exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 7 of 7 RSS Feed

Files Date: 2001-06-07

passlogd-0.1a.tar.gz
Posted Jun 7, 2001

Passlogd is a sniffer which logs traffic on the UDP syslog port, allowing a syslog receiver to have no open ports.

tags | udp
systems | unix
SHA-256 | 6d632883aa1d1f497d54b461d54b3df491cd475e77a00342548fb282b0ab3b0c
firestorm-0.1.3.tar.gz
Posted Jun 7, 2001
Site scaramanga.co.uk

Firestorm is a Network Intrusion Detection sensor which is multi-threaded, fast, and is pluggable at almost every point.

Changes: New TCP flags, ICMP sequence, and ID matchers, bugfixes, a more verbose alert target, and improved documentation.
tags | tool, intrusion detection
systems | unix
SHA-256 | 3148ae3a478e12d7be6f62059295349c4d7dbc4ef15fec0ee23d0ee0f2f9ae03
ms01-030
Posted Jun 7, 2001

Microsoft Security Advisory MS01-030 - Exchange 2000's web access (OWA) has a vulnerability which allows an attacker to send script code to users which can take action against the user's mailbox as if it were the user, including, under certain circumstances, manipulation of messages or folders. Microsoft FAQ on this issue available here.

tags | web
SHA-256 | f7f48318c3d4e4c6d067c2811d272a2e95f9a678915af7f158259f9cd09892f8
su-wrapper.c
Posted Jun 7, 2001
Authored by Dex | Site raza-mexicana.org

Su-wrapper v1.1.1 local root exploit for Linux/x86.

tags | exploit, x86, local, root
systems | linux
SHA-256 | 942b946e556a127ab3738e8046bb6401be1e111a46efe383d2ad6b46481182a5
mindterm_2.0-src.zip
Posted Jun 7, 2001
Site appgate.com

MindTerm is a complete ssh-client in pure java which can be used either as a standalone java-application or as a java-applet. Includes a vt102/xterm-terminal with the ssh protocol and also "drop-in" socket replacements to use ssh tunnels transparently from a java application/applet.

Changes: Fixed scp bug. All sources are now available.
tags | java, protocol
SHA-256 | bd773bec00af0e7d8bcc99ef91ef50f897b8e537c10e4aebd81edb326fa08f81
flawfinder-0.15.tar.gz
Posted Jun 7, 2001
Site dwheeler.com

Flawfinder searches through source code for potential security flaws, listing potential security flaws sorted by risk, with the most potentially dangerous flaws shown first. This risk level depends not only on the function, but on the values of the parameters of the function.

Changes: New --neverignore option.
systems | unix
SHA-256 | 7ff8fe36aecdf1e150ddcc52d1f62484699ce6c98385bcac198ec02989597243
arping-0.97.tar.gz
Posted Jun 7, 2001
Authored by Marvin | Site habets.pp.se

Arping is an arp level ping utility which broadcasts a who-has ARP packet on the network and prints answers. Very useful when you are trying to pick an unused IP for a net that you don't yet have routing to.

Changes: The -R switch for alternative raw output has been added.
tags | tool
systems | unix
SHA-256 | 6403f30d63d52ebe9059a93dc0026c8a421ce628f683d01d048bc6b584945fb2
Page 1 of 1
Back1Next

File Archive:

July 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Jul 1st
    27 Files
  • 2
    Jul 2nd
    10 Files
  • 3
    Jul 3rd
    35 Files
  • 4
    Jul 4th
    27 Files
  • 5
    Jul 5th
    18 Files
  • 6
    Jul 6th
    0 Files
  • 7
    Jul 7th
    0 Files
  • 8
    Jul 8th
    28 Files
  • 9
    Jul 9th
    44 Files
  • 10
    Jul 10th
    24 Files
  • 11
    Jul 11th
    25 Files
  • 12
    Jul 12th
    11 Files
  • 13
    Jul 13th
    0 Files
  • 14
    Jul 14th
    0 Files
  • 15
    Jul 15th
    0 Files
  • 16
    Jul 16th
    0 Files
  • 17
    Jul 17th
    0 Files
  • 18
    Jul 18th
    0 Files
  • 19
    Jul 19th
    0 Files
  • 20
    Jul 20th
    0 Files
  • 21
    Jul 21st
    0 Files
  • 22
    Jul 22nd
    0 Files
  • 23
    Jul 23rd
    0 Files
  • 24
    Jul 24th
    0 Files
  • 25
    Jul 25th
    0 Files
  • 26
    Jul 26th
    0 Files
  • 27
    Jul 27th
    0 Files
  • 28
    Jul 28th
    0 Files
  • 29
    Jul 29th
    0 Files
  • 30
    Jul 30th
    0 Files
  • 31
    Jul 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close