FLoP is utility designed to gather alerts with a payload from distributed Snort sensors at a central server, and to store them in a database. Both PostgreSQL and MySQL are currently supported. High priority alerts may be sent out via e-mail.
04994cfedd9e83f32136db04988decc0e80f2c11ced7ef66a846e4c138e85dc6
radmind is a suite of Unix command-line tools and a server designed to remotely administer the file systems of multiple Unix machines. Radmind operates as a tripwire which is able to detect changes to any managed filesystem object, e.g. files, directories, links, etc. However, radmind goes further than just integrity checking: once a change is detected, radmind can optionally reverse the change.
f202fe183b2c5a42955ee993c7ed88cff4f52529593fc81cd5a3efa2390f5b26
Mambo OS versions 4.5 and 4.6 exploit written in PHP that insets an administrator user into the database.
a2fc44f4482fa74b878d0564d7eb95973e10a36108e84d5af22116e7d3d80daa
This program will reset a TCP connection by guessing a valid sequence number.
ee4592a7693f13a974fc60191dc03c2bacb52cac2c5e420b304e87f7d2855c73
NISCC Vulnerability Advisory 236929 - Vulnerability Issues in TCP. The vulnerability described in this advisory affects implementations of the Transmission Control Protocol (TCP) that comply with the Internet Engineering Task Force's
df3df0b689c29353e8bb99088ce42074ae415df606a7e58c98c4815661db4b6b
THC SSH Cracker is a simple utility that attempts to crack SSH private keys via brute force.
a0ff99a6a4f85e878a138316507d66933b2b5769f4579fa1576aa605bf13d1e2
lnx_reboot version 2 - 59 Byte reboot Opcode array.
e5dcf87114d61374126ac5f7b69c85049853adfc074046fc7cc91babdf726e56
When opening a malicious MRL in any xine-lib or xine-ui based media player, an attacker can write arbitrary content to an arbitrary file, only restricted by the permissions of the user running the application.
fce37c6c031d3dd1020967e99ac804e22be18eb589ad4043485504871ff9ba5a
Columbo is a simple perl script that performs horizontal scanning for information gathering. It scans a range of machines for a specific port and then runs the given command against matching machines. Includes a batch mode with config file for multiple, parallel tests. Takes the repetition out of testing.
b906f7a3fb1cafcc45ff50e1c77da1c14e07bbae91afae808db2c209555252c1
A shellcode that automatically obtains the highest available uid to setuid().
4992fdaec9c45eea8c9813a40f77d568c2c61c9efef684ef291db214b197d926
Smart shellcode which prompts the user for the uid to setuid() with.
ad5249bda8d4fde51167d66b3b19ab600597794ec067f9bc632a8aaef4535f83
Secunia Security Advisory SA11431 - Journalness versions below 3.0.8 suffer from a vulnerability that can be exploited by invalid users to create and edit posts.
ba21156081726f8ce227d282d958d178e2194e0cd3d7e487a45b91f1267ea004
Technical Cyber Security Alert TA04-111B - There is a vulnerability in Cisco's Internetwork Operating System (IOS) SNMP service. When vulnerable Cisco routers or switches process specific SNMP requests, the system may reboot. If repeatedly exploited, this vulnerability could result in a sustained denial of service (DoS).
3fed4b1233387104fb4e7e1bcf2dc6aba32e42412482673afff6ef774107c8b3
Honeyd is a small daemon that creates virtual honey pot hosts on a network. The hosts can be configured to run arbitrary services, and their TCP personality can be adapted so that they appear to be running certain versions of operating systems. Any type of service on the virtual machine can be simulated according to a simple configuration file. Instead of simulating a service, it is also possible to proxy it to another machine.
7d774533010e55a38825fb6cd571a33808e83c5d6691f10ee26527fd93b97646
SID is a Shell Intrusion Detection system. The kernel part plugs into a terminal-processing subsystem and logs hashed terminal lines. The user part reads log entries (hashes), consults a list of allowed entries, and takes appropriate action upon unexpected log entries. Currently supported are Solaris and Linux.
171f0659442c5f4b2c3add675ca0fb1fed6c5140f661990d020b34e8775b61f4
JPEG Rescue is a small program used to search a formatted/wiped filesystem for JPEG files and extracts them. Designed to work with Compact Flash cards.
802d96933d5b0b04de56f8b7429a033f7d15c6374370b066c22ead634e9f1de1
The Linux Intrusion Detection System (LIDS) is a patch which enhances the kernel's security by implementing a reference monitor and Mandatory Access Control (MAC). When it is in effect, chosen file access, all system/network administration operations, any capability use, raw device, memory, and I/O access can be made impossible even for root. You can define which programs may access specific files. It uses and extends the system capabilities bounding set to control the whole system and adds some network and filesystem security features to the kernel to enhance the security. You can finely tune the security protections online, hide sensitive processes, receive security alerts through the network, and more.
e025e71556bd167fa5f567b20af24a34eb59dcaf730c8e180f0c41520490d2ca
Local root exploit for Squirrelmail's chpasswd utility. Tested on Suse 9. Original bug found by Matias Neiff.
2b92773c507dec11bb83386fb30b5c4db547be150a75c00aec35583c53feee1b
XFree version 4.3.x local root exploit that makes use of the vulnerability that exists in the use of the CopyISOLatin1Lowered() function with the 'font_name' buffer.
5f80619f3d14965d61bcf967f0b26ae2e5d1de37280e8076979c4872b7760af0
Linux kernel versions 2.4.22 through 2.4.25 and 2.6.1 through 2.6.3 have an integer overflow in setsockopt MCAST_MSFILTER. Proper exploitation of this vulnerability can lead to privilege escalation.
836369aad1ed778a870f252f0733e83e6fb921672b010265395c6bb0c30ddc9d
Quick and dirty hack to grab the versions from ISC bind 8 and 9 nameservers.
d1a49379069a489d6405a914d21fcb59edfd323ab4351efa3f15397dc1398ba1
A small, but very useful SMB OS-detection tool which gets workgroup, smbserver and operating system. It works for all tested samba versions on different platforms like Mac OSX, AIX, Solaris, Linux, BSD, and all Microsoft Windows platforms.
15e66dd0f9ffc8a4ba1ade94a6b6fa5ed858378503b48dd688db6c38623db32a
Eudora 6.1 still has attachment spoofing flaws along with a Nested MIME DoS vulnerability.
d3024ea6787aa72ecd301f863e452c672b83f691a325455dd8c7f5b291042e9a
Sniff formats hex packets from tcpdump and converts them to ASCII to make them easier to read and understand. Its features include colored console output, CSV file saving, and fully customizable output. The program directly accepts all tcpdump options, including parsing from packet files.
6b0dc26bcbe381e5af17036db35817ec657408fc3b4f9b8aa40a9ecdfd22c7ad
CCTDE is designed as an analysis backend for the Snort NIDS tool and focuses on providing a way to register and disclose information leading to the detection of unauthorized tunnels and covert channels.
0d547e754b02df848f6c4d655587f1f6450a799b688c2490123a87451ca09372