what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 26 - 50 of 53 RSS Feed

Files Date: 2010-02-04 to 2010-02-05

scannedonly-0.18.tar.gz
Posted Feb 4, 2010
Authored by Olivier Sessink | Site olivier.sessink.nl

Scannedonly is a samba VFS module that ensures that only files that have been scanned for viruses are visible and accessible to the end user. Scannedonly was developed because of scalability problems with samba-vscan. Scannedonly comes in two parts: a Samba VFS module and (one or more) daemons. The daemon scans files and marks them when they are known to be clean. The samba module simply filters out files that aren't marked clean.

Changes: This release is a backport of the code that is now part of Samba 3.5. The Samba code was made compatible with Samba 3.2 and 3.4, and by popular demand, Samba 3.0 support has been reintroduced.
tags | tool, scanner
systems | unix
SHA-256 | 979d06d37500d4e3858f4d1b3d2799b0d9cf3efb21ac8cc55f9880affe5a10f4
scannedonly-0.17.tar.gz
Posted Feb 4, 2010
Authored by Olivier Sessink | Site olivier.sessink.nl

Scannedonly is a samba VFS module that ensures that only files that have been scanned for viruses are visible and accessible to the end user. Scannedonly was developed because of scalability problems with samba-vscan. Scannedonly comes in two parts: a Samba VFS module and (one or more) daemons. The daemon scans files and marks them when they are known to be clean. The samba module simply filters out files that aren't marked clean.

Changes: The loop that was fixed in the 0.16 release was not fixed for all cases. This release has a complete rewrite of the loop that should fix the problem in a much better way. This release furthermore fixes AIX compatibility in the VFS module.
tags | tool, scanner
systems | unix
SHA-256 | ab1f33946c0e78bebda526f23fce5d451f789c2b51f1e688e50553efe7ba0308
scannedonly-0.16.tar.gz
Posted Feb 4, 2010
Authored by Olivier Sessink | Site olivier.sessink.nl

Scannedonly is a samba VFS module that ensures that only files that have been scanned for viruses are visible and accessible to the end user. Scannedonly was developed because of scalability problems with samba-vscan. Scannedonly comes in two parts: a Samba VFS module and (one or more) daemons. The daemon scans files and marks them when they are known to be clean. The samba module simply filters out files that aren't marked clean.

Changes: This release fixes a bug in the excludepatterns option of the scanning daemon, and a bug in the VFS module if a directory was listed without read permissions. The logging was further improved.
tags | tool, scanner
systems | unix
SHA-256 | 36bbeb8e0dffd23614f18a8a84463792851de876f7b2ae15b8d506a7907457cb
iscanner-0.1.tar.gz
Posted Feb 4, 2010
Authored by iSecur1ty.org | Site iscanner.isecur1ty.org

iScanner is a free open source tool written in Ruby that lets you detect and remove malicious code from webpages.

tags | tool, scanner, ruby
systems | unix
SHA-256 | 5c2ba2e0c52d06d811138720df748ed834917cd1fbf4bef1a5045f9cc24e8c91
complemento-0.7.5.tar.gz
Posted Feb 4, 2010
Authored by crossbower | Site complemento.sourceforge.net

Complemento is a collection of tools for penetration testing. LetDown is a TCP flooder written after reading the Fyodor article "TCP Resource Exhaustion and Botched Disclosure". Reverse raider is a domain scanner that uses brute force wordlist scanning for finding a target's subdomains or reverse resolution for a range of IPs. Httsquash is an HTTP server scanner, banner grabber, and data retriever. It can be used for scanning large ranges of IPs for finding devices or HTTP servers.

Changes: Major updates were made in HTTSquash.
tags | tool, web, tcp, rootkit
systems | unix
SHA-256 | 09840216f79f048ced66d021350d64bdd15eac86f83998784c1b32849f4f1067
Nmap Port Scanner 5.20
Posted Feb 4, 2010
Authored by Fyodor | Site insecure.org

Nmap is a utility for port scanning large networks, although it works fine for single hosts. Sometimes you need speed, other times you may need stealth. In some cases, bypassing firewalls may be required. Not to mention the fact that you may want to scan different protocols (UDP, TCP, ICMP, etc.). Nmap supports Vanilla TCP connect() scanning, TCP SYN (half open) scanning, TCP FIN, Xmas, or NULL (stealth) scanning, TCP ftp proxy (bounce attack) scanning, SYN/FIN scanning using IP fragments (bypasses some packet filters), TCP ACK and Window scanning, UDP raw ICMP port unreachable scanning, ICMP scanning (ping-sweep), TCP Ping scanning, Direct (non portmapper) RPC scanning, Remote OS Identification by TCP/IP Fingerprinting, and Reverse-ident scanning. Nmap also supports a number of performance and reliability features such as dynamic delay time calculations, packet timeout and retransmission, parallel port scanning, detection of down hosts via parallel pings.

Changes: Dramatically improved the version detection database, integrating 2,596 submissions that users contributed since February 3, 2009! Added a new script, oracle-sid-brute, which queries the Oracle TNS-listener for default instance/sid names. Various other fixes and improvements.
tags | tool, remote, udp, tcp, protocol, nmap
systems | unix
SHA-256 | 74f8b9dfe62040241794568a98f216bf95b422ca73338dc8c6f7a0a1142e21f2
ncrack-0.01ALPHA.tar.gz
Posted Feb 4, 2010
Authored by Fyodor, ithilgore | Site nmap.org

Ncrack is a high-speed network authentication cracking tool. It was built to help companies secure their networks by proactively testing all their hosts and networking devices for poor passwords. Security professionals also rely on Ncrack when auditing their clients. Ncrack was designed using a modular approach, a command-line syntax similar to Nmap and a dynamic engine that can adapt its behaviour based on network feedback. It allows for rapid, yet reliable large-scale auditing of multiple hosts. Ncrack's features include a very flexible interface granting the user full control of network operations, allowing for very sophisticated bruteforcing attacks, timing templates for ease of use, runtime interaction similar to Nmap's and many more.

tags | tool, nmap
systems | unix
SHA-256 | bb866a0e826c88a1edb64bf5f9a3846846fb4b23202b08a26482f506f15de65f
synspam_0.3.5-1.tar.gz
Posted Feb 4, 2010
Authored by Julien Reveret

Synspam uses Netfilter NFQUEUE to catch the source IP address of any machine connecting to your mail server, running multiple tests against it possible, a scoring system is used. If the source IP address is believed to be a spammer IP address, the connection can be dropped. There is a dry run mode if you just want to test it, which is the default.

systems | unix
SHA-256 | 27e542f2ddf225f47fdac4dd9c479e242da6f6aac85b3eb404d320c22c5a429f
Nikto Web Scanner 2.1.1
Posted Feb 4, 2010
Authored by Sullo | Site cirt.net

Nikto is an Open Source web server scanner which performs comprehensive tests against web servers for multiple items, including over 3500 potentially dangerous files/CGIs, versions on over 900 servers, and version specific problems on over 250 servers.

Changes: Added about 2300 RFI tests from the combined RSnake/OSVDB list. Various fixes and changes.
tags | web, cgi
systems | unix
SHA-256 | a606665087342ace2ad2a3ce963e106b474fdff59f8f5c68b022799a74ebea82
sipwitch-0.6.2.tar.gz
Posted Feb 4, 2010
Authored by David Sugar | Site gnutelephony.org

GNU SIP Witch is a pure SIP-based office telephone call server that supports generic phone system features like call forwarding, hunt groups and call distribution, call coverage and ring groups, holding, and call transfer, as well as offering SIP specific capabilities such as presence and messaging. It supports secure telephone extensions for making calls over the Internet, and intercept/decrypt-free peer-to-peer audio and video extensions. It is not a SIP proxy, a multi-protocol telephone server, or an IP-PBX, and does not try to emulate Asterisk, FreeSWITCH, or Yate.

Changes: Use of default UUID-based SIP authentication realms when none is explicitly set. A new and more practical default config file with saner defaults. No generation of extension numbers for user accounts made into SIP accounts if not configured for extension numbering plans.
tags | telephony, protocol
SHA-256 | fa69d6f275cb27a0f5b4c9a77078300e6c4bee0b9d22f6d78a4470d05aef05a5
sipwitch-0.6.0.tar.gz
Posted Feb 4, 2010
Authored by David Sugar | Site gnutelephony.org

GNU SIP Witch is a pure SIP-based office telephone call server that supports generic phone system features like call forwarding, hunt groups and call distribution, call coverage and ring groups, holding, and call transfer, as well as offering SIP specific capabilities such as presence and messaging. It supports secure telephone extensions for making calls over the Internet, and intercept/decrypt-free peer-to-peer audio and video extensions. It is not a SIP proxy, a multi-protocol telephone server, or an IP-PBX, and does not try to emulate Asterisk, FreeSWITCH, or Yate.

Changes: This release focuses on development of GNU SIP Witch as a new kind of desktop VoIP service and includes integration of standard user accounts as sip users to enable one to more easily setup and deploy sipwitch with minimal configuration effort.
tags | telephony, protocol
SHA-256 | 1e1825520ac5562a841f753f15814b63efd9c0dbb1c45dd555487b221eadf537
sipwitch-0.5.13.tar.gz
Posted Feb 4, 2010
Authored by David Sugar | Site gnutelephony.org

GNU SIP Witch is a pure SIP-based office telephone call server that supports generic phone system features like call forwarding, hunt groups and call distribution, call coverage and ring groups, holding, and call transfer, as well as offering SIP specific capabilities such as presence and messaging. It supports secure telephone extensions for making calls over the Internet, and intercept/decrypt-free peer-to-peer audio and video extensions. It is not a SIP proxy, a multi-protocol telephone server, or an IP-PBX, and does not try to emulate Asterisk, FreeSWITCH, or Yate.

Changes: This release offers a change to fully externalize setting of the sipwitch SIP authentication realm for computing digests, and a new utility program, siprealm, to set or show the SIP realm. This change will be essential later when SIP digests are synchronized with user passwords through PAM.
tags | telephony, protocol
SHA-256 | f51a871514b3872bb73bbc852f63861969b35afb4a0c5b03dd656ddb6b900d20
TOR Virtual Network Tunneling Tool 0.2.1.22
Posted Feb 4, 2010
Authored by Roger Dingledine | Site tor.eff.org

Tor is a network of virtual tunnels that allows people and groups to improve their privacy and security on the Internet. It also enables software developers to create new communication tools with built-in privacy features. It provides the foundation for a range of applications that allow organizations and individuals to share information over public networks without compromising their privacy. Individuals can use it to keep remote Websites from tracking them and their family members. They can also use it to connect to resources such as news sites or instant messaging services that are blocked by their local Internet service providers (ISPs).

Changes: This release rotates two of the seven v3 directory authority keys and locations, due to a security breach of some of the Tor project servers. It also fixes a privacy problem in bridge directory authorities in which it would tell you its whole history of bridge descriptors if you made the right directory request.
tags | tool, remote, local, peer2peer
SHA-256 | bbf32ecba15cf70fe2fb3b0922131e68cd1fe8082d628750bf2c0c9a9e6a5134
pkd-1.6.tgz
Posted Feb 4, 2010
Authored by eric

ipt_pkd is an iptables extension implementing port knock detection. This project provides 3 parts: the kernel module ipt_pkd, the iptables user space module libipt_pkd.so, and a user space client knock program. For the knock packet, it uses a UDP packet sent to a random port that contains a SHA-256 of a timestamp, small header, random bytes, and a shared key. ipt_pkd checks the time window of the packet and does the SHA-256 to verify the packet. The shared key is never sent.

Changes: This version was updated for Linux 2.6.32 and iptables 1.4.6. A new knock client was added, which is written in C# and works on both Linux and Windows and encrypts configuration data. A pre-built kernel module, an iptables library for vyatta community edition 5, and a small install script for vyatta were added.
tags | tool, kernel, udp, firewall
systems | linux
SHA-256 | cb0827637a6bb50ffab21ff5346ad7b3c73133578d335ef26023647396683ad2
zzuf-0.13.tar.gz
Posted Feb 4, 2010
Authored by Sam Hocevar | Site sam.zoy.org

zzuf is a transparent application input fuzzer. It works by intercepting file operations and changing random bits in the program's input. zzuf's behavior is deterministic, making it easy to reproduce bugs.

Changes: Zzuf now supports OpenSolaris, and support for OS X and BSD was greatly improved. This release also adds network host filtering and a fully programmable debugging tool.
tags | fuzzer
SHA-256 | 4b155cf351dd40779ed2072e91577f2f88a44dcb2107b9f16f9f9db217bf3779
bf3.tar.gz
Posted Feb 4, 2010
Authored by Jeremy Brown | Site krakowlabs.com

Browser Fuzzer 3 (bf3) is a comprehensive web browser fuzzer that fuzzes CSS, DOM, HTML and JavaScript.

tags | web, javascript, fuzzer
SHA-256 | ab072a52f4342b6af64d4ce2b1a3e18aae40f2dd2bcb3ddffb4cd1711e4150d1
mobiusft-0.5.1.tar.gz
Posted Feb 4, 2010
Site savannah.nongnu.org

Mobius Forensic Toolkit is a forensic framework written in Python/GTK that manages cases and case items, providing an abstract interface for developing extensions. Cases and item categories are defined using XML files for easy integration with other tools.

Changes: The Datasource-EWF extension provides read support for EWF image files.
tags | tool, python, forensics
SHA-256 | f88c29afdb78da90c0cd611ec1f656bd37756b57093938ba9140cb7a9074f11c
malheur-0.4.6.tar.gz
Posted Feb 4, 2010
Authored by Konrad Rieck | Site mlsec.org

Malheur is a tool for automatic analysis of program behavior recorded from malicious software (malware). It is designed to support the regular analysis of malicious software and the development of detection and defense measures. It allows for identifying novel classes of malware with similar behavior and assigning unknown malware to discovered classes. It can be applied to recorded program behavior of various formats as long as monitored events are separated by delimiter symbols, e.g. as in reports generated by the popular malware sandboxes CWSandbox, Anubis, Norman Sandbox, and Joebox.

Changes: Minor fixes and general code clean-up were done.
tags | tool, forensics
SHA-256 | 3530dccb3a426ab47e5db7746ea79e98d8e57353d7b1e19c0cba6da526dd3bc6
stunnel-4.30.tar.gz
Posted Feb 4, 2010
Authored by Michal Trojnara | Site stunnel.org

Stunnel is a program that allows you to encrypt arbitrary TCP connections inside SSL (Secure Sockets Layer) available on both Unix and Windows. Stunnel can allow you to secure non-SSL aware daemons and protocols (like POP, IMAP, NNTP, LDAP, etc) by having Stunnel provide the encryption, requiring no changes to the daemon's code.

Changes: Configuration can be gracefully reloaded with a HUP signal on Unix and with the GUI on Windows.
tags | arbitrary, encryption, tcp, imap, protocol
systems | windows, unix
SHA-256 | cc544d65aa4d60a0f91e21a6930824ab0588813e3a05c5a9d8020fff47dca841
john-1.7.4.2.tar.gz
Posted Feb 4, 2010
Authored by Solar Designer | Site openwall.com

John the Ripper is a fast password cracker, currently available for many flavors of Unix (11 are officially supported, not counting different architectures), DOS, Win32, and BeOS. Its primary purpose is to detect weak Unix passwords, but a number of other hash types are supported as well.

Changes: Major performance improvements for processing of very large password files or sets of files have been implemented. Some previously missed common Web site passwords found on public lists of "top N passwords" have been added to the bundled common passwords list. Some bugs introduced in 1.7.4 have been fixed.
tags | cracker
systems | windows, unix, beos
SHA-256 | 6a35f51ed1711142090639f47dc51041744e59c20bd368871ebb40f21a062e9b
openoffice-null.tgz
Posted Feb 4, 2010
Authored by Hellcode Research

OpenOffice versions 3.1.0 and 3.1.1 suffers from a null pointer vulnerability when opening a malformed .csv file. Proof of concept included.

tags | exploit, proof of concept
SHA-256 | 63435b9c8a48efa9eae0d5b8dc8c91faecf4c6f7f2326d03e55fae2738d91ce4
kismet-2010-01-R1.tar.gz
Posted Feb 4, 2010
Authored by Mike Kershaw | Site kismetwireless.net

Kismet is an 802.11 layer 2 wireless network sniffer. It can sniff 802.11b, 802.11a, and 802.11g traffic. It is capable of sniffing using almost any wireless card supported in Linux, which currently divide into cards handled by libpcap and the Linux-Wireless extensions (such as Cisco Aironet), and cards supported by the Wlan-NG project which use the Prism/2 chipset (such as Linksys, Dlink, and Zoom). Besides Linux, Kismet also supports FreeBSD, OpenBSD and Mac OS X systems. Features Multiple packet capture sources, Runtime network sorting by AP MAC address (bssid), IP block detection via ARP and DHCP packet dissection, Cisco product detection via CDP, Ethereal and tcpdump compatible file logging, Airsnort-compatible "interesting" (cryptographically weak) logging, Secure SUID behavior, GPS devices and wireless devices fingerprinting. Kismet also includes a tool called gpsmap that can be used to create maps from logged GPS data.

Changes: A new active Bluetooth scanning plugin, support for new GPSD protocols, UI improvements, and multiple bugfixes including GPS logic, segfaults in plugins, and CPU-eating bugs on reconnecting to servers.
tags | tool, wireless
systems | cisco, linux, freebsd, openbsd, apple, osx
SHA-256 | 5901d048310bfbb406d9e35b8ce0c28bddc110dfb6bde3a787798349f5db46bc
haraldscan-osx-0.41.tar.gz
Posted Feb 4, 2010
Authored by Terence Stenvold | Site code.google.com

Harald Scan is a Bluetooth discovery scanner. It determines Major and Minor device classes according to the Bluetooth SIG specification and attempts to resolve a device's MAC address to the largest known vendor/MAC address list. Written in Python. This is the Mac OS X source code version.

Changes: The Mac OS X version was updated to the latest code base. A Fancy Blue name was added. Some CLI bugs were fixed. MACLIST now has 310 entries.
tags | tool, python, wireless
systems | apple, osx
SHA-256 | 242f731f63b45360cb5a487bf16c3cd16aa46ceb81d3e56be9dded758e1b3ee8
haraldscan-dist-0.41.tar.gz
Posted Feb 4, 2010
Authored by Terence Stenvold | Site code.google.com

Harald Scan is a Bluetooth discovery scanner. It determines Major and Minor device classes according to the Bluetooth SIG specification and attempts to resolve a device's MAC address to the largest known vendor/MAC address list. Written in Python. This is the Linux binary release.

Changes: A Fancy Blue name was added. Some CLI bugs were fixed. MACLIST now has 310 entries.
tags | tool, python, wireless
systems | linux
SHA-256 | 88937e335ffde5f697979eb9ca8892582cb00b359cd1ec638a35fa629975ef30
nightwing_v0.7.tgz
Posted Feb 4, 2010
Authored by Gustavo Lindberg, Julio C. Puigpinos, Martin A. Campff, Sebastián D. Criado | Site nightwing.lugro-mesh.org.ar

Nightwing allows the creation of quickly deployed wireless networks without the need to make complicated configurations. With the implementation of a Mesh technology called B.A.T.M.A.N, Nightwing allows the extension of wireless networks with a simple way of adding devices that works with minimal human intervention. It has public and private connection interfaces, and the ability to filter content using OpenDNS. It is designed with security in mind, and has low hardware requirements.

Changes: This release adds a traffic shapping (TS) function, a Web admin interface with firmware upgrading via MTD and Node info, TS configuration via nw_conf, and an IP check list in the nwnode config file.
tags | tool, wireless
SHA-256 | 8029bd1f01aa054f42bbb7611ef65e92f2373d8332355087738fa8485faddc4c
Page 2 of 3
Back123Next

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    0 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    0 Files
  • 23
    Apr 23rd
    0 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close