OneOrZero AIMS version 2.8.0 Trial build 231211 suffers from a cross site scripting vulnerability.
3eba4b2fef00005f59a4f4b373637c3b09b89f908851ea13ba4e56f4e4aac5ed
OpenNHRP implements the NBMA Next Hop Resolution Protocol (as defined in RFC 2332). It makes it possible to create a dynamic multipoint VPN Linux router using NHRP, GRE, and IPsec. It aims to be Cisco DMVPN compatible.
118d79062dddb1318eb706054168ad17a030afe1e9ebb59f9dc7c7a7a03bc308
Ruxcon 2012 Call For Papers - Ruxcon is the premier technical computer security conference in the Australia. The conference aims to bring together the individual talents of the best and brightest security folk in the region, through live presentations, activities and demonstrations. This year the conference will take place over the weekend of 20th and 21st of October at the CQ Function Centre, Melbourne, Australia.
967b14c2cc86eb829ac73a7d5559ae16ecaeaee7a00dda16841f0629ce75679a
The Hackademic Call For Papers has been announced. Hackademic is a three day security conference that aims to bring together the hacking community and members from the academic community in order to learn from each others successes and failures. Hosted by the IEEE Reliability Society, this innagural event will be held in the Clayton Hall conference facility at the University of Delaware in Newark DE. Everything about the conference, from the venue to the speakers to the schedule, is structured to facilitate collaboration and information sharing between attendees.
5a88ec9adde7999975d27221f31798ffdcfa01d28f4b5c830356377cb44f8332
OpenNHRP implements the NBMA Next Hop Resolution Protocol (as defined in RFC 2332). It makes it possible to create a dynamic multipoint VPN Linux router using NHRP, GRE, and IPsec. It aims to be Cisco DMVPN compatible.
0814389008bc36b05491fff85942c7c42d6ce47cf72f9593b0981d82ff560158
Lynis is an auditing tool for Unix (specialists). It scans the system and available software to detect security issues. Beside security related information it will also scan for general system information, installed packages and configuration mistakes. This software aims in assisting automated auditing, software patch management, vulnerability and malware scanning of Unix based systems.
fe265965eb1ce8fac352e0bddea1d5ec6508c319bf88a5f63c2edecf2af6de54
JavaScript allows you to exploit human cognitive abilities to a remarkable extent; tools such as window positioning, history.forward() and history.back(), open some scary possibilities that we are completely unprepared to deal with. This proof-of-concept aims to demonstrate this; while it is intentionally crude and makes no real effort to conceal its operation, the transitions can be made seamless and very difficult to perceive. Very accurate click prediction can be achieved by carefully measuring mouse velocity and distance to destination, too.
d7658f0d5bd78b6a2d13c915b7f4668b18228fb508f0cca309cdc5652565e5c9
Ostinato is an open-source, cross-platform packet/traffic generator and analyzer with a friendly GUI. It aims to be "Wireshark in Reverse" and thus become complementary to Wireshark. This is the source code release.
6352a7f68b6f325e14965c399357591a7967cf3f94b01e84c3b50cc40feebb1d
Ostinato is an open-source, cross-platform packet/traffic generator and analyzer with a friendly GUI. It aims to be "Wireshark in Reverse" and thus become complementary to Wireshark. This is the Windows binary release.
f5253935e65bded169b9eb1520383ec1ef681017576cffd49e913ce86360e776
Ostinato is an open-source, cross-platform packet/traffic generator and analyzer with a friendly GUI. It aims to be "Wireshark in Reverse" and thus become complementary to Wireshark. This is the Mac OS X release.
b7e6bb1ee16faf6bfd26776d9d1ff947783c70e5a3d0cad08b8fa740360e6131
OneOrZero AIMS versions 2.7.0 and below suffer from a remote SQL injection vulnerability.
1c05d71273d69e6e24abfb6ad1d52dec5bc696468ebbeda735ede7ee64f0a136
OneOrZero AIMS versions 2.7.0 and below suffer from an authorization bypass via cookie manipulation.
8b2bc60bbeac2e06504b2cc636356cc144ed4226558db470f91e9b90fc270dc4
Agnitio is a tool to help developers and security professionals conduct manual security code reviews in a consistent and repeatable way. Agnitio aims to replace the adhoc nature of manual security code review documentation, create an audit trail and reporting. Both x86 and x64 versions are included in this archive.
ea8f8d900c63a5b4ffd55ccbaf931a5028774259ceed201a1ec6b7a1da68e984
This white paper aims to understand the operation of an Android malware named "*DroidKungFu 2 - A*" and investigate the parameters, code and structure which is created or modified by this malware. It also highlights the mitigation steps which requires the user and the developer to be proactive.
c87a98cdf37b9f56b2a378c84cd4c8aff4968bbdafd25c95eca7fe50f6f384b7
Pmcma aims at automating exploitation of invalid memory writes (being them the consequences of an overflow in a writable section, of a missing format string, integer overflow, variable misuse, or any other type of memory corruption).
7544c62a0e04880da65bbb1977d91d5cb2dcf6333c762b966c6abb657c436896
OpenNHRP implements the NBMA Next Hop Resolution Protocol (as defined in RFC 2332). It makes it possible to create a dynamic multipoint VPN Linux router using NHRP, GRE, and IPsec. It aims to be Cisco DMVPN compatible.
e3cb85774a1a3756fa45f09495e2b4613acce66fef854c0693a9635f6f1bbf9a
Agnitio is a tool to help developers and security professionals conduct manual security code reviews in a consistent and repeatable way. Agnitio aims to replace the adhoc nature of manual security code review documentation, create an audit trail and reporting.
18a1bcf1963c15d188db323fb6a8a80d7ee42e6adea551aaf3604896aee68587
This paper describes the results of a thorough examination of Sophos Antivirus internals. The author presents a technical analysis of claims made by the vendor, and publishes the tools and reference material required to reproduce their results. Furthermore, they examine the product from the perspective of a vulnerability researcher, exploring the rich attack surface exposed, and demonstrating weaknesses and vulnerabilities.
57ecb0848e5b99ef5678dc00d7aabb2718195a8bb23f387f2d5ff429df854455
OpenNHRP implements the NBMA Next Hop Resolution Protocol (as defined in RFC 2332). It makes it possible to create a dynamic multipoint VPN Linux router using NHRP, GRE, and IPsec. It aims to be Cisco DMVPN compatible.
a41e5f0c65e48a76d98b701f1f3e9c43e10ebe3578c79adebcfee2279c7f459a
iCloudCenter JobSite PHP Script version 1.1 suffers from a remote SQL injection vulnerability. The author of this software claims this only affects the demo version.
b509650023b641912535c258e64650b697b206ea7fc1b25224162e1970514f73
OpenNHRP implements the NBMA Next Hop Resolution Protocol (as defined in RFC 2332). It makes it possible to create a dynamic multipoint VPN Linux router using NHRP, GRE, and IPsec. It aims to be Cisco DMVPN compatible.
e657a68a0dd07b6c368fe00d1937671ad68ffa75f21313c5fc8553e7f3ebcfdc
getTorExitNode is a tool that aims at providing torproxy (from tortunnel) with a valid Tor exit node. It returns one or all valid Tor exit nodes. Written in Python.
93f50f1df03039d204ea6ad979133e72a084758137ef36ef12282b90bfb7cb5b
The author of this file claims that naming a directory with a .asp extension on IIS 6 will causing all files inside of it to be executed as such.
7d3a817a22ee42fe51d188e334502eb335489a020414bfe1d8e9ebcb14d8ed1f
Ostinato is an open-source, cross-platform packet/traffic generator and analyzer with a friendly GUI. It aims to be "Wireshark in Reverse" and thus become complementary to Wireshark. This is the windows binary release.
4cfa61d55987c4bf069662dc1c30e6c0faf532d55dedfc3af8bdfdadea41f160
Ostinato is an open-source, cross-platform packet/traffic generator and analyzer with a friendly GUI. It aims to be "Wireshark in Reverse" and thus become complementary to Wireshark. This is the Mac OS X release.
790089a6b37cb6940e2218fe426932092d202eb51608d26002a2219c50e57ae8
Ostinato is an open-source, cross-platform packet/traffic generator and analyzer with a friendly GUI. It aims to be "Wireshark in Reverse" and thus become complementary to Wireshark.
d257270879533212d7fec9f5260b4d3163e0822f8ffdde0fa3f96779fd12e1bb