F.c is a local root exploit for the the SuSEconfig.vmware symbolic link vulnerability. Tested on SuSE 8.2. More information available here.
910390576a341a3905d6fb899498dc660058263cd7ee85e87f7fbf811ff29096
Linux v2.4.x below v2.4.23 was found to contain a local root vulnerability when a multiple servers of the Debian project were compromised using a new kernel exploit. Due to an integer overflow in the do_brk() system call, it is possible for local users to gain root access. Users of kernel v2.4.22 and below should upgrade.
6b7bf49bb900c4191213c7198954faf0787e580c8572403926b9a31da91795b0
Arpscan sends out ARP requests to specified IP addresses and displays a list of the found hosts. Useful for scanning your local network's IP's for live hosts.
7f6480a8558e0d0bc6f97f3f55a3cf25c3ff5e39a29e2954957f453da42dfab2
Cain & Abel is a password recovery tool for Microsoft Operating Systems. It allows easy recovery of various kind of passwords by sniffing the network, cracking encrypted passwords using Dictionary, Brute-Force and Cryptanalysis attacks, decoding scrambled passwords, revealing password boxes, uncovering cached passwords and analyzing routing protocols. Includes support for cracking all common hashing algorithms including the MD5 hashes used by Cisco routers, Arp Poison Routing which enables sniffing on switched LANs, decoders for access databases, base64, and Cisco Type-7, a SiD-Scanner, the LSA Secrets Dumper, the Protected Storage Passwords Viewer, the NT Hash-Dumper (works with Syskey enabled), and much more. Also see the Cain & Abel FAQ.
e3c438dd1559d97c7e48fe1f412ef5099eabc008ebce3cb656affc77b289f67d