Garuda is a wireless intrusion detection system (WIDS). It has been designed for detecting war drivers, rogue APs, denial of service attacks, and even MAC spoofing. Rule-based detection, statistics, and enumeration modules included.
91b1fbcc60a57ba0341d54ffc12fb409bf01bbd9436e702f1a0feea63f4f9185
keychain is a utility that helps manage ssh keys in a convenient and secure manner. It acts as a frontend to ssh-agent, but allows the user to easily have one long running ssh-agent process per system, rather than the norm of one ssh-agent per login session. It also makes it easy for remote cron jobs to securely hook-in to a long running ssh-agent process, allowing your scripts to take advantage of key-based logins.
8aa407cbade370b5c1095feec46679006731bc1317ae0aeb00e49b931cd3286e
SID is a Shell Intrusion Detection system. The kernel part plugs into a terminal-processing subsystem and logs hashed terminal lines. The user part reads log entries (hashes), consults a list of allowed entries, and takes appropriate action upon unexpected log entries. Currently supported are Solaris and Linux.
7205ee61e9f13b4e782af6f3b2406ed1b13c620765d75e8dd5f733f854b5e006
vthrottle is an implementation of an SMTP throttling engine for Sendmail servers, based upon M. Williamson's mechanisms, as described in his 2003 Usenix Security paper. It allows the administrator to control how much email users and hosts may send, hindering the rapid spread of viruses, worms, and spam. Exceptions can be made using a whitelist mechanism, which can be generated manually or with the included tool vmeasure.
8ccf4c09583f75d4470ccf6960421588913866604303e286ad78dcd7ea17bbfd
DNSSEC Walker is a tool to recover DNS zonefiles using the DNS protocol. The server does not have to support zone transfers, but the zone must contain DNSSEC NXT or NSEC records. Optionally, it can also verify DNSSEC signatures on the RRsets within the zone.
a52beb8f075312b5882b57f6e5c329336f0b48786df343c9c2896311238a1880
tcpick is a textmode sniffer that can track TCP streams and saves the data captured in files or displays them in the terminal. It is useful for picking files in a passive way. It can store all connections in different files, or it can display all the stream on the terminal with colors.
ab6fc7f818d123ad8201868f8599e684c7ad807030e5410a051cffc0d246c820
Complete analysis of the 180 Solutions trojan along with exploitation tools that demonstrate at least two new unpublished vulnerabilities in Microsoft Internet Explorer 6 that allow for arbitrary code execution.
633228ca6454a639b5fda36a2efc9fdfa8547bf3667c82b69a3a87a882a0b6d0
Flaws in how Apache's suexec binary has been patched by cPanel when configured for mod_php, in conjunction with cPanel's creation of some perl scripts that are not taint clean, allow for any user to execute arbitrary code as any other user with a uid above UID_MIN.
c6f8c68995fc348495dd14264910ae5696e263da879190792db1826b49350c14
Colin McRae Rally 04 has a flaw where a client can passively block an entire gaming network by setting a value too high.
59bf7b0c634d77e4622f2f88c9b7593b772f34e7892e3e2eb4d1655dc959e6e4
Colin McRae Rally 04 remote denial of service exploit that makes use of a flaw where a client can passively block an entire gaming network by setting a value too high.
601ac79a78b9e63c767aae8eeb1339e7de19daaed223d660ef30e43a2c3da0c8
All versions of l2tpd contain a bss-based buffer overflow. After circumventing some minor obstacles, the overflow can be triggered by sending a specially crafted packet.
a067c526f020fd9fb9fb3138db7c81b08532d2a4d41587a7148996d43140fb10