what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 7 of 7 RSS Feed

Files Date: 2004-01-16

elfpgp-0.1.5.tar.gz
Posted Jan 16, 2004
Authored by Bart Trojanowski | Site jukie.net

elfpgp signs an ELF binary by using standard PGP/GnuPG keys. It also allows for verification of said signatures. The signature is stored in the binary in an ELF record.

tags | encryption
SHA-256 | c72305a22e7ace63cfd05154d33e383e750ba58c7cec03ad65c3754c61d2550d
silc-server-0.9.16.tar.gz
Posted Jan 16, 2004
Authored by priikone | Site silcnet.org

SILC (Secure Internet Live Conferencing) is a protocol which provides secure conferencing services in the Internet. It can be used to send any kind of messages, in addition to normal text messages. This includes multimedia messages like images, video, and audio stream. All messages in the SILC network are encrypted and authenticated, and messages can also be digitally signed. SILC protocol supports AES, SHA-1, PKCS#1, PKCS#3, X.509, OpenPGP, and is being developed in the IETF. This tarball holds all server related files.

Changes: Various bug fixes.
tags | protocol
SHA-256 | d419aab79ceec1e55a50e7ae6b0e4ada556fd8172af713cf6c32b95f4c04f953
wipe-2.2.0.tar.bz2
Posted Jan 16, 2004
Site wipe.sourceforge.net

ya-wipe is a tool that effectively degausses the surface of a hard disk, making it virtually impossible to retrieve the data that was stored on it. This tool is designed to make sure that sensitive data is completely erased from magnetic media.

Changes: Updated autoconf scripts, wipe will now build on s/390, fixed block dev support, fixed percent reporting.
systems | unix
SHA-256 | ea8956c31538b43f04ec3c4999a567a61f34fff0faf6ea02090c860b7f391be6
promisc220103.tgz
Posted Jan 16, 2004
Authored by binary man | Site gerald.colangelo.free.fr

Promisc is a sniffer based on the AF_PACKET domain socket. It parses the IP, TCP, UDP, ICMP, and ARP protocols. A GTK graphical user interface has been written in order to simplify its use.

tags | tool, udp, sniffer, tcp, protocol
SHA-256 | 1b1b29e9e6227c46126f3b1948eaf0a26ab77c7ce834c3c93e5f63a30ce41221
phpshopProject.txt
Posted Jan 16, 2004
Authored by James Bercegay | Site gulftech.org

phpShop Project versions 0.6.1-b and earlier are prone to SQL injection attacks, script injection, cross site scripting, and user information disclosure vulnerabilities.

tags | exploit, vulnerability, xss, sql injection, info disclosure
SHA-256 | adc0386ff64991975f3cef1848e988a682f780a5a19f78fb561e980f819177e2
metadot.txt
Posted Jan 16, 2004
Authored by James Bercegay | Site gulftech.org

MetaDot Portal versions 5.6.5.4b5 and below are susceptible to SQL injection vulnerabilities, Cross Site Scripting, and information disclosure attacks.

tags | advisory, vulnerability, xss, sql injection, info disclosure
SHA-256 | 2f18758617babfb1684f97c043b085cc1427dc8ed63c02c6f2033bd498c2ebce
TA-150104.txt
Posted Jan 16, 2004
Authored by posidron, rushjo | Site tripbit.org

Xtreme ASP Photo Gallery Version 2.0 is prone to a common SQL injection vulnerability. The problem occurs when handling user-supplied username and password data supplied to authentication procedures.

tags | exploit, sql injection, asp
SHA-256 | 18196c49e782ab6139923566eb59889974ae0a3c962a2c04583975e95eea74fa
Page 1 of 1
Back1Next

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    0 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    0 Files
  • 23
    Apr 23rd
    0 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close