FireHOL a simple yet powerful way to configure stateful iptables firewalls. It can be used for almost any purpose, including control of any number of internal/external/virtual interfaces, control of any combination of routed traffic, setting up DMZ routers and servers, and all kinds of NAT. It provides strong protection (flooding, spoofing, etc.), transparent caches, source MAC verification, blacklists, whitelists, and more. Its goal is to be completely abstracted and powerful but also easy to use, audit, and understand.
9bf6cfa2765f05571a2301f0e9cef9e1c13cab4281f2ed0396e6cbf0d374b83d
Honeytrap is a network security tool written to observe attacks against TCP services. As a low-interactive honeypot, it collects information regarding known or unknown network-based attacks and thus can provide early-warning information. The daemon monitors the network stream for incoming connections and dynamically starts server processes if it detects a request to an unbound port. Honeytrap can also be set up as a meta honeypot that forwards several attacks to other systems or, in mirror mode, redirects a connection back to the initiator. Several plugins are available for automated attack analysis.
30c5a5de71a068c6cd236063b57173bb15fa8e0408ee74e0eb080ccf00a41cdc
LeadTools Raster variant remote file overwrite exploit.
19ddae12e8d896f3cad71594b0c414bb26ca7413039dac580f3a6d50f71bc328
Ol Bookmarks Manager version 0.7.4 suffers from a remote SQL injection vulnerability.
c3c538bab37e275b2bf73188916fa35f71b99a7bc75dd5472e50cde460ca2e63
TutorialCMS versions 1.01 and below suffer from an authentication bypass vulnerability.
a07951fc5266415f66cf3c33cea26d50d130ac95fb053f6081b110e3670cc2b3
Ol Bookmarks Manager version 0.7.4 suffers from multiple remote file inclusion vulnerabilities.
c2e02bba9562b20fc0f2c4746e45893102054dee2bb9c77292c7f5df0082a2de
Wordpress version 2.1.3 suffers from a blind SQL injection vulnerability in admin-ajax.php.
10c405189b522f3fdc50b8f1ca2a00587c6d7ee520495bc6b430efd405303e66
Microsoft IIS 6.0 /AUX/.aspx remote denial of service exploit.
befbaf311c1be1ef98f6433ed95ff3daee31ee10c817e56192b648bb3118e662
Whitepaper titled Cross Site Request Forgery: The Sea Surf.
5f2993a62fbb64d5422e96ba9b08bcc4be5bff77401acc7bef23bc85e71da389
This program can send spoofed UDP packets with a user specified data, source and destination port. For Windows XP versions prior to SP2. Includes Delphi source code.
bd4242c6c7bce4fc24809fa15081e36d14cdf2202cab3d216c8c38a3bc162b6d
Syn flooder for Windows XP versions prior to SP2. Includes Delphi source code.
08371b9ac880c3b02c72fbf7f7253ca3d95197f177fbec9238468e3601f9816d
UDP Flooder for Windows 95 and above. It can send udp packets with a user specified data, source and destination port. Includes Delphi source code.
bd346a39aaf24f9e828d6fbd7d3529e7f49eea2dc33ef9234a102b9abcf13044
WindowsRAT is a small sized dos shell for windows. Just execute the exe on remote computer and connect it with telnet.
95079a022e0447fadfa904018f9e8e3335ef5426189f856ce83cefbd3afef6bb
Smurf for Windows XP takes advantage of networks without broadcast address filtering to flood a remote host with lots of ICMP traffic. For Windows XP versions prior to SP2. Includes Delphi source code.
9aa5e2899788c6de2159246f9c7eea9b411aca4db98e5b706b38048695ce386d
This program is a spoofed IRC nuker. For Windows XP versions prior to SP2. Includes Delphi source.
cf4598606e7ec6528ad48e13aef00e638ef552f8af6f0c873a337e75a2f7c03f
An ICMP Type 8 (ping) flooder for Windows 95 and above. Includes Delphi source code.
4eeee02e8f122c7a16100f6fde75cfc7e18ec63370facb7f56928c7759395071
Kiss of Death denial of service attack. Only works on Windows XP prior to SP2. Includes Delphi source code.
bd51e7f7f622a7c28cc58dff4607981e7d04d4dae47555fcdc2bfa4883366c32
This program is the port of jolt2 attack to Windows XP for versions prior to SP2. Includes Delphi source code.
fab47a4257313739a2c082a7ac1a8cf4d019cad352005ac19e177b6176cbf218
This program sends oversized IGMP packets. This causes bluescreens and crashes Windows 98 boxes. Works with winsock2 (Windows 98 and above). Includes Delphi source code.
d1a245a1aeda797aab17e60c4907a711e66273f790fe5d8bf1a134c5db7030d4
This program is the port of bonk attack to Windows XP versions prior to SP2. Includes Delphi source code.
7a4bdb9008edfd098eca1bca2c37bde4eef7ae3dd1271967030ba4a7e8face0f
Sends an icmp echo request including +++ATH0 string in its ICMP data. This data resets vulnerable modems if victim replies the request. Only works on Windows XP prior to SP2. Includes Delphi source code.
292e5a0f49bc5fa0f5224e5e7ade8b35988d806db25ed0868b2f54bc5ed760c9
Ubuntu Security Notice 436-2 - USN-436-1 fixed a vulnerability in KTorrent. The original fix for path traversal was incomplete, allowing for alternate vectors of attack. Bryan Burns of Juniper Networks discovered that KTorrent did not correctly validate the destination file paths nor the HAVE statements sent by torrent peers. A malicious remote peer could send specially crafted messages to overwrite files or execute arbitrary code with user privileges.
9639d94610747e9a97954734b5c101e1362174b07ea0275b2e5704d1ab214c07
VMware Security Advisory - Multiple denial of service issues along with a directory traversal vulnerability has been fixed.
a678b12e0b8ba30554e0498fe1d9269a513afd99bd97dd8c32508c86d25ff94e
rewterz has discovered a critical vulnerability in Hidden Administrator. This vulnerability allows a remote attacker to execute arbitrary code in the context of the user who executed Hidden Administrator. Versions 1.7 and below are affected.
526e6ff2a121cacdb5f197605ddc3c3c999ac066ac8b15c49da5c127dc47f66a
ACROS Security Problem Report #2007-05-14-1 - There is a session fixation vulnerability in HP Systems Insight Manager 4.2 and 5.0 SP4/5 (IM) that allows an attacker to gain administrative access to IM console. As a result, the attacker can take complete administrative control over all managed systems, upload and execute malicious code on them, extract any information from them and disable them at her will.
d39d5adb853db233faf38cc0069a7c6e5065e71f431d97ee7d5b6666e9216a87