BitchX patch which fixes the #define HUMBLE compiling problems. For 1.0c19.
1658a714b2ef988ef14240079649fd7715f4b8ca5a2de7834f96206d2f990263
iDEFENSE Security Advisory 08.28.2002 - Webmin v0.92 and below contains remote vulnerabilities which allow any file to be read from or written to as root. Perl exploit code included.
af31beb487c3d22656202899a2265acf6154205773815b6ae81b751d5177ca36
iDEFENSE Security Advisory 08.28.2002 - A local buffer overflow vulnerability exists in linuxconf v1.28r3 and below which allows users to spawn a root shell on Linux 7.3. Fix available here.
f9ba1eb1fdc12f40a3c9d1f1c58751fb4592b6d5203e97240852745915ace9d3
Atstake Security Advisory A082802-1 - The Microsoft Terminal Server ActiveX client contains a buffer overflow in one of the parameters used by the ActiveX component when it is embedded in a web page which an attacker can exploit to run malicious code on a target system. The user would need to open a malicious HTML file as an attachment to an email message, as a file on the local or network file system, or as a link on a malicious web site.
56359c9b96a1991a0e4e4ca0c9bcd9337adab1526626b1bdc5b1cae7f982e8e1
The Stealth Kernel Patch for Linux v2.4.19 makes the linux kernel discard the packets that many OS detection tools use to query the TCP/IP stack. Includes logging of the dropped query packets and packets with bogus flags. Does a very good job of confusing nmap and queso.
d83f6c2d42f4c4d0faf46cfa16e9c460e0ce02fe230f12f4007615182d399738
This local denial of service exploit works up to kernel 2.2.21 by using up all the available inodes.
0b3e683b3bf8e073894178c7bdd337d759248aec85101372e120cdf4adb4fd1c
The CGI Debugger v1.0 (/cgi-bin/debug.pl) displays information that may be useful to an attacker including the document root and server version info when passed a bogus argument.
fb7ac98f8314c3a58ff56f24e2e1c29c135d75c2f619f967ff2229d80ec3171f
This utility allows the editing and manipulation of wtmp/utmp/wtmpx/utmpx/lastlog.
afc994d3542b3f019db0ad019c0d6a342a5b4c0bbf24de3cc691f1bdced75574
This utility for Linux utilities a bug in Window's SMB implementation to crash file sharing. It works against Windows NT 4.0, Windows XP, and Windows 2000. Author has requested that anyone using this only use it for educational purposes and that any further research performed with this code be shared with them.
ee35b7a2b8ac003079d9c4d2c619682f61cf597ad8f17480da3f99c1a59da2f8
Blowdoor is a backdoor for unix systems using md5sum passwords.
84a75efd14773526c9de2d18b1b8488260ab9e28b2b53d9db1bc0d2a922a48a3
NSSI advisory NSSI-2002-keriopfw - The Kerio Personal Firewall 2.x.x firewall can be made to crash if flooded with SYN packets. Tested under Win2k Advance Server with SP3 and WinNT 4.0 with SP6a.
aa968e38233d82058a014061b76600a85e6043ca2aefb3216aa52b804db85ea7
A denial of service vulnerability found in the Belkin F5D6130 802.11b AP allows remote users to disable this device.
eed3847e3ffbf5fa0484d6205df47b02f5bc57956d89bbf33bd5d456c5266aa9
Debian Security Advisory 158-1 - Gaim uses URL's retrieved from message in command-line execution of the web browser without filtering these URL's first. This issue has been fixed by the Gaim developers in version 0.59.1.
66b12a671c25396e8466f1c03363e0e7c5f9a9c557b48eaf6752ba720e384559
Smokingtwojoints.c logs the contents of inbound and outbound telnet and ssh sessions via ptrace. Takes as input a PID or fd to be watched.
bc1de9a3feb0db8ee16c0099b598a1dd63a3559363b6910433b2c550f8d6d9e3
Arp-sk is an ARP packet generator for Unix designed to illustrate ARP protocol flaws and applications such as ARP cache poisoning and MAC spoofing. It gives complete control of link and network level data. See arp-sk.org for further information.
bd0b28f03cfe68cc4a98700d4f1ed47e8ecac6cc16fd17b73a9ebbd997ba11e6
The Stealth Kernel Patch for Linux v2.2.20 makes the linux kernel discard the packets that many OS detection tools use to query the TCP/IP stack. Includes logging of the dropped query packets and packets with bogus flags. Does a very good job of confusing nmap and queso.
c5848d9fd5af0164aee0fca477ec5c21e39ce2cade88a6e50fd1b459e1b2bfa5
The Stealth Kernel Patch for Linux v2.2.21 makes the linux kernel discard the packets that many OS detection tools use to query the TCP/IP stack. Includes logging of the dropped query packets and packets with bogus flags. Does a very good job of confusing nmap and queso.
99738a62126c4165132bf7eefd3fe9cfe6759da6566671e53723ef5e13215b2f
Stealth.c is a Linux 2.2.x kernel module which discards packets that many OS detection tools use to query the TCP/IP stack. Includes logging of the dropped query packets and packets with bogus flags.
617372d951b886ece66db028d0d134637d1a62f13ff55eb4e94be19b042ea7a4
ECrack v1.0 - Energymech (StarGlider Class - IRC bot) brute force password cracker. Tested with emech-2.99.65 but should work with other versions also.
6a6306078b8ec81f2f6aeac1743765e0efc9a5f9f11bbb112fe6a22cac4160db
Burncrack is a burneye cryptographic layer 1 & 2 cracker which can work together with john the ripper for password generation. It can crack and unwrap burneye layer 1 and layer 2 protected binaries without having to run them, on both windows (Cygwin) and linux platforms.
4bd45ab82150e82102a11bddd896f81fc3cb82859ae990319935b62731410e09
SMBdie is a proof of concept tool which crashes Windows machines with Netbios enabled by sending a specially crafted SMB request. Tested against Windows NT/2k/XP/.NET RC1.
5b21793e665c14f40e6ca342af31b249f2d4e215b15cdc697564836471942749
Local proof of concept exploit for the gdam123 software package. Exploits an unchecked buffer in filename option.
79b4ed49fba81c1e9bbe29fb3aacdd661eeb60bcd533162c9e334f350afee027
This file is a brief overview of the field of advanced COMSEC pertaining specifically to data communications. COMSEC is technical jargon for those in the field of security, and it is an acronym for COMmunications SECurity.
4fa0747b7347da4d9b2e50fd59fcfd8f03a7e1a13fcbdc95af118d67247312ff
From the U.S. Code Online via GPO Access [wais.access.gpo.gov] [Laws in effect as of January 16, 1996] [Document not affected by Public Laws enacted between January 16, 1996 and August 28, 1996] [CITE: 50USC] TITLE 50--WAR AND NATIONAL DEFENSE CHAPTER 36--FOREIGN INTELLIGENCE SURVEILLANCE SUBCHAPTER I--ELECTRONIC SURVEILLANCE
5d452d53f046ea9c03545ac70b1b048485b560b6a3abbcc89b42f88868588217
This article deals with the field of surveillance. In this article the author performs a product review of the various General Purpose Amplifiers, whos purpose will be discussed below. The intent of this article is to make you aware of the various models of such units from different manufacturers as well as the prices of such units. In addition, each unit will be reviewd for quality and usefullness.
55ae0f7abecbbb6cfbb2dde2210018715288eb0782296379f39b68de6f78c0f1