Gives you access to the registry, dos, display properties etc' (control panel too in the next version). Archive password is set to p4ssw0rd. Use at your own risk.
c0e7602f9f22d7569c787cf797f50f6eaed01dba30d5b509ba3d1ea16f6564b9
Tired of all those annoying windows trojans? are you a sysadmin who's afraid that unsuspecting users on his/her network might run trojans and then come to him with complaints? wanna help your friends by scanning them for trojans? wanna be the greatest script kiddie in the world? then download this super-fast local/remote remote administration trojans scanner (scans for hundreds of annoying trojans).
5c15520fefd5605f5657f5a949af8ad6ed654a62e971f0b206e27b9b80e8e7c6
Well written paper on securing linux for newbies. Lots of good and updated info. Version 1.1.
dd27f287c4429d8d76381c494dc21d247077b1a81c69eb8810e41786d60f5274
These calculations show that Microsoft may be guilty of murder, on order of several people per day.
23297b92fb766ca9043cf40b8f3d40fae47a45104b5f56247da2fb43da000a2d
imagemap CGI which is distributed with OmniHTTPd 1.01 and Pro2.04 has a buffer overflow bug, I coded an exploit which can execute any command on the victim host. The Shadow Penguin Security.
934905f1f9f1cb9de1cc562db508da34d8ccefe4d46bd6355fecc4455384cec2
Tailbeep opens a file (-f), seeks to the end, and watches for a string (-s). If the string is found, a beep is sent to the specified tty (-t) device. You can also daemonize (-d) it. I wrote it so I could watch /var/log/messages for the DENY string (so I can tell if someone is trying to break into the firewall.)
44c568b15d10d6153f5b49137e01ff1d3ba63549b16e672d0a3990bf420a5186
Ethereal is a GTK+-based network protocol analyzer, or sniffer, that lets you capture and interactively browse the contents of network frames. The goal of the project is to create a commercial-quality analyzer for Unix and to give Ethereal features that are missing from closed-source sniffers.
e223e4d6dedfe7e08e074834e8a728a44ba1f8ad4dcc95e5c893a7a1988e832f
Easy TcpIp Library is useful to add basic TCP/IP support to your applications by simply linking it in.
c49cd25eebd1db8f427ebdbdf7fcec255bce3bcdea3f7f433d77f240fa31ee01
Microsoft has released a new version of the Microsoft(r) virtual machine (Microsoft VM) that eliminates a security vulnerability that could allow a Java applet to take unauthorized actions on the computer of a web site visitor. Although no standard Java compiler can generate such an applet, a Java applet constructed by hand with a Java bytecode assembler could bypass the sandbox and take virtually any action on the computer that the user would be capable of taking.
8c02eaa1084336b7cffb85cbeeee6bbe73094d24374f1495e1fc5018b391ad3f
[ Windows Security Digest ] 1999 - October 18. Excel Symbolic Links, JavaScript Redirect, Anatomy of an Intrusion, Getting the Drop on Network Intruders, State of Security 2000, So You Want to Be a Cryptographer, C2 Compliance Check. www.ntsecurity.net
b52d9e47f72f9bd6daa0001926b02ea197343a60b323bde7dd34592350f20bdf
Linux accounting-tool for 2.2.x.
9fea4c4d1397cf298dd5a4cfdd58e5ccac4e42e2a9f5fa8af2913c2db86a3676
Tutorial on a new way of exploiting buffer overflows (ret-into-libc).
71f6c76b0584c12d0217a57f3052e0e21eedfa5cd3d63661e5ed666690b0ac17
Three vulnerabilities have been identified in WU-FTPD and other ftp daemons based on the WU-FTPD source code.
314cdbabefb2fd1a366c6c7a8928005c0869880293006ac05ea1331cf7ba7078
weedlog is a packet logger designed to help in debuging network connections on non-router systems. It currently supports the ICMP, TCP, and UDP protocols, but is still early in development. weedlog supports sending output to stdout, a file, or to syslog.
4af20a3f32c977be013ef49b7281dfa1d164849226ad1734d8406b36d7697291
Net::RawIP is a Perl extension for easy manipulation of raw IP packets with an interface to libpcap. This package provides a class object which can be used for creating, manipulating and sending raw IP packets and optional manipulation of ethernet headers.
e0bbe7a9d1a230489cc894a9cab1bfb990f2cf34c00443fe2c8e43dbd4ac02d1
Ricochet is an automated agent for tracing and reporting internet junk mail (a.k.a Spam). Ricochet analyses the headers of a spam to identity the machines used for its injection, looks up the email addresses of the machine owners and mails out a complaint to them. Ricochet uses various network information resources like nameserver records, MX records and Whois databases worldwide to collect and verify this information.
2477d1f734ac9aefe76f35d11e2f03d1e18a6ddde71f2e20b39a218b2f5e53a9
Linux Administrator's Security Guide - Newest snapshot. Updated October 21st 1999, 15:24 EST. The LASG has been updated some more, and the license has changed. The LASG is now OpenContent, I am doing this in the hopes it will encourage the community to contribute.
364bf63df4d0edb9f33de00dc7b3b625f0a0db164b25d8971319353e4d1a075d
The version of screen that shipped with Red Hat Linux 6.1 defaulted to not using Unix98 ptys. Since screen is not setuid root, this means that it leaves the ptys with insecure permissions. The updated packages restore the Unix98 pty support. Red Hat 6.1 security advisories
f33ebb3f1b35ebf58232d75ce2af6c8a8396a3cdf5da9ead2d3659feb29b75cd
Rpc_Gotcha is a network based intrusion detection tool for detecting rpc based scans and attacks (buffer overflows). The program will passively sit on the network perimeter and process packets while analyzing the rpc message data payload looking for signs of a possible attack. Rpc_Gotcha will log all rpc calls made to the network and display payload data for possible attacks. Changes : This version has some major bug fixes , memory leaks and signature issues. It will also read tcpdump capture files in a batch mode.
47e916295ba31b13f5d2c3e1ee1298ccbaa67084f08de4d1c4ed07f5a57002d2
Paper on writing advanced buffer overflow exploits. The early buffer overflow exploit codes only spawn a shell ( execute /bin/sh ). However, nowadays some of the buffer overflow exploit codes have very nice features. For example, passing through filtering, opening a socket, breaking chroot, and so on. This paper will attempt to explain the advanced buffer overflow exploit skill under intel x86 linux.
2e4ea3806ea648290a4bc015d162ee5889ff5d38e9961098e03e606b4897fb15
Generic shellcode for i386. Supports FreeBSD, netBSD, openBSD, and linux. CyberPsychotic
221de581651c3ee9ebc9f9eb960abe2560e3e4d9fbc246668595b818a6544346
NT OBJECTives, Inc. Presents - Seek and Destroy Network Tools. NTO Tools includes four new tools: Lservers[tm], NTOLog[tm] and NPList[tm] and NTODrv[tm]. NTOLog[tm] is a Powerful, network wide backup/clear utility for NT logs.i LServers[tm] is a NetBIOS name dumper. NPList[tm] is a NT network process dumper. NTODrv[tm] is a NT network driver/service dumper. Download NTO Seek/Destroy Tools[tm].
ed8828e22d4b2702b5da0a6830008e334e58b0e5d79651ef004727657c22c2e0
Decrypt MSN passwords from the registry.
39d31c20ce35636f487d14d1a9689cd6c76ec2a764f117a267a0289c392355c2
Winfingerprint 219: Advanced remote windows OS detection. Current Features: Determine OS using SMB Queries, PDC (Primary Domain Controlller), BDC (Backup Domain Controller), NT MEMBER SERVER, NT WORKSTATION, SQL SERVER, NOVELL NETWARE SERVER, WINDOWS FOR WORKGROUPS, WINDOWS 9X, Enumerate Servers, Enumerate Shares including Administrative ($), Enumerate Global Groups, Enumerate Users, Displays Active Services, Ability to Scan Network Neighborhood, Ability to establish NULL IPC$ session with host, Ability to Query Registry (currently determines Service Pack Level & Applied Hotfixes. New features: contains new GUI frontend and some bugfixes.
637342d7cba4ea483d9ce52a271eaab3a898997dc8dcb6ab3c71f4dbe833f86f
Versioner 0.3: Source code. Versioner is a command line tool that traverses directories gathering the file properties described below. Versioner will output its information in a human readable text format as well as a comma seperated version that can be imported directly into MS-Excel or MS-Access. It is useful to anyone who wishes to maintain control over file versions from either a security or compatibility aspect.
28bbb22f26396a6e8197e439794bb2e3e2a85e69452559a6606698ebb15ffda9