file.

tags | tool, nmap
systems | unix
SHA-256 | 928ae6599bdf50ed4d01560bca394fd722f02611373724967ee310ffc7ea531d
dnsscanner
Posted Aug 17, 1999

dnsscanner

tags | tool, nmap
systems | unix
SHA-256 | a8f0d3365716182536de27b36b164c1685866cdc525dcfc9d5b03683d2e2de38
exploit.dat
Posted Aug 17, 1999

exploit.dat

tags | tool, nmap, patch
systems | unix
SHA-256 | 57e5fbf6ca32ad081d91cfc6767c1ee1377f30ee8605c283ec914b50cbdab509
ftpgatescan
Posted Aug 17, 1999

ftpgatescan

tags | tool, nmap
systems | unix
SHA-256 | b42e1125fffe7ca1b922a6243f9202480fc20cad7da959bcbd68cc5377bf6189
ftpscan
Posted Aug 17, 1999

ftpscan

tags | tool, nmap
systems | unix
SHA-256 | fb228135d7709c47f23a82872ae55a1ed01ad4726a5ddcbf513531810fadbaa8
global_structures.h.diff
Posted Aug 17, 1999

global_structures.h.diff

tags | tool, nmap, patch
systems | unix
SHA-256 | b6c94b86a7f66af8a5da1c90e389778799c203fb566c8d05c8a69a4878777cb3
Page 9 of 10
Back678910Next

Top Authors In Last 30 Days

Recent News

News RSS Feed
Black Basta Exploits Patched Windows Privilege Escalation Bug
Posted Jun 13, 2024

tags | headline, malware, microsoft, flaw
Kaspersky Researchers Punch Holes In Biometrics Hardware Security
Posted Jun 13, 2024

tags | headline, russia, flaw
Prevalence And Impact Of Password Exposure Vulns In ICS/OT
Posted Jun 13, 2024

tags | headline, flaw, password
Apple Patches Possibly The First Ever Spatial Computing Hack
Posted Jun 13, 2024

tags | headline, flaw, patch, apple
White House Report Dishes Deet On All 11 Major Government Breaches From 2023
Posted Jun 13, 2024

tags | headline, hacker, government, usa, data loss, flaw
Microsoft President To Testify Over Security Lapses
Posted Jun 13, 2024

tags | headline, hacker, government, microsoft, usa, data loss, flaw
Ransomware Group Exploits PHP Vulnerability Days After Disclosure
Posted Jun 12, 2024

tags | headline, hacker, cybercrime, flaw, cryptography
Let's Kick Off The Summer With A Pwn-Me-By-Wifi Bug In Microsoft Windows
Posted Jun 12, 2024

tags | headline, microsoft, wireless, flaw
China State Hackers Infected 20,000 Fortinet VPNs
Posted Jun 12, 2024

tags | headline, hacker, government, china, flaw, cyberwar, spyware, cryptography
23andMe Investigated Over Hack That Hit 7M Users
Posted Jun 12, 2024

tags | headline, hacker, government, privacy, canada, britain, data loss
View More News →
packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close