Introduction to programming in C - Written with the goal of letting people get the most knowledge as fast as possible from it.
9439ef84c7e9724856d38b8067ccdb5e81490db2fac03db7cd2b1ac0b573b0fd
NScan is a very fast portscanner for Windows (up to 200 ports per second) for both hosts and large networks with numerous features: it scans not only address ranges, but also files with host lists (e.g. proxy list, domain zone or old log), writes logs at the different detail levels, has speed limits, pre-defined service sets and so on. It includes a set of additional tools: whois client, that supports automatic information recognition and fetch, has query history and other features; traceroute, that traces all the way to the host at once in one or two seconds, making route discovery tenth times faster; TCP-based DNS client that supports most of the available options, including AXFR zone transfer.
d0249cf95a04dbcfe4c567d947beec59bdbc4ac21b4dd999816394b4683a9c9e
Secret Agent keeps passphrases and passwords in memory for a configurable timespan. Various applications can be made to cooperate with the agent; support for PGP 2 and GnuPG is provided out of the box, so you do not have to enter your pass phrase every time you sign an email.
77d90114502eb6d37ba85f7d701d359d5f4754253d40a13931b139f6b615e7c3
Pgxconfig is a Raptor graphics card configuration tool for Solaris which has multiple local vulnerabilities. The environment is not sanitized and root privileges are not dropped, allowing commands to be run as root. Local root exploit included.
c672d208fcfc0115d16c23ed363ad4e7466f870b510a0b15f6d338ba4c585b0c
B0g Issue 7 - In this issue: Defcon review, How to own ttysnoop, Taxonomy of Communications Intelligence, Hacking Pine, Paytel Canada payphones, A guide to daemons, Hacking Hotmail, and more.
e7b1fa44f23ed000e666ee7acfbae063c970503697538787259e6bf61dc3dbce
Linux/x86 rpc.statd remote root exploit.
5de64344dc9bb15b3f44b3de59e2f7aae939ea8399dc44a04ff687b5de770027
Ntop -w allows remote users who have permission to view traffic stats to view any file on the system as root.
9de1e58ef979bce83a724e3f9cce6f8179d09e842ccb1ec0db735e19f848fdb3
genocide.c is a dos attack which affects many different web proxies by making multiple connections which tie up all the sockets.
9e065b8db3803c90b6a5c38e2cba0481dce096b68143e275d1d627f37235f6ce
Many HTTP proxies are vulnerable to a denial of service attack because they do not timeout connections to a remote host, causing the proxy to run out of available sockets and start refusing connections. Tested against Delegate 6.1.13. Exploit code included.
a9552173fc6e379e7810ac0699fb84188c3ccbf628f94952e2b66c5ae4c71603
Foundstone Security Advisory FS-073100-10-BEA - It is possible to compile and execute any arbitrary file within the web document root directory of the WebLogic server as if it were a JSP/JHTML file, even if the file type is not .jsp or .jhtml. If applications residing on the WebLogic server write to files within the web document root directory, it is possible to insert executable code in the form of JSP or JHTML tags and have the code compiled and executed using WebLogic's handlers. This can potentially cause an attacker to gain administrative control of the underlying operating systems.
efe85f651d73615fb6cff13785c85e629c1d6000de550891afe91b7b8b3f8677
Microsoft Security Bulletin (MS00-053) - Patch Available for "Service Control Manager Named Pipe Impersonation" vulnerability. Microsoft has released a patch for a security vulnerability in Windows 2000 which allows a user logged onto a Windows 2000 machine from the keyboard to become an administrator on the machine. Microsoft FAQ on this issue available here.
811816b8f54eeecb668d50e232369f06161a4a18095012a0f9bdfe2c5c4a09aa