exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 6 of 6 RSS Feed

Files

Sam Spade 1.14 SEH Overflow
Posted Nov 13, 2015
Authored by Nipun Jaswal

Sam Spade version 1.14 S-Lang command field SEH overflow exploit.

tags | exploit, overflow
SHA-256 | 41df67192f57558444ffeab55b4679775fef44272a59521f731572d482a397d5

Related Files

Sam Spade 1.14 Buffer Overflow
Posted Nov 1, 2015
Authored by Mandaw Coder

Sam Spade version 1.14 local buffer overflow exploit.

tags | exploit, overflow, local
SHA-256 | be1d1470f926865a2cbdf26c04571759ad9dd15539f532abf57dab6d5cab11fa
Secunia Security Advisory 31999
Posted Sep 24, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - r0t has reported some vulnerabilities in Dataspade, which can be exploited by malicious people to conduct cross-site scripting attacks.

tags | advisory, vulnerability, xss
SHA-256 | 938016f93e79a339d70d118a206227c3ca44e075c463901222158ed55357e5f2
Spade-092200.1.tar.gz
Posted Oct 1, 2000
Authored by Stuart Staniford, James Hoagland | Site silicondefense.com

Spade stands for Statistical Packet Anomaly Detection Engine. It is a Snort preprocessor plugin to report and score unusual, possibly suspicious, packets. The anomaly score that is assigned is based on the observed history of the network. The fewer times that a particular kind of packet has occurred in the past, the higher its anomaly score will be. Based on the SPICE Whitepaper.

tags | tool, sniffer
SHA-256 | 2d6fa9e406470ef908f831043f095d3795da1bdc0dcb001c6ef8411dfc6f8b38
spice-ccs2000.pdf
Posted Oct 1, 2000
Authored by James Hoagland | Site silicondefense.com

SPICE Whitepaper - The Stealthy Portscan and Intrusion Correlation Engine is a project at Silicon Defense to detect portscans, even those in which the attacker has attempted to make the scan stealthy. For example, they may have slowed down the scan or randomized it. The basic idea with Spice is to monitor a network's packets. Each packet is assigned an anomaly score based on the normal traffic observed on the network. The higher the score, the more unusual and possibly suspicious the packet it. These are then passed to a correlator which groups related packets together and reports portscans. The correlator is under active development but an implementation of the anomaly sensor called SPADE has been released.

tags | paper
SHA-256 | c99f6f93498d742845e7c30fc7a248c8ed4aea75426f04e9ec5ace07517adf05
spade110.exe
Posted Aug 17, 1999

Sam Spade is an integrated network query tool for Windows 95 and NT4.0. This latest release contains the following tools in a multi-threaded, multi-window environment: ping, nslookup, whois, IP block whois, dig, traceroute, finger, SMTP VRFY, web browser, keep-alive, DNS zone transfer, SMTP relay check, Usenet cancel check, website download, website search, email header analysis. This is a 5-star Packet Storm Security favorite! Freeware by Blighty Designs

tags | web
systems | windows
SHA-256 | 6e029b4dbda4f0144e9da7e77c70e27fe2fb2011b97b4447ec1d84b5af81da28
spade107.zip
Posted Aug 17, 1999

Sam Spade.

SHA-256 | 1e60c240c44f03130c22fbb213e73b7b7b40b496f1e32368fe7868f6f67af93d
Page 1 of 1
Back1Next

File Archive:

June 2022

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Jun 1st
    19 Files
  • 2
    Jun 2nd
    16 Files
  • 3
    Jun 3rd
    28 Files
  • 4
    Jun 4th
    0 Files
  • 5
    Jun 5th
    0 Files
  • 6
    Jun 6th
    19 Files
  • 7
    Jun 7th
    23 Files
  • 8
    Jun 8th
    11 Files
  • 9
    Jun 9th
    10 Files
  • 10
    Jun 10th
    4 Files
  • 11
    Jun 11th
    0 Files
  • 12
    Jun 12th
    0 Files
  • 13
    Jun 13th
    0 Files
  • 14
    Jun 14th
    0 Files
  • 15
    Jun 15th
    0 Files
  • 16
    Jun 16th
    0 Files
  • 17
    Jun 17th
    0 Files
  • 18
    Jun 18th
    0 Files
  • 19
    Jun 19th
    27 Files
  • 20
    Jun 20th
    65 Files
  • 21
    Jun 21st
    10 Files
  • 22
    Jun 22nd
    8 Files
  • 23
    Jun 23rd
    6 Files
  • 24
    Jun 24th
    6 Files
  • 25
    Jun 25th
    0 Files
  • 26
    Jun 26th
    0 Files
  • 27
    Jun 27th
    15 Files
  • 28
    Jun 28th
    14 Files
  • 29
    Jun 29th
    11 Files
  • 30
    Jun 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Hosting By
Rokasec
close