what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 25 of 83 RSS Feed

Files Date: 2006-04-29

Posted Apr 29, 2006
Authored by Victor Julien | Site vuurmuur.sourceforge.net

Vuurmuur is a middle-end and front-end for netfilter and iptables that is aimed at system administrators who need a decent firewall, but do not have netfilter specific knowledge. It converts human-readable rules into an iptables ruleset (or optional a bash script), makes netfilter logs readable, and includes an ncurses GUI.

Changes: Multiple bug fixes and language translations added.
tags | tool, firewall, bash
systems | linux
SHA-256 | 5f504c9630b8c9013b95e7ee8ef0b91385e10b21eb75e89bd23f2f8112cde66e
Posted Apr 29, 2006
Authored by pixelbeat | Site pixelbeat.org

FSlint is a toolkit to find various forms of lint on a filesystem. At the moment it reports duplicate files, bad symbolic links, troublesome file names, empty directories, non stripped executables, temporary files, duplicate/conflicting (binary) names, and unused ext2 directory blocks.

Changes: Variosu bug fixes and some code cleanup.
tags | tool
systems | unix
SHA-256 | 9aa477312dd64522e2c841c0dd58b820e78f7e31a4dc3f77076f60517cdddab9
Posted Apr 29, 2006
Authored by Philip Coombes | Site zoneminder.com

ZoneMinder is a suite of applications intended for use in video camera security applications, including theft prevention and child or family member monitoring. It supports capture, analysis, recording, and monitoring of video data coming from one or more cameras attached to a Linux system. It also features a user-friendly Web interface which allows viewing, archival, review, and deletion of images and movies captured by the cameras. The image analysis system is highly configurable, permitting retention of specific events, while eliminating false positives. ZoneMinder supports both directly connected and network cameras and is built around the definition of a set of individual 'zones' of varying sensitivity and functionality for each camera. This allows the elimination of regions which should be ignored or the definition of areas which will alarm if various thresholds are exceeded in conjunction with other zones. All management, control, and other functions are supported through the Web interface.

Changes: A few important features plus some minor enhancements, usability updates and bug fixes.
tags | web
systems | linux
SHA-256 | 05051baab9e687ca9f2e4419a71d68de854a4b78a3b8b96e7d6b8fa54889d1a2
Posted Apr 29, 2006
Authored by krisstoffe | Site sigof.sourceforge.net

SIGOF (Security Information Graphics Oriented Forensic) has been developed as a complement to the ACID or BASE project by implementing useful and detailed graphical presentation of security information/events. This program can exploit any security information stored in an ACID/BASE database schema. SIGOF introduces another way to manage security forensics and analysis by providing graphical representation of statistical and security trends. This approach provides the ability to manage a large amount of security events.

tags | tool, sniffer
SHA-256 | b92e2569623c40163441bf27477c5b901959af93563cac99c931d4a4c1d3980a
Posted Apr 29, 2006
Authored by rukin | Site vinetto.sourceforge.net

Vinetto is a tool intended for forensics examinations. It is a console program to extract thumbnail images and their metadata from those thumbs.db files generated under Microsoft Windows. Vinetto works under Linux, Cygwin(win32) and Mac OS X.

tags | tool, forensics
systems | linux, windows, apple, osx
SHA-256 | f87f5d23b7a629b16db6319e59377345a85ada116dce43cd33d83862759b2eda
strongSwan IPsec / IKEv1 / IKEv2 Implementation For Linux
Posted Apr 29, 2006
Authored by Andreas Steffen | Site strongswan.org

strongSwan is a complete IPsec and IKEv1 implementation for Linux 2.4 and 2.6 kernels. It interoperates with most other IPsec-based VPN products. It is a descendant of the discontinued FreeS/WAN project. The focus of the strongSwan project is on strong authentication mechanisms using X.509 public key certificates and optional secure storage of private keys on smartcards through a standardized PKCS#11 interface. A unique feature is the use of X.509 attribute certificates to implement advanced access control schemes based on group memberships.

Changes: Mixed PSK|RSA roadwarriors are now supported. Various other additions.
tags | kernel, encryption
systems | linux
SHA-256 | be0cf4f98171fcaba15538e21197278d63717f56069636b43177e18bff1e6c93
Posted Apr 29, 2006
Authored by Carlo Perassi | Site honeynet.org

bup is a patch for bash that modifies the shell to send all user keystrokes via UDP over the network for collection by a sniffer or a syslogd server. It does not depend on syslogd to send the packets. It is part of the Tools/Data_Capture section of The Honeynet Project.

tags | shell, udp, patch, bash
systems | unix
SHA-256 | 39233c257bf7c20dc09788edf0a6894f11cbcd94827fa0949ba67278bacfdf6e
Posted Apr 29, 2006
Authored by Remi Denis-Courmont | Site people.via.ecp.fr

ndisc consists or two small command line tools (ndisc and rdisc) that perform ICMPv6 Neighbor Discovery and ICMPv6 Router Discovery respectively. It is primarily meant for IPv6 networking diagnostics or to detect rogue IPv6 nodes or routers on an Ethernet segment.

Changes: Code clean up.
tags | tool, scanner
systems | unix
SHA-256 | f81edbfc89a74d2d0675acf7ae4557559cdf2ecc6428374c650049c1e8a983a9
Posted Apr 29, 2006
Authored by Neils Provos | Site citi.umich.edu

Systrace enforces system call policies for applications by constraining the application's access to the system. The policy is generated interactively. Operations not covered by the policy raise an alarm, allowing the user to refine the currently configured policy. After a policy has been sufficiently constructed, further alarms often indicate security problems. Policies can also be generated automatically for sandboxing purposes.

systems | unix
SHA-256 | faea906f54fe3782a35789a3f5c7cead85884630c609c7f711b9e3054b08c5c3
Posted Apr 29, 2006
Authored by Jacob Martinson | Site icculus.org

Darc is a utility for managing large Aide installations in heterogeneous environments. It eliminates the need to maintain read-only media on every system, and provides unified reporting on filesystem changes across all machines.

tags | tool, intrusion detection
systems | unix
SHA-256 | 1166636ff0d3c032402122acc6d2c06e202789b30186e3fc3c9264e475db1ce5
Posted Apr 29, 2006
Site aircrack-ng.org

aircrack-ng is a set of tools for auditing wireless networks. It's an enhanced/reborn version of aircrack. It consists of airodump (an 802.11 packet capture program), aireplay (an 802.11 packet injection program), aircrack (static WEP and WPA-PSK cracking), airdecap (decrypts WEP/WPA capture files), and some tools to handle capture files (merge, convert, etc.).

Changes: Fixed a bug that prevented cracking.
tags | tool, wireless
SHA-256 | 7b13241b821a4a15b3dfbbc4610565ea6bc5e0c073ca23b2a3de5438ecd4d44c
Posted Apr 29, 2006
Authored by Danilo Cicerone | Site digitazero.org

combina is a password generator that uses three different algorithms based on combinatorial analysis. It implements the permutation without repetition, permutation with repetition (the famous brute force), and combination without repetition. It supports an unlimited number of characters in the input and MD5 password hashes.

systems | unix
SHA-256 | 9e70a93540ea4231de8613c2ff5e528cf3e0db0897fa3a3f95acf1df0df50b15
Posted Apr 29, 2006
Authored by Boris Wesslowski | Site kyb.uni-stuttgart.de

Fwlogwatch analyzes the ipchains, netfilter, iptables packet filter, and Cisco logfiles and generates text and HTML summaries. Features realtime anomaly alerting capability, an interactive report generator, and the ability to cut off attacks by adding firewall rules.

Changes: Several parser modifications triggered by log submissions. Added GNU adns support. Various small fixes.
tags | tool, firewall
systems | cisco, unix
SHA-256 | d95538b2e7f6f545c8a7ecf73fd705a9072cc6c119c3685a5b3a036e0647b4d0
Posted Apr 29, 2006
Authored by Mike Kershaw | Site kismetwireless.net

Kismet is an 802.11 layer 2 wireless network sniffer. It can sniff 802.11b, 802.11a, and 802.11g traffic. It is capable of sniffing using almost any wireless card supported in Linux, which currently divide into cards handled by libpcap and the Linux-Wireless extensions (such as Cisco Aironet), and cards supported by the Wlan-NG project which use the Prism/2 chipset (such as Linksys, Dlink, and Zoom). Besides Linux, Kismet also supports FreeBSD, OpenBSD and Mac OS X systems. Features Multiple packet capture sources, Runtime network sorting by AP MAC address (bssid), IP block detection via ARP and DHCP packet dissection, Cisco product detection via CDP, Ethereal and tcpdump compatible file logging, Airsnort-compatible "interesting" (cryptographically weak) logging, Secure SUID behavior, GPS devices and wireless devices fingerprinting. Kismet also includes a tool called gpsmap that can be used to create maps from logged GPS data. Full changelog here.

Changes: Various additions.
tags | tool, wireless
systems | cisco, linux, freebsd, openbsd, apple, osx
SHA-256 | eb8a1c688b07adede53c362355e639d8ac29d30536d69eaee97235d14e6d7e76
Posted Apr 29, 2006
Authored by Meni Livne | Site opdb.berlios.de

Konqueror Anti-Phishing Toolbar is an add-on for the Konqueror browser that utilizes the Open Phishing Database to provide the user with information and tools that help protect against phishing.

SHA-256 | 8778511b8024af36f5d5cfc1b3f0fb7f937f88a430645b938233ab1b5dfbaf4e
Posted Apr 29, 2006
Authored by Meni Livne | Site opdb.berlios.de

Libphish is a cross-platform library to interact with the Open Phishing Database. It provides a consistent API that browsers and other HTTP clients can use to in order to have anti-phishing capabilities such as verifying the risk level and safety of URLs.

tags | web, library
SHA-256 | a369769c73fde9bd908159f9b638580a50ef7c30850b4de9d476a3c4d2e76811
Posted Apr 29, 2006
Authored by Boaz | Site opdb.berlios.de

FirePhish is an anti-phishing toolbar for Firefox that utilizes the Open Phishing Database to provide the user with information and tools to protect against phishing attacks.

SHA-256 | c43636175add4346bd19b1f711b060ecaa20d92831eb812e6a68c65c77d8fa7c
Posted Apr 29, 2006
Authored by Vincent Deffontaines | Site inl.fr

Nuface is a Web-based administration tool that generates Edenwall, NuFW, or simple Netfilter firewall rules. It features a high level abstraction on the security policy set by the administrator, and works internally on an XML data scheme. Its philosophy is to let you agglomerate subjects, resources, or protocols into meta-objects, and use those meta objects to generate ACLs, which are then interpreted as netfilter rules by Nupyf, the internal XML parser. This tool may easily be extended to support firewall implementations other than Netfilter.

Changes: Added a real groups interface.
tags | tool, web, firewall, protocol
systems | unix
SHA-256 | 1c89242253da73b6d6b8e9165746d1aadfcb5fa6f2bd02c569287ef66bba4ce1
Posted Apr 29, 2006
Authored by Corcalciuc V. Horia | Site sourceforge.net

alph implements and analyzes historical and traditional ciphers and codes, such as polyalphabetic, substitutional, and mixed employing human-reconstructable algorithms. It provides a pipe filter interface in order to encrypt and decrypt block text to achieve transparency. The program is meant to be used in conjunction with external programs that transfer data, resulting in transparent encryption or decryption of information. The program can thus be used as a mail filter, IRC filter, IM filter, and so on.

Changes: Added NIHILIST cipher. Added error hooks for library and application. Added M Del Vayo cypher. Updated manpage.
tags | encryption
SHA-256 | 80396b3a3ae76958924ab4e839bb623ed266e0bb67928999a7766f2268643cac
Posted Apr 29, 2006
Authored by Alfredo Spadafina | Site nixory.sourceforge.net

Nixory is an innovative, fast, and powerful anti-spyware program, with a user-friendly graphical interface. It protects Mozilla Firefox from dangerous spyware and harmful cookies. Platform independent source zip file.

Changes: Various updates.
SHA-256 | ef8f7623a20c0f0beaf932ae90d2c092d776d4f3793f130d2e4892847f4db0fb
Clam AntiVirus Toolkit 0.88.1
Posted Apr 29, 2006
Authored by Tomasz Kojm | Site clamav.net

Clam AntiVirus is an anti-virus toolkit for Unix. The main purpose of this software is the integration with mail servers (attachment scanning). The package provides a flexible and scalable multi-threaded daemon, a commandline scanner, and a tool for automatic updating via Internet. The programs are based on a shared library distributed with the Clam AntiVirus package, which you can use in your own software.

Changes: Various bug fixes.
tags | virus
systems | unix
SHA-256 | 25f678d1268fa91913dd2f0b7e08338faf65a4f48618ce59d773e3c42e606cff
Posted Apr 29, 2006
Authored by Jan Engelhardt | Site ttyrpld.sourceforge.net

ttyrpld is a kernel-based TTY shell, screen, and key logger for Linux, FreeBSD/PCBSD, and OpenBSD. It has a real-time log analyzer. It supports any TTY type (vc (console), BSD/Unix98 pty (xterm/SSH), serial, ISDN, USB, etc.).

Changes: Added various support and tweaks.
tags | shell, kernel, system logging
systems | linux, unix, freebsd, bsd, openbsd
SHA-256 | b69d633a7e46644c91fd5ac2cddc9dfcb52224106525b731de32b6cccc6ff88b
Posted Apr 29, 2006
Authored by Marshall Whittaker | Site fluxnet.no-ip.org

Nmap Log Stripper is a Bash script intended to be a way to condense all, or some, of the IPs of a "random" (-iR) Nmap scan into a file for later usage. Common uses are to be able to feed the file back into nmap with the -iL switch, or feeding it into another port or vulnerability scanner of your choice. Stripper supports stripping the Nmap log of all but the IPs of hosts running a certain service, a version of a service, or even an arbitrary banner, and writing them to a file.

Changes: version 1.2
tags | tool, arbitrary, nmap, bash
systems | unix
SHA-256 | a617020519869d3905ff109fdc040c61024d1c954d8aeca24ea8e8f82134e291
Posted Apr 29, 2006
Site Aria-Security.net

Land Down Under 802 and below suffer from a path disclosure vulnerability.

tags | advisory
SHA-256 | 4c0163192ee650b02e5abeac6f74c77b35309191c2a0c67add7ae0ce3f96f360
Posted Apr 29, 2006
Authored by D3vil-0x1

MyBB 1.1.1 suffers from several SQL injections in the administration panel.

tags | exploit, sql injection
SHA-256 | a2edc1d4a52274f379fe151e7ac805f3fb0250208c58c30d0da4eb7c7fa4d15c
Page 1 of 4

File Archive:

June 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Jun 1st
    0 Files
  • 2
    Jun 2nd
    0 Files
  • 3
    Jun 3rd
    18 Files
  • 4
    Jun 4th
    21 Files
  • 5
    Jun 5th
    0 Files
  • 6
    Jun 6th
    57 Files
  • 7
    Jun 7th
    6 Files
  • 8
    Jun 8th
    0 Files
  • 9
    Jun 9th
    0 Files
  • 10
    Jun 10th
    12 Files
  • 11
    Jun 11th
    27 Files
  • 12
    Jun 12th
    38 Files
  • 13
    Jun 13th
    16 Files
  • 14
    Jun 14th
    14 Files
  • 15
    Jun 15th
    0 Files
  • 16
    Jun 16th
    0 Files
  • 17
    Jun 17th
    16 Files
  • 18
    Jun 18th
    26 Files
  • 19
    Jun 19th
    15 Files
  • 20
    Jun 20th
    18 Files
  • 21
    Jun 21st
    0 Files
  • 22
    Jun 22nd
    0 Files
  • 23
    Jun 23rd
    0 Files
  • 24
    Jun 24th
    0 Files
  • 25
    Jun 25th
    0 Files
  • 26
    Jun 26th
    0 Files
  • 27
    Jun 27th
    0 Files
  • 28
    Jun 28th
    0 Files
  • 29
    Jun 29th
    0 Files
  • 30
    Jun 30th
    0 Files

Top Authors In Last 30 Days

File Tags


packet storm

© 2022 Packet Storm. All rights reserved.

Security Services
Hosting By