Hping is a software to do TCP/IP stack auditing, to uncover firewall policy, to scan TCP port in a lot of different modes, to transfer files accross a firewall, test network performance, test of TOS is handled, etc.
42eba4cefee6cb7baf1f8c006e8b6590ca76092f8c03c8adfb52d6eebcb10ffc
Underground Periodical issue 6. Includes A Phreaks Guide to net2phone, Virtual Espionage, More 'features' in Win 9x, Compuserve Password Finder, IP Spanking, Pirch Passwords, The ICQ So Called Protocol, ICQ
b109efde04118a0db29092a9d428016733be60e54b2502abf16f43d851dc3ab3
Darats Remote Admin Tool. Windows backdoor which runs on TCP port 48. Archive password is set to p4ssw0rd. Use at your own risk.
77fc4b8faf85f4b0f1968076907cf20dd1d51d6ea1d26450ebaceae1832adfbb
Cgitest.exe CGI is distributed with W4-Server2.6a/32-bits has a buffer overflow. Any instructions can be executed on the victim host by using this buffer overflow exploit.
152b3ef6e55079125a83e4cd6e9842f7de802388a4ca59dc948071470fdfe4af
syslog-ng as the name shows is a syslogd replacement, but with new functionality for the new generation. The original syslogd allows messages only to be sorted based on priority/facility pair, syslog-ng adds the possibility to filter based on message contents using regular expressions. The new configuration scheme is intuitive and powerful.
e95b8af7ac6119743611968def66c26fc674824982d05176787a1a83fccbc924
Nessus is a free, open-sourced and up-to-date remote security scanner for Linux, BSD, Solaris and some other systems. It is multithreaded, plugin-based, has a nice GTK interface and currently performs over 270 remote security checks.
73503cac028d8e11c71ef23ad85f0e943880baab1a18f0e0e849465c3cd2d800
NDump is a collection of Perl programs to log and parse incoming packets. It is very unique in that it is one of the only loggers to log machine level information as well.
df30aa5824c4beb3e25ca5e4d54efef67dd2f8329595ab4a1489013b63ff583a
Microsoft Access database password cracker. Works on Access 97 or Access 2000.
e2d0f4961f76fa56eeb2a9744329080b56a7b0c2ba92664b5e7cc259c522c766
NSS_25.tar.gz
524faf915467ef3023f35e71207ed68d1dede75063948131263699e249209285
Bug is a spy program for linux, which reads from the microphone and sends the audio back to the client in UDP packets. Will not disrupt audio playback.
ea2b635d9e944d47760aa1429a5c954f3b5ed370792148b7cae71cd8503e1ead
DeleGate 5.9.0 remote overflow.
30642c0d094ab7bf796632ec2992a7147c5d28d2f0a2c746c0c9cc62f2186936
This paper will attempt to explain how to exploit a buffer overflow under alpha linux.
9dfb70b64ed44d377e06b5bc10d95c210b241c1438af704d524d60f1bec84e18
Clean, functional, and fast banner scanner.
d3a5bf0b9a3e63c5b84dbc7c7ca06de53564482024ab93e88b6138b33eb0a863
Knark is a kernel-based rootkit for Linux 2.2. Hides files in the filesystem, strings from /proc/net for netstat, processes, and program execution redirects.
2ca87438b3600053b676be52bdbdb15dfd1129e0bf7612e3d6aac9135e2fdae0
The gHost project is a very thorough set of remote security scanning scripts thrown together by various members of the group gH. This is the first alpha release.
6793d248e0c9cd76518748b52ab5eecea926c707d40b145c691419e07c2d9e56
Eyes on Exec 2.32 is a set of tools which you can use to build your own host based IDS. It watches for programs getting exec'd and logs information about it to a file. Combined with perl this can be extremely powerful. Requires linux kernel 2.2.
721aa1dc02e15a1fb8384fa30f37cc22af65e7cc1755e2bc04a94eaffd14de73
List Not Closed Files. Lets you not only list not closed files but also write/read etc. to it. Also inserting commands into stdin of programs (say SSH) is possible. Needs libpopt and x86/linux kernel 2.2.
d7032e97709ff8da358464fef1040bbc91a9b3f460717572d116ffeb0631275f
Named version scanner. Due to several vulneriabilities found in BIND daemon, it's always good to know what bind versions you're running.
6252b690ef013e0a1bf5131aa89038e46fd5d8e9d1b6f0f2ae9ee3555a666327
Unix backdoor which pretends to be a http daemon.
e8731998c6f8964470198eb94c4df8a820262e7bcd5c9ed5a0ceb724d820911a
The rpc.nfsd which is part of the nfs-server package was found to have two remote vulnerabilities. Patches available here.
29d784915088dec312cde6439f632f6fc7c438e0c1e9e3c966d72df9b8cf1a42
sslcrack is a basic VB5 win9x brute force PIN SSL cracker. Zip includes HomeBanking.txt, which explains a common weakness in Home Banking systems that allows brute forcing the PIN.
11b9ec1913a404f6702c653d2d48e9dafae7c4ae3d992e80bf89f454dba7654d
The Nemesis Project is designed to be a commandline-based, portable human IP stack for UNIX/Linux. The suite is broken down by protocol, and should allow for useful scripting of injected packet streams from simple shell scripts.
e8bb31124354adc0124386bb24748c6f2267f8d8bbd9ab549cce53f5f453a8e1
Dragonmount Networks Advisory 1999-001 [DNA-1999-001] Intersoft's NetFTP daemon (included with NetTerm) has many insecure options enabled by default, including allowing access to the entire hard drive to everybody. There are also numerous buffer overflow problems, resulting in remote Denial of Service and possible remote execution of code.
21e973724a97cfd33d343c72679ad892148ca46d585d7f456c876ae569d173c8
NetCPlus SmartServer3 POP 3.51.1 Exploit. Windows binary and source code included. Spawns a command prompt on port 666.
3238b2a6cb153549cf675abd04b8822306e36d2bba966fb91a9d003d385162db
A remotely exploitable buffer overflow has been found in ssh-1.2.27. The problem is the length of the session key is not checked. Multiple platforms are vulnerable.
0a85e8ff5334fd6c730fcbee204b3fcbd601aa00b5176eb6e14ee47c1a17e5db