exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 8 of 8 RSS Feed

Files Date: 1999-10-27

libol-0.2.5.tar.gz
Posted Oct 27, 1999
Authored by Balazs Scheidler

Libraries needed to compile syslog-ng-1.2.0.

tags | system logging
systems | unix
SHA-256 | cf62f99181ce6086b6b417cf622da52637e25fcaf5aeffe37d27215acb7ecfbc
syslog-ng-1.2.0.tar.gz
Posted Oct 27, 1999
Authored by Balazs Scheidler

Syslog-ng as the name shows is a syslogd replacement, but with new functionality for the new generation. The original syslogd allows messages only to be sorted based on priority/facility pair, syslog-ng adds the possibility to filter based on message contents using regular expressions. The new configuration scheme is intuitive and powerful.

Changes: A new stable series started with this release. Version 0.2.5 of libol is required to compile syslog-ng now.
tags | system logging
systems | unix
SHA-256 | 7688e47e094bd096ad063d2888408cd6b23e11fcb32bf36ebb18433f917f4576
ftpcheck.pl
Posted Oct 27, 1999
Authored by David Weekly | Site david.weekly.org

Ftpcheck version 0.32 scans hosts and networks for FTP and anonymous FTP archives. It was written as a security analysis tool. ftpcheck is very fast. It can effectively scan a class C network for anonymous FTP sites in less than 5 seconds. It does this by starting a new process for each connection. ftpcheck requires perl and libnet (from CPAN).

Changes: Fixed misclassification of "a.b.c" hostnames as class C IP addresses.
tags | tool, scanner, perl
systems | unix
SHA-256 | 4db18ee847594c54327e7cbf9a06f2931d9e5950e20b2ba32d3e0d93b52e29c0
tailbeep-0.43.tar.gz
Posted Oct 27, 1999
Authored by Tommy. | Site soomka.com

Tailbeep opens a file (-f), seeks to the end, and watches for a string (-s). If the string is found, a beep is sent to the specified tty (-t) device. You can also daemonize (-d) it. I wrote it so I could watch /var/log/messages for the DENY string (so I can tell if someone is trying to break into the firewall).

Changes: Added -F (frequency) and -M (milliseconds) option, added -x "command" option, cleaned up the help screen, and you can use -p and -P at the same time now if you want both the entire line and a predefined message.
tags | tool, intrusion detection
systems | unix
SHA-256 | f48d24516c0e62148cbb782e1cb62c1b16b0c0a4f5d49100f27fe7568d015b5a
linux-2.0.38-ow4.tar.gz
Posted Oct 27, 1999
Site openwall.com

This patch (for kernel version 2.0.38) is a collection of security-related features for the Linux kernel, all configurable via the new 'Security options' configuration section. In addition to the new features, some versions of the patch contain various security fixes. The number of such fixes changes from version to version, as some are becoming obsolete (such as because of the same problem getting fixed with a new kernel release), while other security issues are discovered.

tags | kernel
systems | linux
SHA-256 | bac133254280a1004601ee0378499f2384700b2c51e1280c5877c6d220d8550d
Openwall Linux Kernel Patch
Posted Oct 27, 1999
Site openwall.com

This patch (for kernel version 2.2.13) is a collection of security-related features for the Linux kernel, all configurable via the new 'Security options' configuration section. In addition to the new features, some versions of the patch contain various security fixes. The number of such fixes changes from version to version, as some are becoming obsolete (such as because of the same problem getting fixed with a new kernel release), while other security issues are discovered.

tags | kernel
systems | linux
SHA-256 | 950f913dd4c3cb5fc0e1ab946fc132fef8d3e674b058a9d8aef8258d476418c8
cracking2.txt
Posted Oct 27, 1999
Authored by Techlord | Site blacksun.box.sk

Techlord's second cracking tutorial. This one will guide you through the cracking process of a small program, and help you under stand all the steps involved in cracking.

SHA-256 | e803f72a65f8cc8dcb206d3258ec9d4593fa5d20dc608d7cde6804d8f708540d
suidshow.c
Posted Oct 27, 1999

suidshow.c is a linux lkm that will log any non-root user doing a setuid(0) or a setreuid(0,0) system call. CyberPsychotic

tags | tool, root, intrusion detection
systems | linux, unix
SHA-256 | 5089cc902d75283bd99aa843ad384439e5b1b862509c70dfa40b9ccae967e300
Page 1 of 1
Back1Next

File Archive:

March 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Mar 1st
    16 Files
  • 2
    Mar 2nd
    0 Files
  • 3
    Mar 3rd
    0 Files
  • 4
    Mar 4th
    32 Files
  • 5
    Mar 5th
    28 Files
  • 6
    Mar 6th
    42 Files
  • 7
    Mar 7th
    17 Files
  • 8
    Mar 8th
    13 Files
  • 9
    Mar 9th
    0 Files
  • 10
    Mar 10th
    0 Files
  • 11
    Mar 11th
    15 Files
  • 12
    Mar 12th
    19 Files
  • 13
    Mar 13th
    21 Files
  • 14
    Mar 14th
    38 Files
  • 15
    Mar 15th
    15 Files
  • 16
    Mar 16th
    0 Files
  • 17
    Mar 17th
    0 Files
  • 18
    Mar 18th
    10 Files
  • 19
    Mar 19th
    32 Files
  • 20
    Mar 20th
    46 Files
  • 21
    Mar 21st
    16 Files
  • 22
    Mar 22nd
    13 Files
  • 23
    Mar 23rd
    0 Files
  • 24
    Mar 24th
    0 Files
  • 25
    Mar 25th
    12 Files
  • 26
    Mar 26th
    31 Files
  • 27
    Mar 27th
    19 Files
  • 28
    Mar 28th
    42 Files
  • 29
    Mar 29th
    0 Files
  • 30
    Mar 30th
    0 Files
  • 31
    Mar 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close