The Attack Tool Kit (ATK) is an open-source utility to perform vulnerability checks and enhance security audits. The most important changes in ATK 3.0 are the introduction of a dedicated exploiting routine and the Plugin AutoUpdate (over HTTP). Check the website for more details. Binary version.
fff78b654c27955434f6b2c513880a3a88ef5fdf1aa10a4ba630fa3f163f1362
Although one of the features of Google Desktop Search is to archive web history in its index for future searching, unchecking the preference to archive Web History and saving the preference does not clear the web history from the index.
d6ac298483d170e897ea9fdc64c9e41824b213b20b76a5907a327dc8094dc5a7
This is a simple tool that searches for the central and local headers contained in a zip file and alters the uncompressed data variable to be 0 in an attempt to trick anti-virus software into not scanning the files inside the zip file.
89007618a7cc506d601e2523249eba67ce6ad4d3cc000482f70f5e18ab449a0d
TheFaceBook is susceptible to multiple cross site scripting flaws.
e8602f6f087e56db508594ec635b29de6aac55141c8f005ff868b24087ef3a19
Eudora 6.2.14 for Windows that was just released is still susceptible to an attachment spoofing vulnerability. Working exploit included.
40feffee7423a8d9403bc9b62c864111246e0808bd8068c7ab5f09b183a516b9
Remote exploit for the IPSwitch-IMail 8.13 stack overflow in the DELETE command. Successful exploitation binds a shell to port 4444.
34486ab358c7f8793e3c20cec33de6a9c6baf7c1e07b04a872a23d2c482b2059