IEHist dumps Internet Explorer history from index.dat files into delimited files suitable for import into other tools.
b8aa5e9a301292fd275a632be35c3791be8407e584979256137f32203de3a450
VNCPwdump can be used to dump and decrypt the registry key containing the encrypted VNC password in a few different ways. It supports dumping and decrypting the password by: Dumping the current users registry key, retrieving it from a NTUSER.DAT file, decrypting a command line supplied encrypted password, and injecting the VNC process and dumping the owner's password.
ebf49f069d3620f60c4c84681dfca3061ff616033ee023578474e84bc7623eed
Passifist is a tool for passive network discovery. It could be used for a number of different things, but was mainly written to discover hosts without actively probing a network. The tool analyzes broadcast traffic and has a plugin architecture through which it dissects and reports services found. Initial version holds support for the following protocols and plugins: CDP, CIM, HSRP, IPX, NETOP, SMB, TFTP.
8bc5231456824abbfdbf91481823c7a14a7be0f5e42fc530de99aeb9ac3314bb
ChiTeX, the utility used to put Chinese Big5 codes in TeX/LaTeX documents, contains two setuid root binaries that execute cat without using an explicit path allowing an attacker to easily gain root privileges.
1c2236c651538e4aaaa0b8f89bbc85cd212f6cf79eed7e9609ddef1998071e56
Remote exploit for the buffer overrun found in passlogd. Target list includes four flavors of Linux with more to come.
37b269945b84e22d48de5f5d785c67d39f7bf09b5346f96a621bc6647022fc26
Service Banner Fingerprinting in C - This paper is a supplement to modular's tcpscan series. It covers how to write C programs that will perform banner fingerprinting using various standard servers as examples.
e235c26539ac8a622e503b130f1fea2dec6c57ae8c0f9b6cd3ed0564bfe69c95
Local root exploit for mtr versions lower than 4.0.6. Vulnerability originally found by KF of Snosoft.
d8abcbb929ad05dfb21ec534c2ad715d568011e3df645bbfcfb8825327e5eb29
Local root exploit for ntping vulnerability discovered by KF of Snosoft.
174e33b3e8617e4b37bf7ac6e72751b288a801da064c5eda214b0b9950eea5d9
A buffer overrun exists in passlogd, the passive syslog capture daemon, in the parse.c code.
187f1c045d7ee8745a0af71546b8d5dde0458959b31d7fdf3347f791fc3439c7
lkminject is a script that builds a binary which will allow you to inject a module inside of a kernel module.
20a13dd3a35002ac4722687a293c51b5fe9af4d0bed3092f3e47e75c4ddcc65e