The Autopsy Forensic Browser is an HTML-based graphical interface to The here.
cde4370054a7517eb875f440b96f74eecd787db70646c17b539c794decd11608
NGSSoftware Security Advisory - Microsoft SQL Server 2000 and 7 allow attackers to gain control of the database by elevating their privileges by using the xp_runwebtask stored procedure. Fix available here.
0993da5c8ab7c5ff24d06d11c71e7c6166e5eef4f669d081f8f47da07b21ae30
AN HTTPD v1.30 to 1.41c remote heap overflow exploit written in java for Japanese Windows 2000 Pro (SP2).
167ce9e82779b5e084ff82fd83009543c8acb427e75433946e1e8bb76aabd037
Nocc v0.9.5 contains cross site scripting vulnerabilities which allow an attacker to take over a victim's e-mail account and/or perform actions against the victim's will, by simply sending a malicious e-mail message to the victim. Fix available at http://nocc.sourceforge.net.
9dc7f58e6a84de7afd3c2dc0c1c01e0a92637f30032701f1adde85a1090db208
PowerFTP v2.24 and below remote denial of service exploit in Perl.
6c35bcb40ba1d5bd9322642847860c17eb6c904541ae79689c51f4513a733837
Sendmail 8.11.x linux/x86 local root exploit. Uses gdb to find offsets.
97fb231f9fda1d4ce349f63e8594a891166c284dcf5ab06cb3000406b26a36b9
Unicode IIS exploit in perl. Tries 20 ways.
8662d0aab8bd41a11af165611d21686de5ca89f17b76ea0ca9ec002d6a6ccc07
Windows XP port scanner.
2765e98d0c660f9e26fe5790fef0fe45c40dc5cafb09fc4422ae1815a1232f59
Web602 webserver remote denial of service exploit which uses the com1 windows flaw.
ab81b2d5aae5a6c0ecbe18c0c13997194365a98f277de5ce0d0fa049a1a34322
Web602 (Czech version) directory tree exploit.
93003a050e2c15ef1e0f6c14a2e62b6ea615d4de687dec1239970cbb346096e7
HP Netris v0.5 and below remote denial of service exploit.
1511466d20ead8a76a69420ed7ccb8dcb916dcf1d94877d562d9820209800c33
Crip.c is a utility for ripping out a c-declaration of binary data (like shellcode) and converting it to binary.
a63c9f4d2960f672e07b9bbd29d3d87d4a43463fb6e89cd83c72d12adb1619b0
Logwatch analyzes and reports on unix system logs. It is a customizable and pluggable log monitoring system which will go through the logs for a given period of time and make a customizable report. It should work right out of the package on most systems.
0fd643ed6ce80f231d2e8aeb0282685d95a821baacdd2963e6c251e0fbff879d
Network Traffic Analyzer (formerly known as sniffer) is designed to be an extremely powerful, configurable, and versatile tool for monitoring network traffic. It can be used as a plain sniffer, as a tool for accounting, dynamic firewall updates, and many more things. It features scripting support and an event-driven architecture.
2a3912e05cf9a52bd3afea5f9a8013210a3db30e922d20a3b6b090d9f91ebebb
DansGuardian is a web content filter which currently runs on Linux, FreeBSD, OpenBSD and Solaris. It filters the actual content of pages based on many methods including phrase matching, PICS filtering and URL filtering. It does not purely filter based on a banned list of sites like lesser totally commercial filters. DansGuardian is designed to be completely flexible and allows you to tailor the filtering to your exact needs. It can be as Draconian or as un-obstructive as you want.
f0003cc7c44bf053003f746583a595dcc3b843748cdbf0bb8475ed89a538c8f3
RPCAP is a Remote Packet Capture system. It enables you to run a packet capture program (the server) on a target computer, which will sniff the network traffic on that system, and uplink the captured packets to another host (the client), where the captured packets can be processed, analyzed and archived . The rpcap system thus consists of two separate processes, the server (or agent) which captures network traffic on a remote system, and a client, which receives and processes these packets. The server code is a standalone executable program which uses the libpcap packet capture library to capture network traffic. The client is a library called librpcap, which is linked to a user program and used on the client system in a manner identical to libpcap, to receive and process the captured packets.
bc9423ceb9e73e1b4bc2ddfd8483ebc0f006bcb4ad31602eda4b13475b5a0596
Rtdump is a version of tcpdump modified to capture traffic on remote systems and networks. It links to librpcap rather than libpcap. Apart from the additional requirements introduced by the remote capture paradigm, rtdump is identical to tcpdump in command syntax and use.
7612b9f2f2c55b9865bc449622ea8614fc7b42d351530ccf677791dbbb7157c3
Logrep is a framework for extraction and presentation of information from several kinds of logfiles. Currently Snort, Squid, Postfix, Apache, Trend Micro VirusWall, and Microsoft IIS are supported. Includes HTML reports, 2D analysis, overview page, secure communication, and bar charts.
4e765d1e6b2f97a48521f2ccb109118602a06e59be467aef7b1378894b4a9136
Packit offers the ability to monitor, manipulate and inject IPv4 (and soon IPv6) traffic (TCP/UDP/ICMP) on and into your network. This can be valuable in testing firewalls, intrusion detection systems and in general TCP/IP auditing. At the comment Packit can be run using one of two modes. packet capture, and IPv4 packet injection. Packit is dependent on libnet 1.1.0+ and libpcap and has been tested with numerous FreeBSD and Linux kernels.
ea2fcd0a0b3d8168358f5503f81d46ced5a6bc48fc9a0b78f88d32b2481ab3de
The cipherfunk Patched Linux Kernels provide patch sets that focus on security enhancements, optimizations, and bugfixes to the current stable Linux Kernel. They are suitable for workstation or high-end server use in both production and development environments.
5ef0770b74439a0e0d70f94a607274936cd7648e93aca444311a9c43428e871b
The Bastille Hardening System attempts to "harden" or "tighten" the Linux/Unix operating systems. It currently supports Red Hat and Mandrake systems, with support on the way for Debian, SuSE, TurboLinux and HP-UX. We attempt to provide the most secure, yet usable, system possible. Screenshot available here..
fb6d096a829d4241956085f69b5c3dde765b7ef522d6db5c5f2603f328ea2a3b
The Multi Router Traffic Grapher (MRTG) is a tool to monitor the traffic load on network-links. MRTG generates HTML pages containing graphical images which provide a LIVE visual representation of this traffic. Check http://www.ee.ethz.ch/stats/mrtg for an example. MRTG is based on Perl and C and works under UNIX and Windows NT.
789694b170187543e100c18ad5cd223ff4f9c46d2e0e955ffdf50fa259145563
Kismet is an 802.11b wireless network sniffer. It is capable of sniffing using almost any wireless card supported in Linux, which currently divide into cards handled by libpcap and the Linux-Wireless extensions (such as Cisco Aironet), and cards supported by the Wlan-NG project which use the Prism/2 chipset (such as Linksys, Dlink, and Zoom). Besides Linux, Kismet also supports FreeBSD, OpenBSD and Mac OS X systems. Features Multiple packet capture sources, Runtime network sorting by AP MAC address (bssid), IP block detection via ARP and DHCP packet dissection, Cisco product detection via CDP, Ethereal and tcpdump compatible file logging, Airsnort-compatible "interesting" (cryptographically weak) logging, Secure SUID behavior, GPS devices and wireless devices fingerprinting. Kismet also includes a tool called gpsmap that can be used to create maps from logged GPS data. Full changelog here.
4267968d657ec3c48333621ddfa6f1f203183b082cf08fbcd73101d2575cd1a3
Stunnel is a program that allows you to encrypt arbitrary TCP connections inside SSL (Secure Sockets Layer) available on both Unix and Windows. Stunnel can allow you to secure non-SSL aware daemons and protocols (like POP, IMAP, NNTP, LDAP, etc) by having Stunnel provide the encryption, requiring no changes to the daemon's code. Windows binaries available here.
3f292c6513d671f71f3fb635363a9f819662fc4c0989be4dc1e6ba7edbc7e14e
The Complete Trojans Text. Contents:What Is a Trojan Horse,Trojans Today,The Future Of Trojans,Anti-virus Scanners,How You Can Get Infected -From ICQ,From IRC,From attachment,From Physical Access,From Trick,How Dangerous a trojan can be,Different Kinds Of Trojans,Remote Access Trojans,Password Sending Trojans, Keyloggers,Destructive Trojans,FTP Trojans,Who can Infect you?What is the attacker looking for?How trojans work?The Most COmmon Trojan Ports,Anti-trojans software -Log Monitor,PrcView,XNetStatm,AtGuard,Conseal PC Firewall,LockDown2000,TDS. Archive password is set to p4ssw0rd. Use at your own risk.
60fb960c3356495ffadf73b60d770925f0d93995f1b5f388d491cf90d94b4dc5