Cso.c is a remote exploit for cgicso included with cgiemail 1.6. Tested on Slackware Linux 7.1 running Apache 1.3.20.
8d232fa0a2687a8c7dc294c61bb1c84b0a1be65bdeb8565fa7f6f9fa693a87cb
Hhp-temprace6_0.pl is a quick and simple temp race checker for Linux, BSD, Sun/Solaris and IRIX. Put together to eliminate the hassle of manual checking.
3a7b01350b0436ef102a74f1abf29d166c13d069a577ab60fb104dd82412538d
A tcp proxy.
b0e839102eb66e7fc5fc5e7f23927805b2ddb3b1481a6501192d10905931f47b
Chanshell is somewhat like an IRC bot with bash capabilities.
3d880f15c213c19a4f991c1552cf109daeb6f9cb0553e74114dfaf70036083a1
Programming and Programming Securely - How to do it. Includes information on argument checking, buffer checking, shell escapes, preventing races, logging, sly tricks, and more.
edb8b73394fff8565bcf46d4f90e36e6624ac18ea964a4c8dc669891dc5b6a62
A document Analysis tool which is useful for cryptanalysis. From May '98.
8024662cda4203693c125747c6a763cff1085e773ab5485c9fe0b23f1c2232b7
Ghost Port Scan is an advanced port scanner and a firewall rule disclosure tool. Uses IP & ARP spoofing, sniffing, stealth scanning, arp poisoning, and other techniques to perform stealth and untrackable information collection. GPS is especially efficient in LAN pen-testing, due to its ability to disclose the firewall settings of a host.
f0cc0f25246061b51c42b84dc8a7122793170043c5a3a167beaae5823f14cf32
Microsoft Security Advisory MS01-047 - A vulnerability in Microsoft Exchange 5.5 allows attackers to retrieve email addresses from the global address list (GAL) by sending a properly formatted request to the back-end function that actually performs the search. Microsoft FAQ on this issue available here.
18c4b6c3eb44aecc71e6e6a57632aab76dbf4ce6192e8552ad1c1945bbe99e0c
FreeBSD Security Advisory FreeBSD-SA-01:59 - The infrequently used rmuser command exposes the master.passwd file to all users for an instant.
45d58a81cf33c8b0c5bbeb03f86e5520d0c454827c9ad2b0ea45917766b6295f
Altering ARP Tables v1.00 - This paper is dedicated to ARP tables and how to alter them remotely. Includes a couple of implementations of ARP poisoning in a bridge based segment and a couple of ways to protect yourself.
73d99dbc0fb85dc0f69f259bf15400a6b209739aef0f1c1d8d61e438c03184a3
Swatch, the Simple Watch Daemon is a program for UNIX system logging, originally written to actively monitor messages as they are written to a log file via the UNIX syslog utility. Swatch was designed to keep system administrators from being overwhelmed by large quantities of log data. It monitors log files and acts to filter out unwanted data and take one or more simple user specified actions based upon patterns in the log. Swatch can monitor information as it is being appended to the log file and alert system administrators immediately to serious system problems as they occur.
ecc3023e0c1b71e7b0f3d0122473ddd13694810fdb850d77557ebd05c57c6b2d
SMS spoof is an application that allows you to send spoofed SMS messages with a palm pilot. It uses a dialup connection to an EMI/UCP-compatible SMSC. It works with a modem connected to the Palm, such as an IR link to a GSM phone with a built-in modem. SMS spoof has been tested with Telenor's SMSC in Norway, and should work with any SMSC that supports the EMI/UCP protocol as long as no authentication is required.
5ca217e2f0978f634e58d91564109aa70cf66e83b3e4d8db5f5d1a5b5c5daf32
Port Scan Attack Detector (psad) is a perl program that is designed to work with Linux firewalling code (iptables in the 2.4.x kernels, and ipchains in the 2.2.x kernels) to detect port scans. It features a set of highly configurable danger thresholds (with sensible defaults provided), verbose alert messages that include the source, destination, scanned port range, begin and end times, TCP flags and corresponding nmap options (Linux 2.4.x kernels only), email alerting, and automatic blocking of offending IP addresses via dynamic configuration of ipchains/iptables firewall rulesets. In addition, for the 2.4.x kernels psad incorporates many of the TCP signatures included in Snort to detect highly suspect scans for various backdoor programs (e.g. EvilFTP, GirlFriend, SubSeven), DDoS tools (mstream, shaft), and advanced port scans (syn, fin, Xmas) which are easily leveraged against a machine via nmap.
9ba6d0c125e870c4eda1642bae0f28af0527e3dfe0b9212abe5bf2c96aedad3a
Firestorm is a Network Intrusion Detection sensor which is multi-threaded, fast, and is pluggable at almost every point.
8e8b5c43e13c843370f225ff1003f6b0f2483791e95265a9dc7a0a465faa5d17
IPA is highly configurable IP accounting software for Free and Open BSD. It allows to make IP accounting based on IP Firewall and/or IP Filter accounting rules. In most cases IP Accounting Daemon is run on public servers, software routers, etc. It uses powerful IP Firewall and/or IP Filter accounting rules and based on its configuration allows to escape from writing scripts to manage network accounting.
efeb5c499117e2738b81d6d4ce4aa65956a42f706b6e7382c736999fc4867272
Snort-rep is a Snort reporting tool that can produce text or HTML output from a syslog snort log file. It is intended to be used for daily e-mail reports to the system administrators. If snort v1.8+ is used, all reports contain priority information, and the HTML output contains direct links to the IDS descriptions of whitehats.com.
d91eb7ef5cf24f6b236c8a59a071a9b15877cd0f0a2ac41c6853ab021b9ece16
The Anomy mail sanitizer is a filter designed to block email-based attacks such as trojans and viruses. It reads an RFC822 or MIME message and removes or renames attachments, truncate unusually long MIME header fields and sanitizes HTML by disabling Javascript and Java. It uses a single-pass pure Perl MIME parser, which can make it both more efficient and more precise than other similar programs and has built-in support for third-party virus scanners.
9d6af4e62b34d3aad46f483a95bb007d949d046326b351ef26e865ca61774b9a
Qualcomm's Qpopper mail server POP3 authentication when used with PAM that gives remote users information about whether user accounts exist or not. This perl script has been tested with Qpopper v4.0.1 on Redhat 7.x.
552b77283bca7bfe71ead2e26048f4a7c53545e50aaf62baa7867718bbf668db
ISNprober is a tool that samples TCP Initial Sequence Numbers and can use that information to determine if a set of IP addresses belong to the same TCP/IP stack (machine) or not.
ca03d910506b94aa3851961823c884a3e0017d2dfd0ff900677bd9850d22206b
A disassembler written for disassembly of x86 ELF targets on Linux (other file formats/CPUs can be 'plugged in'). Written as a backend or engine -- the UI is a command line; support for controlling the disassembler via pipes or FIFOs is provided. Note that this disassembler does not rely on libopcodes to do its disassembly; rather, the 'libi386' plugin is a standard .so that can be reused by other projects.
deb4902992d31c1b6c37b4dcbc701dbc71c042fb0433831e4d972abcf40efb8c
ngrep-lib is a packet filtering library based on ngrep which provides an easy interface. Instead of having to worry about pcap options, syntax, processing of IP packets, etc. you can just initialize and run, letting callback functions handle the rest.
124a3d6908ef8ce3209e9a7eced6262ee9e66b35a7954ad140e57cb91df9f95f
Timing Analysis of Keystrokes and Timing Attacks on SSH - Watching the timing between keystrokes sent over SSH and other encrypted protocols, some information can be obtained about the contents of the packet.
16113d5b2e15a06d9b17c1cbf6a6dc1812913daf27141c3a46816d73465b0e86
Patch advisory for Sun Microsystems. Please read for details.
dc64b9883f3e3a2bf6a72a92bd8c6016e8de6c6722cdfefbec5b8fd591e8e83f
Patch advisory for Sun Microsystems. Please read for details.
2d02f7d6cafe97ac68af0d9baaf2b28fd0ef5e6b64c3f72b7874eeeee3284889
FreeBSD Security Advisory FreeBSD-SA-01:58 - Users on the local machine or on remote systems which are allowed to access the local line printer daemon may be able to cause a buffer overflow. Submitting a specially-crafted incomplete print job and subsequently requesting a display of the printer queue, a static buffer overflow may be triggered, causing arbitrary code to be executed on the machine as root. In order to remotely exploit this vulnerability, the remote machine must be given access to the local printer daemon via a hostname entry in /etc/hosts.lpd or /etc/hosts.equiv. lpd is not enabled on FreeBSD by default.
840cb12218a791d933dd62c507535a88975344fe0b8c5ee583d5b7dd5bcfc089