Twenty Year Anniversary
Showing 1 - 11 of 11 RSS Feed

Files Date: 2001-08-25

Posted Aug 25, 2001
Authored by awnex | Site

Phelon is an IRC bot that executes raw commands and enables a user to utilize it more efficiently.

MD5 | ddc2aa2e5f4bded13394be91d6f33fd2
Posted Aug 25, 2001
Authored by Bjarni R. Einarsson | Site

The Anomy mail sanitizer is a filter designed to block email-based attacks such as trojans and viruses. It reads an RFC822 or MIME message and removes or renames attachments, truncate unusually long MIME header fields and sanitizes HTML by disabling Javascript and Java. It uses a single-pass pure Perl MIME parser, which can make it both more efficient and more precise than other similar programs and has built-in support for third-party virus scanners.

Changes: Some security vulnerabilities discussed on bugtraq were fixed.
tags | trojan, perl, javascript, virus
systems | unix
MD5 | 6c0af0aea116356035e2bfc66f3371c4
Posted Aug 25, 2001

strace is a useful diagnostic, instructional, and debugging tool. System administrators, diagnosticians and troubleshooters will find it invaluable for solving problems with programs for which the source is not readily available.

Changes: Linux/ia64 support was fixed. The ioctl setup for Linux was fixed. The ioctl extractor was improved.
systems | unix
MD5 | 7246ce73640760fa7e8357fd9ecf7af3
Posted Aug 25, 2001

The Marvin Obfuscater rewrites Java applications in a way that makes it almost impossible to decompile them and understand their inner workings.

tags | java
MD5 | 7a4376d538fa45ce3757fef6c6bb7b14
Posted Aug 25, 2001

exiscan is an email virus scanner that works together with the Exim MTA from It is written in Perl, and is easy to implement. It supports multithreaded unpacking and scanning of mail, with a configurable number of processes. It has generic support for available command line virus scanners, and can scan inside of MS-TNEF and SMIME (signed) wrapped messages.

tags | web, perl, virus
systems | unix
MD5 | 5dddcde5ae9130dd122cbd897a239a2d
Posted Aug 25, 2001

Snort-rep is a Snort reporting tool that can produce text or HTML output from a syslog snort log file. It is intended to be used for daily e-mail reports to the system administrators. If snort v1.8+ is used, all reports contain priority information, and the HTML output contains direct links to the IDS descriptions of

Changes: Embedded Parse::Syslog module for easier installation. Now uses Text::FormatTable for nice text reports. Added --text-width and --narrow options.
tags | tool, sniffer
MD5 | 4ad789f8a4d15a388f205c789c527fe7
FreeBSD Security Advisory 2001.56
Posted Aug 25, 2001
Authored by The FreeBSD Project | Site

FreeBSD Security Advisory FreeBSD-SA-01:56 - Tcp_wrappers PARANOID option was not properly implemented and did not provide any more protection than regular host ACL's. This allows an attacker that can influence the results of reverse DNS lookups to get away with providing false information in his dns server.

systems | freebsd
MD5 | 0c27c70a8da0f4f644a62aa70acb3f06
Posted Aug 25, 2001
Authored by Alt3kx

Ntop v1.1 for Solaris/x86 contains a remotely exploitable buffer overflow in the http server which defaults to tcp port 8080.

tags | exploit, web, overflow, x86, tcp
systems | solaris
MD5 | b835b14e9bd0431144499b6dc3c5e6c7
Posted Aug 25, 2001
Authored by Lucysoft

Sendmail 8.11.5 and below local root exploit for linux.

tags | exploit, local, root
systems | linux
MD5 | 945b1ee84290d2a8d065d059bc740dc3
Posted Aug 25, 2001
Authored by Grange

Sendmail-8.11.x linux x86 local exploit. Takes advantage of a memory access violation when specifying out-of-bounds debug parameters.

tags | exploit, x86, local
systems | linux
MD5 | 9ca3b58dee980471ff0c1c8d15d79a94
Posted Aug 25, 2001

Sendmail is a very popular unix Mail Transfer Agent, a program that moves mail from one machine to another.

Changes: Fixes a here.
systems | unix
MD5 | a57e7681d810d9d6400cbe6bbcf06aa0
Page 1 of 1

File Archive:

October 2018

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Oct 1st
    26 Files
  • 2
    Oct 2nd
    15 Files
  • 3
    Oct 3rd
    15 Files
  • 4
    Oct 4th
    15 Files
  • 5
    Oct 5th
    15 Files
  • 6
    Oct 6th
    2 Files
  • 7
    Oct 7th
    3 Files
  • 8
    Oct 8th
    23 Files
  • 9
    Oct 9th
    16 Files
  • 10
    Oct 10th
    15 Files
  • 11
    Oct 11th
    19 Files
  • 12
    Oct 12th
    16 Files
  • 13
    Oct 13th
    2 Files
  • 14
    Oct 14th
    2 Files
  • 15
    Oct 15th
    15 Files
  • 16
    Oct 16th
    20 Files
  • 17
    Oct 17th
    19 Files
  • 18
    Oct 18th
    21 Files
  • 19
    Oct 19th
    16 Files
  • 20
    Oct 20th
    0 Files
  • 21
    Oct 21st
    0 Files
  • 22
    Oct 22nd
    0 Files
  • 23
    Oct 23rd
    0 Files
  • 24
    Oct 24th
    0 Files
  • 25
    Oct 25th
    0 Files
  • 26
    Oct 26th
    0 Files
  • 27
    Oct 27th
    0 Files
  • 28
    Oct 28th
    0 Files
  • 29
    Oct 29th
    0 Files
  • 30
    Oct 30th
    0 Files
  • 31
    Oct 31st
    0 Files

Top Authors In Last 30 Days

File Tags


packet storm

© 2018 Packet Storm. All rights reserved.

Security Services
Hosting By