pwdump2 - This is an application which dumps the password hashes (OWFs) from NT's SAM database, whether or not SYSKEY is enabled on the system.
16a77e246b28114635e53ac29ced3bab37b377719626d78e44fb26f7ff6499d4
irii-dcc is a set of perl scripts which exploits a dos vulnerability in ircii-4.4 when sending and receiving a dcc chat request from/to a vulnerable client.
480639cea435396e89c11b39f8dea3c9b7d5cc7feb64de1783c33a07eca4a819
syslogd-to-MySQL wrapper v0.1 prebeta. Stores syslog messages in a MySQL database. Written for FreeBSD.
b44da69a92c3350c4053b05fab764bff3d6940f5eb010c5337cd82acb8578da7
Plogd v2 (Revision 1.5) is a syn/udp/icmp packet logger for freebsd.
c8063e2434da5fb556ad35fc5af1b0a42d30521cf23bede1da4f7da952df83df
T.REX Open Source Firewall - The T.Rex Firewall is a highly integrated enterprise security suite that combines functions that normally require the installation of multiple products. Features stateful packet inspection, content filtering, NAT, authentication, VPN, Workload Balancing, high availability, Real-time performance monitor, Network scanning and intrusion detection tools, and Extensive auditing and reporting tools that can produce more than 52 unique reports.
925d1b395a6875e09193df10a7690552dd2ea6ee547e0ce2d35815cb356fe168
Scanlogd v2.1 is a TCP port scan detection tool for linux, originally designed to illustrate various attacks an IDS developer has to deal with, for a here.
78959c2380ba0c76ab938c17250bcd65557aa7949742c3227a301132bfc09782
Security Auditor's Research Assistant (SARA) is a security analysis tool based on the SATAN model. It is updated frequently to address the latest threats. Checks for common old holes, backdoors, trust relationships, default cgi, common logins.
354e7145959cad880583cd5ca8e3f419e97c3f0ebba52e2a938da89d98cffb4c
E-LogMonitor is an Enlightenment epplet that monitors various log files for the occurence of specified keywords. It supports up to 20 file/keyword combinations and provides various ways of alerting the user if a keyword has been detected.
0e918d6104f3154e1365986167906c72abdcd1721c586b0122ada1a634af9c95
Etherape is an etherman clone which displays network activity graphically. Active hosts are shown as circles of varying size, and traffic among them is shown as lines of varying width. It is GNOME and pcap based.
bd2134689d290ec002716b163e101a92f6a83f479eacd8e00180c290ac704f09
LogDog is a very easy to configure and install system log monitor for watching system log files and emailing administrators when problems are found. Note that LogDog sends email to REAL email addresses, and does not require sendmail to be installed, it uses SendEmail which is also written by me and is included with the LogDog package as of v0.94.4. LogDog has a single configuration file which allows you to easily specify a list of key words to watch for, a list of words to ignore, a list of administrators to email when problems are found.
3d07f95079468f15c97c1c7d8893c3909e44229788a20c5fea33480cbc4c026d
Grout is the geographical tracerouter for unix. It combines the fastest tracerouter with the ability to display the location of intermediate machines. Developed for openbsd.
5a9cb90cdc0a48a91c4008ee756c525e07938a67a0318ee90b7f6580eb06c53b
dig v2.2 local buffer overflow exploit for x86 linux. Note that dig isn't suid/sgid on some platforms, yet on some it is.
9558bb85b9f1f940cb13b09af0c0a312ede194c6966ff6a071a7358a79f49ff1
imapd IMAP4rev1 v10.205 remote root exploit, solaris x86. Exploits the AUTHENTICATE overflow, yielding a remote root shell.
60090c36ac8c823cce06c3173af240ef94222db30faac4df5e3b13de2c7a547b
rpc.nisd remote root overflow, solaris 2.4 x86. Solaris 2.5.0 and 2.5.1 work with different offset.
e7bdfe8a6620ff1c89a033090f13a3a320060779e65b74fd857bbb8857d3f829
/usr/bin/lpset local root stack overflow for Solaris 7, x86.
a475a736a78b2988273182e46297cb031078a395224c65cf9e12a7ddf3c792fb
xsun.c is a Solaris 7 x86 local root stack overflow for /usr/openwin/bin/Xsun.
8af8334ae766a801bf8d4fc9e432e34370f3f1ad1621d0fed7d083f188ac984f
Broadcast Internet String Search Engine (BISSE) is a windows based scanner which searches your network for servives who have banners which match a user specified string.
71f45e86f1e5abaeb64f2f881e2327962a560ce984048bfafb508d8f493e44eb
FreeBSD Security Advisory FreeBSD-SA-00:15 - The imap-uw port supplies a "libc-client" library which provides various functionality common to mail servers. The algorithm used for locking of mailbox files contains a weakness which allows an unprivileged local user to lock an arbitrary local mailbox.
e886c572dda7f30f968164db8223b60f93ec3a3a62c1ffa925d1c397304210bc
FreeBSD Security Advisory FreeBSD-SA-00:14 - imap-uw contains security vulnerabilities for "closed" mail servers. There are numerous buffer overflows available to an imap user after they have successfully logged into their mail account. Thus, the vulnerability is only relevant on a "closed" mail server, i.e. one which does not normally allow interactive logins by mail users.
6fda2e7d9e5a79ccc9fa6a78c1894f185013d87e58d37237a89d82bc3c09dca2
Crazy Scan is a unix based scanner which scans for NT web vulnerabilties. Checks for about 30 cold fusion files, some cgi's, IIS / iisadmin scripts, msadc, and many other url's that indicate a remote vulnerability. Checks for 140 paths in all. Bug list available here.
ef4da4879810b3a2f4cf94e1bead2a85efcc7fc4d711dc3568c12d5124521a1c
The mio-star distributed multihosted unix password cracker v0.1 runs on all platforms where perl is installed. Comments and documentation is in German.
db9d49784497be47ea822a2ea9409857d496382a544d25862171f4f80ce97cca
GNITvse rc1: GNIT Vulnerability Scanning Engine Release Candidate One - (for WIN2K and NT systems). Performs a port scan, and based on those findings, calls other functions. Checks for MANY windows based vulnerabilities, and grabs banners.
1f337843a9ce01d908ccead72c80e7d43812269e422e2807368214bcf2e7c725
FTP Scanner v2.2.59 is a windows application which will scan a range of IP addresses for any login and password you specify.
38f7bab95018d3f33f227e902b67a8d2002a57b386b6a0d24812e9ded7a843fa
BufferOverflow Security Advisory #3 - libncurses buffer overflow in NCURSES 1.8.6 on FreeBSD 3.4-STABLE. Setuid programs linked with libncurses can be exploited to obtain root access.
d3900b7fe44530224283ef6bcd98f8704f6c629dab6bcb828e3d5083c81ea48e
FreeBSD mtr-0.41 local root exploit.
8fb8c8be26e6cdcb84cb5bb42887b0e84ec53f58ef96682bfc2e84d893e90fd4