pcds is a Perl script written to monitor processes on a system and report changes.
5f198c35bda7d05c078a7a683a87be3ceb477bc374af209b621c46a0a2c6e406
Env_audit is a program that ferrets out everything it can about the environment. It looks for process IDs, UID, GID, signal masks, umask, priority, leaked file descriptors, and environmental variables. It comes with test configurations for anacron, Apache, atd, crond, GDB, inittab, logrotate, PHP, pppd, procmail, rsh, rxvt, Sendmail, SSH, stunnel, sudo, xinetd, and xterm.
2ded505c9776412372ae67832707fe5e29399cee84b389c485c1bfc340a0fe2c
Jay's Iptables Firewall is a bash script that allows one to easily install and configure a firewall on a Linux system. It features support for multiple interfaces, TCP/UDP/ICMP control, masquerading, synflood control, spoofing control, port forwarding from specific interfaces, VPNs, ToS, denying hosts by IP or MAC address, ZorbIPTraffic, Spyware list IP, Pre/Post scripts, log options, and more. The firewall is able to launch custom iptables rules, and the configuration of the firewall is assisted by an optional, interactive, curses-based Perl script.
7cebbf7fd1aa9923bb8d2fa34d7818752a7195080fb0c036e19ab4e96350b332
Whitepaper detailing how to successfully patch the linux kernel in order to allow ptracing /sbin/init, and subsequently inject a connect-back shellcode into the target process. Patch code included.
8f53ec04bcff41e9accc09e517f1377b092c491fe8ae8d1ad5bb913474b9c162
Exploit code that makes use of the showHelp() vulnerability found in Microsoft Explorer versions 5.x-6.0. This file must be renamed with a .html extension to work.
df1ca6fa1d9d5d0313b50e8210ed14c64f175b0dd2ee7b9c9100c8e99159e329
A flaw exists in Microsoft Internet Explorer 5.x-6.0 that allows a remote attacker to execute a file using chm in showHelp().
74dacbfe84a67a971cd82b2d9a84831f67dbb9786abc754990bc01ccd23a36b1
Gallery versions 1.3.3 and below suffer from a cross-site scripting vulnerability in its searching functionality.
3b40870b0304d5f379e4c14f009bb9a9df94a16511285d52a426f305dbde5f76
php-ping improperly filters user inputs, allowing for a malicious remote attacker to execute arbitrary commands as the webserver uid.
eb4c1e1ec0ead88df0513af866db209a8221dfe268483b81a69311c05b77cf3a