what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 13 of 13 RSS Feed

Files Date: 2003-10-17

libnids-1.18.tar.gz
Posted Oct 17, 2003
Authored by Nergal | Site libnids.sourceforge.net

Libnids is a library that provides a functionality of one of NIDS (Network Intrusion Detection System) components, namely E-component. It means that libnids code watches all local network traffic, cooks received datagrams a bit (quite a bit ;)), and provides convenient information on them to analyzing modules of NIDS. So, if you intend to develop a custom NIDS, you do not have to build low-level network code. If you decide to use libnids, and you have got E-component ready - you can focus on implementing other parts of NIDS.

Changes: Rejection of TCP packets with old timestamp, fixed memory corruption, and more.
tags | tool, local, intrusion detection
systems | unix
SHA-256 | b0275c914197a53c6ccf631eac756fd37ec6f2d8f09f15757061495cf9be0fcd
libShellCode-0.2.1.tar.gz
Posted Oct 17, 2003
Authored by ORK | Site orkspace.net

libShellCode is a library that can be included when writing linux/i386 exploits by providing functions that generate shellcode with user given parameters during runtime.

Changes: Bug fixes for one byte heap overflows. Added examples.
tags | shellcode
systems | linux
SHA-256 | eb23dfd2e215f67685a489a5c03f1de67404c5cea819ed591c39de78b5546c81
bububu.zip
Posted Oct 17, 2003
Authored by GriYo, TheVoid | Site griyo.hellsparty.com

Utility that is a Microsoft Windows 2000 command-line application that creates a fake host in a Windows workgroup.

systems | windows
SHA-256 | 0b1fc8ce2d098910059401ae98e833c12c3cead2413e9846e433278f91e14067
x.zip
Posted Oct 17, 2003
Authored by GriYo | Site griyo.hellsparty.com

Command-line Microsoft Windows 2000 / XP application which sends random ICMP, TCP and UDP traffic to a given host. It randomizes the source IP, source port, TOS, offset, ICMP type and code, etc.

tags | denial of service, udp, tcp
systems | windows
SHA-256 | 5ae2d4c544eb41605a0f126c27941f37487df80d16e6d801b44da506fa11b398
oracle_ownage.c
Posted Oct 17, 2003
Authored by c0ntex

Local exploit for Oracle Release 2 Patch Set 3 Version 9.2.0.4.0 for Linux x86 that makes use of a buffer overflow to escalate user privileges via the oracle binary.

tags | exploit, overflow, x86, local
systems | linux
SHA-256 | 2c21dea3eb6b73fa7a98866ffe0291269326fe9469746e2067e9471a004ab542
tiger-3.2.1.tar.gz
Posted Oct 17, 2003
Site savannah.gnu.org

The Tiger Scripts are a security tool set designed to perform audits of UNIX systems. It's useful as an security check tool and as a host intrusion detection tool (if configured to run through cron and by sending e-mail reports).

Changes: Tons of changes all available in the changelog here.
tags | tool, scanner
systems | unix
SHA-256 | fc4832368c39094ec28b1b9ca0326f7f5636a84ce85a515d090df92018366627
Pound-1.5.tgz
Posted Oct 17, 2003
Authored by roseg | Site apsis.ch

Pound is a reverse HTTP proxy, load balancer, and SSL wrapper. It proxies client HTTPS requests to HTTP backend servers, distributes the requests among several servers while keeping sessions, supports HTTP/1.1 requests even if the backend server(s) are HTTP/1.0, and sanitizes requests.

tags | web
SHA-256 | 0f8d3ee93f757198ca8ced83d82022a0a2a18ad25d6a644cdf922323f82fddf3
afick-1.3-0.tgz
Posted Oct 17, 2003
Authored by Eric Gerbier | Site afick.sourceforge.net

afick is another file integrity checker, designed to be fast and fully portable between Unix and Windows platforms. It works by first creating a database that represents a snapshot of the most essential parts of your computer system. Then a user can run the script to discover all modifications made since the snapshot was taken (i.e. files added, changed, or removed). The configuration syntax is very close to that of aide or tripwire, and a graphical interface is provided.

tags | tool, integrity
systems | windows, unix
SHA-256 | 319c038feea039d99bc264bf7faf901520c708b0ff8141263a79afba5ce9e2f0
silc-toolkit-0.9.10.tar.gz
Posted Oct 17, 2003
Authored by priikone | Site silcnet.org

SILC (Secure Internet Live Conferencing) is a protocol which provides secure conferencing services in the Internet. It can be used to send any kind of messages, in addition to normal text messages. This includes multimedia messages like images, video, and audio stream. All messages in the SILC network are encrypted and authenticated, and messages can also be digitally signed. SILC protocol supports AES, SHA-1, PKCS#1, PKCS#3, X.509, OpenPGP, and is being developed in the IETF. This tarball holds all developer related files.

tags | protocol
SHA-256 | d537d0bc36c46d8b68453108b43f19229542f689be44b67bc9ee2bef6b2fa351
silc-client-0.9.13.tar.gz
Posted Oct 17, 2003
Authored by priikone | Site silcnet.org

SILC (Secure Internet Live Conferencing) is a protocol which provides secure conferencing services in the Internet. It can be used to send any kind of messages, in addition to normal text messages. This includes multimedia messages like images, video, and audio stream. All messages in the SILC network are encrypted and authenticated, and messages can also be digitally signed. SILC protocol supports AES, SHA-1, PKCS#1, PKCS#3, X.509, OpenPGP, and is being developed in the IETF. This tarball holds all client related files.

tags | protocol
SHA-256 | d467a6c8abc03450f8ba830488eb60833ef7fcd5ad71115053eb4b4f5960929d
silc-server-0.9.14.tar.gz
Posted Oct 17, 2003
Authored by priikone | Site silcnet.org

SILC (Secure Internet Live Conferencing) is a protocol which provides secure conferencing services in the Internet. It can be used to send any kind of messages, in addition to normal text messages. This includes multimedia messages like images, video, and audio stream. All messages in the SILC network are encrypted and authenticated, and messages can also be digitally signed. SILC protocol supports AES, SHA-1, PKCS#1, PKCS#3, X.509, OpenPGP, and is being developed in the IETF. This tarball holds all server related files.

tags | protocol
SHA-256 | a414e9be254f67d851387344a63cb5a0f4661d30907262f8c6c44e8dd5ffa4e4
radmind-1.2.0.tgz
Posted Oct 17, 2003
Site rsug.itd.umich.edu

radmind is a suite of Unix command-line tools and a server designed to remotely administer the file systems of multiple Unix machines. Radmind operates as a tripwire which is able to detect changes to any managed filesystem object, e.g. files, directories, links, etc. However, radmind goes further than just integrity checking: once a change is detected, radmind can optionally reverse the change.

Changes: Pipelined lcreate, Added progress output option -v to fsdiff, f_noauth exits so client gets error, Fixed libsnet one off error, Added -R to radmind usage, mkdirs clears errno on success, Updated configure script, Added known issues section to README.
tags | tool, intrusion detection
systems | unix
SHA-256 | 5d916e5f1a346e029e9ff6c68b67542b0c0b5066be2dfaddf8d10e23a7859f0e
MS-crash.txt
Posted Oct 17, 2003
Authored by Dr. Insane | Site members.lycos.co.uk

Under some circumstances, it seems that when some code is added into a Microsoft Word document and then spell checked, the application will crash.

tags | advisory
SHA-256 | b3ae1023eb8bb7fc1504b78ead52b1dd1ca967aea41d061f9279d8d88b423b9a
Page 1 of 1
Back1Next

File Archive:

May 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    May 1st
    44 Files
  • 2
    May 2nd
    5 Files
  • 3
    May 3rd
    11 Files
  • 4
    May 4th
    0 Files
  • 5
    May 5th
    0 Files
  • 6
    May 6th
    28 Files
  • 7
    May 7th
    3 Files
  • 8
    May 8th
    4 Files
  • 9
    May 9th
    54 Files
  • 10
    May 10th
    12 Files
  • 11
    May 11th
    0 Files
  • 12
    May 12th
    0 Files
  • 13
    May 13th
    17 Files
  • 14
    May 14th
    11 Files
  • 15
    May 15th
    0 Files
  • 16
    May 16th
    0 Files
  • 17
    May 17th
    0 Files
  • 18
    May 18th
    0 Files
  • 19
    May 19th
    0 Files
  • 20
    May 20th
    0 Files
  • 21
    May 21st
    0 Files
  • 22
    May 22nd
    0 Files
  • 23
    May 23rd
    0 Files
  • 24
    May 24th
    0 Files
  • 25
    May 25th
    0 Files
  • 26
    May 26th
    0 Files
  • 27
    May 27th
    0 Files
  • 28
    May 28th
    0 Files
  • 29
    May 29th
    0 Files
  • 30
    May 30th
    0 Files
  • 31
    May 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close