what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 25 of 100 RSS Feed

Files

OneOrZero AIMS 2.8.0 Trial Build 231211 Cross Site Scripting
Posted Jan 18, 2012
Authored by High-Tech Bridge SA | Site htbridge.com

OneOrZero AIMS version 2.8.0 Trial build 231211 suffers from a cross site scripting vulnerability.

tags | exploit, xss
SHA-256 | 3eba4b2fef00005f59a4f4b373637c3b09b89f908851ea13ba4e56f4e4aac5ed

Related Files

OpenNHRP NBMA Next Hop Resolution 0.13.1
Posted Jun 23, 2012
Authored by Timo Teras | Site sourceforge.net

OpenNHRP implements the NBMA Next Hop Resolution Protocol (as defined in RFC 2332). It makes it possible to create a dynamic multipoint VPN Linux router using NHRP, GRE, and IPsec. It aims to be Cisco DMVPN compatible.

Changes: This release adds minor fixes for configurations with multiple mgre interfaces.
tags | encryption, protocol
systems | cisco, linux
SHA-256 | 118d79062dddb1318eb706054168ad17a030afe1e9ebb59f9dc7c7a7a03bc308
Ruxcon 2012 Call For Papers
Posted Apr 19, 2012
Site ruxcon.org.au

Ruxcon 2012 Call For Papers - Ruxcon is the premier technical computer security conference in the Australia. The conference aims to bring together the individual talents of the best and brightest security folk in the region, through live presentations, activities and demonstrations. This year the conference will take place over the weekend of 20th and 21st of October at the CQ Function Centre, Melbourne, Australia.

tags | paper, conference
SHA-256 | 967b14c2cc86eb829ac73a7d5559ae16ecaeaee7a00dda16841f0629ce75679a
Hackademic Call For Papers
Posted Mar 13, 2012
Site hackademic.info

The Hackademic Call For Papers has been announced. Hackademic is a three day security conference that aims to bring together the hacking community and members from the academic community in order to learn from each others successes and failures. Hosted by the IEEE Reliability Society, this innagural event will be held in the Clayton Hall conference facility at the University of Delaware in Newark DE. Everything about the conference, from the venue to the speakers to the schedule, is structured to facilitate collaboration and information sharing between attendees.

tags | paper, conference
SHA-256 | 5a88ec9adde7999975d27221f31798ffdcfa01d28f4b5c830356377cb44f8332
OpenNHRP NBMA Next Hop Resolution 0.13
Posted Dec 26, 2011
Authored by Timo Teras | Site sourceforge.net

OpenNHRP implements the NBMA Next Hop Resolution Protocol (as defined in RFC 2332). It makes it possible to create a dynamic multipoint VPN Linux router using NHRP, GRE, and IPsec. It aims to be Cisco DMVPN compatible.

Changes: Minor feature improvements for multiple ISP setups with failover. Memory corruption and memory leaks that occur when acting as NHS (with heavy traffic) have been fixed.
tags | encryption, protocol
systems | cisco, linux
SHA-256 | 0814389008bc36b05491fff85942c7c42d6ce47cf72f9593b0981d82ff560158
Lynis Auditing Tool 1.3.0
Posted Dec 26, 2011
Authored by Michael Boelen | Site cisofy.com

Lynis is an auditing tool for Unix (specialists). It scans the system and available software to detect security issues. Beside security related information it will also scan for general system information, installed packages and configuration mistakes. This software aims in assisting automated auditing, software patch management, vulnerability and malware scanning of Unix based systems.

Changes: Some tests have been extended and a few new ones have been added to this release. There are also improvements for the screen output and logging.
tags | tool, scanner
systems | unix
SHA-256 | fe265965eb1ce8fac352e0bddea1d5ec6508c319bf88a5f63c2edecf2af6de54
ClickIt Proof Of Concept
Posted Dec 13, 2011
Authored by Michal Zalewski | Site lcamtuf.coredump.cx

JavaScript allows you to exploit human cognitive abilities to a remarkable extent; tools such as window positioning, history.forward() and history.back(), open some scary possibilities that we are completely unprepared to deal with. This proof-of-concept aims to demonstrate this; while it is intentionally crude and makes no real effort to conceal its operation, the transitions can be made seamless and very difficult to perceive. Very accurate click prediction can be achieved by carefully measuring mouse velocity and distance to destination, too.

tags | exploit, javascript
SHA-256 | d7658f0d5bd78b6a2d13c915b7f4668b18228fb508f0cca309cdc5652565e5c9
Ostinato Traffic Generator 0.5 Source Code
Posted Dec 7, 2011
Authored by Srivats P | Site code.google.com

Ostinato is an open-source, cross-platform packet/traffic generator and analyzer with a friendly GUI. It aims to be "Wireshark in Reverse" and thus become complementary to Wireshark. This is the source code release.

Changes: Improved maximum traffic generation rates. Added support for many things. Various bug fixes and other improvements.
tags | tool
systems | unix
SHA-256 | 6352a7f68b6f325e14965c399357591a7967cf3f94b01e84c3b50cc40feebb1d
Ostinato Traffic Generator 0.5 Windows Binary
Posted Dec 7, 2011
Authored by Srivats P | Site code.google.com

Ostinato is an open-source, cross-platform packet/traffic generator and analyzer with a friendly GUI. It aims to be "Wireshark in Reverse" and thus become complementary to Wireshark. This is the Windows binary release.

Changes: Improved maximum traffic generation rates. Added support for many things. Various bug fixes and other improvements.
tags | tool
systems | windows
SHA-256 | f5253935e65bded169b9eb1520383ec1ef681017576cffd49e913ce86360e776
Ostinato Traffic Generator 0.5 Mac OS X
Posted Dec 7, 2011
Authored by Srivats P | Site code.google.com

Ostinato is an open-source, cross-platform packet/traffic generator and analyzer with a friendly GUI. It aims to be "Wireshark in Reverse" and thus become complementary to Wireshark. This is the Mac OS X release.

Changes: Improved maximum traffic generation rates. Added support for many things. Various bug fixes and other improvements.
tags | tool
systems | apple, osx
SHA-256 | b7e6bb1ee16faf6bfd26776d9d1ff947783c70e5a3d0cad08b8fa740360e6131
OneOrZero AIMS 2.7.0 SQL Injection
Posted Oct 28, 2011
Authored by Yuri Goltsev | Site ptsecurity.com

OneOrZero AIMS versions 2.7.0 and below suffer from a remote SQL injection vulnerability.

tags | advisory, remote, sql injection
SHA-256 | 1c05d71273d69e6e24abfb6ad1d52dec5bc696468ebbeda735ede7ee64f0a136
OneOrZero AIMS Authorization Bypass
Posted Oct 28, 2011
Authored by Yuri Goltsev | Site ptsecurity.com

OneOrZero AIMS versions 2.7.0 and below suffer from an authorization bypass via cookie manipulation.

tags | advisory
SHA-256 | 8b2bc60bbeac2e06504b2cc636356cc144ed4226558db470f91e9b90fc270dc4
Agnitio 2.1
Posted Oct 24, 2011
Authored by David Rook | Site sourceforge.net

Agnitio is a tool to help developers and security professionals conduct manual security code reviews in a consistent and repeatable way. Agnitio aims to replace the adhoc nature of manual security code review documentation, create an audit trail and reporting. Both x86 and x64 versions are included in this archive.

Changes: Windows x64 support. Automatically decompiles Android .apk application for easy analysis. Various other features and updates.
tags | x86
systems | windows
SHA-256 | ea8f8d900c63a5b4ffd55ccbaf931a5028774259ceed201a1ec6b7a1da68e984
Dissecting Andro Malware
Posted Sep 8, 2011
Authored by Vadodil Joel Varghese

This white paper aims to understand the operation of an Android malware named "*DroidKungFu 2 - A*" and investigate the parameters, code and structure which is created or modified by this malware. It also highlights the mitigation steps which requires the user and the developer to be proactive.

tags | paper
SHA-256 | c87a98cdf37b9f56b2a378c84cd4c8aff4968bbdafd25c95eca7fe50f6f384b7
Post Memory Corruption Memory Analyzer 1.00
Posted Sep 2, 2011
Authored by Andrew Griffiths, Matthieu Suiche, Tim Shelton, Jonathan Brossard, Nicolas Massaviol | Site pmcma.org

Pmcma aims at automating exploitation of invalid memory writes (being them the consequences of an overflow in a writable section, of a missing format string, integer overflow, variable misuse, or any other type of memory corruption).

tags | tool, overflow
systems | unix
SHA-256 | 7544c62a0e04880da65bbb1977d91d5cb2dcf6333c762b966c6abb657c436896
OpenNHRP NBMA Next Hop Resolution 0.12.3
Posted Aug 19, 2011
Authored by Timo Teras | Site sourceforge.net

OpenNHRP implements the NBMA Next Hop Resolution Protocol (as defined in RFC 2332). It makes it possible to create a dynamic multipoint VPN Linux router using NHRP, GRE, and IPsec. It aims to be Cisco DMVPN compatible.

Changes: Leaf (re)discovery immediately after reboot was fixed when stale IPsec SAs are still present and IPsec initial-contact notification is expected to flush them.
tags | encryption, protocol
systems | cisco, linux
SHA-256 | e3cb85774a1a3756fa45f09495e2b4613acce66fef854c0693a9635f6f1bbf9a
Agnitio 2.0
Posted Aug 4, 2011
Authored by David Rook | Site sourceforge.net

Agnitio is a tool to help developers and security professionals conduct manual security code reviews in a consistent and repeatable way. Agnitio aims to replace the adhoc nature of manual security code review documentation, create an audit trail and reporting.

Changes: Addition of a basic code analysis module with rules for analyzing Android and iOS. Multiple editors added.
systems | windows
SHA-256 | 18a1bcf1963c15d188db323fb6a8a80d7ee42e6adea551aaf3604896aee68587
Sophail: A Critical Analysis Of Sophos Antivirus
Posted Aug 4, 2011
Authored by Tavis Ormandy

This paper describes the results of a thorough examination of Sophos Antivirus internals. The author presents a technical analysis of claims made by the vendor, and publishes the tools and reference material required to reproduce their results. Furthermore, they examine the product from the perspective of a vulnerability researcher, exploring the rich attack surface exposed, and demonstrating weaknesses and vulnerabilities.

tags | paper, vulnerability, virus
SHA-256 | 57ecb0848e5b99ef5678dc00d7aabb2718195a8bb23f387f2d5ff429df854455
OpenNHRP NBMA Next Hop Resolution 0.12.2
Posted Jul 8, 2011
Authored by Timo Teras | Site sourceforge.net

OpenNHRP implements the NBMA Next Hop Resolution Protocol (as defined in RFC 2332). It makes it possible to create a dynamic multipoint VPN Linux router using NHRP, GRE, and IPsec. It aims to be Cisco DMVPN compatible.

Changes: This release contains only a single commit: a fix for a regression (introduced in 0.12) in which shortcuts do not work properly unless using dynamic-map NHS mode. This issue probably affects most configurations, so upgrading is strongly recommended.
tags | encryption, protocol
systems | cisco, linux
SHA-256 | a41e5f0c65e48a76d98b701f1f3e9c43e10ebe3578c79adebcfee2279c7f459a
iCloudCenter JobSite PHP Script SQL Injection
Posted Mar 30, 2011
Authored by RoAd_KiLlEr

iCloudCenter JobSite PHP Script version 1.1 suffers from a remote SQL injection vulnerability. The author of this software claims this only affects the demo version.

tags | exploit, remote, php, sql injection
SHA-256 | b509650023b641912535c258e64650b697b206ea7fc1b25224162e1970514f73
OpenNHRP NBMA Next Hop Resolution 0.12.1
Posted Mar 24, 2011
Authored by Timo Teras | Site sourceforge.net

OpenNHRP implements the NBMA Next Hop Resolution Protocol (as defined in RFC 2332). It makes it possible to create a dynamic multipoint VPN Linux router using NHRP, GRE, and IPsec. It aims to be Cisco DMVPN compatible.

Changes: The GRE key is now exported to opennhrp-script (to allow dual-DMVPN setups). Minor bugs in config directives were fixed, along with building for certain configurations.
tags | encryption, protocol
systems | cisco, linux
SHA-256 | e657a68a0dd07b6c368fe00d1937671ad68ffa75f21313c5fc8553e7f3ebcfdc
getTorExitNode Python Script
Posted Feb 10, 2011
Authored by Sebastien Damaye

getTorExitNode is a tool that aims at providing torproxy (from tortunnel) with a valid Tor exit node. It returns one or all valid Tor exit nodes. Written in Python.

tags | tool, python, peer2peer
SHA-256 | 93f50f1df03039d204ea6ad979133e72a084758137ef36ef12282b90bfb7cb5b
Microsoft IIS 6 Parsing Vulnerability
Posted Jan 25, 2011
Authored by Pouya Daneshmand

The author of this file claims that naming a directory with a .asp extension on IIS 6 will causing all files inside of it to be executed as such.

tags | advisory, asp
SHA-256 | 7d3a817a22ee42fe51d188e334502eb335489a020414bfe1d8e9ebcb14d8ed1f
Ostinato Traffic Generator 0.3 Windows Binary
Posted Dec 10, 2010
Authored by Srivats P | Site code.google.com

Ostinato is an open-source, cross-platform packet/traffic generator and analyzer with a friendly GUI. It aims to be "Wireshark in Reverse" and thus become complementary to Wireshark. This is the windows binary release.

Changes: IGMP, MLD, HexDump (user defined content) protocols added. Several bugfixes.
tags | tool
systems | windows
SHA-256 | 4cfa61d55987c4bf069662dc1c30e6c0faf532d55dedfc3af8bdfdadea41f160
Ostinato Traffic Generator 0.3 Mac OS X
Posted Dec 10, 2010
Authored by Srivats P | Site code.google.com

Ostinato is an open-source, cross-platform packet/traffic generator and analyzer with a friendly GUI. It aims to be "Wireshark in Reverse" and thus become complementary to Wireshark. This is the Mac OS X release.

Changes: IGMP, MLD, HexDump (user defined content) protocols added. Several bugfixes.
tags | tool
systems | windows, apple, osx
SHA-256 | 790089a6b37cb6940e2218fe426932092d202eb51608d26002a2219c50e57ae8
Ostinato Traffic Generator 0.3 Source Code
Posted Dec 10, 2010
Authored by Srivats P | Site code.google.com

Ostinato is an open-source, cross-platform packet/traffic generator and analyzer with a friendly GUI. It aims to be "Wireshark in Reverse" and thus become complementary to Wireshark.

Changes: IGMP, MLD, HexDump (user defined content) protocols added. Several bugfixes.
tags | tool
systems | windows, unix
SHA-256 | d257270879533212d7fec9f5260b4d3163e0822f8ffdde0fa3f96779fd12e1bb
Page 1 of 4
Back1234Next

File Archive:

July 2022

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Jul 1st
    52 Files
  • 2
    Jul 2nd
    0 Files
  • 3
    Jul 3rd
    0 Files
  • 4
    Jul 4th
    11 Files
  • 5
    Jul 5th
    8 Files
  • 6
    Jul 6th
    0 Files
  • 7
    Jul 7th
    0 Files
  • 8
    Jul 8th
    0 Files
  • 9
    Jul 9th
    0 Files
  • 10
    Jul 10th
    0 Files
  • 11
    Jul 11th
    0 Files
  • 12
    Jul 12th
    0 Files
  • 13
    Jul 13th
    0 Files
  • 14
    Jul 14th
    0 Files
  • 15
    Jul 15th
    0 Files
  • 16
    Jul 16th
    0 Files
  • 17
    Jul 17th
    0 Files
  • 18
    Jul 18th
    0 Files
  • 19
    Jul 19th
    0 Files
  • 20
    Jul 20th
    0 Files
  • 21
    Jul 21st
    0 Files
  • 22
    Jul 22nd
    0 Files
  • 23
    Jul 23rd
    0 Files
  • 24
    Jul 24th
    0 Files
  • 25
    Jul 25th
    0 Files
  • 26
    Jul 26th
    0 Files
  • 27
    Jul 27th
    0 Files
  • 28
    Jul 28th
    0 Files
  • 29
    Jul 29th
    0 Files
  • 30
    Jul 30th
    0 Files
  • 31
    Jul 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Hosting By
Rokasec
close