exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 25 of 100 RSS Feed

Files

AIDE 0.17
Posted Jan 25, 2021
Authored by Rami Lehti | Site aide.github.io

AIDE (Advanced Intrusion Detection Environment) is a free replacement for Tripwire(tm). It generates a database that can be used to check the integrity of files on server. It uses regular expressions for determining which files get added to the database. You can use several message digest algorithms to ensure that the files have not been tampered with.

Changes: Updated man pages. Removed outdated aide.conf.in. Limited number of nested includes. Updates to documentation and various bug fixes.
tags | tool, intrusion detection
systems | unix
SHA-256 | 4fd88d1d5ddc70c698c6519ebbc05c8d32c3f6d8137bbfdefeaebaafd6db867b

Related Files

RaidenHTTPD 2.0.44 User-Agent Cross Site Scripting
Posted Jul 12, 2017
Authored by sultan albalawi

RaidenHTTPD version 2.0.44 suffers from a cross site scripting vulnerability via the user-agent header.

tags | exploit, xss
SHA-256 | 4e5fb1d12824277e2c16c01b1e20fc64700a011ff335cb5fd70e538478517c43
BitRaider Streaming Client 1.3.3.4098 Local Privilege Escalation
Posted Dec 23, 2014
Authored by LiquidWorm | Site zeroscience.mk

BitRaider Streaming Client version 1.3.3.4098 suffers from a local privilege escalation vulnerability.

tags | advisory, local
SHA-256 | 5ca434384e236fd488d813284f4b706e9da5d216379d4490e3c07e2b5a5650bf
Another File Integrity Checker 3.4
Posted Sep 10, 2013
Authored by Eric Gerbier | Site afick.sourceforge.net

afick is another file integrity checker, designed to be fast and fully portable between Unix and Windows platforms. It works by first creating a database that represents a snapshot of the most essential parts of your computer system. Then a user can run the script to discover all modifications made since the snapshot was taken (i.e. files added, changed, or removed). The configuration syntax is very close to that of aide or tripwire, and a graphical interface is provided.

Changes: Three new classes were added: Afick::Aliases, Afick::Macros, and Afick::Directives. A new macro was added: archive_retention. On Windows, installation of the Tk module is now forced. afickonfig now works on all config types. An inconsistency between command line parameters and config directives was fixed.
tags | tool, integrity
systems | linux, windows, unix
SHA-256 | d73a9ee31690f3b23171387fa6f99dadcf6613bbd0e1efb7e99124ca37275a9d
Another File Integrity Checker 3.3
Posted Dec 27, 2012
Authored by Eric Gerbier | Site afick.sourceforge.net

afick is another file integrity checker, designed to be fast and fully portable between Unix and Windows platforms. It works by first creating a database that represents a snapshot of the most essential parts of your computer system. Then a user can run the script to discover all modifications made since the snapshot was taken (i.e. files added, changed, or removed). The configuration syntax is very close to that of aide or tripwire, and a graphical interface is provided.

Changes: This release continued the rewrite with libraries and unit tests. Afick::Gen, a new library for generic code was added. A bug was fixed in the fix report_url option. The check_update feature was also fixed.
tags | tool, integrity
systems | linux, windows, unix
SHA-256 | 09e9674109a70567315f3b473402b481393dff4d7842f9bf2844db43d014279f
Another File Integrity Checker 3.2
Posted Nov 14, 2012
Authored by Eric Gerbier | Site afick.sourceforge.net

afick is another file integrity checker, designed to be fast and fully portable between Unix and Windows platforms. It works by first creating a database that represents a snapshot of the most essential parts of your computer system. Then a user can run the script to discover all modifications made since the snapshot was taken (i.e. files added, changed, or removed). The configuration syntax is very close to that of aide or tripwire, and a graphical interface is provided.

Changes: This is the second release of the new 3.x branch (a progressive rewrite in object oriented programming). Many bugs were fixed. A new plugin (stat_date) was added. The class Afick::Tst was added.
tags | tool, integrity
systems | linux, windows, unix
SHA-256 | d848542c2832eaa78bdd6919fdbd7f4f023b16fb5bd5f2d82d6e273f19097ba1
Another File Integrity Checker 3.1
Posted Jul 26, 2012
Authored by Eric Gerbier | Site afick.sourceforge.net

afick is another file integrity checker, designed to be fast and fully portable between Unix and Windows platforms. It works by first creating a database that represents a snapshot of the most essential parts of your computer system. Then a user can run the script to discover all modifications made since the snapshot was taken (i.e. files added, changed, or removed). The configuration syntax is very close to that of aide or tripwire, and a graphical interface is provided.

Changes: This is the first public (stable) release of new 3.x branch. It is a rewrite (partial for now) of afick in object oriented programming, to allow better code and better support. It matches the 2.21 release for features. The two afick branches (2.x and 3.x) will be maintained in parallel for a few versions, to allow users to migrate when they want.
tags | tool, integrity
systems | linux, windows, unix
SHA-256 | 933d4fffd3ddffb6eeb8972b47caf3bce6a24d709209a488ab2ddec8e716842c
Another File Integrity Checker 2.21
Posted Jul 17, 2012
Authored by Eric Gerbier | Site afick.sourceforge.net

afick is another file integrity checker, designed to be fast and fully portable between Unix and Windows platforms. It works by first creating a database that represents a snapshot of the most essential parts of your computer system. Then a user can run the script to discover all modifications made since the snapshot was taken (i.e. files added, changed, or removed). The configuration syntax is very close to that of aide or tripwire, and a graphical interface is provided.

Changes: On Unix/Linux systems, the cron job can now notify nagios monitoring, using the nsca tool.
tags | tool, integrity
systems | linux, windows, unix
SHA-256 | a3e1d27385876c05c08eb1166b11ec93813315173953b748a1e2149f47a31761
Another File Integrity Checker 2.20
Posted Feb 7, 2012
Authored by Eric Gerbier | Site afick.sourceforge.net

afick is another file integrity checker, designed to be fast and fully portable between Unix and Windows platforms. It works by first creating a database that represents a snapshot of the most essential parts of your computer system. Then a user can run the script to discover all modifications made since the snapshot was taken (i.e. files added, changed, or removed). The configuration syntax is very close to that of aide or tripwire, and a graphical interface is provided.

Changes: SHA-256 and SHA-512 checksum algorithms were added to replace SHA-1 for better security. Output of SHA checksums are now compatible with the output of the sha1sum, sha256sum, and sha512sum commands.
tags | tool, integrity
systems | linux, windows, unix
SHA-256 | 067e9fd3a6de7bcf39a64c3ea4e28159c8a11605e0f19179116cbaf0b785167e
AiDesign SQL Injection
Posted Jan 9, 2012
Authored by Farbod Mahini, H4ckCity Security Team | Site h4ckcity.org

AiDesign suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | 7eafdb23259045c84ec22e3fe7606b9d8e1e990addd9e8d9fd3f6628b4c8565e
Another File Integrity Checker 2.19
Posted Nov 16, 2011
Authored by Eric Gerbier | Site afick.sourceforge.net

afick is another file integrity checker, designed to be fast and fully portable between Unix and Windows platforms. It works by first creating a database that represents a snapshot of the most essential parts of your computer system. Then a user can run the script to discover all modifications made since the snapshot was taken (i.e. files added, changed, or removed). The configuration syntax is very close to that of aide or tripwire, and a graphical interface is provided.

Changes: A new option (--csv) is added to allow export of the database in CSV format. A new macro (MAILAUTH), permits mail authentication on Windows. A new directive (allow_relativepath) is added that makes internal controls use relative path instead absolute path. A new syntax for file/directories and use of the AFICK_CHROOT environment variable allow 'chrooted directories'.
tags | tool, integrity
systems | linux, windows, unix
SHA-256 | f7f6f52200bb66d9f8c5ad93800fbab84853a74f88790323a5688516a06a2a26
Another File Integrity Checker 2.18
Posted Oct 11, 2011
Authored by Eric Gerbier | Site afick.sourceforge.net

afick is another file integrity checker, designed to be fast and fully portable between Unix and Windows platforms. It works by first creating a database that represents a snapshot of the most essential parts of your computer system. Then a user can run the script to discover all modifications made since the snapshot was taken (i.e. files added, changed, or removed). The configuration syntax is very close to that of aide or tripwire, and a graphical interface is provided.

Changes: This release fixes a lot of little problems on Windows operating systems. A delete button has been added in afick_set_planning.pl. Environment variables in the configuration file are now expanded on-the-fly at the beginning of a run. The program's documentation has been updated.
tags | tool, integrity
systems | linux, windows, unix
SHA-256 | dec04b3f53106cacd1335b01b592eab5a98834e75a09cc837f0526e999409a80
Complemento Penetration Tools 0.7.7.2
Posted Jun 15, 2011
Authored by crossbower | Site complemento.sourceforge.net

Complemento is a collection of tools for penetration testing. LetDown is a TCP flooder written after reading the Fyodor article "TCP Resource Exhaustion and Botched Disclosure". Reverse raider is a domain scanner that uses brute force wordlist scanning for finding a target's subdomains or reverse resolution for a range of IPs. Httsquash is an HTTP server scanner, banner grabber, and data retriever. It can be used for scanning large ranges of IPs for finding devices or HTTP servers.

Changes: Various updates.
tags | tool, web, tcp, rootkit
systems | unix
SHA-256 | 01cec2d94c04ad80540724c9d1a4dcd23cc5c4d7af0fd832e9e85cb729918512
Another File Integrity Checker 2.17
Posted Jun 10, 2011
Authored by Eric Gerbier | Site afick.sourceforge.net

afick is another file integrity checker, designed to be fast and fully portable between Unix and Windows platforms. It works by first creating a database that represents a snapshot of the most essential parts of your computer system. Then a user can run the script to discover all modifications made since the snapshot was taken (i.e. files added, changed, or removed). The configuration syntax is very close to that of aide or tripwire, and a graphical interface is provided.

Changes: Arguments for the --list option should now be separated by a comma instead a space character. Search for the default config file is now the same for Unix and Linux: /etc/afick.conf and then afick.conf. The version is now shared between afick and afick-tk. Arguments for --list can also be given in several calls.
tags | tool, integrity
systems | linux, windows, unix
SHA-256 | 16c0827f38b019c292df6dac99eddc1b658553dfb181f86e551638115f8bc238
Secunia Security Advisory 44749
Posted May 31, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been discovered in AIDeX Mini-WebServer, which can be exploited by malicious people to conduct cross-site scripting attacks.

tags | advisory, xss
SHA-256 | ec6d556b6dd8231392e3ffecd8d0379deb3f1cc3da4e4e897e9ff4b8ae553089
AIDeX Mini-Webserver 1.4 Cross Site Scripting
Posted May 27, 2011
Authored by wingthor

AIDeX Mini-Webserver version 1.4 integrated chat suffers from a persistent cross site scripting vulnerability.

tags | exploit, xss
SHA-256 | 63f08b95e3d992ec65cfd62a1c051d262be94d3bea6b68f906be082536cf1b6e
Hack This Zine #11
Posted Mar 14, 2011
Authored by htz | Site hackbloc.org

Hack This Zine Issue 11 - This issue's topics include Hackers and the Law, Perfect-Privacy.com Raided, Julian Assange Charged With Rape Under Mysterious Circumstances, and more.

tags | magazine
SHA-256 | f0e9a187aabb81661c108b851b949053beebb6bc95f9c9af64cb3b71ba82bb8a
Another File Integrity Checker 2.16
Posted Dec 15, 2010
Authored by Eric Gerbier | Site afick.sourceforge.net

afick is another file integrity checker, designed to be fast and fully portable between Unix and Windows platforms. It works by first creating a database that represents a snapshot of the most essential parts of your computer system. Then a user can run the script to discover all modifications made since the snapshot was taken (i.e. files added, changed, or removed). The configuration syntax is very close to that of aide or tripwire, and a graphical interface is provided.

Changes: Some bugs were fixed in checksum computing.
tags | tool, integrity
systems | linux, windows, unix
SHA-256 | 66d8374c7516016aa8a7fce0af66cc5c2cfea6101ef18e20cdbfe33a76789658
AIDE 0.15.1
Posted Sep 14, 2010
Authored by Rami Lehti | Site aide.github.io

AIDE (Advanced Intrusion Detection Environment) is a free replacement for Tripwire(tm). It generates a database that can be used to check the integrity of files on server. It uses regular expressions for determining which files get added to the database. You can use several message digest algorithms to ensure that the files have not been tampered with.

Changes: Various bug fixes.
tags | tool, intrusion detection
systems | unix
SHA-256 | 303e5c186257df8c86e418193199f4ea2183fc37d3d4a9098a614f61346059ef
Team Johnlong RaidenTunes 2.1.1 Cross Site Scripting
Posted Aug 5, 2010
Authored by LiquidWorm | Site zeroscience.mk

Team Johnlong RaidenTunes version 2.1.1 suffers from a cross site scripting vulnerability.

tags | exploit, xss
SHA-256 | 4199949d35c67667cd038d30a7f4e8a72521e296137d729dadf966fb082dfe7a
Secunia Security Advisory 40837
Posted Aug 5, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Gjoko Krstic has reported a vulnerability in RaidenTUNES, which can be exploited by malicious people to conduct cross-site scripting attacks.

tags | advisory, xss
SHA-256 | 5a8f6359b796d34c629acde4895b66f6253b4d0df6c3b902d580cbc8d0b4c492
Complemento Penetration Tools 0.7.6
Posted May 6, 2010
Authored by crossbower | Site complemento.sourceforge.net

Complemento is a collection of tools for penetration testing. LetDown is a TCP flooder written after reading the Fyodor article "TCP Resource Exhaustion and Botched Disclosure". Reverse raider is a domain scanner that uses brute force wordlist scanning for finding a target's subdomains or reverse resolution for a range of IPs. Httsquash is an HTTP server scanner, banner grabber, and data retriever. It can be used for scanning large ranges of IPs for finding devices or HTTP servers.

Changes: A segmentation fault in HTTSquash was fixed.
tags | tool, web, tcp, rootkit
systems | unix
SHA-256 | 7aa2293ebab917117aa67a1b9e45853e6dae02184c6daf984967f8daef648bd3
Another File Integrity Checker 2.15
Posted Apr 24, 2010
Authored by Eric Gerbier | Site afick.sourceforge.net

afick is another file integrity checker, designed to be fast and fully portable between Unix and Windows platforms. It works by first creating a database that represents a snapshot of the most essential parts of your computer system. Then a user can run the script to discover all modifications made since the snapshot was taken (i.e. files added, changed, or removed). The configuration syntax is very close to that of aide or tripwire, and a graphical interface is provided.

Changes: Afick will now work on Windows Vista/Seven with uac. Afick_cron now uses boune syntax instead of bash syntax. A bug has been fixed for activeperl 5.10.1.1007. Remaining environment variables in the configuration file are detected/replaced by the check_config and clean_config options.
tags | tool, integrity
systems | windows, unix
SHA-256 | 3fbc00b9baf21d4e47916f9da5ebf3cad4f643b51f83c0d0862eb96cf85c07af
WebRaider 0.2.3.8
Posted Mar 3, 2010
Authored by Ferruh Mavituna

WebRaider is a proof of concept quality tool to get a reverse shell out of SQL injection (MS-SQL) by using One Click Ownage.

tags | shell, sql injection, proof of concept
SHA-256 | 745e39d9782621659e4b684fd301e6cd6374a5d4ec94298eadb8e858bdd7080d
complemento-0.7.5.tar.gz
Posted Feb 4, 2010
Authored by crossbower | Site complemento.sourceforge.net

Complemento is a collection of tools for penetration testing. LetDown is a TCP flooder written after reading the Fyodor article "TCP Resource Exhaustion and Botched Disclosure". Reverse raider is a domain scanner that uses brute force wordlist scanning for finding a target's subdomains or reverse resolution for a range of IPs. Httsquash is an HTTP server scanner, banner grabber, and data retriever. It can be used for scanning large ranges of IPs for finding devices or HTTP servers.

Changes: Major updates were made in HTTSquash.
tags | tool, web, tcp, rootkit
systems | unix
SHA-256 | 09840216f79f048ced66d021350d64bdd15eac86f83998784c1b32849f4f1067
Another File Integrity Checker
Posted Jul 28, 2009
Authored by Eric Gerbier | Site afick.sourceforge.net

afick is another file integrity checker, designed to be fast and fully portable between Unix and Windows platforms. It works by first creating a database that represents a snapshot of the most essential parts of your computer system. Then a user can run the script to discover all modifications made since the snapshot was taken (i.e. files added, changed, or removed). The configuration syntax is very close to that of aide or tripwire, and a graphical interface is provided.

Changes: The checksum output is now compatible with md5sum/sha1sum commands. A bug was fixed on negative rules. The quiet option was added. The graphical interface now accepts database, history, and archive command line options.
tags | tool, integrity
systems | windows, unix
SHA-256 | c153bac2a81cf0db04f64c84975d8eb350619b161262ca423f395b9bb6eeb37c
Page 1 of 4
Back1234Next

File Archive:

May 2023

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    May 1st
    15 Files
  • 2
    May 2nd
    16 Files
  • 3
    May 3rd
    38 Files
  • 4
    May 4th
    15 Files
  • 5
    May 5th
    35 Files
  • 6
    May 6th
    0 Files
  • 7
    May 7th
    0 Files
  • 8
    May 8th
    8 Files
  • 9
    May 9th
    65 Files
  • 10
    May 10th
    19 Files
  • 11
    May 11th
    27 Files
  • 12
    May 12th
    8 Files
  • 13
    May 13th
    0 Files
  • 14
    May 14th
    1 Files
  • 15
    May 15th
    19 Files
  • 16
    May 16th
    66 Files
  • 17
    May 17th
    28 Files
  • 18
    May 18th
    32 Files
  • 19
    May 19th
    13 Files
  • 20
    May 20th
    0 Files
  • 21
    May 21st
    0 Files
  • 22
    May 22nd
    23 Files
  • 23
    May 23rd
    15 Files
  • 24
    May 24th
    49 Files
  • 25
    May 25th
    20 Files
  • 26
    May 26th
    13 Files
  • 27
    May 27th
    0 Files
  • 28
    May 28th
    0 Files
  • 29
    May 29th
    0 Files
  • 30
    May 30th
    0 Files
  • 31
    May 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close