exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 8 of 8 RSS Feed

Files Date: 2001-02-20

userinfo.zip
Posted Feb 20, 2001

The purpose of this app is to illustrate inconsistencies in the MS implementation of the RestrictAnonymous registry setting.

tags | registry
SHA-256 | d6df10eb7f0b38d84f1de3f0c3fdab2f52f62ea42623b850c5b20c8b0b286a98
userdump.zip
Posted Feb 20, 2001

The purpose of this app is to illustrate inconsistencies in the MS implementation of the RestrictAnonymous registry setting.

tags | registry
SHA-256 | 54a8f594254f8385c2c02fe7a62622582d763ae1448a25aeca9b46fcc20020c7
integrit-1.06.06.tar.gz
Posted Feb 20, 2001
Site integrit.sourceforge.net

Integrit is an alternative to file integrity verification programs like tripwire and aide. It helps you determine whether an intruder has modified a computer system. integrit's major advantages are a small memory footprint and simplicity. It works by creating a database that is a snapshot of the most essential parts of your computer system. You put the database somewhere safe, and you can then use it to make sure that no one has made any illicit modifications to the computer system. In the case of a break in, you know exactly which files have been modified, added, or removed.

Changes: The byte-order problem was solved, allowing integrit to run properly on big-endian machines. An RPM spec file was added. The report includes more information and is more readable. More error checking and code enhancements were added. Portability has been improved after abandoning readdir_r.
tags | tool, intrusion detection
systems | unix
SHA-256 | fc5b9e14dce5c202e0d0b107a8cb86a89cd50094799d6664e3bb0ec26afd7a2e
echoping-4.1.0.tar.gz
Posted Feb 20, 2001
Site echoping.sourceforge.net

echoping is a small program to approximatively test the performance of a remote host by sending it TCP "echo" packets. It is able to use the following protocols: echo, discard, chargen, HTTP (with SSL if you wish), ICP, and SMTP. It uses UDP instead of TCP for the protocols which accept it (like echo), it can repeat the test and display various statistics, and it can use T/TCP on systems which support it.

Changes: SSL (Secure Sockets Layer) support, and a new ability to read many bytes at a time for a big performance improvement.
tags | tool, remote, web, udp, tcp, protocol
systems | unix
SHA-256 | efcb74884ea3e610b50f62d2c8f0be2adcbab46d06b305bbfdf31d53701d049f
GnoScan-0.1.tar.gz
Posted Feb 20, 2001
Site gnoscan.berlios.de

GnoScan is a multi-threaded network scan and security utility with an intuitive graphical user interface. It runs under GNOME. This is not the world's first port scanner, but certainly one of the most easy ones to use.

tags | tool, scanner
systems | unix
SHA-256 | b26a1c32a92e8edb288d3ba836a3cbcc7946beacca618107dede2158d276bcce
ettercap-0.2.0.tar.gz
Posted Feb 20, 2001
Authored by Alberto Ornaghi, Marco Valleri | Site ettercap.sourceforge.net

Ettercap is a network sniffer/interceptor/logger for switched LANs. It uses ARP poisoning and the man-in-the-middle technique to sniff all the connections between two hosts. Features character injection in an established connection - you can inject characters to server (emulating commands) or to client (emulating replies) while maintaining the connection alive! Integrated into a easy-to-use and powerful ncurses interface.

tags | tool, sniffer
SHA-256 | 9ba05bb75d19bd314c53dcb0edad0c26019be6c5ab558f0839bb683db9d01a7a
seahorse-0.5.0.tar.gz
Posted Feb 20, 2001
Site seahorse.sourceforge.net

Seahorse is a Gnome front end for GnuPG, the GNU Privacy Guard program. It is a tool for secure communications and data storage. Data encryption and digital signature creation can easily be performed through a GUI and Key Management operations can easily be carried out through an intuitive interface.

Changes: This release adds a new key manager and a lot of bugfixes.
tags | encryption
SHA-256 | 3ef0fff90fa270a382d921f88c20e2a0ed5bc641af074f3f52fcb91d0fe9ccc5
scanssh-1.4.tar.gz
Posted Feb 20, 2001
Authored by Provos | Site monkey.org

scanssh scans a list of addresses and networks for running SSH servers and their version numbers. scanssh supports random selection of IP addresses from large network ranges and is useful for gathering statistics on the deployment of SSH servers in a company or the Internet as whole.

Changes: This release includes parallel scanning from different hosts, a lower memory footprint, the ability for randomization to now be seedable so that random scans can be split among hosts or that the scan can be repeated, and greater portability.
tags | tool, scanner
systems | unix
SHA-256 | 750732217d36f93827b84b7a1165d67a278f005ad6c9ae39df4a7d9b36e269a3
Page 1 of 1
Back1Next

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    0 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    0 Files
  • 23
    Apr 23rd
    0 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close