exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 13 of 13 RSS Feed

Files Date: 2004-05-12

rrs-1.50.tar.gz
Posted May 12, 2004
Authored by Michel Blomgren aka Shadowinteger | Site cycom.se

rrs is a reverse (connecting) remote shell. Instead of listening for incoming connections it will connect out to a listener (rrs in listen mode). The listener will accept the connection and receive a shell from the remote host. rrs features full pseudo-tty support, full OpenSSL support (high encryption, client/server authentication, choice of cipher suites), Twofish encryption, a simple XOR cipher, plain-text (unencrypted) session, peer-side session monitoring (snooping), daemon option and reconnection features. rrs is Free Software distributed under the MIT License and is known to compile and run under Linux, FreeBSD, NetBSD, OpenBSD and QNX.

Changes: Included string.h into farm9crypt.cc.
tags | remote, shell
systems | linux, netbsd, unix, freebsd, openbsd
SHA-256 | d88505015c16f2edd0fa08ec1d5fe659035fd768314016daf711864453c44e27
os-sim-0.9.4.tar.gz
Posted May 12, 2004
Authored by Dominique Karg, David Gil, Fabio Ospitia Trujillo, Julio Casal, Jesus D. Munoz | Site sourceforge.net

Os-sim attempts to unify network monitoring, security, correlation, and qualification in one single tool. It combines Snort, Acid, MRTG, NTOP, OpenNMS, nmap, nessus, and rrdtool to provide the user with full control over every aspect of networking or security. Supported platform is Linux.

Changes: Bug fixes, feature enhancements, and updates.
tags | system logging
systems | linux, unix
SHA-256 | 735df791f7560ee25e912bf0da4e4795e6a7a4e84c388f9775bcb8a4e6d92789
tinyca-0.6.0.tar.gz
Posted May 12, 2004
Authored by Stephan Martin | Site tinyca.sm-zone.net

TinyCA is a simple GUI written in Perl-Gtk to manage a small certification authority. It works as a frontend to OpenSSL. TinyCA lets you manage x509 certificates. It is possible to export data in PEM or DER format for use with servers, as PKCS#12 for use with clients, or as S/MIME certificates for use with email programs. It is also possible to import your own PKCS#10 requests and generate certificates from them. It also lets you create and manage SubCAs for more complex setups. The most important certificate extensions can be configured with the graphical frontend. English and German translations are included.

tags | perl, encryption
SHA-256 | 927bcc2eca6cc048924c947e7fdb6b7f7ba8614984983211c713e5b00d15b2b5
afick-2.2-0.tgz
Posted May 12, 2004
Authored by Eric Gerbier | Site afick.sourceforge.net

afick is another file integrity checker, designed to be fast and fully portable between Unix and Windows platforms. It works by first creating a database that represents a snapshot of the most essential parts of your computer system. Then a user can run the script to discover all modifications made since the snapshot was taken (i.e. files added, changed, or removed). The configuration syntax is very close to that of aide or tripwire, and a graphical interface is provided.

Changes: Bug fixes.
tags | tool, integrity
systems | windows, unix
SHA-256 | 3f4e944d2b2f885c1959fa58ec2eb0daf9d5a6c5d330d21611e34ceba3a1914f
macchanger-1.5.0.tar.gz
Posted May 12, 2004
Site alobbs.com

MAC Changer is a utility for viewing/manipulating the MAC addresses of network interfaces which can set specific, random, vendor-based (with a 6000+ vendor list) and device-type-based MACs.

Changes: 513 addresses updated.
tags | tool
systems | unix
SHA-256 | d44bfa27cb29c5a718627cb3ef3aa42eb5130426545eb2031120826cd73fa8fe
rkhunter-1.0.8.tar.gz
Posted May 12, 2004
Authored by Michael Boelen | Site rootkit.nl

Rootkit Hunter scans files and systems for known and unknown rootkits, backdoors, and sniffers. The package contains one shell script, a few text-based databases, and optional Perl modules. It should run on almost every Unix clone.

Changes: Added support for Mandrake 10 and Slackware 9.1.0. Added hashes for Red Hat Enterprise Linux 2.1. Updated hashes for Red Hat Enterprise Linux 3 and Fedora Core 1. Improved extra Suckit tests.
tags | tool, shell, perl, integrity, rootkit
systems | unix
SHA-256 | 7fa408ee71a6be98bfc03d4b14f593a3d0eb9d7f0af23e6e3d4eb389404c04a5
mimedefang-2.43.tar.gz
Posted May 12, 2004
Authored by Dianne Skoll | Site mimedefang.org

MIMEDefang is a flexible MIME email scanner designed to protect Windows clients from viruses. Includes the ability to do many other kinds of mail processing, such as replacing parts of messages with URLs. It can alter or delete various parts of a MIME message according to a very flexible configuration file. It can also bounce messages with unacceptable attachments. MIMEDefang works with Sendmail 8.11/8.12's new "Milter" API, which makes it more flexible and efficient than procmail-based approaches.

Changes: Mostly bug fixes. Addition of -X and -Y switches.
systems | windows, unix
SHA-256 | fe4099dceba724b46087d484b51285018680f06c2a94cf112f1efc858272ada2
RFC-NG-3.1.0.tar.gz
Posted May 12, 2004
Authored by Claudio Panichi | Site rfc.sourceforge.net

RFC (Remote Filesystem Checker) is a set of scripts that aims to help system administrators run a filesystem checker (like tripwire, aide, etc.) from a master-node to several slave-nodes using ssh, scp, sudo, and few other common shell commands.

Changes: Bug fixes.
tags | tool, remote, shell, integrity
SHA-256 | f2fd87ac3a42fbea9f9fb77f29c80a45fe43dbe856097514e96ead2a1b248c42
Exploit Labs Security Advisory 2003.27
Posted May 12, 2004
Authored by Donnie Werner, Exploit Labs | Site exploitlabs.com

Exploitlabs.com Advisory 27 - Microsoft Windows Help and Support Center has a vulnerability due to an unspecified input validation error. This can be exploited via the HCP protocol on Microsoft Windows XP and Microsoft Windows 2003 through Internet Explorer or Outlook and allows for arbitrary code execution.

tags | advisory, arbitrary, code execution, protocol
systems | windows
SHA-256 | d988b8210aca1e91cb4d3d9dd5b3f573ea60e02d6175fb32fad685eae2dc0074
outlook2k3.txt
Posted May 12, 2004
Authored by http-equiv | Site malware.com

Outlook 2003 has a flaw that will allow malicious spammers to verify whether or not a recipient has read an email.

tags | advisory
SHA-256 | 11ecdcb13367d2e1ae1f3074de7d169c041339a8b606c74b1a864149a8cffaa3
042004.txt
Posted May 12, 2004
Authored by Stefan Esser | Site e-matters.de

Privilege escalation is possible for users with access to the systrace device on Net-BSD and Free-BSD.

tags | advisory
systems | bsd
SHA-256 | 5055b81404726430cf6bf4f0924753685d120e9b3cabd9c41fc131e5cd09cfb0
msxml3dll.txt
Posted May 12, 2004
Authored by Rafel Ivgi | Site theinsider.deep-ice.com

The msxml3.dll crashes when a page is refreshed that has an ampersand included inside of a link or value.

tags | advisory
SHA-256 | 87782652da2a9d4d71ad20c25f67177ce0ebae7ed140f222f81055d63310722d
2425ouch.txt
Posted May 12, 2004
Authored by Shaun Colley aka shaun2k2

The usage of the SCTP implementation in all versions prior to 2.4.26 of the Linux kernel are susceptible to an integer overflow.

tags | advisory, overflow, kernel
systems | linux
SHA-256 | f066b2cbb6af3fe4fe3ad12ba310fa17c52d57e4b55c41f6d53c4a9f4d6b0539
Page 1 of 1
Back1Next

File Archive:

October 2022

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Oct 1st
    10 Files
  • 2
    Oct 2nd
    0 Files
  • 3
    Oct 3rd
    12 Files
  • 4
    Oct 4th
    15 Files
  • 5
    Oct 5th
    18 Files
  • 6
    Oct 6th
    16 Files
  • 7
    Oct 7th
    0 Files
  • 8
    Oct 8th
    0 Files
  • 9
    Oct 9th
    0 Files
  • 10
    Oct 10th
    0 Files
  • 11
    Oct 11th
    0 Files
  • 12
    Oct 12th
    0 Files
  • 13
    Oct 13th
    0 Files
  • 14
    Oct 14th
    0 Files
  • 15
    Oct 15th
    0 Files
  • 16
    Oct 16th
    0 Files
  • 17
    Oct 17th
    0 Files
  • 18
    Oct 18th
    0 Files
  • 19
    Oct 19th
    0 Files
  • 20
    Oct 20th
    0 Files
  • 21
    Oct 21st
    0 Files
  • 22
    Oct 22nd
    0 Files
  • 23
    Oct 23rd
    0 Files
  • 24
    Oct 24th
    0 Files
  • 25
    Oct 25th
    0 Files
  • 26
    Oct 26th
    0 Files
  • 27
    Oct 27th
    0 Files
  • 28
    Oct 28th
    0 Files
  • 29
    Oct 29th
    0 Files
  • 30
    Oct 30th
    0 Files
  • 31
    Oct 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Hosting By
Rokasec
close