exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 26 - 50 of 100 RSS Feed

Files

AIDE 0.17
Posted Jan 25, 2021
Authored by Rami Lehti | Site aide.github.io

AIDE (Advanced Intrusion Detection Environment) is a free replacement for Tripwire(tm). It generates a database that can be used to check the integrity of files on server. It uses regular expressions for determining which files get added to the database. You can use several message digest algorithms to ensure that the files have not been tampered with.

Changes: Updated man pages. Removed outdated aide.conf.in. Limited number of nested includes. Updates to documentation and various bug fixes.
tags | tool, intrusion detection
systems | unix
SHA-256 | 4fd88d1d5ddc70c698c6519ebbc05c8d32c3f6d8137bbfdefeaebaafd6db867b

Related Files

Secunia Security Advisory 35963
Posted Jul 23, 2009
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Some vulnerabilities have been reported in RaidenHTTPD, which can be exploited by malicious people to conduct cross-site scripting attacks and disclose potentially sensitive information.

tags | advisory, vulnerability, xss
SHA-256 | 2bb4168db6f2c41522b173898f5c5f12d3deed9f8bb236801ae7208d0e828b03
COMRaider Insecure Method
Posted Jul 17, 2009
Authored by IRCRASH | Site ircrash.com

COMRaider CreateFolder() and Copy() insecure method hard disk filler exploit.

tags | exploit
SHA-256 | 6dc754186ff68f974317f5e7dbe75367f2be240d23e025ce07f6537f16294108
Complemento Penetration Tools
Posted Apr 22, 2009
Authored by crossbower | Site complemento.sourceforge.net

Complemento is a collection of tools for penetration testing. LetDown is a TCP flooder written after reading the Fyodor article "TCP Resource Exhaustion and Botched Disclosure". Reverse raider is a domain scanner that uses brute force wordlist scanning for finding a target's subdomains or reverse resolution for a range of IPs. Httsquash is an HTTP server scanner, banner grabber, and data retriever. It can be used for scanning large ranges of IPs for finding devices or HTTP servers.

Changes: Major improvements were made in all tools. LetDown now supports Python scripting for multistage protocols. ReverseRaider has many new DNS features. HttSquash has been rewritten.
tags | tool, web, tcp, rootkit
systems | unix
SHA-256 | 0fc520b857f3d367a876deab158b90287f0d8020981d24071511ca1b200f4d86
Complemento Collection Of Pentesting Tools
Posted Jan 26, 2009
Authored by crossbower | Site complemento.sourceforge.net

Complemento is a collection of tools for penetration testing. LetDown is a TCP flooder written after reading the Fyodor article "TCP Resource Exhaustion and Botched Disclosure". Reverse raider is a domain scanner that uses brute force wordlist scanning for finding a target's subdomains or reverse resolution for a range of IPs. Httsquash is an HTTP server scanner, banner grabber, and data retriever. It can be used for scanning large ranges of IPs for finding devices or HTTP servers.

tags | tool, web, tcp, rootkit
systems | unix
SHA-256 | 08c6ca5d023bbf50d43246bc47e894a7f12cab09a5faf2d7d3f69994cf85b2cc
Another File Integrity Checker 2.13-1
Posted Jan 21, 2009
Authored by Eric Gerbier | Site afick.sourceforge.net

afick is another file integrity checker, designed to be fast and fully portable between Unix and Windows platforms. It works by first creating a database that represents a snapshot of the most essential parts of your computer system. Then a user can run the script to discover all modifications made since the snapshot was taken (i.e. files added, changed, or removed). The configuration syntax is very close to that of aide or tripwire, and a graphical interface is provided.

Changes: Removed udev files from scan. Began to remove global variables. Various other bug fixes and additions.
tags | tool, integrity
systems | windows, unix
SHA-256 | c3070a5715957e2d8f94273a98bc4f922f8d2077847b1e2c87f41ca241e65b61
Complemento Penetration Testing Tool Kit
Posted Dec 31, 2008
Authored by crossbower | Site complemento.sourceforge.net

Complemento is a collection of tools for penetration testing. LetDown is a TCP flooder written after reading the Fyodor article "TCP Resource Exhaustion and Botched Disclosure". Reverse raider is a domain scanner that uses brute force wordlist scanning for finding a target's subdomains or reverse resolution for a range of IPs. Httsquash is an HTTP server scanner, banner grabber, and data retriever. It can be used for scanning large ranges of IPs for finding devices or HTTP servers.

tags | tool, web, tcp, rootkit
systems | unix
SHA-256 | 6933bf187c12a9167f4b60b368ae8ab9d19eb3c8cd8421225b57193f574875c1
Complemento Penetration Testing Kit
Posted Dec 9, 2008
Authored by crossbower | Site complemento.sourceforge.net

Complemento is a collection of tools for penetration testing. LetDown is a TCP flooder written after reading the Fyodor article "TCP Resource Exhaustion and Botched Disclosure". Reverse raider is a domain scanner that uses brute force wordlist scanning for finding a target's subdomains or reverse resolution for a range of IPs. Httsquash is an HTTP server scanner, banner grabber, and data retriever. It can be used for scanning large ranges of IPs for finding devices or HTTP servers.

tags | tool, web, tcp, rootkit
systems | unix
SHA-256 | a9c415af494e5be03b60dde1ffa3bf530546c49c85c8648c3fab1f8a7ec24f93
afick-2.12-1.tgz
Posted Oct 23, 2008
Authored by Eric Gerbier | Site afick.sourceforge.net

afick is another file integrity checker, designed to be fast and fully portable between Unix and Windows platforms. It works by first creating a database that represents a snapshot of the most essential parts of your computer system. Then a user can run the script to discover all modifications made since the snapshot was taken (i.e. files added, changed, or removed). The configuration syntax is very close to that of aide or tripwire, and a graphical interface is provided.

Changes: Some bug fixes and additions.
tags | tool, integrity
systems | windows, unix
SHA-256 | 8fbdb2e3c4adb8abc36c58252bb031dc8d04d53a7e59d39b275a29a1bc76e829
Secunia Security Advisory 32216
Posted Oct 15, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - dmnt has discovered a vulnerability in RaidenFTPD, which can be exploited by malicious users to compromise a vulnerable system.

tags | advisory
SHA-256 | 0e15cc114ad7a498c6eaf113d7d2f2a074648b193a44760d87a9e9e34f8c429e
raiden-dos.txt
Posted Oct 13, 2008
Authored by dmnt

RaidenFTPD version 2.4 build 3620 remote denial of service exploit.

tags | exploit, remote, denial of service
SHA-256 | 4d68fbe64c1d8654e9d53b67b07bb2184df637451e645473423eec1b898ee06c
domainraider.tar.gz
Posted Sep 27, 2008
Authored by Jeremy Brown | Site jbrownsec.blogspot.com

Domain Raider is a brute forcing utility to find a target's sub-domains.

tags | cracker
SHA-256 | f5796f130056d86cedf30f8f27ae002ad298b2b58a2180df1cde76d30ea114b2
phpraider-rfi.txt
Posted May 27, 2008
Authored by Dr.Kacak

phpRaider version 1.0.7 suffers from a remote file inclusion vulnerability in phpbb3.functions.php.

tags | exploit, remote, php, code execution, file inclusion
SHA-256 | d90c1021ef11c6ca70018e1fac98584a7b89ebc24524ed76d6167ed7eeeb9611
Secunia Security Advisory 30375
Posted May 27, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - KaCaK has discovered a vulnerability in phpRaider, which can be exploited by malicious people to disclose sensitive information and to compromise a vulnerable system.

tags | advisory
SHA-256 | 141ae52220288db24881a525dd3b9c587c3232dfb0197acd2685cef17d637f22
afick-2.11-1.tgz
Posted Apr 16, 2008
Authored by Eric Gerbier | Site afick.sourceforge.net

afick is another file integrity checker, designed to be fast and fully portable between Unix and Windows platforms. It works by first creating a database that represents a snapshot of the most essential parts of your computer system. Then a user can run the script to discover all modifications made since the snapshot was taken (i.e. files added, changed, or removed). The configuration syntax is very close to that of aide or tripwire, and a graphical interface is provided.

Changes: Some bug fixes and additions.
tags | tool, integrity
systems | windows, unix
SHA-256 | 673ffbfd010c1c40cf1b2c6602fbc592d45dc9e5540844d1d8b3d4b95dc6cdd8
Secunia Security Advisory 28770
Posted Feb 6, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in RaidenHTTPD, which can be exploited by malicious people to conduct cross-site scripting attacks.

tags | advisory, xss
SHA-256 | da8ac656cff68f73a24d799c26ba17b0b8d1d5990bccf06eba215b17c7c838fd
Secunia Security Advisory 28143
Posted Dec 19, 2007
Authored by Secunia | Site secunia.com

Secunia Security Advisory - rgod has discovered a vulnerability in RaidenHTTPD, which can be exploited by malicious people to disclose sensitive information.

tags | advisory
SHA-256 | c5d7603e59315b85b1c148033009c7b239f053b6112f6f45fe0e92d331092f8a
raidhttpdudo.txt
Posted Dec 18, 2007
Authored by rgod | Site retrogod.altervista.org

RaidenHTTPD version 2.0.19 ulang command execution proof of concept exploit.

tags | exploit, proof of concept
SHA-256 | 673b614fe243897edcb2b2bdcbd71a1f52312222617148de6b1adb3a887a63ac
Secunia Security Advisory 26711
Posted Sep 5, 2007
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Red Hat has issued an update for aide. This fixes a security issue, which can be exploited by malicious, local users to bypass certain security restrictions.

tags | advisory, local
systems | linux, redhat
SHA-256 | a2936d3925d2ecce6409aaf59dac447b823f6ced4ab04aa8a183d1cd1800132c
integrit-4.1.tar.gz
Posted Jun 6, 2007
Site integrit.sourceforge.net

Integrit is an alternative to file integrity verification programs like tripwire and aide. It helps you determine whether an intruder has modified a computer system. integrit's major advantages are a small memory footprint and simplicity. It works by creating a database that is a snapshot of the most essential parts of your computer system. You put the database somewhere safe, and you can then use it to make sure that no one has made any illicit modifications to the computer system. In the case of a break in, you know exactly which files have been modified, added, or removed.

Changes: Fixed exit status, considering missing files correctly as a change.
tags | tool, intrusion detection
systems | unix
SHA-256 | 2a09b670ee025d6fae756e044f780ccaca90688a97183a350927e3885174223e
afick-2.10-1.tgz
Posted May 24, 2007
Authored by Eric Gerbier | Site afick.sourceforge.net

afick is another file integrity checker, designed to be fast and fully portable between Unix and Windows platforms. It works by first creating a database that represents a snapshot of the most essential parts of your computer system. Then a user can run the script to discover all modifications made since the snapshot was taken (i.e. files added, changed, or removed). The configuration syntax is very close to that of aide or tripwire, and a graphical interface is provided.

Changes: Some bug fixes and additions.
tags | tool, integrity
systems | windows, unix
SHA-256 | ccf388983b47fc1f8e85226a1d1f4d1b44f41a5bfdc7587b72148fcb0777f171
raiden24-dos.txt
Posted Apr 23, 2007
Authored by sapheal

RaidenFTP version 2.4 suffers from multiple denial of service vulnerabilities.

tags | advisory, denial of service, vulnerability
SHA-256 | 4de07c4a80e3bfd19cd740efc309dcc025aeb33c5ff3f26b9b4381e7d27b1509
Secunia Security Advisory 23569
Posted Dec 29, 2006
Authored by Secunia | Site secunia.com

Secunia Security Advisory - shinnai has discovered a vulnerability in AIDeX, which can be exploited by malicious people to cause a DoS (Denial of Service).

tags | advisory, denial of service
SHA-256 | ec0f7cedd4c2ba16582e39de2300cac5f814ed2a0b7dfd32d53152e666cf0d6f
GestArt_vbeta_1.txt
Posted Oct 30, 2006
Authored by Wasem898

GestArt vbeta 1 and prior suffer from a remote file inclusion vulnerability in /gestArt/aide.php.

tags | exploit, remote, php, file inclusion
SHA-256 | d5c5b20e02b057928a8151002d3b6ef3b90265dc9cddd6a3645261773fc6b16b
afick-2.9-1.tgz
Posted Oct 6, 2006
Authored by Eric Gerbier | Site afick.sourceforge.net

afick is another file integrity checker, designed to be fast and fully portable between Unix and Windows platforms. It works by first creating a database that represents a snapshot of the most essential parts of your computer system. Then a user can run the script to discover all modifications made since the snapshot was taken (i.e. files added, changed, or removed). The configuration syntax is very close to that of aide or tripwire, and a graphical interface is provided.

Changes: Some bug fixes and additions.
tags | tool, integrity
systems | windows, unix
SHA-256 | a5a4c6467366081cfc8fa798db44e5f44641c7b83b9af36cfc1db9af47305cd4
Secunia Security Advisory 21833
Posted Sep 12, 2006
Authored by Secunia | Site secunia.com

Secunia Security Advisory - rgod has discovered a vulnerability in RaidenHTTPD, which can be exploited by malicious people to compromise a vulnerable system.

tags | advisory
SHA-256 | bb0df56350966b5295f3e93e1e5e8207509d83cac732e64b1679379cd3fb5c73
Page 2 of 4
Back1234Next

File Archive:

June 2023

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Jun 1st
    18 Files
  • 2
    Jun 2nd
    13 Files
  • 3
    Jun 3rd
    0 Files
  • 4
    Jun 4th
    0 Files
  • 5
    Jun 5th
    32 Files
  • 6
    Jun 6th
    39 Files
  • 7
    Jun 7th
    22 Files
  • 8
    Jun 8th
    0 Files
  • 9
    Jun 9th
    0 Files
  • 10
    Jun 10th
    0 Files
  • 11
    Jun 11th
    0 Files
  • 12
    Jun 12th
    0 Files
  • 13
    Jun 13th
    0 Files
  • 14
    Jun 14th
    0 Files
  • 15
    Jun 15th
    0 Files
  • 16
    Jun 16th
    0 Files
  • 17
    Jun 17th
    0 Files
  • 18
    Jun 18th
    0 Files
  • 19
    Jun 19th
    0 Files
  • 20
    Jun 20th
    0 Files
  • 21
    Jun 21st
    0 Files
  • 22
    Jun 22nd
    0 Files
  • 23
    Jun 23rd
    0 Files
  • 24
    Jun 24th
    0 Files
  • 25
    Jun 25th
    0 Files
  • 26
    Jun 26th
    0 Files
  • 27
    Jun 27th
    0 Files
  • 28
    Jun 28th
    0 Files
  • 29
    Jun 29th
    0 Files
  • 30
    Jun 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close