fwmail is a small secure daemon for inetd that forwards incoming smtp traffic to another sendmail server, acting as a gateway, and optionally anonymizing the senders origin. Version 1.1.
aa50ed680dff4ba963354310ae65f519721901b409409b2ad2f3d944d5b6794b
nsat is a bulk security scanner designed for recoverable long-time scans, optimized for speed and stability, that scans and audits about 60 different services and 170 cgis. Version 1.08.
eb55372260ad6fd90f349dab6565c49e8a639a33693e0a0fdcfed17433e4eeeb
Several vulnerabilities exist: ypserv prior 1.3.9 allows an administrator in the NIS domain to inject password tables; rpc.yppasswd prior 1.3.6.92 has got a buffer overflow in the md5 hash generation [SuSE linux is unaffected by this, other linux falvors are]; rpc.yppasswdd prior 1.3.9 allows users to change GECO and login shell values of other users. Affected are all linux distributions using the ypserv package. Website for patches here.
760ce3bd92792f507a4556e1a3b80e429915e2e35a020f7efc814d176a4281a6
UNIX/Win remote vulnerability exploit scanner with Fixes for Vulnerabilities. based on ben-z fts-rvscan scanner. Includes: WINSCAN (scans win/nt systems for latest trojans/remote exploits), VETE (single vuln/host scanner) VETES (single vuln/host w/o host checking), VETEMASS (mass vuln/host scanner), CMSD mass/get (a b c scanner and getter), AMD/get (mass a b c scanner and getter), MOUNTD/get ( mass a b c scanners/getter), many exploits, Fixes, and utils included.
99c3a3de5a307efc0d5dde9ebe1a45fbeaa0ec8158ead50ee84d677dbbe243e0
A list of the TCP ports which trojans use. Archive password is set to p4ssw0rd. Use at your own risk.
798103e287d7346856c86294b48fe70090244b2a4c81c8f143677b3b4393bd76
DOSfw is a simple Linux netfilter firewall module which drops denial-of-service attack packets. The current version supports only two attacks and TCP Fingerprint scan, but you may expect other attacks in the (hopefully near) future.
3e3130198ff8e4d64cc597ae528140fb041f6deea4eaa8dacc470c7fec948060
FWT is a web based administration package for remote configuration and administration of the firewalling and (some) networking aspects of the Linux operating system. The tool is easy to use and can configure most useful parts of ipchains (including masquerading), policy routing, ethernet alias interfaces and redirection of TCP traffic through a masquerading firewall.
6fb3676c874f25ef731ce868c549790434192d7c15b75373d3bfc1240a703c97
Logcolorise is a PERL script to make your syslog generated log files much more legible by colourising them (context highlighting based on keywords).
c63321d7d299bfb4acc2b06a4c5e8179a58c46288c934847e20ecb25751c7ee1
Tailbeep opens a file (-f), seeks to the end, and watches for a string (-s). If the string is found, a beep is sent to the specified tty (-t) device. You can also daemonize (-d) it. I wrote it so I could watch /var/log/messages for the DENY string (so I can tell if someone is trying to break into the firewall.)
0011bf9bb3235b1f12a7a203cf243e8db9ffb91b311a8147d9873a667d78fb33
A simple GUI trojan that when added to the autostart *see regedit* registry will log the passwords of the Novell NetWare School Vista user to c:\windows\samples .txt. Loginw31.exe is an exact duplicate of the login while Login31(2).exe is a system confirmation tricking the user to re-enter their password.
58d1a61a0dad0a8bd9fdf8856cb55f06ea965f5b92b98a29653c46aae61937c7
pr0tscan was based on vetescan, but added more vulns and tried to make it run more smoother. Winscan, (scans win/nt systems for latest trojans/remote exploits). The docs include fixes for the vulnerabilities it finds.
492897184ae35990598618bea3d466e9283d566f80648c61ea9254760a094c18
logController allows you to control the size of some files that tend to become too large (logfiles). A config file allows you to define which files to monitor and the sizes not to exceed. If one or more files exceed the limit size, they are automatically truncated to a new user-defined size and the area truncated can be erased, or compressed and stored.
13b9e31af419c0a7b8b3fd18a2724a16c5b2e33b81f142a08655ea85d257030f
Spikeman's DoS Attack Tool - Revision 5. 31 denial of service attacks at once.
9f930571591e3d0822220c2d809879ca668143471a6765e5e25f7583bd14d138
Forged packets can be send out from a Linux system, for example for NFS attacks or any other protocol relying on addresses for authentification, even when protected from the outside interfaces by firewalling rules. Most of the time, existing firewalling rules are bypassed. This requires at least a shell account on the system.
8d159590c7c839774eb2f8a7c4dddf0737f16a6cf7e3d10393036232f45f5469
Walker - Compuserve 3.0 Password Decrypter. It decrypts Compuserve 3.0 ini files (cis.ini) that stores account passwords.
165027448c137a47f5149973229d79d31f0b0a137efbc4f0c01f848456b74fa8
Pho's alternate remote OS detection techinques page has been updated. Includes information on ICMP techniques, ARP techniques, IP techniques, and UDP techniques.
8ad58add858120309dfa20fecd05c30e086888dd27674d03eb1a7771daeb0615
If you have installed Microsoft Office 2000 or keep current on your Windows Updates, you may have noticed a new WebFolders namespace in Windows Explorer. The fun part is that WebFolders have some significant weaknesses (inherited from FrontPage) and are such a new concept that it turns out they make a great entry point into a remote server.
01adda0b5af462be99d4d8071315e8516891937780a27b461c6b4e7ab4d80727