Cgichk is a web vulnerability scanner which automatically searches for a series of interesting directories and files on a given site. Instead of focusing on vulnerable CGI scripts, it looks for interesting and/or hidden directories such as logs, testing, secret, scripts, stats, restricted, code, robots.txt, etc.
47937001a230d3e10896211f3c3d820eb3e969277cbc5a736ef051717fd564f3
Fuzz searches for new security vulnerabilities by generating random garbage which can be passed in several ways to programs to see if they can be made to crash or hang.
29b280efe18fc556c6dcba186c430ae12addb85b83e715cd6ee0e1ace1fb5058
Foundstone Security Advisory - Two show code vulnerabilities exist with BEA's WebLogic 5.1.0 allowing an attacker to view the source code of any file within the web document root of the web server. Depending on web application and directory structure attacker can access and view unauthorized files. Proof of concept URL's included.
a1739693599c1bd00c0168ba2ed4568341d3855b737c21cb6ff4a6e8b88a66b3
Etherape is an etherman clone which displays network activity graphically. Active hosts are shown as circles of varying size, and traffic among them is shown as lines of varying width. It is GNOME and pcap based. Screenshot here.
e445ae87463e53f2888604cecbf389c8eee66aceaa830406e73ae8645776a716
The Anomy mail sanitizer is a filter designed to block email-based attacks such as trojans and viruses. It reads an RFC822 or MIME message and removes or renames attachments, truncate unusually long MIME header fields and sanitizes HTML by disabling Javascript and Java. It uses a single-pass pure Perl MIME parser, which can make it both more efficient and more precise than other similar programs and has built-in support for third-party virus scanners.
dafaa757b66be13f66b725cb857e1ea3989a90eef7ce7a96ca8da47e6a5b7ce4