what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 16 of 16 RSS Feed

Files Date: 2000-01-11

weedlog-1.0.1pl1.tar.gz
Posted Jan 11, 2000
Authored by Phil Jones | Site firepool.com

weedlog is a packet logger designed to help in debugging network connections on non-router systems. It currently supports the ICMP, IGMP, TCP, and UDP protocols. weedlog supports sending output to stdout, a file, or to syslog.

Changes: Fixes for most pthread-related bugs.
tags | tool, udp, sniffer, tcp, protocol
SHA-256 | fe774ec44cee497b1a0f7af6899533ecc38a56afc3f040f9cda58512843cdae5
watchfile-0.9.tgz
Posted Jan 11, 2000
Authored by Nick 'Zaf' Clifford | Site nrc.co.nz

Watchfile will display a list of specified files on the screen, and continually update their stats. The stats displayed (i.e. file size, modified time, owner, etc.) can be configured on the command-line along with the update frequency.

tags | tool, intrusion detection
systems | unix
SHA-256 | ba0fd45f64df9c7832434769f98fae5f6cc552866915de5efc17504ab8d8b22c
webdecoy.tgz
Posted Jan 11, 2000
Authored by Mixter

webdecoy.tgz is a small script that can find, remove and replace vulnerable CGI scripts on the local webserver with "decoy" CGIs, which log exploit attempts.

tags | local, cgi
SHA-256 | 853f3f8326f0656b1f9c046c35b006d4d37ff9fd19357e3909da8eb0e31eb4f8
nsat-1.12.tgz
Posted Jan 11, 2000
Authored by Mixter

Nsat is a fast bulk security scanner designed for long-range scans written in C++ which scans and audits about 60 different services and 170 cgis with different scan intensity.

Changes: Several bugfixes, stability upgrades, 5 new cgi checks, updated vulnerability information and Cisco router detection.
tags | tool, cgi, scanner
systems | unix
SHA-256 | 3ab2a97528f2860fe8da6c53e97c0b30414f7de6150a4d2fb4dfed024c39a521
kmap-0.7.1.tar.gz
Posted Jan 11, 2000
Authored by Ian Zepp | Site islc.net

Kmap is a QT/KDE front-end to nmap, a popular and powerful console portscanner. Kmap allows quick and easy access to all of nmap's features, with much less hassle. Kmap also sorts the output from nmap into usable sections, so you easily extract the information you want.

Changes: Fingerprints are now appended to a file. The bounce option now works correctly. A logging option was added to all windows. The verbose option no longer causes a double info entry. Shift up/down buttons now work. History window sorting was fixed. Logging now saves date and time.
tags | tool, nmap
systems | unix
SHA-256 | d52a9015b9ab1bf91671fd7274fa9ee1a3e10f39f2b0b5b7183ce1c8e4cab5a5
MacPork.sit
Posted Jan 11, 2000
Authored by DarkSider | Site freaky.staticusers.net

Macintosh - MacPork new Developed by Team2600 MacPork is a auditing tool like many seen for unix platforms, this is a small program that allow you to scan a server for tracking holes and exploiting them. MacPork scan over 130 vulnerabilities and retrieve a passwd file in 45 differents manners. It's the best scanner/retriever ever made on both macintosh and unix.

tags | vulnerability
systems | unix
SHA-256 | d7495fce7255a9e66fa5180935216c57032fe1c5cd128d9e91f5e16c27ca3616
MK3.sit.bin
Posted Jan 11, 2000
Authored by Freaky | Site freaky.staticusers.net

Macintosh - MagicKey III Created by SystemCowboy of Digital-Rebels The program will atempt to crack a users account on an appletalk network. OS8 Ready.

SHA-256 | b747406d8e1a99ec68bff235fca00d5b94a5025fdac001bc919a993836ae20d9
portchk.c
Posted Jan 11, 2000
Authored by Missinglnk | Site tribune.intranova.net

Simple port checker that either takes command-line input or file input and checks each host if a given port is open.

tags | tool, scanner
systems | unix
SHA-256 | c6196cb0030306034df4e5f018b488e74133893235f29df326bb4ff2de6299ec
plusmail.c
Posted Jan 11, 2000
Authored by Missinglnk | Site tribune.intranova.net

PlusMail CGI remote exploit - This posts the form to the victim, reads the data, binds to a port on the local machine, then you open up a browser and go to http://localhost:4040.

tags | exploit, remote, web, local, cgi
SHA-256 | 65735cef498dd42d12cd9b4a11b9ed5eb2ec95a330443001f62c15aa73e980df
getwksinfo.exe
Posted Jan 11, 2000
Authored by Missinglnk | Site tribune.intranova.net

Getwksinfo is a little program coded for Windows 95/98/NT/2000 that gets the parameters of a remote Windows NT server, parameters include NetBIOS name, NetBIOS domain/workgroup, amount of users currently logged in, and remote operating system version.

tags | remote
systems | windows
SHA-256 | 2e05d6ca2a325c70bf4d891313dede50016ea3ec3834a29b7f44982e18cac92d
intact21.zip
Posted Jan 11, 2000
Site pedestalsoftware.com

Intact Open Use is a host integrity checking system for Windows NT available free for non-commercial use. Intact can detect change in the NT filesystem and NT registry. Other versions of Intact include Intact Intelligence and Intact Enterprise. Unlike Intact Open Use, these can monitor a system for change and build an optimal configuration file containing objects and object characteristics which do not normally change. To clarify, this is a lightweight free version.

tags | registry
systems | windows
SHA-256 | 3d0d7cfe5fed2cfb449d8b784b7ea4c0a4c27460bd673ff6953b27415e43f933
osiris.zip
Posted Jan 11, 2000
Authored by The Schmoo Group | Site schmoo.com

Simple perl scripts for generating a catalog of MD5 hashes of executable files under NT, and later comparing the catalog to new snapshots. Compares based on missing or additional files, differing MD5 hashes, modification dates, and file attributes.

tags | perl
SHA-256 | 6bab0ab22e817f7d4d6cbb0081fc29758f51d25453c01f6a99be598279b2c685
dsniff-1.2.tar.gz
Posted Jan 11, 2000
Authored by Dug Song | Site monkey.org

Dsniff contains several powerful new network tools, written for use in penetration testing. Arpredirect is a very effective way of sniffing traffic on a switch by forging arp replies. Findgw determines the local gateway of an unknown network via passive sniffing, which can be used in conjunction with arpredirect to intercept all outgoing traffic on a switch. Macof floods the network with random MAC addresses, causing some switches to fail in open repeating mode, facilitating sniffing. Dsniff is a simple password sniffer which parses passwords from many protocols, only saving the "interesting" bits. Mailsnarf is a fast and easy way to violate the Electronic Communications Privacy Act of 1986. Urlsnarf outputs all requested URL's from HTTP traffic. Webspy sends URLs sniffed from a client to your local Netscape browser for display, updated in real-time (as the target surfs, your browser surfs along with them, automagically).

Changes: Ported to FreeBSD, Add NFS mount parsing / RPC framework to dsniff, Add -i flag to specify interface to use.
tags | tool, web, local, sniffer, protocol
SHA-256 | 3e2ba48592e238432309cc390cea45781fbf3bfd215112c6d81acde38ca6916c
sftp-0.6.tar.gz
Posted Jan 11, 2000
Authored by Brian Wellington | Site xbill.org

Secure FTP (sftp) implements a file transfer protocol using ssh/rsh as the transport mechanism. When the client is invoked, a remote shell is spawned and the server is run. sftp is mainly useful over a secure ssh session since passwords are not exposed. It also has the advantage that no root access is required, since the server runs as a user process.

Changes: Better quoting and tilde handling, support for windows that are not 80 characters wide and the ability to pass arguments directly to ssh have been added.
tags | remote, shell, root, encryption, protocol
SHA-256 | e35aa9a46e14873628d8e21da671ac82c48cc18c978ae56c9d03a24f67f33534
service_check.tcl
Posted Jan 11, 2000
Authored by Phil Ehrens

This is a simple script written in tcl which parses the output of the nmap program to determine whether required services are in fact running on a machine. Output is written as an html formatted log file.

tags | tool, scanner
systems | unix
SHA-256 | e7ffd4cb2568288bd041ca938ab43c887d064dbb920e4b2b0ab6c7a913cd439d
saint-1.5.beta1.tar.gz
Posted Jan 11, 2000
Authored by Sam Kline | Site wwdsi.com

SAINT, based upon SATAN, is a network security scanner which runs on Unix platforms. This version includes fixes for the y2k and timeout problems in http checks, and features the ability to scan multiple hosts, subnets, or IP address ranges. There are also new configuration options and two new severity categories, and a new check for the stacheldraht distributed denial-of-service tool.

tags | tool, web, scanner
systems | unix
SHA-256 | 641a040138f951d893ed2c6db68a343f94d8be62e71a7fb9cc826eb8fe5cbe33
Page 1 of 1
Back1Next

File Archive:

June 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Jun 1st
    0 Files
  • 2
    Jun 2nd
    0 Files
  • 3
    Jun 3rd
    18 Files
  • 4
    Jun 4th
    21 Files
  • 5
    Jun 5th
    0 Files
  • 6
    Jun 6th
    57 Files
  • 7
    Jun 7th
    6 Files
  • 8
    Jun 8th
    0 Files
  • 9
    Jun 9th
    0 Files
  • 10
    Jun 10th
    12 Files
  • 11
    Jun 11th
    27 Files
  • 12
    Jun 12th
    38 Files
  • 13
    Jun 13th
    16 Files
  • 14
    Jun 14th
    14 Files
  • 15
    Jun 15th
    0 Files
  • 16
    Jun 16th
    0 Files
  • 17
    Jun 17th
    0 Files
  • 18
    Jun 18th
    0 Files
  • 19
    Jun 19th
    0 Files
  • 20
    Jun 20th
    0 Files
  • 21
    Jun 21st
    0 Files
  • 22
    Jun 22nd
    0 Files
  • 23
    Jun 23rd
    0 Files
  • 24
    Jun 24th
    0 Files
  • 25
    Jun 25th
    0 Files
  • 26
    Jun 26th
    0 Files
  • 27
    Jun 27th
    0 Files
  • 28
    Jun 28th
    0 Files
  • 29
    Jun 29th
    0 Files
  • 30
    Jun 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close