Linux rpc.nfsd has real_path bug. Vulnerable are RedHat 5.2 and Debian 2.1, local only in most cases.
1853738a3818451ec52cfb97c1b54df616bd2086214f56b0e53130f0dd0433fa
One security bug and several functionality bugs have been fixed in a new release of initscripts. A /tmp race existed in /etc/profile.d/lang.csh. Users who had csh/tcsh as their login shell could be vulnerable to having arbitrary shell code run by their shell on login.
971038611775d944acbfec933a168df6999aa96a656cdd69a92bc3e238cb7df3
Titan is a collection of programs, each of which either fixes or tightens one or more potential security problems with a particular aspect in the setup or configuration of a Unix system. At the moment it only works on sunos, solaris, and linux.
e4fb2ef832dbc20ba3d2ed46a2a4b488be00edc0bbf550a2506ca5e95f50bdb0
SpyNet v2.06 is a sniffer for Win 95 / Win 98 which can recompose the original TCP sessions from the composing packets. Reconstructs telnet sessions, e-mail messages, POP3 logins, etc. Also has the ability to fake cookies it sniffs. Screenshot here.
b8afe933da5a07be5d41b776757490eed64568a136b8a8ca198b85bf76d5ca21
SpyNet v3.00 works! Spynet is a sniffer for Win 95 / Win 98 which can recompose the original TCP sessions from the composing packets. Reconstructs telnet sessions, e-mail messages, POP3 logins, etc. Also has the ability to fake cookies it sniffs.
f39d006352cf62f7e75d78937fbc9a1d255dbefd95b7783ee67cb24595cd8992
Remote DoS Attack in TransSoft's Broker Ftp Server v3.5 Vulnerability.
bc5c8241925213abf26be436ed1ae35a1c5d72b7971cd1c8a013c92b000c3e87
The log-proxy server is a perl script which can be used as a direct fixed-destination proxy, or as an http proxy. It sends all the data being sent or recieved in both hex and ascii to stdout so it can be easily logged to a file. log-proxy also has built-in support for colored output.
19f629897cec5992d03c770d5837651bc22708120896dbc3826b12ddeb4b2c5c
Kmap is a QT/KDE front-end to nmap, a popular and powerful console portscanner. Kmap allows quick and easy access to all of nmap's features, with much less hassle. Kmap also sorts the output from nmap into usable sections, so you easily extract the information you want.
518612e75e6fcb548a930bdf9334fa090d580b8022af122e62039de8514584cd
Logwatch provides a client/server architecture for viewing logfiles on multiple machines on a network. With a single daemon process running on each participating computer, logfiles can be tailed from any authorized machine. Multiple logfiles on multiple machines can be followed with a single client process by specifying the machines and files to follow.
39583b7bcfa05e6bac8964d2e2ed38b98707b722312bb43babd2ca27f6bad959
Xipdump is a protocol analyzer and tester. It's a kind of graphical tcpdump(8) with possibility of changing packet values and resending them. It could be also defigned by the term "human IP stack". Graphical representation of a packet is intended to have a complete, customizable view at a glance.
41c806a52552d9c0ca69b883cbd2da9b5a5b590f91db225aa396512708fa2d7d
iplog is a TCP/IP traffic logger. Currently, it is capable of logging TCP, UDP and ICMP traffic. iplog 2.0 is a complete re-write of iplog 1.x, resulting in greater portability and better performance. iplog 2.0 contains all the features of iplog 1.x as well as several new ones. Major new features include a packet filter and detection of more scans and attacks. It currently runs on Linux, FreeBSD, OpenBSD, BSDI and Solaris.
799cb9b23700ed9f554e9b074a6a3f5303e52dfd0e44843efd5515fc4c20367f
firesoft is a collection of Perl scripts for viewing snort-generated logs and ipchains logs. The package includes a bar chart creator from ipchains logs, to quickly view who has been scanning you the most.
4fb6ac3726d2ee46e1eed632e9031387e99c60694386b203fba668c5142b6c47
There is a problem (actually several) with the "cgiwrap" program on Cobalt RaQ2 servers. This can be used to break other sites on a RaQ2 in several ways.
8105413f2c7ca65abc0278ea5141490cab31082aacbbd3cad6b8e1ff4e4a5ffb
NTHunter is a program that contains several d.o.s. attacks against NT servers. There are lots of variations of this program. But I wrote it, cause it includes real OOB attack to 135 port & "coke". Some programs do not send oob-attack to 135, just try to flood this port.
285395bc48ca16387b690f5612bfa480f31a6208624cdaf64ae326bafb0ae3a1
targa3 is a DoS exploit that sends random IP packets with parameters known to cause crashes on various machines, and can be used to determine if a systems IP stack is really stable and crash-proof under unexpected conditions.
6253f5fba61013437021a6884ee572f1df8670c179847720a71bf3779779e140
Exploit of the Microsoft script lib bug and reg wiz control buffer overflow allow very evil code to be executed when this html is viewed. A very large number of systems are at risk. Archive password is set to p4ssw0rd. Use at your own risk.
2c6c2d017075957476ae82d4d32b9259c7126bdee155230e91a6e7eafd564dc2