TinyCA is a simple GUI written in Perl-Gtk to manage a small certification authority. It works as a frontend to OpenSSL. TinyCA lets you manage x509 certificates. It is possible to export data in PEM or DER format for use with servers, as PKCS#12 for use with clients, or as S/MIME certificates for use with email programs. It is also possible to import your own PKCS#10 requests and generate certificates from them. It also lets you create and manage SubCAs for more complex setups. The most important certificate extensions can be configured with the graphical frontend. English and German translations are included.
fe49c691f79f747d47f72928f0c997052b351423da98535f5d47eee93ab51541
DansGuardian is a web content filter which currently runs on Linux, FreeBSD, OpenBSD and Solaris. It filters the actual content of pages based on many methods including phrase matching, PICS filtering and URL filtering. It does not purely filter based on a banned list of sites like lesser totally commercial filters. DansGuardian is designed to be completely flexible and allows you to tailor the filtering to your exact needs. It can be as Draconian or as un-obstructive as you want.
68d6c5b54144545ce4476094a6edc8fe2895d3d32f5e81003a12172ac78ec514
NessusWC provides a simple HTTP Web interface to the Nessus Security Scanner. It connects to local or remote Nessus version 2 daemons via SSL (using OpenSSL libraries), retrieves the plugins, configures a scan for a single target host, and saves the results in HTML format. As a result, even users with limited security knowledge can scan their machines. Scan results are stored in a central place.
876204631ce2a9e265fc47906f66160223d19cf9c9f199f53f55654a13ef5143
Brief paper discussing the basics of cryptography and the difference between symmetric and asymmetric cryptography.
93735bfd1dfecd82ceb55801288ec1b11f69cb6aa350d743d7867aee56f469d7
ndisc consists or two small command line tools (ndisc and rdisc) that perform ICMPv6 Neighbor Discovery and ICMPv6 Router Discovery respectively. It is primarily meant for IPv6 networking diagnostics or to detect rogue IPv6 nodes or routers on an Ethernet segment.
ec890edb79c0fd6ed2b082b522ce5bf0e6dae7943a7427513043a32d772ee93a
Ciphire Mail is an email encryption tool. It works in conjunction with your existing email client. It operates seamlessly in the background and does not interfere with normal email routines. It encrypts and decrypts email messages, and can digitally sign each message to provide authentication and guard against identity theft. It resides on your computer, between your email client and your email server, transparently encrypting/decrypting and digitally signing your email communication. It is compatible with all email clients using standard SMTP, POP3, or IMAP4 (including SSL/TLS variants and STARTTLS support). It is free for consumers, non-profit organizations, and the press. Mac version.
9efa4e7079dde58189208c3542a5ed60b0884d6055c1e1ba39fa44404a61465d
Ciphire Mail is an email encryption tool. It works in conjunction with your existing email client. It operates seamlessly in the background and does not interfere with normal email routines. It encrypts and decrypts email messages, and can digitally sign each message to provide authentication and guard against identity theft. It resides on your computer, between your email client and your email server, transparently encrypting/decrypting and digitally signing your email communication. It is compatible with all email clients using standard SMTP, POP3, or IMAP4 (including SSL/TLS variants and STARTTLS support). It is free for consumers, non-profit organizations, and the press. Linux version.
b052e5db286872389b0dbb9f110eee93d125556048ec19dcbdc099584e2bf104
Ciphire Mail is an email encryption tool. It works in conjunction with your existing email client. It operates seamlessly in the background and does not interfere with normal email routines. It encrypts and decrypts email messages, and can digitally sign each message to provide authentication and guard against identity theft. It resides on your computer, between your email client and your email server, transparently encrypting/decrypting and digitally signing your email communication. It is compatible with all email clients using standard SMTP, POP3, or IMAP4 (including SSL/TLS variants and STARTTLS support). It is free for consumers, non-profit organizations, and the press. Windows version.
2ba8a92a314d55b2da10779661b9c8ab487be5c3cf4e05a960b0d47126e7affc
wu-ftpd versions 2.6.2 and below file globbing denial of service exploit.
aef936eb0d14e525d6b2d01ab0a0e40e28fbaf9287e89142dcf8c7c027d47f62
Remote pluginmode command execution exploit for AWStats versions 5.7 through 6.2.
a82a72fd891c5a191c588719e00bd1107ef2daed56cb475e9bf979f5be6ae538
Avaya IP Office Phone Manager exploit that attempts to extract sensitive data from the Windows registry.
ff0a4079c402c4cf0790dcb6c7d725ce9160fd962b77a2c52670e8f2f6179804
AWStats versions 5.7 to 6.4 have a path disclosure flaw.
1f9e81c350624ec631794b3dafaf016be3236f2fb18f204f9f53ba37135d3ca0
Proof of concept DNS smurfing utility.
899e8c41cffc89940458b4266f87b49c0e72c274e518a29fad61e100586d7c05
WebConnect remote exploit that makes use of a directory traversal vulnerability in versions 6.4.4 and 6.5.
2d547bdd62b6ceb8e18c55857e4b388aefd9f219e6a9f3609806e27395367f24
Secunia Security Advisory - A vulnerability has been reported in Hardware Management Console (HMC), which can be exploited by malicious, local users to perform certain actions on a vulnerable system with escalated privileges.
2a34837660ef281b3aa119fd04bba7ba8cc77e02c9e373bb520c0345bc279f9e
Secunia Security Advisory - A vulnerability has been reported in ginp, which can be exploited by malicious people to gain knowledge of sensitive information.
dc74ad68ea02eca41852621bb672607d6fa0ec73cb8138e25d23ccac91dc4356
Microsoft Office 10 applications and flashdrives can be used to browse restricted drives. To resolve this problem, obtain Microsoft Office Service Pack 3 or later.
b38163c420b99062850d56410708ae80be7a1f41e63e61b29c8946e5d82ddf17
Gentoo Linux Security Advisory GLSA 200502-29 - The Cyrus IMAP Server is affected by several overflow vulnerabilities which could potentially lead to the remote execution of arbitrary code. Versions below 2.2.12 are affected.
07283ccfa639fcaecf43fdeec36548b5bef25b8c1101248674274d545658dea2
MercuryBoard versions 1.1.1 and below blind bruteforcing utility.
9307293808acfc5d6acbad4a8cf847e983e65d2873bd5677a0007b73ca90bd40
WWW File Share Pro version 2.72 local exploit that discloses passwords.
81eaeb644c226a7688b86697632cd0330ffd01eabac0e89cc20d8c0a47bf8a32
Chat Anywhere version 2.72a local exploit that discloses passwords.
eccaa791eb33b884cb920670795cbca9584e20bf600e2d9f825f3beea963b7f9
SendLink version 1.5 local exploit that discloses passwords.
37e5ea50633ffc6f0e2798bfeaa612f1e2eacae8a144ea3f98370b29c3a636db
eXeem version 0.21 local exploit that discloses passwords for proxy settings.
e3a6ae0ffe766a9ec580e9b32d00e00cbf99b913d2bf2c743ce35d446a4a6729
MacSpoof DB is a database of MAC prefixes for spoofing your MAC address in Linux. Ideal for in war driving situations. It comes with 7500+ available MAC prefixes, the ability to search and sort by company name or MAC prefix, and an option to pick from the results at random. It then sets the MAC accordingly.
8d79f3a75df1d686e439da6062aa189f03c401828f5ed93eee369aaa8318c36a
The Avaya IP Office Phone Manager stores sensitive user data in the Windows Registry.
a8ef610343d5e19f8fd31dbe3ee860e5f5b3f1434a04a7af1d434055215974f5