Imp is a denial of service tool which sends SYN floods. Some people call this one slice3. Dynamically linked with libc5.
d8cf30882ac4d4ec7b847bf9d642fa4796da3f4e83a781bf3451b335261e29a4
Snort is an open source network intrusion detection system, capable of performing real-time traffic analysis and packet logging on IP networks. It can perform protocol analysis, content searching/matching and can be used to detect a variety of attacks and probes, such as buffer overflows, stealth port scans, CGI attacks, SMB probes, OS fingerprinting attempts, and much more. Includes real time alerting, incorporating alerting mechanisms for syslog, a user specified file, a UNIX socket, or WinPopup messages via smbclient.
1340b33f5dfe0eeaa4567f6d7341a523ee3f582b4f73bac4157c33820370c72d
This is a Linux/portable port of OpenBSD's excellent OpenSSH. OpenSSH is based on the last free version of Tatu Ylonen's SSH with all patent-encumbered algorithms removed, all known security bugs fixed, new features reintroduced, and many other clean-ups.
9ac31a081ace29131435a854402905a0759ad06ca10aa76c2c182db4b3537a19
Jack.c is a remote exploit for the Active Perl ISAPI overflow described in Bugtraq ID 3526. Sends you a shell with SYSTEM level access.
3745d798cbfd539aa3903eced68c73268af5b0ed42cc15a37971c2d5e4a435b4
Jim.c is an exploit for the remote IIS server side include buffer overflow vulnerability. Tested on Linux and Win32. To exploit this vulnerability you must have write access to the web root of the target web server. Causes the server to send you a shell with SYSTEM level access.
fc4394ea6bdefdcf93fd1062c5697de010d7b73a75a52213eedbd484a3d7bfab
Badboy.c is a remote exploit for the Win32 Checkpoint Firewall-1 GUI log viewer program. Binds a shell to a port with SYSTEM level access. Must be run from a valid GUI client machine.
4cf220b4efdf8049558c14ed6efc96485034f17cf3eb5a189cb6dcffc19f652c
Comphack.c is a remote exploit for Compaq Insight Manager.
77ce882eebad3c846cad7406ee942408f5d27df5e3e7c6d6733ae42461dcf0d9