Bandmon monitors the bandwidth usage on your network.
fc860fa4a3eba7e426d19566aa2d2d1a5e568080009369f6607b4a605af139af
VLAD the Scanner - A freeware, open-source scanner that checks for the common security problems referenced in the SANS Top Ten list of common security problems. While freeware scanners are not neccessarily unique, VLAD is rather unique because of the amount of vulnerable CGI programs it checks for, and its comprehensive account/password checks (seven different protocols).
c11a359047c6b0adcc8ec01e3e1553c13244ad74fbdcc0023ac9b1bcd4fa6e0b
Form-Totaller version 1.0 (form-totaller.cgi) trusts user input for filenames, allowing a remote user to read any file on the webserver.
e3d777d52f8cfacde87ec258a2d6cfa48ba8b637c56c21835cdf716ee4620394
The Everything Form (everythingform.cgi) contains remote vulnerabilities which allow any file on the sytem to be read.
1b339106ce174c1887c0dbb63dc46ef3e2273e5d5d44fae56593ea21e2c22e12
Cgichk is a web vulnerability scanner which automatically searches for a series of interesting directories and files on a given site. Instead of focusing on vulnerable CGI scripts, it looks for interesting and/or hidden directories such as logs, testing, secret, scripts, stats, restricted, code, robots.txt, etc.
6f6f598ec88ef7adaa2cf7926ee888b9597ebe691c24aafa0507df4f283fdcc4
Security Auditor's Research Assistant (SARA) is a security analysis tool based on the SATAN model. It is updated frequently to address the latest threats. Checks for common old holes, backdoors, trust relationships, default cgi, common logins.
b8db4be53593de73b8f7a025da93a91c2ceec449b028bacc5f2403c98e9b2bfb
dupl.pl v0.4 is a snort rules beautifier which removes duplicate rules from *-lib, vision.conf, and xxxx-rules files.
b76c7e112174613043dc1d689b3076f74a8e39ce5dc0a8e0ed2b5687496b215e
UIN tp IP Converter for ICQ 2000 - This program enables you to retrieve the IP# of any given ICQ Number (UIN) in your online list. (The ICQMAPI.DLL is included) Written in Visual Basic.
15afb0fe0cb8f0a5bd0a3ef032c756d22fb68b16b5c56b1065cfc6af41450b55
BKtspibdc.c allows sniffing on switched networks by flooding the switch with TCP & IP & ARP requests containing spoofed MAC addresses.
3d2385a867ce0b4d297d0ef596abb742173add20b7c3aad942ed6ac3f7b435b0
BKtrpibdc.c is a network tool for arp redirection which implements a man in the middle attack.
6708726e4c0433d5697874606ed537a26e80eecb7fb5d757762d609b588763fd
BKtclipabdc.c is a tool to change the mac address of your ethernet device. It doesn't change the hardware address, but just the stack implementation of it.
f8bd82cad3394a8e8ffbbce3e28b60bcb00bff580ed81044a67a2b1a2e664187
Nmap is a utility for port scanning large networks, although it works fine for single hosts. Sometimes you need speed, other times you may need stealth. In some cases, bypassing firewalls may be required. Not to mention the fact that you may want to scan different protocols (UDP, TCP, ICMP, etc.). Nmap supports Vanilla TCP connect() scanning, TCP SYN (half open) scanning, TCP FIN, Xmas, or NULL (stealth) scanning, TCP ftp proxy (bounce attack) scanning, SYN/FIN scanning using IP fragments (bypasses some packet filters), TCP ACK and Window scanning, UDP raw ICMP port unreachable scanning, ICMP scanning (ping-sweep), TCP Ping scanning, Direct (non portmapper) RPC scanning, Remote OS Identification by TCP/IP Fingerprinting, and Reverse-ident scanning. Nmap also supports a number of performance and reliability features such as dynamic delay time calculations, packet timeout and retransmission, parallel port scanning, detection of down hosts via parallel pings. Screenshot available here.
3cefe3bb966b2062072889ef31c89900491ab7fe7a07ae1a795d6ef84b74e1f0
The wais.pl CGI written by Tony Sanders provides means to access the waisq WAIS client via the webserver. Waisq contains buffer overflows allowing remote code execution which can be exploited via wais.pl. In addition, files owned by nobody on the webserver can be overwritten with arbitrary content. Includes exploit for Linux/x86.
0a1486af2061c3b2f7952eb470c47fcbf6d3d36571a036f046ae5709356c58d1
Sendmail is a Mail Transfer Agent, which is the program that moves mail from one machine to another.
bc497185b4c122db27c444e2c8a91693fe81459630c4718e6a27fa86386e78d7
Zorp is a new-generation modular proxy firewall suite to finetune proxy decisions with its built in script language, fully analyze complex protocols (like SSH with several forwarded TCP connections), and utilize outband authentication techniques (unlike common practices where proxy authentication had to be hacked into the protocol).
538dc3df32203b51e16efa7a67085359cc1bc106bdad261f111aaaca03b17035
Gopher+ v2.3.1p0 remote exploit - Spawns a remote shell on tcp port 36864 under the UID that the gopher+ daemon runs as. Tested against Linux Slackware 3.6 / 7.0.
71aa58978ab9c730cefaa09803a9c98febeb91b69d9d601ac9a232b790ac1e41