Tor is a network of virtual tunnels that allows people and groups to improve their privacy and security on the Internet. It also enables software developers to create new communication tools with built-in privacy features. It provides the foundation for a range of applications that allow organizations and individuals to share information over public networks without compromising their privacy. Individuals can use it to keep remote Websites from tracking them and their family members. They can also use it to connect to resources such as news sites or instant messaging services that are blocked by their local Internet service providers (ISPs).
d611283e1fb284b5f884f8c07e7d3151016851848304f56cfdf3be2a88bd1341
Hashcat is an advanced GPU hash cracking utility that includes the World's fastest md5crypt, phpass, mscash2 and WPA / WPA2 cracker. It also has the first and only GPGPU-based rule engine, focuses on highly iterated modern hashes, single dictionary-based attacks, and more. This is the source code release.
92627197daa850dc7d723793150801c0791fe31f6c767de68417cee097ad6f4c
Hashcat is an advanced GPU hash cracking utility that includes the World's fastest md5crypt, phpass, mscash2 and WPA / WPA2 cracker. It also has the first and only GPGPU-based rule engine, focuses on highly iterated modern hashes, single dictionary-based attacks, and more. This is the binary release.
2ffba8950a8e3b72f7ece355bce5021974dc34d4982816cd9813f742d26ae49f
Capstone is a multi-architecture, multi-platform disassembly framework. It has a simple and lightweight architecture-neutral API, thread-safe by design, provides details on disassembled instruction, and more.
587c092454ad59137686529f3c008c265cc6d427a85d5d2e8f6a902b72d215b3
I2P is an anonymizing network, offering a simple layer that identity-sensitive applications can use to securely communicate. All data is wrapped with several layers of encryption, and the network is both distributed and dynamic, with no trusted parties. This is the source code release version.
67da4ce224fef2b190ffeed5dba102a3b7724f061b1c168255625c028a97c3a7
Lynis is an auditing tool for Unix (specialists). It scans the system and available software to detect security issues. Beside security related information it will also scan for general system information, installed packages and configuration mistakes. This software aims in assisting automated auditing, software patch management, vulnerability and malware scanning of Unix based systems.
771a25238c2b2aa92857096670463801149ce9e13b8d82c53dfe1cad2608316a
Ubuntu Security Notice 3215-2 - USN-3215-1 fixed a vulnerability in Munin. The upstream patch caused a regression leading to errors being appended to the log file. This update fixes the problem. It was discovered that Munin incorrectly handled CGI graphs. A remote attacker could use this issue to overwrite arbitrary files as the www-data user.
aa1f24b6f532f9a94b446eecce1f85748ef6ebca90324dbc5b1f133dce50088f
pfSense version 2.3.2 suffers from cross site request forgery and cross site scripting vulnerabilities that can assist in gaining a reverse-shell remotely as root.
cd39c0002c9cbad6f84b7ff1bc8b8dfac8bd266558a55a8c5b35198aec6c2e57
Joomla Recipe Manager component version 2.2 suffers from a remote SQL injection vulnerability.
9475b7764ad3c035a9c1d0aedef33e517241ab183d242e273d8a837a759e0c2c
Joomla Guesser component version 1.0.4 suffers from a remote SQL injection vulnerability.
7e5437ce0e5c08a6977f0422189d1f5c96727657c24c737d099b9b287a4ce948
Joomla StreetGuessr Game component version 1.0 suffers from a remote SQL injection vulnerability.
b4f8fd0800d2434e2bc7baab9337cec94238c1c6c3cad4e1ce93ceb394905daf
Joomla Abstract component version 2.1 suffers from a remote SQL injection vulnerability.
162ff907f8affdaa02e6afc9950fea17d4b349b6f540fdff29333709842c24e1
NetGain Enterprise Manager versions 7.2.562 build 853 and below suffer from a ping command injection vulnerability.
65782cf6f7eafb12c288f2dc5c904209ff696bf281464766fc61b65617f713e5
NetSTR is an open source small, fast and easy to use port scanner and packet sniffer. IPv4 scanner can perform ranged, single or use an internal top ports list plus it has a flexible timers/port capability. IPv6 single port single host is supported. The tcp and arp sniffers print an easy to read dump format and have a full packet decode capability. Additionally netstr sports a fuzzy passive network scanner.
878f8e1c354a7af52fb070235beb2aa55d53602e2728069efeab2d0e51dbfff7
31 bytes small Linux x86_64 polymorphic setuid(0) and execve(/bin/sh) shellcode.
c402b58268e42bce5a0d795156af2b1df6f55f3fcdc828ad17fff029af7b770d
WordPress Contact Form plugin version 4.0.0 suffers from a cross site scripting vulnerability.
584dc6e15f6a3d8fd4dd2df04a59176bf53f2fe05a39c7749e9ccb90cecf014d
WordPress Contact Form Manager plugin suffers from cross site request forgery and cross site scripting vulnerabilities.
de609d4292dcc9ecec778d67effe9ec246ff8261422bac22eb7abbd0ad762702
WordPress User Login Log plugin version 2.2.1 suffers from a cross site scripting vulnerability.
1e716bb3eab880b82d9519988f8f516e288c83773a805ad4c2919514b5e4797b
WordPress Popup by Supsystic plugin 1.7.6 suffers from a cross site request forgery vulnerability.
c44f0d7c29e05b7d57e8ef6eaec37a3a1b7d438d1d471473d6154da47e3616ea
WordPress VaultPress plugin version 1.8.4 suffers from a remote code execution via man-in-the-middle attack vulnerability.
4c056c1d1a19a56f28c822e0b04fb7a61c23f8d3512b2811ce4e0043e1f21294
WordPress Alpine PhotoTile for Instagram plugin version 1.2.7.7 suffers from a cross site scripting vulnerability.
aadf56e6de519dd917e723fa5bdfd3e087171bdde3318b0d219911308c0d2101
WordPress Google Analytics Dashboard plugin version 2.1.1 suffers from a cross site scripting vulnerability.
bc9ec119f0a226470311e249f41eb959a98b3b4353374203f0b337db3a302b54
WordPress Magic Fields 1 plugin version 1.7.1 suffers from a cross site scripting vulnerability.
aedb2e37c089832d32e0904ab02df9464d1d572fcc56386d16a6ba7140d5a684
Simple PHP proof of concept exploit that demonstrates username enumeration in WordPress versions prior to 4.7.1.
6330d946fbcd5422cc1b6d65d1436107000d78c749ccd76f058efcd3d7c00f83
WordPress Atahualpa theme suffers from a cross site scripting vulnerability.
07d5ff8c80d33d34260cc5c93dd81e287636e22821daf977393abeae82bee6e9