nsat is a bulk security scanner designed for recoverable long-time scans, optimized for speed and stability, that scans and audits about 60 different services and 170 cgis. Version 1.08.
eb55372260ad6fd90f349dab6565c49e8a639a33693e0a0fdcfed17433e4eeeb
Several vulnerabilities exist: ypserv prior 1.3.9 allows an administrator in the NIS domain to inject password tables; rpc.yppasswd prior 1.3.6.92 has got a buffer overflow in the md5 hash generation [SuSE linux is unaffected by this, other linux falvors are]; rpc.yppasswdd prior 1.3.9 allows users to change GECO and login shell values of other users. Affected are all linux distributions using the ypserv package. Website for patches here.
760ce3bd92792f507a4556e1a3b80e429915e2e35a020f7efc814d176a4281a6
UNIX/Win remote vulnerability exploit scanner with Fixes for Vulnerabilities. based on ben-z fts-rvscan scanner. Includes: WINSCAN (scans win/nt systems for latest trojans/remote exploits), VETE (single vuln/host scanner) VETES (single vuln/host w/o host checking), VETEMASS (mass vuln/host scanner), CMSD mass/get (a b c scanner and getter), AMD/get (mass a b c scanner and getter), MOUNTD/get ( mass a b c scanners/getter), many exploits, Fixes, and utils included.
99c3a3de5a307efc0d5dde9ebe1a45fbeaa0ec8158ead50ee84d677dbbe243e0
A list of the TCP ports which trojans use. Archive password is set to p4ssw0rd. Use at your own risk.
798103e287d7346856c86294b48fe70090244b2a4c81c8f143677b3b4393bd76
DOSfw is a simple Linux netfilter firewall module which drops denial-of-service attack packets. The current version supports only two attacks and TCP Fingerprint scan, but you may expect other attacks in the (hopefully near) future.
3e3130198ff8e4d64cc597ae528140fb041f6deea4eaa8dacc470c7fec948060
FWT is a web based administration package for remote configuration and administration of the firewalling and (some) networking aspects of the Linux operating system. The tool is easy to use and can configure most useful parts of ipchains (including masquerading), policy routing, ethernet alias interfaces and redirection of TCP traffic through a masquerading firewall.
6fb3676c874f25ef731ce868c549790434192d7c15b75373d3bfc1240a703c97
Logcolorise is a PERL script to make your syslog generated log files much more legible by colourising them (context highlighting based on keywords).
c63321d7d299bfb4acc2b06a4c5e8179a58c46288c934847e20ecb25751c7ee1
Tailbeep opens a file (-f), seeks to the end, and watches for a string (-s). If the string is found, a beep is sent to the specified tty (-t) device. You can also daemonize (-d) it. I wrote it so I could watch /var/log/messages for the DENY string (so I can tell if someone is trying to break into the firewall.)
0011bf9bb3235b1f12a7a203cf243e8db9ffb91b311a8147d9873a667d78fb33
A simple GUI trojan that when added to the autostart *see regedit* registry will log the passwords of the Novell NetWare School Vista user to c:\windows\samples .txt. Loginw31.exe is an exact duplicate of the login while Login31(2).exe is a system confirmation tricking the user to re-enter their password.
58d1a61a0dad0a8bd9fdf8856cb55f06ea965f5b92b98a29653c46aae61937c7
pr0tscan was based on vetescan, but added more vulns and tried to make it run more smoother. Winscan, (scans win/nt systems for latest trojans/remote exploits). The docs include fixes for the vulnerabilities it finds.
492897184ae35990598618bea3d466e9283d566f80648c61ea9254760a094c18
logController allows you to control the size of some files that tend to become too large (logfiles). A config file allows you to define which files to monitor and the sizes not to exceed. If one or more files exceed the limit size, they are automatically truncated to a new user-defined size and the area truncated can be erased, or compressed and stored.
13b9e31af419c0a7b8b3fd18a2724a16c5b2e33b81f142a08655ea85d257030f
Spikeman's DoS Attack Tool - Revision 5. 31 denial of service attacks at once.
9f930571591e3d0822220c2d809879ca668143471a6765e5e25f7583bd14d138
Forged packets can be send out from a Linux system, for example for NFS attacks or any other protocol relying on addresses for authentification, even when protected from the outside interfaces by firewalling rules. Most of the time, existing firewalling rules are bypassed. This requires at least a shell account on the system.
8d159590c7c839774eb2f8a7c4dddf0737f16a6cf7e3d10393036232f45f5469
Walker - Compuserve 3.0 Password Decrypter. It decrypts Compuserve 3.0 ini files (cis.ini) that stores account passwords.
165027448c137a47f5149973229d79d31f0b0a137efbc4f0c01f848456b74fa8
Pho's alternate remote OS detection techinques page has been updated. Includes information on ICMP techniques, ARP techniques, IP techniques, and UDP techniques.
8ad58add858120309dfa20fecd05c30e086888dd27674d03eb1a7771daeb0615
If you have installed Microsoft Office 2000 or keep current on your Windows Updates, you may have noticed a new WebFolders namespace in Windows Explorer. The fun part is that WebFolders have some significant weaknesses (inherited from FrontPage) and are such a new concept that it turns out they make a great entry point into a remote server.
01adda0b5af462be99d4d8071315e8516891937780a27b461c6b4e7ab4d80727
Libnids is a library that provides a functionality of one of NIDS (Network Intrusion Detection System) components, namely E-component. It means that libnids code watches all local network traffic, cooks received datagrams a bit (quite a bit ;)), and provides convinient information on them to analyzing modules of NIDS. So, if you intend to develop a custom NIDS, you don't have to build low-level network code. If you decide to use libnids, you have got E-component ready - you can focus on implementing other parts of NIDS.
37aab0e12817880ae502de7bec0810e0df2e1c6ee7cd328e933f0bca7751c656
Versioner 0.4: Source code. Versioner is a command line tool that traverses directories gathering the file properties described below. Versioner will output its information in a human readable text format as well as a comma seperated version that can be imported directly into MS-Excel or MS-Access. It is useful to anyone who wishes to maintain control over file versions from either a security or compatibility aspect.
83c2cb2763ce18eb7438821f2011ae0ea994e221d2cc17951c44359d0f30b101
Versioner 0.4: Binary distribution. Versioner is a command line tool that traverses directories gathering the file properties described below. Versioner will output its information in a human readable text format as well as a comma seperated version that can be imported directly into MS-Excel or MS-Access. It is useful to anyone who wishes to maintain control over file versions from either a security or compatibility aspect.
91a7f19d27b6d4287ff71dda6b47654fd6d52d5659ab2e0090657f1a47004e9f
Static linux binary for ngrep 1.35.
de58a4bda1fcf89bd2f42affba85873ba5e04bce8cb96cb71941b53188a62b11
ngrep is an awesomly powerful network too which strives to provide most of GNU grep's common features, applying them to the network layer. ngrep is a pcap-aware tool that will allow you to specify extended regular expressions to match against data payloads of packets. It currently recognizes TCP, UDP and ICMP across Ethernet, PPP, SLIP and null interfaces, and understands bpf filter logic in the same fashion as more common packet sniffing tools, such as tcpdump and snoop.
8e9c02d7d666c89fcef1675ad1bb9e4d4c2c0b6f12111f29ea122e8bca9d8c4b
"libpwrite" - A C library for portable packet creation. Libnet is an API to help with the construction and handling of network packets. It provides a portable framework for low-level network packet writing and handling (use libnet in conjunction with libpcap and you can write some really cool stuff).
ce8af7b861f3663f4910d026b536b9c5bd714f68ab9422629fabd8771d4f7da2
Default newsletter Issue #7. Includes Setting up a great desktop Linux, How to make safe Windows 95 based server, Web based encrypted e-mail (critic and the response), Welcome to the wonderful world of cellular phreaking, Unix logging and auditing tools, and Freedom of the speech related incidents.
2794b94e3bc6575c0ec03735ecef55d627af7b4c60a32a0ff16b93f06766d783
Adding new services to the Windows NT kernel (Native API) on intel X86 processors. Version 0.81.
c6f6384f6b9e9467c3f627de844e172d83aae5c41e789cecfda274df0f75bf2e
Remote exploit for dopewars-1.4.4. Exploit works for servers as well as clients. Produces a shell.
6ba59e6009b05be123b6af5928e78b018f173818061ec3c4bfedafabca9b0987