exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 13 of 13 RSS Feed

Files Date: 2003-10-17

libnids-1.18.tar.gz
Posted Oct 17, 2003
Authored by Nergal | Site libnids.sourceforge.net

Libnids is a library that provides a functionality of one of NIDS (Network Intrusion Detection System) components, namely E-component. It means that libnids code watches all local network traffic, cooks received datagrams a bit (quite a bit ;)), and provides convenient information on them to analyzing modules of NIDS. So, if you intend to develop a custom NIDS, you do not have to build low-level network code. If you decide to use libnids, and you have got E-component ready - you can focus on implementing other parts of NIDS.

Changes: Rejection of TCP packets with old timestamp, fixed memory corruption, and more.
tags | tool, local, intrusion detection
systems | unix
SHA-256 | b0275c914197a53c6ccf631eac756fd37ec6f2d8f09f15757061495cf9be0fcd
libShellCode-0.2.1.tar.gz
Posted Oct 17, 2003
Authored by ORK | Site orkspace.net

libShellCode is a library that can be included when writing linux/i386 exploits by providing functions that generate shellcode with user given parameters during runtime.

Changes: Bug fixes for one byte heap overflows. Added examples.
tags | shellcode
systems | linux
SHA-256 | eb23dfd2e215f67685a489a5c03f1de67404c5cea819ed591c39de78b5546c81
bububu.zip
Posted Oct 17, 2003
Authored by GriYo, TheVoid | Site griyo.hellsparty.com

Utility that is a Microsoft Windows 2000 command-line application that creates a fake host in a Windows workgroup.

systems | windows
SHA-256 | 0b1fc8ce2d098910059401ae98e833c12c3cead2413e9846e433278f91e14067
x.zip
Posted Oct 17, 2003
Authored by GriYo | Site griyo.hellsparty.com

Command-line Microsoft Windows 2000 / XP application which sends random ICMP, TCP and UDP traffic to a given host. It randomizes the source IP, source port, TOS, offset, ICMP type and code, etc.

tags | denial of service, udp, tcp
systems | windows
SHA-256 | 5ae2d4c544eb41605a0f126c27941f37487df80d16e6d801b44da506fa11b398
oracle_ownage.c
Posted Oct 17, 2003
Authored by c0ntex

Local exploit for Oracle Release 2 Patch Set 3 Version 9.2.0.4.0 for Linux x86 that makes use of a buffer overflow to escalate user privileges via the oracle binary.

tags | exploit, overflow, x86, local
systems | linux
SHA-256 | 2c21dea3eb6b73fa7a98866ffe0291269326fe9469746e2067e9471a004ab542
tiger-3.2.1.tar.gz
Posted Oct 17, 2003
Site savannah.gnu.org

The Tiger Scripts are a security tool set designed to perform audits of UNIX systems. It's useful as an security check tool and as a host intrusion detection tool (if configured to run through cron and by sending e-mail reports).

Changes: Tons of changes all available in the changelog here.
tags | tool, scanner
systems | unix
SHA-256 | fc4832368c39094ec28b1b9ca0326f7f5636a84ce85a515d090df92018366627
Pound-1.5.tgz
Posted Oct 17, 2003
Authored by roseg | Site apsis.ch

Pound is a reverse HTTP proxy, load balancer, and SSL wrapper. It proxies client HTTPS requests to HTTP backend servers, distributes the requests among several servers while keeping sessions, supports HTTP/1.1 requests even if the backend server(s) are HTTP/1.0, and sanitizes requests.

tags | web
SHA-256 | 0f8d3ee93f757198ca8ced83d82022a0a2a18ad25d6a644cdf922323f82fddf3
afick-1.3-0.tgz
Posted Oct 17, 2003
Authored by Eric Gerbier | Site afick.sourceforge.net

afick is another file integrity checker, designed to be fast and fully portable between Unix and Windows platforms. It works by first creating a database that represents a snapshot of the most essential parts of your computer system. Then a user can run the script to discover all modifications made since the snapshot was taken (i.e. files added, changed, or removed). The configuration syntax is very close to that of aide or tripwire, and a graphical interface is provided.

tags | tool, integrity
systems | windows, unix
SHA-256 | 319c038feea039d99bc264bf7faf901520c708b0ff8141263a79afba5ce9e2f0
silc-toolkit-0.9.10.tar.gz
Posted Oct 17, 2003
Authored by priikone | Site silcnet.org

SILC (Secure Internet Live Conferencing) is a protocol which provides secure conferencing services in the Internet. It can be used to send any kind of messages, in addition to normal text messages. This includes multimedia messages like images, video, and audio stream. All messages in the SILC network are encrypted and authenticated, and messages can also be digitally signed. SILC protocol supports AES, SHA-1, PKCS#1, PKCS#3, X.509, OpenPGP, and is being developed in the IETF. This tarball holds all developer related files.

tags | protocol
SHA-256 | d537d0bc36c46d8b68453108b43f19229542f689be44b67bc9ee2bef6b2fa351
silc-client-0.9.13.tar.gz
Posted Oct 17, 2003
Authored by priikone | Site silcnet.org

SILC (Secure Internet Live Conferencing) is a protocol which provides secure conferencing services in the Internet. It can be used to send any kind of messages, in addition to normal text messages. This includes multimedia messages like images, video, and audio stream. All messages in the SILC network are encrypted and authenticated, and messages can also be digitally signed. SILC protocol supports AES, SHA-1, PKCS#1, PKCS#3, X.509, OpenPGP, and is being developed in the IETF. This tarball holds all client related files.

tags | protocol
SHA-256 | d467a6c8abc03450f8ba830488eb60833ef7fcd5ad71115053eb4b4f5960929d
silc-server-0.9.14.tar.gz
Posted Oct 17, 2003
Authored by priikone | Site silcnet.org

SILC (Secure Internet Live Conferencing) is a protocol which provides secure conferencing services in the Internet. It can be used to send any kind of messages, in addition to normal text messages. This includes multimedia messages like images, video, and audio stream. All messages in the SILC network are encrypted and authenticated, and messages can also be digitally signed. SILC protocol supports AES, SHA-1, PKCS#1, PKCS#3, X.509, OpenPGP, and is being developed in the IETF. This tarball holds all server related files.

tags | protocol
SHA-256 | a414e9be254f67d851387344a63cb5a0f4661d30907262f8c6c44e8dd5ffa4e4
radmind-1.2.0.tgz
Posted Oct 17, 2003
Site rsug.itd.umich.edu

radmind is a suite of Unix command-line tools and a server designed to remotely administer the file systems of multiple Unix machines. Radmind operates as a tripwire which is able to detect changes to any managed filesystem object, e.g. files, directories, links, etc. However, radmind goes further than just integrity checking: once a change is detected, radmind can optionally reverse the change.

Changes: Pipelined lcreate, Added progress output option -v to fsdiff, f_noauth exits so client gets error, Fixed libsnet one off error, Added -R to radmind usage, mkdirs clears errno on success, Updated configure script, Added known issues section to README.
tags | tool, intrusion detection
systems | unix
SHA-256 | 5d916e5f1a346e029e9ff6c68b67542b0c0b5066be2dfaddf8d10e23a7859f0e
MS-crash.txt
Posted Oct 17, 2003
Authored by Dr. Insane | Site members.lycos.co.uk

Under some circumstances, it seems that when some code is added into a Microsoft Word document and then spell checked, the application will crash.

tags | advisory
SHA-256 | b3ae1023eb8bb7fc1504b78ead52b1dd1ca967aea41d061f9279d8d88b423b9a
Page 1 of 1
Back1Next

File Archive:

March 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Mar 1st
    16 Files
  • 2
    Mar 2nd
    0 Files
  • 3
    Mar 3rd
    0 Files
  • 4
    Mar 4th
    32 Files
  • 5
    Mar 5th
    28 Files
  • 6
    Mar 6th
    42 Files
  • 7
    Mar 7th
    17 Files
  • 8
    Mar 8th
    13 Files
  • 9
    Mar 9th
    0 Files
  • 10
    Mar 10th
    0 Files
  • 11
    Mar 11th
    15 Files
  • 12
    Mar 12th
    19 Files
  • 13
    Mar 13th
    21 Files
  • 14
    Mar 14th
    38 Files
  • 15
    Mar 15th
    15 Files
  • 16
    Mar 16th
    0 Files
  • 17
    Mar 17th
    0 Files
  • 18
    Mar 18th
    10 Files
  • 19
    Mar 19th
    32 Files
  • 20
    Mar 20th
    46 Files
  • 21
    Mar 21st
    16 Files
  • 22
    Mar 22nd
    13 Files
  • 23
    Mar 23rd
    0 Files
  • 24
    Mar 24th
    0 Files
  • 25
    Mar 25th
    12 Files
  • 26
    Mar 26th
    31 Files
  • 27
    Mar 27th
    19 Files
  • 28
    Mar 28th
    42 Files
  • 29
    Mar 29th
    0 Files
  • 30
    Mar 30th
    0 Files
  • 31
    Mar 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close