httptunnel creates a bidirectional data channel through an HTTP proxy, from your isolated computer behind a restrictive firewall, to a system on the Internet you have access to.
1c8e33af1950332160d20ce3202f2afe131eb1b111d425336bc159469cf9e691
SRS is the largest syslog implementation for Unix (or any operating system). It has its own original protocol to ensure reliability.
0fd0e6892167da1e606927d561a9e887736528832ccc7edaad63a0f88a3d3fc8
Windows NT Magazene Security Update - Contains information on Internet Explorer Allowing Circumvention of Domain Security, IMail IMonitor DoS, MCIS IMAP Buffer Overflow, NetSec 2000, Email Security, and Embedded NT Firewalls. NTsecurity homepage here.
e10826cc45c3d2cc4e9fa262b9b5a88a4d1946983aa4f83b92098b3e7afbeaf3
Modem Finder v2.0b84 is a Windows based wardialer.
dcd35ce35e365f721fc3b3cc9ae2e091c967d90a501933ba22333546a8abc571
Cisco Scanner for Windows v1.02. Cisco Scanner will scan a range of IP address for Cisco routers that havn't changed their default password of "cisco".
28e910c326f6bd4e48bdbfc05087e4972613986077d569841e803fabceb15ad6
QIB - Remote access through Linux LPD. Binds a shell to port 26092.
97afaabada366abf97982811fdd724de55e48453cce1302244854e8ba62fadfc
Anyone with access to a running MySQL and GRANT privilege for any database or table in it, can change any MySQL-password he wishes, including the MySQL superusers. This makes all default-configured MySQL very vulnerable.
e35a0dceadc9e253ba3e40f84739ccab2b43de064f7db17e121ef8cc5029f754
Exploit information for the recent bugs in the Altavista Search Engine to read any file on the system.
31947cb85d87ea62e83e870b5086f47b97bbc339e314a15df7b3eb2b2b1af1f4
Georgi Guninski security advisory #5 - Yet another Hotmail security hole. Hotmail allows executing JavaScript code in email messages using vascript, which may compromise user's Hotmail mailbox when viewed with Internet Explorer. Includes exploit code.
65fdac7706125ec8e60e80805e2a38b4ad6098e748b5365f66c120c827d08596
L0pht Advisory - A remote user can execute arbitrary code on a properly configured Linux LPD server.
09a305e3e24195a53ab09f9a992de2f278d9d4743d6570f174bdd602e7df59f1
httptype reads a list of http hosts and optionally the port number for each of these. It queries each host, displaying the type of HTTP server running on that host, if any. It reads the http_proxy and no_proxy environment variables to determine whether to use a proxy or not. These options may also be specified through the command line.
a8721faf825430542fd67b9287e29124b45f981cd5ed7cf1d91e56f17dd31415
netfilter is a framework for arbitrary packet mangling. So far, a new NAT system and packet-filtering system have been built on top of it, as well as compatibility modules for ipfwadm and ipchains. Netfilter is a work-in-progress, but should be fairly robust for non-exotic work.
f78a3f2078400db7d7f6f152a8f6801bf578926487e20d5a8175c31c7af57d57
Ipaudit records network activity. It stores a count of bytes and packets exchanged for every combination of host/port pairs and protocol. It can be signalled after a fixed interval (30 minutes is typical) to output results. It's useful for identifying heavy bandwidth users, intrusive telnet sessions, denial of service attacks, scans, etc. There is also an option (like tcpdump) to save raw packet headers for detailed analysis with packages such as tcpdump or ethereal.
69cf1c9bb497338ecc4bdefd8e61e7e4441fbae7beb1a2fc493764ca62c31abe
This src grabs documents printed on a network printer installed with lpd by sniffing it from the network.
fdd3a4da4b6c7e5bdabff5d056a2cdc6624bc2137b16ee1f75f434459fc2b500
Gork is a tcp/udp/icmp/ip dumper with options to log only packets from/to specific machine/s in a file. This version supports pcap library. Tested on Redhat, Debian, and FreeBSD.
5888b46530d4848b2f9113d552f2992a3955bbb3340fd1f234250f1690ffc7f1
VeteScan is a bulk vunerability scanner containing programs to scan Windows NT and UNIX systems for the latest trojans/remote exploits, a scanner for the vulnerabilities of single hosts (with or without host checking), a tool for scanning multiple hosts, a scanner for class A/B/C networks, and fixes for various vulnerablities.
9271d6e3afb250451e53ecac981efb95ebf6df94bb39629eb4fa170ff929d58a
The Vetestcl package contains various TCL scripts with the same functionality found in the VeteScan package. You can load the scripts within an Eggdrop bot to make sure none of your channel operators or hosts running IRC bots suffers from security vulnerabilities present in the operating system or user space applications.
aa465ba5a2ef8425aa485bee8ee8a1d3b9ba82e52d60b16747d932e435abaa6d
Vetes.bx is a remote vulnerability scanner for the BitchX irc client. Includes scans for rpc services, bind version, and windows trojans.
6db57558a65908b41a01699de53006aca14a19f88876559ca422ca4036c196c5
Uses malloc to tie up all available memory, crashing a RH 6.1 box w/ 64 MB ram in 10 seconds.
7662e1284064f4cf86581211e7d2046926fd04a8256274c31e34a8fa0cafc586
Secure Programming Howto - This paper provides a set of design and implementation guidelines for writing secure programs for Linux systems. Such programs include application programs used as viewers of remote data, CGI scripts, network servers, and setuid/setgid programs.
b065896ba58bc640450fba80726f03db71475b8ff5923da0350cfc11dc22dd3e
InET Magazene in Palm Pilot format. (Issues 1 through 4) In Spanish.
91c8e70195a81064e137762a503d9d143cd42f5ed93d440afa0eed2eec942f79