Smbkillah.c exploits the SMB death bug in the WinXX OS.
640d132863cb7924714e5d0d18c4f4e4b06760e757e8cadfb996390bb417dabb
L2ES is the Legion 2000 Encryption System. It uses CAST-256 encryption, automatically recognizes l2es-encrypted files, and includes Linux, FreeBSD and Windows binaries along with C source.
e7ebb379df878eec5305fdc57655628af847bd5017640cacb0ab48b94145dba5
Cynux-Portscanner v1.1 is a simple and compact port scanner written in Perl which simply checks for open ports between 1-1024.
3db9fbc1fa1c3f57d2b22fbb26e2466bdcc997115f1ecbace20afaec51df80f6
NGSSoftware Security Research Advisory NISR03092002 - The sp_MSSetServerProperties stored procedure in Microsoft SQL Server 2000 contains a low risk issue which allows remote users to decide whether or not SQL server starts up automatically. This does not allow an attacker to com promise the server or data but may be used in conjunction with another attack.
2d8b8761c587c92d162bdf1ffcb36e42ec190e63cc9a5e3406c3b2a332cc6519
NGSSoftware Security Research Advisory NISR03092002B - The Microsoft Windows .NET Server Release Candidate contains a buffer overflow in name resolution which allows an attacker without a userID or password to take control of the server with a single packet to UDP port 1434 on the machine running MSDE. Fix available here.
9db34630d664597a8cf29192735e45564c2d9e401bac5a6b0d4ed6fab67a82c6
NGSSoftware Security Research Advisory NISR25072002 - Microsoft's database server SQL Server 2000 exhibits two buffer overrun vulnerabilities that can be exploited by a remote attacker without ever having to authenticate to the server. What further exacerbates these issues is that the attack is channeled over UDP port 1434. Whether the SQL Server process runs in the security context of a domain user or the local SYSTEM account, successful exploitation of these security holes will mean a total compromise of the target server and its data.
7374876a71fb3fcb12a28e6f8cfb96087512b03f0bc58422af03eaa003fa9944
Lcrzoex is a toolbox for network administrators and network hackers. Lcrzoex contains over 200 functionalities using network library lcrzo. For example, one can use it to sniff, spoof, create clients/servers, create decode and display packets, etc. The Ethernet, IP, UDP, TCP, ICMP, ARP and RARP protocols are supported. Lcrzoex and lcrzo were successfully installed under Linux, FreeBSD and Solaris. This archive contains Lcrzo and Lcrzoex. Windows binaries available here.
f0e7cc26d441199ad794d4e742c860d052eabd6f5bbb89e7d52e964b65c90a15
A vulnerability exists in the insecure creation of files in /tmp by Scrollkeeper versions 0.3.4 and 0.3.11. Proof of concept exploit included.
e0688a37a550e78e95f81f75c0a1a5d103aec32f940e904a1754d99dccb816fc