Pgp4pine is a script that automatically encrypts and decrypts mail under Pine using PGP. The user is not separated from things that PGP does. The program is compatible with PGP versions 2.6.3, 5.0, 6.5.1 and GNUPG 1.0, has support for an aliases file and signature-rotating programs, and can remember your passphrase for a session if you need.
507f7aa0e6b41414813d3216aad8e8bb13dcd2354853f426c869e14dca41f20a
Microsoft Security Bulletin (MS00-021) - Microsoft has released a patch for a security vulnerability in the TCP/IP Printing Services for Windows NT 4.0 and Windows 2000. If the service is installed the vulnerability could allow a malicious user to disrupt printing services. A Microsoft FAQ on this issue is available here.
a27440ed5a4bc1f89702d58c90c17e7a86ad3db09a90da4a29fcff049f013317
Microsoft Security Bulletin (MS00-019) - Microsoft has released a patch for a security vulnerability in Microsoft Internet Information Server and products based on it. The vulnerability could cause a web server to send the source code of .ASP and other files to a visiting user. A Microsoft FAQ on this issue is available here.
82679a2e5a6ea19d3c6b77a90e2b86158046deffb192ff4fa46998f51e065303
Unofficial FreeBSD patch to drop all ICMP packets with a size greater than 8,184 bytes.
a71b3b0b939c6e6d229c913bdca2f7e3ed0bb6df6f34dbc1a979de1a4e7a4f16
Unofficial FreeBSD patchfile with recommended unused bit attack patch from LigerTeam.
bd4b03760419f88ad3e8c031f8c9e3f2f739d9d5a86f4e8719b6f93466529135
Unofficial FreeBSD patch to drop all TCP packets with a sequence and/or acknowledgement number of 0.
bddfb3e361bb24d9627c76791fcc131730673d50ed341fc805e404d50e389e7f
spp_portscan.c - Snort Portscan Preprocessor logs port scans through snort.
6e6b56d477c46c50eea6ac3e90210ceecbbe1546a20509aadd808e90cd37f46d
Over 800 rules for the Snort IDS software. Last updated 3/25/2000.
6048b29687940ea6614c159d1877a5fec7dfec0a08995d36ff290e44923f7e5c
BIND 8.2 - 8.2.2 remote root exploit how-to. Explains how to manipulate DNS records on a primary name server to exploit this vulnerability.
13963a941af3f8fdd0f2293e438b81cbd1c0cfbbfca61326c27bfe8f6538b9c0
Zombie Zapper v1.2 Windows NT Binary - Zombie Zapper [tm] is a free, open source tool that can tell a zombie system flooding packets to stop flooding. It works against Trinoo, TFN, and Stacheldraht. It does assume various defaults used by these attack tools are still in place, but allows you to put the zombies to sleep.
dcc715e480b5deefee880cc6be5fe8a4860c6ae9ec35f5da0d4410390f88a0c9
Zombie Zapper Unix version 1.2 - Zombie Zapper [tm] is a free, open source tool that can tell a zombie system flooding packets to stop flooding. It works against Trinoo, TFN, and Stacheldraht. It does assume various defaults used by these attack tools are still in place, but allows you to put the zombies to sleep.
1b826dedddd3355c5cd7f3c1b0a853a3214af6ea762c4d4ef0be1e09e91a9664
Iptables is built on top of netfilter: the new packet alteration framework for Linux 2.4. It is an enhancement on ipchains, and is used to control packet filtering, Network Address Translation (masquerading, portforwarding, transparent proxying), and special effects.
5a45f8378a2ec9c8d3809a0d55170a49102399f3ae966cc4fe434cfc031ea0ba
Analysis of a Shaft Node and Master - This analysis is in addition to Sven Dietrich's analysis of the Shaft DDoS tool. The analysis we provide here is a description of the rootkit used and the methods of distribution of the tool.
091e169628a50f06952298b9fe24d4b94d338a3dc8a4cf25c89ff275b310dec7
IRC Bot plugin for BO2K v1.0 - It is an IRC client, Channel Bot style. Is fully customizable and once logged into an IRC server, it is remotely administrable through the IRC /msg or /query commands. The bot will rejoin any channel where get kicked, reconnect on disconnect, generate random nicks on raw 432 or 433, can delete, list, copy, spawn files on remote machine through irc. Archive password is set to p4ssw0rd. Use at your own risk.
02f46e1c94e8bfcfa0d112dedc5bbd3af025eb850cfb53cc00126a85318fbc4c
BlackCode Firewall v1.0 - Windows firewall with built in port scanner, anonymous emailer, and other features.
0538771cb349c4b06d90df22e883395435707d80b360dc23e5d113d8e4d4abe1
dsniff is a suite of utilities that are useful for penetration testing. It consists of the following programs: arpredirect intercepts packets from a target host on the LAN intended for another host on the LAN by forging ARP replies. findgw determines the local gateway of an unknown network via passive sniffing. macof floods the local network with random MAC addresses. tcpkill kills specified in-progress TCP connections. dsniff is a simple password sniffer which handles many protocols. mailsnarf outputs all messages sniffed from SMTP traffic in Berkeley mbox format. webspy sends URLs sniffed from a client to your local Netscape browser for display, updated in real-time.
225820da6efd655e320bfc3aad29eacd2e1d5d8ab01102d238e091882265cbf7
Zombie Zapper v1.2 Windows NT Source Code - Zombie Zapper [tm] is a free, open source tool that can tell a zombie system flooding packets to stop flooding. It works against Trinoo, TFN, and Stacheldraht. It does assume various defaults used by these attack tools are still in place, but allows you to put the zombies to sleep.
284a598ea169fa349dcc72b8a0cd88056fd0e80ff712647d8d5736efa6851fa0
Bastille Linux aims to be the most comprehensive, flexible, and educational Security Hardening Program for Red Hat Linux 6.0/6.1. Virtually every task it performs is optional, providing immense flexibility. It educates the installing admin regarding the topic at hand before asking any question. The interactive nature allows the program to be more thorough when securing, while the educational component produces an admin who is less likely to compromise the increased security.
4c9fbb2334a07c3f4875d6885490f092c1595bfca237e4d182bb36a4fe0c0806
CellCo system ID listing.
16b4e59f54dab4d17a90b240a231f53ccf261eabc2934acedb7f28d4f67c583a
Patch advisory for Sun Microsystems. Please read for details.
8e0668fc3bf5747a94d3bd4afc60bb516b50f53b20be3b612c14ee869e6115e7
The Fine Art of Telephony
bf96c262439bb898f26175f14dca720d78e75f04121362ede2d6025ebebe1a93
Automatic Number Identification delivery docs
25c03d23068ed9de44cb2540c4f509394f3c58252cc93ede03088c17bb926a8c
Ericsson 1331 NAM and Options programming
5565d783a21994ff252552a35c5a41df4a358c2f1d8e4b03a587d9b5c7e49880
Ericsson 1341 NAM and Options programming
5581726504b3518e85d293a9d7644f231d5424da0a2cba812fe198abaf730f88
300 snort rules to detect windows backdoors.
390b848257ce83d0de5c84bb6fc465d825466ab811e188f5d09cb91488a97520