Seawall is an ipchains firewall that supports IP masquerading and can be used on a standalone system, on a dedicated firewall system or on a multi-use gateway/server. It supports VPN via IPIP tunnels and PPTP, has an easy to edit configuration file, and can be extended without modifying the base product. It also includes realtime monitoring with an audible alarm that sounds when suspect packets are detected.
c1e6b2a02f93a60cebb23853b7ab0496b72b1f0ab32f9250764cc4032875da8b
WPC is a simple application that tries to guess usernames and passwords for password-protected web pages. This security tool is intended for webmasters.
0a8216de126db4914a192cc687ed30f96963ee3768b34ef4e60d1edd74ff187a
Pyro Scanner v1.2 scans for many web / cgi vulnerabilities and has the nice feature that it displays the server output so you can see what is really going on.
9ddc2b2e6e743728c84328afe7c7c42c29b91cf9abe474e97437c54bf302bf8d
nis-spoof.c spoofs the response from a NIS server to a client.
e767ec14fcd1d8828d2216e5f793b7001d6f722f8cd0bbb2330dd185eed139b3
USSR Advisory #40 - Remote DoS attack in Microsoft IIS 4.0 & 5.0 - Malformed Extension Data in URL Vulnerability. The Ussr Labs Team has recently discovered a memory problem in IIS. Performing an attack with specially-malformed information extension data in the URL will cause the server to slow or stop.
3ad2790a2aa9da5a9e68e4f05873fcf34d29c2e12efbfb4acaed60e374f2d48d
Neon beta5 - Simple Host or Iplist cgi Scanner which does 358 checks.
a0fc3d293b0acf7825ebd5b79d94d7aa2fa74286565aaee9b6fc858b23fb9ae6
Internet Security Systems (ISS) X-Force has determined that Microsoft Internet Information Server (IIS) is vulnerable to a remote Denial of Service (DoS) attack. IIS is a popular web server application for Windows NT, and comprises the majority of Windows NT based web servers. This vulnerability may allow a remote attacker to effectively disable vulnerable versions of IIS.
b3f3869ababf8355003692b68bc463889b7d558c776dd4b96ffa2393d0ca1ac3
Writing Internet Worms for Fun and Profit - The love letter worm was very crude, and proof of concept code for much more powerful worms has been written. Expect next years worms to be architecture independent, invisable to the end user, spread without user intervention, learn and launch updated worms, polymorphic with no constant code, and dissapear after it has accomplished its objective.
4814e0d3497813ef018f3be0c85104943a8f0a6b10ad19514067d20f4a5d8653
Cum Security Toolkit (cst v1.0) - Contains a scriptscanner and a portscanner Coded in Java. The http-script scanner features the ability to use a proxy server, a scripts-to-scan database, anti-IDS url encoding, fake "X-Forwarded-For:" header, and uses fake "Referer: " info. The port scanner is a full TCP connection scanner which can scan port ranges and grab banners.
4a48a8b8b4f3c855330733200affaf3d5fdca4f02a949b6e0d9a50938eab9560
BufferOverflow Advisory: Unchecked system call in Bugzilla 2.8. The script used to submit new bugs, process_bug.cgi, is vulnerable because it does not check the contents of the who field. Includes perl remote exploit code.
c03b1338b6456d559d308a4ca0f67b5d6cb1acb1d1ed85a1dec83f1ca6175f4c