Httpscan scans web servers for version and server type. Takes input from a file.
5fdfcdbd60b9eea2e183242dbd37f82e4922ef1bd99752f303299b7190154df3
A fast multithreaded NSLookup program that can be used with Proxy Hunter. 32 bit DOS, GPL, Ada 95.
d6fb8f7e172812ea71021112485fcb3e56cba99cd4db0c048720b852f8710735
Log Applet is a fairly small applet for the GNOME panel which monitors a file (typically a log file) as it is updated. It will display a customizable number of lines at the end of the file. <a href="http://orion.olg.com/~mcraig/">
1236e40cfa88e9460d0aee2979e58dfced498f3b7ee23903188eaecbefc229ac
The Secure-Linux patch adds a few security features to the kernel which, while not a complete method of protection, will stop most of the 'cookbook' buffer overflow exploits cold. It also adds the option of restricting the use of symlinks in +t (temp) directories which fixes most tmp-race exploits as well. It can also add a little bit more privacy to the system by restricting access to parts of /proc to root so that users may not see who else is logged on or what they're doing.
d72f9b43933eac2c13a83036ca7d5017dc1d78ce758198b6c633a00759d706a4
Forbidden Knowledge Issue #7. Includes: Trusted Windows RFC, Mass Fake Portscanner, Leet Windows/Linux Benchmark, Port Sentry Killer, Guide to learning how to hack, Mass CGI Vulnerability Scanner, DOS/Win9x Keylogger in ASM.
e1bf13c623f602bd3dfd85c3c3440141700804931ccf63dfeac8c538644eeebf
VeteScan updated to be capable of doing bulk scans. Courtesy of VetesGirl
eabb85ba22ee9e1042f30c622cb66f1b51112939a55a218e84c898763e62bb91
A word document discussing the possibilities of defeating encryption programs such as PGP using LanMan under NT.
36075d5ad515b3cc6df89ff4093cd14678327dc9bfa487d7c98880cc7bd36e16
Oracle installations with the 'Oracle Intelligent Agent' installed have a path related vulnerability. The problem lies in the dbsnmp program located in $ORACLE_HOME/bin . This setuid root program calls a tcl script (nmiconf.tcl) located by default in $ORACLE_HOME/network/agent/config. The problem is that the dbsnmp script relies on an environment variable (the path to nmiconf.tcl) which can be a set by a user. Therefore, intruders can force the script to execute a trojaned version of nmiconf.tcl which will run as root.
0f333e0cee58f483618cb5b045cda5dd5f3845e5f50149416ee043fd7957d53a
A vulnerability in Internet Explorer 5 that allows a malicious web site operator to read files on the computer of a person who visited the site.
b74388296f34727128150446873f6059bf6a0fdc3c669e2df6b4c0cde7827891
A patch to fix a number of ODBC vulnerabilities.
55e4dbb55835d40f100bd9112d62f2e2efeacc68d10d449ffd098ceda133aa4e
Donald Dick: Server Generator v1.53. Archive password is set to p4ssw0rd. Use at your own risk.
c079c0bb3fb46e636355672918eda507df1fe915cdbcd63a9fd6d61fd2a12a77
Donald Dick: Full Package (GUI Client & Server Generator) v1.53. Donald Dick is a remote control system for workstations running Windows 95, 98 or NT 4.0 (not tested on 5, we didn't steal it yet). First, it was implemented to replace well-known trojans we used to confuse dummies, and to be invisible for existing antiviruses. We used it locally since february - march of '99 till the summer. The first implementation could only open and close cdrom tray but it quickly becomes powerful remote control system. Here is the list of actions you can perform: File system - full access: browse, create, remove directories; erase, rename, copy, upload, download files; set date/time of file. Processes and threads: browse, terminate; run programs; additionally for processes - set priority; for threads - suspend, resume. Registry - full access: browse, create, remove keys and values; set values. System: get/set system time (you can perform Y2K compliance test ;) ); shutdown/logoff/reboot/power off; query system info, query/set system parameters. Windows: get list of windows; query and set system colors; get screenshot or the shot for particular window; send messages to window. Hardware: read and write CMOS (does not work under Windows NT, we not implemented this feature yet). Keyboard: simulate keystrokes, remap, disable keys, view keyboard input (all features except keystroke simulation are not implemented under Windows NT yet) Jokes: open and close CD; turn monitor's power off and on; talk with dummy using message boxes; play wave files. Chat: you can chat with other guys in volatile chat room and leave important messages in non-volatile chat room. Archive password is set to p4ssw0rd. Use at your own risk.
b8d9d3d8f22ebd4fd9c2a3a1093be7e71ecbfd1c0450fddc61463adbc2b499ef
Intrusion Auditing Under Windows NT. Microsoft PowerPoint presentation.
1f6a7a3596b2ad9381e38f460158d1b5ac70433e7354b9021b4a40bdeeff3891
This program will read any file from any NT Server, if the SHOWCODE.ASP script is present. Compile -DSPANISH for the spanish version!!
77d01f32c9be3d63742efac89cd45d47b428c7fb24e8525285ef0acaa786f929
Mountd vulnerability scanner.
9339bb098816c20e0b46c6b2707e83a35d2fda9ad805f21a213e747a2d4238ec
rpc.cmsd scanner.
819f44a12290c86a9392cf8c6ccec525a773bb1f0e11bbb31d0ca5e8632d40bd
Automount (amd) vulnerability scanner.
c8d823ac615895c18f0812319f0200d708330ab51623d9ccd856cab90ed058a9
Remote vulnerability scanner for Solaris. Requires nmap and netcat. Courtesy of VetesGirl
1b9111219d8643a6a3c709ed43c76e3f550a2ea5e0e8acaee7d3710819a7ac55
vetetcl: TCL version of vetescan, for use with eggdrop. Updated: forgot to add the scanners to the 1st release.
e90b766892be4410d887400d1bb856a762e965a1aea2f3f51429e623a2271932
vetescan, a bulk vulnerability scanner. Includes, according to the documentation: WINSCAN (scans win/nt systems for latest trojans/remote exploits), VETE (single vuln/host scanner), VETES (single vuln/host w/o host checking), VETEMASS (mass vuln/host scanner), CMSD mass (a b c scanner and getter), AMD (mass a b c scanner and getter), MOUNTD (mass a b c scanners/getter), many exploits, Fixes, and utils included. vscan.tcl wscan.tcl nmap.tcl. Changes in this version: Fixed a few errors in vetescan and winscan, updated the cmsd, amd, and mountd scanners, took tcl out of this package. Updated cmsd exploit. vetemass can now mass scan ranges of IP addresses.
f846bab8282105f41afc396570e54b277e05791beceb25660e767acc7dead587