exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 11 of 11 RSS Feed

Files

Ninja Intrusion And Prevention System
Posted Dec 5, 2009
Authored by Tom Rune Flo | Site forkbomb.org

Ninja is a privilege escalation detection and prevention system for GNU/Linux hosts. While running, it will monitor process activity on the local host, and keep track of all processes running as root. If a process is spawned with UID or GID zero (root), ninja will log necessary information about this process, and optionally kill the process if it was spawned by an unauthorized user.

Changes: A bugfix for x86-64 platforms when using a log file.
tags | tool, local, root, intrusion detection
systems | linux, unix
SHA-256 | 0be3bda69816beb05a03df470f9d652594aa81dd49baac2bd7ebd2491794712d

Related Files

Ninja 0.1.3 Race Condition
Posted Apr 29, 2015
Authored by Ben Sheppard

Ninja privilege escalation detection and prevention system version 0.1.3 suffers from a race condition vulnerability.

tags | exploit
SHA-256 | 0c04f125429ae3d5bf78e45cae4f47cf93b72213a6ec0a6ae100e2ab1807e2e3
Brief Whitepaper On Underground Hacking
Posted May 27, 2011
Authored by ninjashell

This is a brief whitepaper discussing tools and methodologies used by black hat hackers.

tags | paper
SHA-256 | 99cb5168fe73f25bc8cebea491434ac4136ad39ade7060bd9bca61721ecbea5c
Ninja Blog 4.8 XSS / RFI
Posted Jan 4, 2010
Authored by indoushka

Ninja Blog version 4.8 suffers from cross site scripting and remote file inclusion vulnerabilities.

tags | exploit, remote, vulnerability, code execution, xss, file inclusion
SHA-256 | 696cdbcb461b04b71dc4622a4eb4c261736a4bf3a8299218a7e534ff9309ce80
Ninja Blog 4.8 Cross Site Scripting
Posted Aug 26, 2009
Authored by Moudi

Ninja Blog version 4.8 suffers from cross site scripting vulnerabilities.

tags | exploit, vulnerability, xss
SHA-256 | 5312a74a3dae0b65adfc64707d9ee64e0ecf9ec80f9e1bfcd5c88d997993d2ab
Ninja Blog 4.8 XSRF / XSS
Posted Jan 21, 2009
Authored by Danny Moules | Site push55.co.uk

Ninja Blog version 4.8 suffers from cross site request forgery and cross site scripting vulnerabilities.

tags | exploit, vulnerability, xss, csrf
SHA-256 | 5fbe07eb78e8f607da18b753d206d57a195804171d49b6c8158f3636bfdc2b5e
Ninja Blog 4.8 Information Disclosure
Posted Jan 21, 2009
Authored by Danny Moules | Site push55.co.uk

Ninja Blog version 4.8 suffers from a remote information disclosure vulnerability.

tags | exploit, remote, info disclosure
SHA-256 | 1ac8fb81127a7b04e575118d9675250f9a679afb9faf5e72a948f869c9a46498
ninja-0.1.2.tar.bz2
Posted Sep 1, 2005
Authored by Tom Rune Flo | Site forkbomb.org

Ninja is a privilege escalation detection and prevention system for GNU/Linux hosts. While running, it will monitor process activity on the local host, and keep track of all processes running as root. If a process is spawned with UID or GID zero (root), ninja will log necessary information about this process, and optionally kill the process if it was spawned by an unauthorized user.

Changes: Minor updates.
tags | tool, local, root, intrusion detection
systems | linux, unix
SHA-256 | 4b1821128eeef43d3384ce91ea2756e702ad3d2196e391fac7e54b0f79543eba
ninja-0.1.1.tar.bz2
Posted Aug 19, 2005
Authored by Tom Rune Flo | Site forkbomb.org

Ninja is a privilege escalation detection and prevention system for GNU/Linux hosts. While running, it will monitor process activity on the local host, and keep track of all processes running as root. If a process is spawned with UID or GID zero (root), ninja will log necessary information about this process, and optionally kill the process if it was spawned by an unauthorized user.

Changes: Minor updates.
tags | tool, local, root, intrusion detection
systems | linux, unix
SHA-256 | d3d0b7c8ed845234f1678012845a0b1839a1a14f8a589e1925b07b951fc5cb46
ninja-0.1.0.tar.bz2
Posted Aug 18, 2005
Authored by Tom Rune Flo | Site forkbomb.org

Ninja is a privilege escalation detection and prevention system for GNU/Linux hosts. While running, it will monitor process activity on the local host, and keep track of all processes running as root. If a process is spawned with UID or GID zero (root), ninja will log necessary information about this process, and optionally kill the process if it was spawned by an unauthorized user.

tags | tool, local, root, intrusion detection
systems | linux, unix
SHA-256 | d24a665624c479709b5a91d7303bfba53f43f48945d7908c4bf833a39220f7c8
ninja.tgz
Posted Oct 30, 2003
Authored by Creed

Ninja.c is a tool which encodes x86 shellcode using only the characters [0-9,A-Z,a-z,@]. Includes a test program.

tags | x86, shellcode
SHA-256 | 539de5c4cb66695fd11579eba945ff3a48d18eae357ed1b0cbda5f3f0ef39d55
ninja.zip
Posted Aug 26, 2002

No information is available for this file.

tags | bbs
SHA-256 | c1fdc28c15b81fad1c78d7401566d829dc93ebfba43f373e782bbae36465b5f1
Page 1 of 1
Back1Next

File Archive:

December 2023

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Dec 1st
    11 Files
  • 2
    Dec 2nd
    0 Files
  • 3
    Dec 3rd
    0 Files
  • 4
    Dec 4th
    0 Files
  • 5
    Dec 5th
    0 Files
  • 6
    Dec 6th
    0 Files
  • 7
    Dec 7th
    0 Files
  • 8
    Dec 8th
    0 Files
  • 9
    Dec 9th
    0 Files
  • 10
    Dec 10th
    0 Files
  • 11
    Dec 11th
    0 Files
  • 12
    Dec 12th
    0 Files
  • 13
    Dec 13th
    0 Files
  • 14
    Dec 14th
    0 Files
  • 15
    Dec 15th
    0 Files
  • 16
    Dec 16th
    0 Files
  • 17
    Dec 17th
    0 Files
  • 18
    Dec 18th
    0 Files
  • 19
    Dec 19th
    0 Files
  • 20
    Dec 20th
    0 Files
  • 21
    Dec 21st
    0 Files
  • 22
    Dec 22nd
    0 Files
  • 23
    Dec 23rd
    0 Files
  • 24
    Dec 24th
    0 Files
  • 25
    Dec 25th
    0 Files
  • 26
    Dec 26th
    0 Files
  • 27
    Dec 27th
    0 Files
  • 28
    Dec 28th
    0 Files
  • 29
    Dec 29th
    0 Files
  • 30
    Dec 30th
    0 Files
  • 31
    Dec 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close