Kerberos 4 cracker.
1e2ec4124c5ea5abc860098482da56da54827ff1882ff0bc51e8a78488c36135
Monkey S/Key challenge/response auditor and white paper. Works similarly in nature to Alec Muffet's CRACK. In essence it takes the md4 value in either HEX or English words and compares it to a dictionary.
91361b4f1c1136c90bd9c318b67f64854190eb95ae32e1899a0166c2aa19e602
Antisniff Unix Researchers (free) version 1-1 - This is a command line only version that runs many of the same tests to determine if a sniffer is running on the local network that the Windows NT/98/95 GUI does. Currently only Solaris and OpenBSD are supported.
d6e2c4c3da8d8dc4fa5b2a702a65d8f22552aff1a897e8f70b86863afc84a4ef
imap_core.sh is a quick proof of concept tool that causes some imapd implementations to dump core. Unfortunately the core file contains the password and shadow password file in it!
5e97f6397d4e546bc641fcd0059100b35a6649499f07bf90d15bf975d7a592ee
initscripts-4.48-1 on RedHat Linux is vulnerable to a race condition. Contains the l0pht advisory on the subject and exploit.
8fbb95a1d486767654b91e051c53b1fe705011257fc3403f663104539a8a7c68
Application: Cactus Software's shell-lock. (a) A trivial encoding mechanism is used for obfuscating the shell code in the "compiled" binary. Anyone with read permissions to the file in question can decode and retrieve the original shell code. Another vulnerability exists where the user can retrieve the un-encoded shell script without needing to actually decode the binary. (b) The vendors claim the program to be useful in creating SUID binaries on systems that do not honor SUID shell scripts and also to protect against the security problems with SUID shell scripts. As it turns out any shell-lock "compiled" program that is SUID root will allow any user to execute any program with root privileges.
fbc992a6624e12b0216864edca92c85c28dcac58f61f8ee50642f370d5371b9a
Quakenbush Windows NT Password Appraiser software sends users password hashes and even plaintext passwords out through the Internet, regardless of firewall rules.
1c8af51b12b6d745cf6013df3d5a7e38a7194174382a59ffba2407bcf308f873
A tool designed to monitor directory activity, copy transient files based upon regular expression matching, syslog upon seeing links created, etc. etc.
009d0caa417af9984853ed35b338892c7e71f91002af3a6f3002f7c09c443272
L0pht (mini)Advisory - Just about every OS out there is replete with programs that insecurely handle files in publicly accesible temporary directories.
7c56fbb452a59b584cfe504fc6c4abd39f8bd034cb7ab418e773b2613b6d0607
Poor security coding leaves several race conditions and other security problems in Clear Case, a configuration management program from Rational Software. Local root compromise. "clear_waste.sh" exploit code included.
956fb8fc120b620f5d57d1e03ed6693777c34c60bb007966b51b57d0a9569947