exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 26 - 50 of 375 RSS Feed

Files Date: 2005-02-01 to 2005-02-28

tinyca-0.6.8.tar.gz
Posted Feb 26, 2005
Authored by Stephan Martin | Site tinyca.sm-zone.net

TinyCA is a simple GUI written in Perl-Gtk to manage a small certification authority. It works as a frontend to OpenSSL. TinyCA lets you manage x509 certificates. It is possible to export data in PEM or DER format for use with servers, as PKCS#12 for use with clients, or as S/MIME certificates for use with email programs. It is also possible to import your own PKCS#10 requests and generate certificates from them. It also lets you create and manage SubCAs for more complex setups. The most important certificate extensions can be configured with the graphical frontend. English and German translations are included.

Changes: Added OpenSSL 0.9.8 detection among other additions.
tags | perl, encryption
SHA-256 | fe49c691f79f747d47f72928f0c997052b351423da98535f5d47eee93ab51541
dansguardian-2.8.0.4.source.tar.gz
Posted Feb 26, 2005
Site dansguardian.org

DansGuardian is a web content filter which currently runs on Linux, FreeBSD, OpenBSD and Solaris. It filters the actual content of pages based on many methods including phrase matching, PICS filtering and URL filtering. It does not purely filter based on a banned list of sites like lesser totally commercial filters. DansGuardian is designed to be completely flexible and allows you to tailor the filtering to your exact needs. It can be as Draconian or as un-obstructive as you want.

Changes: Corrections to Brazillian messages in Portuguese. Updates to Lithuanian messages. Updates to INSTALL file to stop confusing debian users. Fixed libz problem in Makefile for OSX. Various other fixes.
tags | web
systems | linux, solaris, freebsd, openbsd
SHA-256 | 68d6c5b54144545ce4476094a6edc8fe2895d3d32f5e81003a12172ac78ec514
nessuswc-v1.1.tar.gz
Posted Feb 26, 2005
Authored by Frank4DD | Site frank4dd.com

NessusWC provides a simple HTTP Web interface to the Nessus Security Scanner. It connects to local or remote Nessus version 2 daemons via SSL (using OpenSSL libraries), retrieves the plugins, configures a scan for a single target host, and saves the results in HTML format. As a result, even users with limited security knowledge can scan their machines. Scan results are stored in a central place.

tags | tool, remote, web, local, scanner
systems | unix
SHA-256 | 876204631ce2a9e265fc47906f66160223d19cf9c9f199f53f55654a13ef5143
Brief_intro_to_crypt.pdf
Posted Feb 26, 2005
Authored by PAgVac

Brief paper discussing the basics of cryptography and the difference between symmetric and asymmetric cryptography.

tags | paper
SHA-256 | 93735bfd1dfecd82ceb55801288ec1b11f69cb6aa350d743d7867aee56f469d7
ndisc-0.1.0.tar.bz2
Posted Feb 26, 2005
Authored by Remi Denis-Courmont | Site people.via.ecp.fr

ndisc consists or two small command line tools (ndisc and rdisc) that perform ICMPv6 Neighbor Discovery and ICMPv6 Router Discovery respectively. It is primarily meant for IPv6 networking diagnostics or to detect rogue IPv6 nodes or routers on an Ethernet segment.

tags | tool, scanner
systems | unix
SHA-256 | ec890edb79c0fd6ed2b082b522ce5bf0e6dae7943a7427513043a32d772ee93a
ciphire-mail-0.11.11-osx-ppc.dmg
Posted Feb 26, 2005
Site ciphire.com

Ciphire Mail is an email encryption tool. It works in conjunction with your existing email client. It operates seamlessly in the background and does not interfere with normal email routines. It encrypts and decrypts email messages, and can digitally sign each message to provide authentication and guard against identity theft. It resides on your computer, between your email client and your email server, transparently encrypting/decrypting and digitally signing your email communication. It is compatible with all email clients using standard SMTP, POP3, or IMAP4 (including SSL/TLS variants and STARTTLS support). It is free for consumers, non-profit organizations, and the press. Mac version.

Changes: Improved installer, various other fixes.
tags | encryption
SHA-256 | 9efa4e7079dde58189208c3542a5ed60b0884d6055c1e1ba39fa44404a61465d
ciphire-mail-0.11.6-linux-i686.tar.gz
Posted Feb 26, 2005
Site ciphire.com

Ciphire Mail is an email encryption tool. It works in conjunction with your existing email client. It operates seamlessly in the background and does not interfere with normal email routines. It encrypts and decrypts email messages, and can digitally sign each message to provide authentication and guard against identity theft. It resides on your computer, between your email client and your email server, transparently encrypting/decrypting and digitally signing your email communication. It is compatible with all email clients using standard SMTP, POP3, or IMAP4 (including SSL/TLS variants and STARTTLS support). It is free for consumers, non-profit organizations, and the press. Linux version.

Changes: Fixed smart system mail handling, integrity check only runs during updates.
tags | encryption
systems | linux
SHA-256 | b052e5db286872389b0dbb9f110eee93d125556048ec19dcbdc099584e2bf104
ciphire-mail-0.11.6.exe
Posted Feb 26, 2005
Site ciphire.com

Ciphire Mail is an email encryption tool. It works in conjunction with your existing email client. It operates seamlessly in the background and does not interfere with normal email routines. It encrypts and decrypts email messages, and can digitally sign each message to provide authentication and guard against identity theft. It resides on your computer, between your email client and your email server, transparently encrypting/decrypting and digitally signing your email communication. It is compatible with all email clients using standard SMTP, POP3, or IMAP4 (including SSL/TLS variants and STARTTLS support). It is free for consumers, non-profit organizations, and the press. Windows version.

Changes: Fixed smart system mail handling, integrity check only runs during updates.
tags | encryption
systems | windows
SHA-256 | 2ba8a92a314d55b2da10779661b9c8ab487be5c3cf4e05a960b0d47126e7affc
wuftpd262DoS.c
Posted Feb 26, 2005
Authored by str0ke | Site milw0rm.com

wu-ftpd versions 2.6.2 and below file globbing denial of service exploit.

tags | exploit, denial of service
SHA-256 | aef936eb0d14e525d6b2d01ab0a0e40e28fbaf9287e89142dcf8c7c027d47f62
sileAWSxpl_v5.7-6.2.c
Posted Feb 26, 2005
Authored by Silentium | Site autistici.org

Remote pluginmode command execution exploit for AWStats versions 5.7 through 6.2.

tags | exploit, remote
SHA-256 | a82a72fd891c5a191c588719e00bd1107ef2daed56cb475e9bf979f5be6ae538
avaya.cpp
Posted Feb 26, 2005
Authored by PAgVac

Avaya IP Office Phone Manager exploit that attempts to extract sensitive data from the Windows registry.

tags | exploit, registry
systems | windows
SHA-256 | ff0a4079c402c4cf0790dcb6c7d725ce9160fd962b77a2c52670e8f2f6179804
sile001adv.txt
Posted Feb 26, 2005
Authored by Silentium | Site autistici.org

AWStats versions 5.7 to 6.4 have a path disclosure flaw.

tags | advisory
SHA-256 | 1f9e81c350624ec631794b3dafaf016be3236f2fb18f204f9f53ba37135d3ca0
dnssmurf.c
Posted Feb 26, 2005
Authored by topolb

Proof of concept DNS smurfing utility.

tags | denial of service, proof of concept
SHA-256 | 899e8c41cffc89940458b4266f87b49c0e72c274e518a29fad61e100586d7c05
webconnect.pl
Posted Feb 26, 2005
Authored by KarakOrsan

WebConnect remote exploit that makes use of a directory traversal vulnerability in versions 6.4.4 and 6.5.

tags | exploit, remote
SHA-256 | 2d547bdd62b6ceb8e18c55857e4b388aefd9f219e6a9f3609806e27395367f24
Secunia Security Advisory 14377
Posted Feb 26, 2005
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in Hardware Management Console (HMC), which can be exploited by malicious, local users to perform certain actions on a vulnerable system with escalated privileges.

tags | advisory, local
SHA-256 | 2a34837660ef281b3aa119fd04bba7ba8cc77e02c9e373bb520c0345bc279f9e
Secunia Security Advisory 14373
Posted Feb 26, 2005
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in ginp, which can be exploited by malicious people to gain knowledge of sensitive information.

tags | advisory
SHA-256 | dc74ad68ea02eca41852621bb672607d6fa0ec73cb8138e25d23ccac91dc4356
officeRestrict.txt
Posted Feb 26, 2005
Authored by Sonny Discini

Microsoft Office 10 applications and flashdrives can be used to browse restricted drives. To resolve this problem, obtain Microsoft Office Service Pack 3 or later.

tags | advisory
SHA-256 | b38163c420b99062850d56410708ae80be7a1f41e63e61b29c8946e5d82ddf17
Gentoo Linux Security Advisory 200502-29
Posted Feb 26, 2005
Authored by Gentoo | Site security.gentoo.org

Gentoo Linux Security Advisory GLSA 200502-29 - The Cyrus IMAP Server is affected by several overflow vulnerabilities which could potentially lead to the remote execution of arbitrary code. Versions below 2.2.12 are affected.

tags | advisory, remote, overflow, arbitrary, vulnerability, imap
systems | linux, gentoo
SHA-256 | 07283ccfa639fcaecf43fdeec36548b5bef25b8c1101248674274d545658dea2
mb111-zk.txt
Posted Feb 26, 2005
Authored by Zeelock | Site codebug.org

MercuryBoard versions 1.1.1 and below blind bruteforcing utility.

tags | cracker
SHA-256 | 9307293808acfc5d6acbad4a8cf847e983e65d2873bd5677a0007b73ca90bd40
wwwfileshare.c
Posted Feb 26, 2005
Authored by Kozan | Site netmagister.com

WWW File Share Pro version 2.72 local exploit that discloses passwords.

tags | exploit, local
SHA-256 | 81eaeb644c226a7688b86697632cd0330ffd01eabac0e89cc20d8c0a47bf8a32
ChatAnywhere.c
Posted Feb 26, 2005
Authored by Kozan | Site netmagister.com

Chat Anywhere version 2.72a local exploit that discloses passwords.

tags | exploit, local
SHA-256 | eccaa791eb33b884cb920670795cbca9584e20bf600e2d9f825f3beea963b7f9
SendLink.c
Posted Feb 26, 2005
Authored by Kozan | Site netmagister.com

SendLink version 1.5 local exploit that discloses passwords.

tags | exploit, local
SHA-256 | 37e5ea50633ffc6f0e2798bfeaa612f1e2eacae8a144ea3f98370b29c3a636db
eXeem021.c
Posted Feb 26, 2005
Authored by Kozan | Site netmagister.com

eXeem version 0.21 local exploit that discloses passwords for proxy settings.

tags | exploit, local
SHA-256 | e3a6ae0ffe766a9ec580e9b32d00e00cbf99b913d2bf2c743ce35d446a4a6729
dbmac.tar.gz
Posted Feb 26, 2005
Authored by doctor raid

MacSpoof DB is a database of MAC prefixes for spoofing your MAC address in Linux. Ideal for in war driving situations. It comes with 7500+ available MAC prefixes, the ability to search and sort by company name or MAC prefix, and an option to pick from the results at random. It then sets the MAC accordingly.

tags | tool, spoof
systems | linux, unix
SHA-256 | 8d79f3a75df1d686e439da6062aa189f03c401828f5ed93eee369aaa8318c36a
AvayaData.txt
Posted Feb 26, 2005
Authored by PAgVac

The Avaya IP Office Phone Manager stores sensitive user data in the Windows Registry.

tags | advisory, registry
systems | windows
SHA-256 | a8ef610343d5e19f8fd31dbe3ee860e5f5b3f1434a04a7af1d434055215974f5
Page 2 of 15
Back12345Next

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    0 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    0 Files
  • 23
    Apr 23rd
    0 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close