Email address | private |
---|---|
First Active | 2006-08-27 |
Last Active | 2010-06-03 |
This library provides a Ruby interface to Nmap's scan data. It can run Nmap and parse its XML output directly from the scan, parse a file containing the XML data from a separate scan, parse a String of XML data from a scan, or parse XML data from an object via its read() method. This information is presented in an easy-to-use and intuitive fashion for storing and manipulating.
51c079bb8152f5b2280c1a02d1b51e348ff40b4bd48a36441f49b72f61a89162
176 bytes small linux/x86 shellcode that binds to port 8000 and executes iptables -F.
cee3314bcc617b07ed5484cd22bc2b1d9556e0fde56c770455a9cf3765f33219
This library provides a Ruby interface to Nmap's scan data. It can run Nmap and parse its XML output directly from the scan, parse a file containing the XML data from a separate scan, parse a String of XML data from a scan, or parse XML data from an object via its read() method. This information is presented in an easy-to-use and intuitive fashion for storing and manipulating.
47c1937b01637fd278b0adfff6e0bf52eee038e65d6fd4c25716f6bee893a7b8
This library provides a Ruby interface to Nmap's scan data. It can run Nmap and parse its XML output directly from the scan, parse a file containing the XML data from a separate scan, parse a String of XML data from a scan, or parse XML data from an object via its read() method. This information is presented in an easy-to-use and intuitive fashion for storing and manipulating.
07c3d36b4de8c4e28895571e209f42d41644eca09a53fbbbf3aca6a00cfa52d5
finetd reads a configuration file to see which TCP/UDP ports to listen on, or which UNIX path names to create and listen on. When a connection is made to one of these ports, finetd launches an application to handle the request. finetd supports IPv4, IPv6, and UNIX domain sockets. Stream, Datagram (dgram), and Seqpacket socket types are supported.
ffbbecd1646f88b6108b6b0e4cbbda75b90f29ca74fedb0e6c0c9bcf6faef62e
This library provides a Ruby interface to Nmap's scan data. It can run Nmap and parse its XML output directly from the scan, parse a file containing the XML data from a separate scan, or parse a string of XML data from a scan. This information is presented in an easy to use fashion for storing and manipulating.
45aed780b003524f9dc083fdc67c4f13c902f0e6b7fea3e8c1892f4d60174938
This library provides a Ruby interface to Nmap's scan data. It can run Nmap and parse its XML output directly from the scan, parse a file containing the XML data from a separate scan, or parse a string of XML data from a scan. This information is presented in an easy to use fashion for storing and manipulating.
4941e7fc4df551c1d923aefb2f7b1b1a57b7e6a7be3bdcbd175b0138a8677363
This is a Ruby library (module) for parsing Nmap's XML output. It can perform a scan with Nmap and parse its output straight from there, read and parse an XML file, or you can pass along a string of XML for parsing.
ac1d080c8e7e5e0c16569d77aa133077479062abcbf18a17e13f4e5ec2ac40c9
Backdoor patch for OpenSSH versions 4.4p1, 4.5p1, and 4.6p1 that logs usernames, hosts, and passphrases from login attempts.
bf09a9bc1fa3e69a42c62f7d9ccc67ca8d993fc674e0a8165454ad05730c9480
Whitepaper discussing various port scanning techniques with explanations, diagrams, and examples using Nmap and Hping3. PDF version.
c0dd9c2daf75d423372e3098be822433dd1a7a63f0118e0a205fe59b2b971571
Whitepaper discussing various port scanning techniques with explanations, diagrams, and examples using Nmap and Hping3. Text version.
d3019251c4f27b4d2fb8cce28300a408be8e83c9a19904cca9e409520ba51ed4
Simple script that updates Nmap's data files and sticks them in a given directory or cwd.
888a480574d678d09e7f5762eda112ca471b4b9afe20e5cbd7ed82e66808de5f
Utility that sniffs HTTP Basic Authentication information and prints the base64 decoded form.
d1f498ffeccaf405d1c5eee02b9059c9c967af99640fa813e9ef92cb76640102
Patch for Nmap 4.20RC1 (and some 4.20ALPHA versions) that adds a runtime option to toggle the sending of packets with bad TCP/UDP checksums.
e180b38e4a7275e4114c2efec3e17fc8133b9b2f0046f82fac757451fd6323a6
This shellcode sets the system time to 0 (00:00:00 GMT Jan 1, 1970) and exits in 12 bytes for Linux/x86.
671894154a3f23262ce22704ba3555cc5472af0a6360c70f0489e3ecc1686d9f
45 byte shellcode for Linux/x86 that performs execve("rm -rf /").
f7049ef5b574b64d8d8f114099f457c18a3401474e43c0dcc5dec65fa2fcb870
40 byte shellcode to flush iptables for Linux/x86.
626cec6fc89263e53cf70a5198bec5575b6c7fbfc5a134deda8b3a2c541cdb4c
This shellcode does a execve("ipchains -F") in 40 bytes for Linux/x86.
a46a03162b60f010c529dc4e669324ea009a92d1ddfa441f3bf320a0738a8b3b
A simple ICMP/TCP/UDP packet sniffer that was written for and tested on Linux.
b5998435a4a0e12b7ec376aaf53a26839c8421fdbe23f0273a52109c470a54aa
This shellcode does a execve("ipchains -F") in 41 bytes for Linux/x86.
e742f9afc4b4c28d5ccc45d6e151176a73545cd305be09731907f104d0d080c3
This shellcode adds a new root-equivalent user "r00t" with no password to /etc/passwd in 69 bytes for Linux/x86.
8922a4e770170ee0f5b528e7d6a7ac05789b5ac4acc3ca9b18b398f084d27581
This shellcode sets the system time to 0 (00:00:00 GMT Jan 1, 1970) and exits in 15 bytes for Linux/x86.
10104469e5a80af14384e1151e756a992eaf452dc10f9054491bd6a209bbcc25
11 byte shellcode for Linux/x86 that kills all processes.
7385e922191bbd115ccc17a49a7f27480d8bf2fb4888f053896e3fa0bae94ef8
20 byte Linux/x86 shellcode that reboots the system.
94f1faff10f9bedfe3cd5057c2bfe06d3ec14d006792926f227319b5f5e08e52
48 byte shellcode for Linux/x86 that performs execve("rm -rf /").
24327527c420ed9ed8d4ba6439251e16b92700e61417c06758f7a081b3a51154