Kmap is a QT/KDE front-end to nmap, a popular and powerful console portscanner. Kmap allows quick and easy access to all of nmap's features, with much less hassle. Kmap also sorts the output from nmap into usable sections, so you easily extract the information you want.
13aa864a43d43e08b41aedb9d5b0a663fd6e9a9223d80430113fb11a959fe2ff
Linux Rootkit v4.1 is based on Lord Somers LRK4 but several things are fixed. Includes a better find patch, fixed install of pidof / killall, fixed rshd patch, compilation fixes, and more. Released 11-may-2000, tested on Linux kernel 2.2.6, Slackware 4.0.
adecedb7ccb2d5c273f0825c00ea50190704d28a5ee05cde397452f6133b9549
Touch of Death is a TCP connection killer for linux which is designed to work with sniffit. When running sniffit in interactive mode, you can immediately kill any connection you can see.
7ada2bc1a67bc67fc83014c84f0791097e39af05eccb4f2dc68b913ffb0a8b0b
Cisco Secure PIX Firewall TCP Reset Vulnerability - The Cisco Secure PIX Firewall cannot distinguish between a forged TCP Reset (RST) packet and a genuine TCP RST packet because the sequence number is not checked. Any TCP/IP connection established through the Cisco Secure PIX Firewall can be terminated by a third party from the untrusted network if the connection can be uniquely determined. If only source ip / destination ip / destination port are known, a RST packet can be sent with each source port.
b1f7eb96541775acb267d750a7136e421f2b6437fb5e1dadef4de9c99dc843d6
The goal of FireStarter is to provide an easy to use, yet powerful, GUI tool for setting up, administrating and monitoring firewalls for Linux machines. FireStarter is made for the GNOME desktop. It can actively monitor your firewall and list any unauthorized connection attempts made to your machine in a readable table format.
95f2a4e5466e3649db9dc3ecc82e2f37939c903d798d8efb780211d011bcca8f
TWWWscan is a Windows based www vulnerability scanner which looks for 209 www/cgi vulnerabilities . Displays http header, server info, and tries for accurate results. Now features anti-IDS url encoding and passive mode scan. Tested on win95 osr2 win98,win98se,win nt4,win 2k.
e22757f754f09cec07ef92b15d7288a1bb562a9210beb649e6f3b972e9082ec0
Linux FreeS/WAN provides IPSEC (IP Security, which is both encryption and authentication) kernel extensions and an IKE (Internet Key Exchange, keying and encrypted routing daemon) allowing you to build secure tunnels through untrusted networks. Compatible with with other IPSEC and IKE systems already deployed by other vendors such as OpenBSD.
1c356c0db0bf695b0cfb1071cb663a74990de3ec263f22a6519bbff5cfffd444
Gspy retrieves images from a video4linux device and processes these into a daily mpeg movie on the disk drive. Each image is recorded with a time stamp to insure accurate real world correlation. Special motion detection algorithms are used to reduce the size of the daily movies by eliminating pictures with similar content as well as the normal compression obtained via the mpeg process. The result is a time lapse video per day with nonlinear time compression using only the images of interest. Screenshot available here.
3a5d7fe8d9f47f7208c3de20c64ba67dcf4d1fd30c289ec26d47a46947ef6e5b
Security Auditor's Research Assistant (SARA) is a security analysis tool based on the SATAN model. It is updated frequently to address the latest threats. Checks for common old holes, backdoors, trust relationships, default cgi, common logins.
a19656b99be490cdd1cdac8f161f6660f073f3560b9ae87285ebd94e3c44856f
Bind-8.2.2P5 patch which logs all bind version requests to syslog.
8f2aee92d405daba443d0178423cc93d73c437944166a54146dfe95825fd2a6e
Microsoft Security Bulletin (MS00-046) - Patch Available for "Cache Bypass" vulnerability. Microsoft has released a patch for a security vulnerability in all versions of Outlook and Outlook Express. This vulnerability would allow an HTML mail to bypass the cache mechanism and create a file in a known location on the recipient's disk. If an HTML mail created an HTML file outside the cache, it would run in the Local Computer Zone when opened, allowing it to open a file on the user's computer and send it a malicious user's web site. The vulnerability also can be used as a way of placing an executable file on the user's machine or a way of reading any file. Microsoft FAQ on this issue available here.
f1f37e4ddffca9b7352f96d857b4ae7065485b5ad61a97039870a80d1747a8e1
Microsoft Security Bulletin (MS00-045) - Patch Available for "Persistent Mail-Browser Link" vulnerability. Microsoft has released a patch for a security vulnerability affecting Microsoft Outlook Express. The vulnerability allows a malicious user to send an email that will "read over the shoulder" of the recipient as he previews subsequent emails in Outlook Express by opening a browser window that links back to the Outlook Express windows which can read the HTML mail that is displayed in Outlook Express. Microsoft FAQ on this issue available here.
3b31ce131e7d9706a3f89d381201adeea41926edc44b27d96fae174da7b8298f
Microsoft Security Bulletin (MS00-043) - Patch Available for "Malformed E-mail Header" Vulnerability. Outlook and Outlook Express allow a malicious user to cause code of his choice to execute on another user's computer. A component shared by Outlook and Outlook Express contains an unchecked buffer in the functionality that parses e-mail headers when downloading mail via either POP3 or IMAP4. Microsoft FAQ on this issue available here.
95d4a85d402cadf9ee7b36bc9aa351f788acc75f338ca40111407c9bf8a8dfe1