BVI v1.1.1 is an editor for binary files using common vi - commands and additional commands for binary search and substitution.
c94dbfa293cbc61b8571d025e90fd1f06a34f8d4e5b11a59856bfc1f13014de3
Sortelnetd is a working telnetd 0.17 exploit (even remote if you are careful enough). alignment is critical. Includes a demo of how to find offsets and use against localhost.
6e643b30e9635a5e3b22d1113b59356de6894ddf8033ed508db6d01f8a7808f3
Mieliekoek.pl is a SQL insertion crawler which tests all forms on a web site for possible SQL insertion problems. This script takes the output of a web mirroring tools as input, inspecting every file and determine if there is a form in the file.
fe1bfe7f6e6e16ac4c2fcbed336c09b562bbbe5cb6b8556bfdf043b0c7344cff
CERT Advisory CA-2002-04 - Microsoft Internet Explorer contains a buffer overflow vulnerability in its handling of embedded objects in HTML documents. This vulnerability allows attackers to execute arbitrary code on the victim's system when the victim visits a web page or views an HTML email message. This bug was discussed in MS02-005.
9a86954b827531979248410932ae6b826879622ef9498d4d64c93d6d37982945
A paper in mIRC security.
90a2207d0d828df429e655944406fbc25002e8d8c14bbe55d716c17f03e9ade0
Weaknesses in the CHAP protocol as used within PPP and PPTP. Allows authentication in PPTP networks without knowing valid login/password combinations. This authentication scheme is widely used at universities (WLAN networks). A link to a special pppd which is able to authenticate without valid /etc/ppp/chap-secrets is included.
a57abb2faae0727b81e1510955840c818aed9a508d24a18b84c7c47e18cd0da4
NetStumbler is a Windows utility for 802.11b based wireless network auditing.
c27225ba4264acde0d6ea5ab87765dc3481c0a71598cd2219ffa5d54825d6786
ApSniff is a wireless (802.11) access point sniffer for Windows 2000. It enables you to list all access points broadcasting beacon signals at your location. Useful for helping you set new access points making sure you do not have interfering APs, and helping you set-up wireless clients by providing you with the client configuration information. Requires WLAN cards of Prism 2 chipset. It works with a DLINK DWL-650 and linksys WPC11.
a21ff12cd0f685ecb6beedee3258a44546d209435187179a19c1cace86d71521
Kismet is an 802.11b wireless network sniffer. It is capable of sniffing using almost any wireless card supported in Linux, which currently divide into cards handled by libpcap and the Linux-Wireless extensions (such as Cisco Aironet), and cards supported by the Wlan-NG project which use the Prism/2 chipset (such as Linksys, Dlink, and Zoom). Features Multiple packet capture sources, Runtime network sorting by AP MAC address (bssid), IP block detection via ARP and DHCP packet dissection, Cisco product detection via CDP, Ethereal and tcpdump compatible file logging, Airsnort-compatible "interesting" (cryptographically weak) logging, and Secure SUID behavior.
650217f643c0fcd7692ecb59ff0d20b1c0ba84ae2af7abb9eac15f01dd14ed1b
The UNICODE bug explained, by ReDeeMeR
1f7165fc929d3a5b630e0fe560bd7b35f047a4bd537ee6d46eb63d05be739c47
SQLAT is a suite of tools which could be useful for pen-testing a MS SQL Server. The tools do dictionary attacks, upload files, read registry and dump the SAM. They do this by wrapping extended stored procedures. There is also a tool for doing a minimal analysis of a SQL Server with output as HTML. You need to be 'sa' to run some of the tools, but this usually isn't a problem. SQLAT works over port 1433.
0a6676ead453d7eb681412ed238737347e7d9999a9a49c421d11ecd2fa62ddf7
OAT 1.1.0 is a set of tools which can be used to audit Oracle databases running on the Microsoft Windows platform. The Tools are Java based and were tested on both Windows and Linux. They should hopefully also run on any other Java platform.
bc9ed0ea0c85421c9784e1ff06ab40b9281dd0c95e8d3000643a6c092d7de444
WaveStumbler is console based 802.11 network mapper for Linux and supports WEP, ESSID, MAC and more. This package includes a kernel patch (for the wireless nic drivers) which can be applied to the linux-2.4.17 sources and a program called wavestumbler. The program interacts with the patched network drivers to map wireless networks.
319a2fe4cb418f7de47ee1cd5c4b13d741d5068d4d306365a9efe4016383edba
NetBIOS Enumeration Utility v2.0 beta 1 is a utility for Windows which can be used to enumerate one single host or an entire class C subnet. This utility can run in two modes: query and attack. The main difference between these modes is that when NBTEnum is running in attack mode it will seek for blank password and for passwords that are the same as the username but then in lowercase letters. Runs on Windows NT 4.0/2000/XP.
12ac2cfedbc300d17fcbaffeef06b0f83bc887f0476ab2d221c8093e37454c97
WebClicker v2.56 uses public proxies to create artificial banner ad clicks. Emulates complete browser HTTP transfer and can be used for banner/link exchanges and toplists as well.
3a526be0353ccddea8bb276fd38b9d7ca51629a459134d57868966c55ab45d43