AIDE (Advanced Intrusion Detection Environment) is a free replacement for Tripwire(tm). It generates a database that can be used to check the integrity of files on server. It uses regular expressions for determining which files get added to the database. You can use several message digest algorithms to ensure that the files have not been tampered with.
4fd88d1d5ddc70c698c6519ebbc05c8d32c3f6d8137bbfdefeaebaafd6db867b
RaidenHTTPD version 2.0.44 suffers from a cross site scripting vulnerability via the user-agent header.
4e5fb1d12824277e2c16c01b1e20fc64700a011ff335cb5fd70e538478517c43
BitRaider Streaming Client version 1.3.3.4098 suffers from a local privilege escalation vulnerability.
5ca434384e236fd488d813284f4b706e9da5d216379d4490e3c07e2b5a5650bf
afick is another file integrity checker, designed to be fast and fully portable between Unix and Windows platforms. It works by first creating a database that represents a snapshot of the most essential parts of your computer system. Then a user can run the script to discover all modifications made since the snapshot was taken (i.e. files added, changed, or removed). The configuration syntax is very close to that of aide or tripwire, and a graphical interface is provided.
d73a9ee31690f3b23171387fa6f99dadcf6613bbd0e1efb7e99124ca37275a9d
afick is another file integrity checker, designed to be fast and fully portable between Unix and Windows platforms. It works by first creating a database that represents a snapshot of the most essential parts of your computer system. Then a user can run the script to discover all modifications made since the snapshot was taken (i.e. files added, changed, or removed). The configuration syntax is very close to that of aide or tripwire, and a graphical interface is provided.
09e9674109a70567315f3b473402b481393dff4d7842f9bf2844db43d014279f
afick is another file integrity checker, designed to be fast and fully portable between Unix and Windows platforms. It works by first creating a database that represents a snapshot of the most essential parts of your computer system. Then a user can run the script to discover all modifications made since the snapshot was taken (i.e. files added, changed, or removed). The configuration syntax is very close to that of aide or tripwire, and a graphical interface is provided.
d848542c2832eaa78bdd6919fdbd7f4f023b16fb5bd5f2d82d6e273f19097ba1
afick is another file integrity checker, designed to be fast and fully portable between Unix and Windows platforms. It works by first creating a database that represents a snapshot of the most essential parts of your computer system. Then a user can run the script to discover all modifications made since the snapshot was taken (i.e. files added, changed, or removed). The configuration syntax is very close to that of aide or tripwire, and a graphical interface is provided.
933d4fffd3ddffb6eeb8972b47caf3bce6a24d709209a488ab2ddec8e716842c
afick is another file integrity checker, designed to be fast and fully portable between Unix and Windows platforms. It works by first creating a database that represents a snapshot of the most essential parts of your computer system. Then a user can run the script to discover all modifications made since the snapshot was taken (i.e. files added, changed, or removed). The configuration syntax is very close to that of aide or tripwire, and a graphical interface is provided.
a3e1d27385876c05c08eb1166b11ec93813315173953b748a1e2149f47a31761
afick is another file integrity checker, designed to be fast and fully portable between Unix and Windows platforms. It works by first creating a database that represents a snapshot of the most essential parts of your computer system. Then a user can run the script to discover all modifications made since the snapshot was taken (i.e. files added, changed, or removed). The configuration syntax is very close to that of aide or tripwire, and a graphical interface is provided.
067e9fd3a6de7bcf39a64c3ea4e28159c8a11605e0f19179116cbaf0b785167e
AiDesign suffers from a remote SQL injection vulnerability.
7eafdb23259045c84ec22e3fe7606b9d8e1e990addd9e8d9fd3f6628b4c8565e
afick is another file integrity checker, designed to be fast and fully portable between Unix and Windows platforms. It works by first creating a database that represents a snapshot of the most essential parts of your computer system. Then a user can run the script to discover all modifications made since the snapshot was taken (i.e. files added, changed, or removed). The configuration syntax is very close to that of aide or tripwire, and a graphical interface is provided.
f7f6f52200bb66d9f8c5ad93800fbab84853a74f88790323a5688516a06a2a26
afick is another file integrity checker, designed to be fast and fully portable between Unix and Windows platforms. It works by first creating a database that represents a snapshot of the most essential parts of your computer system. Then a user can run the script to discover all modifications made since the snapshot was taken (i.e. files added, changed, or removed). The configuration syntax is very close to that of aide or tripwire, and a graphical interface is provided.
dec04b3f53106cacd1335b01b592eab5a98834e75a09cc837f0526e999409a80
Complemento is a collection of tools for penetration testing. LetDown is a TCP flooder written after reading the Fyodor article "TCP Resource Exhaustion and Botched Disclosure". Reverse raider is a domain scanner that uses brute force wordlist scanning for finding a target's subdomains or reverse resolution for a range of IPs. Httsquash is an HTTP server scanner, banner grabber, and data retriever. It can be used for scanning large ranges of IPs for finding devices or HTTP servers.
01cec2d94c04ad80540724c9d1a4dcd23cc5c4d7af0fd832e9e85cb729918512
afick is another file integrity checker, designed to be fast and fully portable between Unix and Windows platforms. It works by first creating a database that represents a snapshot of the most essential parts of your computer system. Then a user can run the script to discover all modifications made since the snapshot was taken (i.e. files added, changed, or removed). The configuration syntax is very close to that of aide or tripwire, and a graphical interface is provided.
16c0827f38b019c292df6dac99eddc1b658553dfb181f86e551638115f8bc238
Secunia Security Advisory - A vulnerability has been discovered in AIDeX Mini-WebServer, which can be exploited by malicious people to conduct cross-site scripting attacks.
ec6d556b6dd8231392e3ffecd8d0379deb3f1cc3da4e4e897e9ff4b8ae553089
AIDeX Mini-Webserver version 1.4 integrated chat suffers from a persistent cross site scripting vulnerability.
63f08b95e3d992ec65cfd62a1c051d262be94d3bea6b68f906be082536cf1b6e
Hack This Zine Issue 11 - This issue's topics include Hackers and the Law, Perfect-Privacy.com Raided, Julian Assange Charged With Rape Under Mysterious Circumstances, and more.
f0e9a187aabb81661c108b851b949053beebb6bc95f9c9af64cb3b71ba82bb8a
afick is another file integrity checker, designed to be fast and fully portable between Unix and Windows platforms. It works by first creating a database that represents a snapshot of the most essential parts of your computer system. Then a user can run the script to discover all modifications made since the snapshot was taken (i.e. files added, changed, or removed). The configuration syntax is very close to that of aide or tripwire, and a graphical interface is provided.
66d8374c7516016aa8a7fce0af66cc5c2cfea6101ef18e20cdbfe33a76789658
AIDE (Advanced Intrusion Detection Environment) is a free replacement for Tripwire(tm). It generates a database that can be used to check the integrity of files on server. It uses regular expressions for determining which files get added to the database. You can use several message digest algorithms to ensure that the files have not been tampered with.
303e5c186257df8c86e418193199f4ea2183fc37d3d4a9098a614f61346059ef
Team Johnlong RaidenTunes version 2.1.1 suffers from a cross site scripting vulnerability.
4199949d35c67667cd038d30a7f4e8a72521e296137d729dadf966fb082dfe7a
Secunia Security Advisory - Gjoko Krstic has reported a vulnerability in RaidenTUNES, which can be exploited by malicious people to conduct cross-site scripting attacks.
5a8f6359b796d34c629acde4895b66f6253b4d0df6c3b902d580cbc8d0b4c492
Complemento is a collection of tools for penetration testing. LetDown is a TCP flooder written after reading the Fyodor article "TCP Resource Exhaustion and Botched Disclosure". Reverse raider is a domain scanner that uses brute force wordlist scanning for finding a target's subdomains or reverse resolution for a range of IPs. Httsquash is an HTTP server scanner, banner grabber, and data retriever. It can be used for scanning large ranges of IPs for finding devices or HTTP servers.
7aa2293ebab917117aa67a1b9e45853e6dae02184c6daf984967f8daef648bd3
afick is another file integrity checker, designed to be fast and fully portable between Unix and Windows platforms. It works by first creating a database that represents a snapshot of the most essential parts of your computer system. Then a user can run the script to discover all modifications made since the snapshot was taken (i.e. files added, changed, or removed). The configuration syntax is very close to that of aide or tripwire, and a graphical interface is provided.
3fbc00b9baf21d4e47916f9da5ebf3cad4f643b51f83c0d0862eb96cf85c07af
WebRaider is a proof of concept quality tool to get a reverse shell out of SQL injection (MS-SQL) by using One Click Ownage.
745e39d9782621659e4b684fd301e6cd6374a5d4ec94298eadb8e858bdd7080d
Complemento is a collection of tools for penetration testing. LetDown is a TCP flooder written after reading the Fyodor article "TCP Resource Exhaustion and Botched Disclosure". Reverse raider is a domain scanner that uses brute force wordlist scanning for finding a target's subdomains or reverse resolution for a range of IPs. Httsquash is an HTTP server scanner, banner grabber, and data retriever. It can be used for scanning large ranges of IPs for finding devices or HTTP servers.
09840216f79f048ced66d021350d64bdd15eac86f83998784c1b32849f4f1067
afick is another file integrity checker, designed to be fast and fully portable between Unix and Windows platforms. It works by first creating a database that represents a snapshot of the most essential parts of your computer system. Then a user can run the script to discover all modifications made since the snapshot was taken (i.e. files added, changed, or removed). The configuration syntax is very close to that of aide or tripwire, and a graphical interface is provided.
c153bac2a81cf0db04f64c84975d8eb350619b161262ca423f395b9bb6eeb37c