T.REX Open Source Firewall - The T.Rex Firewall is a highly integrated enterprise security suite that combines functions that normally require the installation of multiple products. Features stateful packet inspection, content filtering, NAT, authentication, VPN, Workload Balancing, high availability, Real-time performance monitor, Network scanning and intrusion detection tools, and Extensive auditing and reporting tools that can produce more than 52 unique reports.
925d1b395a6875e09193df10a7690552dd2ea6ee547e0ce2d35815cb356fe168
Scanlogd v2.1 is a TCP port scan detection tool for linux, originally designed to illustrate various attacks an IDS developer has to deal with, for a here.
78959c2380ba0c76ab938c17250bcd65557aa7949742c3227a301132bfc09782
Security Auditor's Research Assistant (SARA) is a security analysis tool based on the SATAN model. It is updated frequently to address the latest threats. Checks for common old holes, backdoors, trust relationships, default cgi, common logins.
354e7145959cad880583cd5ca8e3f419e97c3f0ebba52e2a938da89d98cffb4c
E-LogMonitor is an Enlightenment epplet that monitors various log files for the occurence of specified keywords. It supports up to 20 file/keyword combinations and provides various ways of alerting the user if a keyword has been detected.
0e918d6104f3154e1365986167906c72abdcd1721c586b0122ada1a634af9c95
Etherape is an etherman clone which displays network activity graphically. Active hosts are shown as circles of varying size, and traffic among them is shown as lines of varying width. It is GNOME and pcap based.
bd2134689d290ec002716b163e101a92f6a83f479eacd8e00180c290ac704f09
LogDog is a very easy to configure and install system log monitor for watching system log files and emailing administrators when problems are found. Note that LogDog sends email to REAL email addresses, and does not require sendmail to be installed, it uses SendEmail which is also written by me and is included with the LogDog package as of v0.94.4. LogDog has a single configuration file which allows you to easily specify a list of key words to watch for, a list of words to ignore, a list of administrators to email when problems are found.
3d07f95079468f15c97c1c7d8893c3909e44229788a20c5fea33480cbc4c026d
Grout is the geographical tracerouter for unix. It combines the fastest tracerouter with the ability to display the location of intermediate machines. Developed for openbsd.
5a9cb90cdc0a48a91c4008ee756c525e07938a67a0318ee90b7f6580eb06c53b
dig v2.2 local buffer overflow exploit for x86 linux. Note that dig isn't suid/sgid on some platforms, yet on some it is.
9558bb85b9f1f940cb13b09af0c0a312ede194c6966ff6a071a7358a79f49ff1
imapd IMAP4rev1 v10.205 remote root exploit, solaris x86. Exploits the AUTHENTICATE overflow, yielding a remote root shell.
60090c36ac8c823cce06c3173af240ef94222db30faac4df5e3b13de2c7a547b
rpc.nisd remote root overflow, solaris 2.4 x86. Solaris 2.5.0 and 2.5.1 work with different offset.
e7bdfe8a6620ff1c89a033090f13a3a320060779e65b74fd857bbb8857d3f829
/usr/bin/lpset local root stack overflow for Solaris 7, x86.
a475a736a78b2988273182e46297cb031078a395224c65cf9e12a7ddf3c792fb
xsun.c is a Solaris 7 x86 local root stack overflow for /usr/openwin/bin/Xsun.
8af8334ae766a801bf8d4fc9e432e34370f3f1ad1621d0fed7d083f188ac984f
Broadcast Internet String Search Engine (BISSE) is a windows based scanner which searches your network for servives who have banners which match a user specified string.
71f45e86f1e5abaeb64f2f881e2327962a560ce984048bfafb508d8f493e44eb
FreeBSD Security Advisory FreeBSD-SA-00:15 - The imap-uw port supplies a "libc-client" library which provides various functionality common to mail servers. The algorithm used for locking of mailbox files contains a weakness which allows an unprivileged local user to lock an arbitrary local mailbox.
e886c572dda7f30f968164db8223b60f93ec3a3a62c1ffa925d1c397304210bc
FreeBSD Security Advisory FreeBSD-SA-00:14 - imap-uw contains security vulnerabilities for "closed" mail servers. There are numerous buffer overflows available to an imap user after they have successfully logged into their mail account. Thus, the vulnerability is only relevant on a "closed" mail server, i.e. one which does not normally allow interactive logins by mail users.
6fda2e7d9e5a79ccc9fa6a78c1894f185013d87e58d37237a89d82bc3c09dca2
Crazy Scan is a unix based scanner which scans for NT web vulnerabilties. Checks for about 30 cold fusion files, some cgi's, IIS / iisadmin scripts, msadc, and many other url's that indicate a remote vulnerability. Checks for 140 paths in all. Bug list available here.
ef4da4879810b3a2f4cf94e1bead2a85efcc7fc4d711dc3568c12d5124521a1c
The mio-star distributed multihosted unix password cracker v0.1 runs on all platforms where perl is installed. Comments and documentation is in German.
db9d49784497be47ea822a2ea9409857d496382a544d25862171f4f80ce97cca