Twenty Year Anniversary
Showing 1 - 11 of 11 RSS Feed

Files Date: 2003-12-14

enforcer-0_3_ALPHA.tar.gz
Posted Dec 14, 2003
Site enforcer.sourceforge.net

Enforcer is a Linux security module designed to help improve integrity by providing a subset of Tripwire-like functionality with a LKM. It runs continuously and as each protected file is opened its SHA1 is calculated and compared to a previously stored value. The Enforcer can integrate with TCPA hardware to provide a secure boot when booted with a TCPA enabled boot loader.

Changes: This release only works with 2.6+ because updates were made to take advantage of Linux 2.6+ kernel features such as native kernel crypto and the new build system. Some bugs were squashed, and some features were added. A user-space helper was written to mount an encrypted loopback filesystem where the encryption key is the secret protected by the TPM. Some stand alone programs that implement TCPA functions such as MakeIdentity, CertifyKey, etc. were written.
systems | linux
MD5 | bfb914e98cf37292ffa871337b3f58f2
rec16lx.zip
Posted Dec 14, 2003
Site backerstreet.com

REC is a portable reverse engineering decompiler which reads an executable file and attempts to produce a C-like representation of the code and data used to build it. It can decompile 386, 68k, PowerPC, and MIPS R3000 programs and recognizes the following file formats: ELF (System V Rel. 4, e.g. Linux, Solaris, etc.), COFF (System V Rel. 3.x, e.g. SCO), PE (Win32 .EXE and .DLL for Microsoft Windows 95 and NT), AOUT (BSD derivatives, e.g. SunOS 4.x), Playstation PS-X (MIPS target only), and raw binary data (via .cmd files).

systems | linux, windows, 9x, solaris, bsd, 32
MD5 | a347303252e10cba03e8f0d29d91d33d
wistumbler2.00-pre3.tar.gz
Posted Dec 14, 2003
Site nopcode.org

Wistumbler2 is a network stumbler for WaveLAN/IEEE wireless networking. Supports GTK2 and console modes. Includes speaker beeps similar to windows stumbler.

Changes: Log-saving on the fly is now allowed. Some GPS pointers that caused segfaults were patched.
tags | tool, wireless
systems | windows
MD5 | 922da338af586c24d81cdd87b2020c0e
netdude-0.4.3.tar.gz
Posted Dec 14, 2003
Site netdude.sourceforge.net

Netdude is the NETwork DUmp data Displayer and Editor for tcpdump tracefiles. It is a GUI-based tool that allows you to make detailed changes to packets in tcpdump tracefiles. It can set the value of every field in IP, TCP, and UDP packet headers, copy, move, and delete packets in the tracefile, and fragment and reassemble IP packets. Netdude addresses the need for a tool that allows developers of networking code to easily create specific traffic patterns in order to test features of their software. Tested on Linux and FreeBSD.

Changes: Minor fixes and an update to libnetdude.
tags | tool, udp, sniffer, tcp
systems | linux, freebsd
MD5 | b7cf1b90929ea4395c6237997f5bc6cf
lads-0.8.tar.bz2
Posted Dec 14, 2003
Authored by fred | Site lepied.com

Login Anomaly Detection System (LADS) detects anomalies in logins and logouts and can perform various actions in response.

Changes: Fixes a bug in IP address reporting and a bug that prevented correct logging.
tags | tool, intrusion detection
systems | unix
MD5 | 0908e52ffc65a6fa16b7906b60dd2908
afick-1.5-0.tgz
Posted Dec 14, 2003
Authored by Eric Gerbier | Site afick.sourceforge.net

afick is another file integrity checker, designed to be fast and fully portable between Unix and Windows platforms. It works by first creating a database that represents a snapshot of the most essential parts of your computer system. Then a user can run the script to discover all modifications made since the snapshot was taken (i.e. files added, changed, or removed). The configuration syntax is very close to that of aide or tripwire, and a graphical interface is provided.

Changes: A new directive (exclude_suffix) has been added, the tk interface has been improved with a progress bar, and some bugs have been repaired.
tags | tool, integrity
systems | windows, unix
MD5 | 6a4d9f9ab657e5132ab4bcf06a0199ae
stan-0.4.tar.gz
Posted Dec 14, 2003
Authored by Konrad Rieck | Site roqe.org

Stream Analyzer is a console application which analyses binary streams and calculates useful statistical information from the observed data which features mathematical, pattern, and bit analysis. It has been designed as a "Swiss-army-knife" for initial steps in reverse engineering and cryptographic analysis.

Changes: Code and documentation have been polished and unneeded sections from previous years have been removed.
tags | encryption
MD5 | 42069a002bac3d7004e11faec2e377d1
cart32.txt
Posted Dec 14, 2003
Authored by fris | Site dreambigmedia.com

How to find Cart32 Sites with google.com.

tags | paper
MD5 | 6600df331c4d0133197e24c8d9ad5f46
tcptrack-1.0.2.tar.gz
Posted Dec 14, 2003
Authored by Steve Benson | Site rhythm.cx

tcptrack is a packet sniffer which passively watches for connections on a specified network interface, tracking their states and listing them in a manner similar to the top command. It displays source and destination addresses and ports, connection state, idle time, and bandwidth usage. Screenshot available here.

Changes: Fixed compile problems with GCC and on Solaris.
tags | tool, sniffer
MD5 | a661a8a53558c2b72189151e6e992153
mod_security-1.7.4.tar.gz
Posted Dec 14, 2003
Site modsecurity.org

Mod_security is an Apache module whose purpose is to protect vulnerable applications and reject human or automated attacks. In addition to filtering requests, it also can create Web application audit logs. Understands regular expressions and POST payloads and runs on both branches of Apache.

Changes: A bug in the Apache 2 version that would confuse PHP has been fixed and another bug causing the "nolog" action to not prevent the request from being logged to the audit log has been fixed.
tags | web
MD5 | 629945812ca7aab4ef2f76ad00172444
0x333maelstrom.c
Posted Dec 14, 2003
Authored by Cowboy, 0x333 | Site 0x333.org

Maelstrom local exploit that gives gid for user games making use of the overflow found in the -server switch. Tested against /usr/bin/Maelstrom on Red Hat 9.0

tags | exploit, overflow, local
systems | linux, redhat
MD5 | a935d6a8cc4501c955311239727e64af
Page 1 of 1
Back1Next

File Archive:

September 2018

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Sep 1st
    1 Files
  • 2
    Sep 2nd
    3 Files
  • 3
    Sep 3rd
    15 Files
  • 4
    Sep 4th
    15 Files
  • 5
    Sep 5th
    18 Files
  • 6
    Sep 6th
    18 Files
  • 7
    Sep 7th
    15 Files
  • 8
    Sep 8th
    2 Files
  • 9
    Sep 9th
    2 Files
  • 10
    Sep 10th
    16 Files
  • 11
    Sep 11th
    17 Files
  • 12
    Sep 12th
    15 Files
  • 13
    Sep 13th
    29 Files
  • 14
    Sep 14th
    21 Files
  • 15
    Sep 15th
    3 Files
  • 16
    Sep 16th
    1 Files
  • 17
    Sep 17th
    15 Files
  • 18
    Sep 18th
    16 Files
  • 19
    Sep 19th
    29 Files
  • 20
    Sep 20th
    18 Files
  • 21
    Sep 21st
    5 Files
  • 22
    Sep 22nd
    2 Files
  • 23
    Sep 23rd
    0 Files
  • 24
    Sep 24th
    0 Files
  • 25
    Sep 25th
    0 Files
  • 26
    Sep 26th
    0 Files
  • 27
    Sep 27th
    0 Files
  • 28
    Sep 28th
    0 Files
  • 29
    Sep 29th
    0 Files
  • 30
    Sep 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2018 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close