CGI hacking tutorial which explains how to find many vulnerable systems using google and contains an awful lot of URL's.
8f5bd59a5a7375fa7149f34226f9495228de9311afd316ccfc4005837cc4449b
Exp_unix2tcp.c is a local exploit for unix2tcp below v0.8.0 which gives root access if unix2tcp is setuid, which it is usually not. Tested on Redhat Linux 9.
090081e4d5414fd808dae2631f05e4e974bba1a9cb222618b3b73d8dbae56e84
Reducing human factor mistakes.
99ea04714acb22ad5f76d9890154aea28225a30990fa7a573ab431a1c1e1961c
Rootkit Hunter scans files and systems for known and unknown rootkits, backdoors, and sniffers. The package contains one shell script, a few text-based databases, and optional Perl modules. It should run on almost every Unix clone.
5ee9d66059fc15346bb7105eacba1628035dc38a3712759132700c61a273e02a