The etherdam utility is an IPTables firewall configuration engine. It implements a primitive scripting language as an alternative to the direct use of iptables. It comes with full documentation plus a heavily commented example configuration file. The configuration file should work for many scenarios with minimal adjustment.
df9edbb0f8fc948fb608a2b82464df46b4665703551e9d38dd7c28b5af2a28d7
AntiExploit is a small Perl script that scans for well known exploit files. It currently recognizes over 1400 suspicious files, and the database is updated weekly. Useful for a system that has a lot of shell accounts being used.
d48cf9228975b741d91369068db09a6363848e7d8ab3e3e9f5c5d93298a5ed12
jailed implements a non-privileged jailroot. It allows an environment to be specified, does std(in/out/err) redirection, and can restart a failed child. Tested on OpenBSD and Gentoo Linux.
f1ffa44fc4b1cace7bef9c2fbacba49de070e0b0151a188fd8751869bcb32405
HAP-Linux is a collection of security related patches which are designed to be applied after Solar Designers Openwall patches are installed. Changes include some extra information in the printks, and the ability to allow hard links to files you don't own which are in your group, and the ability to follow links & pipes in +t directories if they are not world-writable. This is useful for getting various daemons to run chrooted as a non-root user, and some secure drop- directory stuff.
b56be54ffa14a72c217268c5e8fbef7e7d5ef5c7b7e401d0e35686b428f6ffd2
MS04-011 DsRoleUpgradeDownlevelServer remote exploit. Submitted anonymously.
c345e1ceaf031691148d79a9fafffd9b68fdbe6f2ffeb4b7ad70da3edd68b5fe
Multiple vulnerabilities have been discovered and fixed in the Real-Time Streaming Protocol (RTSP). Versions of MPlayer below 1.0pre4 are affected.
f42371e900636bbb672e0c3661765f1b16d179f412ab731b1a2740d47ec26398
Remote exploit for the Lsasrv.dll RPC buffer overflow. To make this exploit work remotely you have to use the sbaaNetapi.dll which modifies the DsRoleUpgradeDownlevelServer API.
c155fee77b812701dd4efb98b8ad352943a5fa4ca64edab679c6ddefca7a2e45
Remote exploit for the Lsasrv.dll RPC buffer overflow. Tested against various Russian and English versions of Windows XP Professional, Windows 2000 Professional, and Windows 2000 Advanced Server.
b67594dc0860e55e0a2dbb1361ffe68073b8564d93f740595e75b36e19a82e49
HSFTP versions 1.11 and below remote exploit that makes use of a format string vulnerability when processing file names.
0f0b1134f526e9e119a43dac0a36550ab2c1495e9c627acdb6f4557b53503898
THC-Hydra is a high quality parallelized login hacker for Samba, Smbnt, Cisco AAA, FTP, POP3, IMAP, Telnet, HTTP Auth, LDAP, NNTP, MySQL, VNC, ICQ, Socks5, PCNFS, Cisco and more. Includes SSL support, parallel scans, and is part of Nessus.
9970185af51e16c9801f755a5b8516a7c8fca1ae5ec372cee96f42fca2aa2424
A local buffer overflow vulnerability exists in REP version 0.15.1 on RedHat Linux 7.3. Proof of concept exploitation included.
8e1fdc0cc3c3bec4177fbfd6ba811f0eac0e4c1f712dacde188c47bea51db84c
Cisco Global Exploiter is a tool that demonstrates exploitation of the various Cisco buffer overflow and denial of service vulnerabilities. Google flags this as malware so only use this if you know what you are doing. The password to unarchive this zip is the word "infected".
d9ebaf0cd3d01a7813e46a67bf12eaee98841234ed430e3ca3ae69831f7dfb62
Scanner for webservers that checks for various CGI and other httpd related vulnerabilities.
0860f49a686ecc423f54a9627ebbb8e9687d063d2d2dba9f40aa4740b438ce32
Local buffer overflow exploit generator for Linux, BSD, BSDi, HP-UX, UnixWare, IRIX and SCO.
465a904f656b98cb00d6dfdb5da54526aa940319ba0406a0fa7caa938bc9a2a9
Perl Loadable Exploiting Module (PLEM) is an advanced module for Perl programming that provides a list of common functions for local and remote exploit coding.
59990e1585e8a43db707953bdaf4a443fe2cfb007fbeb1b8f7770a1e56900e07
Microsoft Windows LSASS (Local Security Authority Subsystem Service) is prone to a remotely exploitable buffer overrun vulnerability. The specific vulnerable system component is LSASRV.DLL. Successful exploitation of this issue could allow a remote attacker to execute malicious code on a vulnerable system, resulting in full system compromise. This exploit produces a shell.
3028a82b21c514fb8370c4391a58a4050e0b3aa2d874a827f1748ed35a4edee8