Analyzer v2.02 is a full configurable windows packet sniffer and network analyzer. Developed in a Win32 environment, it works on both Windows 95/98 and Windows NT/2000 platforms. It features a GUI, an analysis engine and a capture program.
26b0d4a78466e8726e7d44efdd8ca21de96fcd05c5c971a37a1fb8f3e765b4b8
Securing and Optimizing Red Hat Linux - This documentation is indispensable for peoples that want to get all advantage, security, and optimization of a Linux Server. Features Free/SWAN section, Quota configuration, Portsentry, Logcheck, section, improved firewall security approach, more system security tips and a lot other changes. This is the version 1.2 released the March 17, 2000.
21fedc3ff40715c9ab54627a93f618933543a9092dd9c93b1701b7e1865b8233
Ethereal is a GTK+-based network protocol analyzer, or sniffer, that lets you capture and interactively browse the contents of network frames. The goal of the project is to create a commercial-quality analyzer for Unix and to give Ethereal features that are missing from closed-source sniffers.
a86271a7bfa3de19c018bdb9637588bca51d5d8b032bcdf971c6f593268173af
SuSE Security Announcement - A security hole was discovered in kreatecd version 0.3.8b and below. Kreatecd is a KDE tool used to burn cd-roms, in which an exploitable buffer overflow was found allowing local users to get root. SuSE security website here.
d143541083c4cd2e4218fc0c810424545d121f5db2811df201e4f8074bdabac7
SuSE Security Announcement - A security hole was discovered in gpm verison 1.18.1 and before, allowing local users to execute commands as EUID 0. SuSE security page here.
da04ad53049b68946f42d5b38d8d36f0ad7afa0ac85e1424a0e34694d3db7200
Boink.c is a modification of bonk - DoS attack against windows.
7aec22a3206ed698148a6c4062d3660392e88832419ca5ceaeb326d3d8464fec
chupacabra is a remote access trojan created by Dark Side Industries. The trojan has the common remote access trojan fuctions and also a nice design. Archive password is set to p4ssw0rd. Use at your own risk.
7eefe8f4274ce42204d4440d738b87998f370f2908396ee28f9b02cbc1e51396
Playing with the Internet Daemons - There are many fun internet daemons that can be played with to give a fuller understanding of unix networking. Very well written.
65189f823bd35fa6726a9232af8ed50e9c670ee0b6f78bff4667aa4f60200d41
dopewars 1.4.4 exploit, it's been fixed now ( thanks to my patch :-) ). It dates back to oktober 1999. But i used some cool methods in it.
f7b77db072d1405a450204a66ded9b44f5d8fe5c91b142d9376c984870b4f68f
Misoskian's IGMP Nuker OSR - Includes delphi source.
0a150f34142362dddd5e61d7cc368d4010bc95cedcf634fcd6d2e95da1d0a714
paralyze3.c will open as many connections to a remote host as supported (by both ends). Many daemons will crash and/or stop responding under the load.
cf39c4874fd834079ec15e0f07fbb763bd4552e4ce47d69b77678bba1386ca41
safe_exec.c - execute programs in a secure environment with a specific uid/gid/user and you can specify a program to be executed before the chroot.
a237a905c377b8cdf4065c45fb6568e482cec4b7ed56166967add7160a81033b
sc.tgz is a bunch of linux shellcodes. x86: shellexecuting, portbinding, encrypted (to avoid IDS detection), cdrom ejecting, writing (append "lamagra was here" to /etc/motd) , reading (read 255 chars and execute). tools: a tool that "creates" shellcode from the _start of a program, a list of useful syscalls + arguments. m68k: reading, shellexecuting.
7a65245816d3ac1c54c5513145d58b318536f68db9ba2d683cf9ba7142068296
YATunnel is an easy tunneling program to bypass firewalls so you can access your computers behind firewalls from other places.
334c5ad3390480d368c716545003b6d6ea13147cb877499c56721145ecdb89e2
Trojans213.zip is a list of 213 remote access windows trojans, with the default port numbers they use. Also contains a list formatted for use with superscan 2.0*. Archive password is set to p4ssw0rd. Use at your own risk.
1fd6a10a326570d7abd24f5219207d57e1f5f40291a26545d6029aed0e99d4b4