exploit the possibilities
Showing 1 - 10 of 10 RSS Feed

Files Date: 2004-09-30

zm-1.19.5.tar.gz
Posted Sep 30, 2004
Authored by Philip Coombes | Site zoneminder.com

ZoneMinder is a suite of applications intended for use in video camera security applications, including theft prevention and child or family member monitoring. It supports capture, analysis, recording, and monitoring of video data coming from one or more cameras attached to a Linux system. It also features a user-friendly Web interface which allows viewing, archival, review, and deletion of images and movies captured by the cameras. The image analysis system is highly configurable, permitting retention of specific events, while eliminating false positives. ZoneMinder supports both directly connected and network cameras and is built around the definition of a set of individual 'zones' of varying sensitivity and functionality for each camera. This allows the elimination of regions which should be ignored or the definition of areas which will alarm if various thresholds are exceeded in conjunction with other zones. All management, control, and other functions are supported through the Web interface.

Changes: Various updates and fixes.
tags | web
systems | linux
MD5 | dc8502c92fa7b9802d1efbaf2198ff42
nkvir-rc.gz
Posted Sep 30, 2004
Authored by nikant | Site agriroot.aua.gr

YAVR, or Yet Another antiVirus Recipe, is a procmail recipe that helps filter out many of the common e-mail worms and viruses.

Changes: Added various virus signatures.
tags | worm
systems | unix
MD5 | f721899ef653ccc66e76812c7ced7637
aircrack-2.0.2.tgz
Posted Sep 30, 2004
Authored by Christophe Devine

Aircrack is an 802.11 WEP cracking program that can recover a 40-bit or 104-bit WEP key once enough encrypted packets have been gathered. It implements the standard FMS attack along with some optimizations, thus making the attack much faster compared to other WEP cracking tools.

Changes: Various bug fixes, rewrites, and additions.
tags | tool, wireless
MD5 | bb6117a0ded5f1f71da1c26c9734b396
vuurmuur-0.5.51.tar.gz
Posted Sep 30, 2004
Authored by Victor Julien | Site vuurmuur.sourceforge.net

Vuurmuur is a middle-end and front-end for netfilter and iptables that is aimed at system administrators who need a decent firewall, but do not have netfilter specific knowledge. It converts human-readable rules into an iptables ruleset (or optional a bash script), makes netfilter logs readable, and includes an ncurses GUI.

Changes: Various fixes.
tags | tool, firewall, bash
systems | linux
MD5 | 147a2ca5ce2569ff79fb54a6ffbd42b2
flc_exp.c
Posted Sep 30, 2004
Authored by CoKi | Site nosystem.com.ar

Local exploit for flc versions 1.0.4 and below. Note that flc is not setuid by default and this is completely proof of concept. Tested on Slackware 10.0.

tags | exploit, local, proof of concept
systems | linux, slackware
MD5 | 6bde4a3aa0db275b740ec679ab535911
BanCh.pl
Posted Sep 30, 2004
Authored by LyNx

BanCh version 1.0 checks hosts for selected banners. Available services are FTP, SMTP, and HTTP. Provides anonymous FTP login checking, CGI scanning, e-mail address extraction from web pages, and other features.

tags | tool, web, cgi, scanner
systems | unix
MD5 | c3b47c724ef1b929ed5e32b959ad96f3
canonSpam.txt
Posted Sep 30, 2004
Authored by Andrew Daviel

The Canon iR5000i digital printer will print anything sent to port 25 without any authentication.

tags | advisory
MD5 | b3bf792c4d0f6198e4d8e97cbbf68f52
mdaemon_rcpt.c
Posted Sep 30, 2004
Authored by d_bug

Remote denial of service proof of concept exploit that makes use of a buffer overflow in Mdaemon SMTP server version 6.5.1.

tags | exploit, remote, denial of service, overflow, proof of concept
MD5 | c739d6439f26297b8ad85526974ad8ab
mdaemon_imap.c
Posted Sep 30, 2004
Authored by d_bug

Remote proof of concept exploit for MDaemon IMAP server version 6.5.1 that makes use of an overflow in the LIST command.

tags | exploit, remote, overflow, imap, proof of concept
MD5 | 70e53f1694ce2dc74788bb19d73ba65e
n-du.tgz
Posted Sep 30, 2004
Authored by Serguei

N-du is a Unix backdoor which does not have any open ports. It waits for a special UDP or TCP packet, then opens a tcp port backdoor.

tags | tool, udp, tcp, rootkit
systems | unix
MD5 | a18fef559fcfc16db6beadd02924cde6
Page 1 of 1
Back1Next

File Archive:

February 2020

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Feb 1st
    1 Files
  • 2
    Feb 2nd
    2 Files
  • 3
    Feb 3rd
    17 Files
  • 4
    Feb 4th
    15 Files
  • 5
    Feb 5th
    24 Files
  • 6
    Feb 6th
    16 Files
  • 7
    Feb 7th
    19 Files
  • 8
    Feb 8th
    2 Files
  • 9
    Feb 9th
    2 Files
  • 10
    Feb 10th
    15 Files
  • 11
    Feb 11th
    20 Files
  • 12
    Feb 12th
    16 Files
  • 13
    Feb 13th
    19 Files
  • 14
    Feb 14th
    17 Files
  • 15
    Feb 15th
    4 Files
  • 16
    Feb 16th
    4 Files
  • 17
    Feb 17th
    34 Files
  • 18
    Feb 18th
    15 Files
  • 19
    Feb 19th
    20 Files
  • 20
    Feb 20th
    33 Files
  • 21
    Feb 21st
    11 Files
  • 22
    Feb 22nd
    0 Files
  • 23
    Feb 23rd
    0 Files
  • 24
    Feb 24th
    0 Files
  • 25
    Feb 25th
    0 Files
  • 26
    Feb 26th
    0 Files
  • 27
    Feb 27th
    0 Files
  • 28
    Feb 28th
    0 Files
  • 29
    Feb 29th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2016 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close