This tool is a simple WordPress brute forcing utility written in PHP.
826118e911fad728ccfeda726fcedec979d776f67274fb216b25defd0c3b5541
This tool is a polymorphic shellcode editor.
80e7547fd684fb6a3e2aacc65fbc85005ed50a4d36805f404985dafe4ebfec7b
Core Security Technologies Advisory - XnView is prone to a security vulnerability when processing MBM files. This vulnerability could be exploited by a remote attacker to execute arbitrary code on the target machine, by enticing the user of XnView to open a specially crafted file.
1dd2d9c8da6455cc894ae24f9a350bb78d4a892c610a234754bd6d713da7fdb4
Gentoo Linux Security Advisory 201006-21 - Multiple vulnerabilities in UnrealIRCd might allow remote attackers to compromise the "unrealircd" account, or cause a Denial of Service. Versions less than 3.2.8.1-r1 are affected.
d4fdf591914d3b687980dd7690c87875eb5f50d6026dd3ff5840dd643b409523
Membership Site Script suffers from a remote SQL injection vulnerability.
2125b74111357c07a03c807cbeac1a9f6a58a487573f3f9178eb4463ea9584d9
Daily Inspirational Quotes Script suffers from a remote SQL injection vulnerability.
c83afcf0fb9993bd48572338626c6daa7b1ca54314a8cdb1f93d23528be40c9b
Sydbox is a ptrace-based sandbox implementation. It intercepts system calls, checks for allowed filesystem prefixes, and denies them when checks fail. It has basic support for disallowing network connections. It has basic support to sandbox execve calls. It is based in part on catbox and strace.
3edec47f3ddb65ae495ad105dbc7908163e7fc7ab96d9d37eb3c5f0acc1ac06c
Tor is a network of virtual tunnels that allows people and groups to improve their privacy and security on the Internet. It also enables software developers to create new communication tools with built-in privacy features. It provides the foundation for a range of applications that allow organizations and individuals to share information over public networks without compromising their privacy. Individuals can use it to keep remote Websites from tracking them and their family members. They can also use it to connect to resources such as news sites or instant messaging services that are blocked by their local Internet service providers (ISPs).
6cdc60ed0b2e3eb790cbf37741a3c86a004f4f7c6678e25b9b936d6a340c7fa2
John the Ripper is a fast password cracker, currently available for many flavors of Unix, Windows, DOS, BeOS, and OpenVMS. Its primary purpose is to detect weak Unix passwords. It supports several crypt(3) password hash types commonly found on Unix systems, as well as Windows LM hashes. On top of this, many other hash types are added with contributed patches, and some are added in John the Ripper Pro.
77e44d068d317648c41d3ac61b8ea1df18d5c7401083e7a4f6681816900c1a73
Joke Website Script suffers from cross site scripting and remote SQL injection vulnerabilities.
b98a4a882c70f214f89b09cb1ed34e82e14f364de8cf568a63eae108df97e83d
E-Book Store suffers from a remote SQL injection vulnerability.
11b7962e20c8a77c2c0b5d2ad3499fce8e66c954b83e532cc180b12033bdd91c
Lyrics Script suffers from cross site scripting and remote SQL injection vulnerabilities.
2d1d7a33c445cfdc1a4265f377971b26471aac781dd3fccb162b94d8fb788e93
Rosoft Audio Converter version 4.4.4 local buffer overflow exploit that creates a malicious .m3u file.
514a817d1b88a2a903b0d297b92466adbc5b58c3e2e06a4b5df4de68f591f3b1
THC-Hydra is a high quality parallelized login hacker for Samba, Smbnt, Cisco AAA, FTP, POP3, IMAP, Telnet, HTTP Auth, LDAP, NNTP, MySQL, VNC, ICQ, Socks5, PCNFS, Cisco and more. Includes SSL support, parallel scans, and is part of Nessus.
595e4cc2f186ef7f616e31448f1caf9df51d2d7b8d2bec92738ed1fb58e41e81
THC-IPV6 is a toolkit that attacks the inherent protocol weaknesses of IPv6 and ICMP6 and it includes an easy to use packet factory library.
839a42e5e31965bd3ffdd6b0c223c1a0087eb78fa6f58e6f3df03ab5facbf2f3
WATOBO, the Web Application Toolbox, is a tool that enables security professionals to perform highly efficient (semi-automated) web application security audits. It acts like a local proxy and analyzes the traffic on the fly for helpful information and vulnerabilities. It also has automated scanning capabilities, e.g. SQL injection, cross site scripting and more.
7266766b712bc00e0299f97a39549b351e1594a72c96c91399a2d01357ce289d
Debian Linux Security Advisory 2060-1 - Stefan Esser discovered that cacti, a front-end to rrdtool for monitoring systems and services, is not properly validating input passed to the rra_id parameter of the graph.php script. Due to checking the input of $_REQUEST but using $_GET input in a query an unauthenticated attacker is able to perform SQL injections via a crafted rra_id $_GET value and an additional valid rra_id $_POST or $_COOKIE value.
f67e6f193c2d5a80f90343b329eadfb551cc0916fe75d3cc23a7b852dfaeebe4
Yahoo! Mail suffered from a cross site scripting vulnerability.
9fdfd1b1bd8b4131013e93bc2435d960d8b1e004a248505338b03724101b3a27
AneCMS versions 1.3 and below suffer from cross site scripting and remote SQL injection vulnerabilities.
3ebfa2591c50bc7b231cb796968508e366bde2b606181201784bb7660764e872
MODx CMS versions 1.0.3 and below suffer from multiple remote SQL injection vulnerabilities.
cd8746949034f5f29fb69f8f145d654fe74ed673537e47bfa1151a19c697edb8
A timeout detection flaw in the httpd mod_proxy_http module causes proxied response to be sent as the response to a different request, and potentially served to a different client, from the HTTP proxy pool worker pipeline.
03e462a5ce2e114368076311833ec0ec4944c031022cd24c9970a8f9214252b7