ESM (Extensible System Monitor) is a program that lets you tie together plugins to monitor your system. This could be used to alert by email or pager in the event of hard drive failure, tripwire alerts, high load, etc. All of this is done automatically. Features fault-tolerent design, unlimited number of agents, simple API, comes with Mailreport and a monitor called ESMSyslog.
7de04f501ebf11244c7e8312fc9c0f1cf50c113ad52b6459cb121943a4fa9905
Gzip for Windows! gzip is gnu zip. This is the self extracting archive.
da97196a1da79cd843e96639721a49993464e3304fd4bf6b44508b53043758b5
GNU zip (gzip) for Windows!
d4643ac853dfc090f48c55802a6525913ce0f3ba36d7363633a108eed5dc0483
This is GNU tar, ported to Windows.
4f952a3f55088df7975f66708aa8aa6ef2c09ee33f3012ae9367d23e67d971e7
Mailing List & News Version 1.7 remote exploit - takes advantage of insecure mail handling to spawn a shell on tcp port 60179.
3a148d33c2f43170a5459c274e9265844c395aa32ff20393b2138faa0365ddd6
Listmail v112 remote exploit which spawns a shell on tcp port 60179. Takes advantage of an insecure open call.
a2ac27c937b546ef9d313562c45140abe85c463a173244433131cd8154e5689a
FormNow CGI script v1.0 remote exploit - Takes advantage of an insecure sendmail call to bind a shell to tcp port 60179.
42bf2ffcf31c7fb94d3cd685478259c9560724e80bf63d3d45532dea4c785e1e
News Update 1.1 advisory / remote exploit which allows changing the passwords for the cgi program without knowing the former password, allowing malicious users to modify your news-page.
8ebdb22642d1fa6286496e52ac9000e2dacc42f9352cbae20dec72dc68ce24bc
Older version of the host command contains a remotely exploitable buffer overflow. The host command is used to perform the AXFR request to obtain the zone transfer information, and can be caused to execute arbitrary code when connecting to a fake DNS server, a netcat process listening on port 53.
39951d3f589829a119033d3606128b1ac7e7273f64901d487f9e72eb6efa1de7
aix2passwd converts the AIX shadow passwd (located in /etc/security/passwd) into a regular crackable passwd file, which can be cracked with any password auditing tool.
9d80b662e5db3010c29386a3f63cdb0de68f428134449a4a02ba2dac7bd9407d
SuSE Security Advisory - A vulnerability has been found in the ncurses library, which is used by many text based applications. Insufficient boundary checking leads to a buffer overflow if a user supplies a specially drafted terminfo database file. If an ncurses-linked binary is installed setuid root, it is possible for a local attacker to exploit this hole and gain local root access. SuSE recommends patching this vulnerability by removing the SUID bits from xaos, screen, and cda.
ac12b02288d39d5602539adb46a4349398da66ae75f08fcfd4f548ea2d04d609
The Half-life Dedicated Server for Linux contains remotely exploitable buffer overflow vulnerabilities. Includes remote buffer overflow exploit hl-rcon.c which has been tested against v3.1.0.x for Linux x86.
4e21668332d5a5c5d6b07f99eee2df8e776267a63c81e42ab56b09b08e270f90
This program exploits a flaw in the share level password authentication of MS windows 95/98/ME in its CIFS protocol to find the password of a given share on one of these machines, as discussed in ms00-072. Google flags this as malware so only use this if you know what you are doing. The password to unarchive this zip is the word "infected".
96e29bad718463491122f8f7ad5158fa52c389629d4c02a73b7d0bb812c5f9c8
Unicodexecute2 is a simple perl script to execute commands on vulnerable IIS servers w/ Unicode, as described in this article.
5b2cf0d0ae0a8d6764aa36ceead14fd067a55867c82158f7611f7b7fe312bc2c
net-acct logs network traffic. It provides a daemon (nacctd) that logs all traffic passing through the machine it runs on, and the level of detail of output is configurable.
070910cfa7ec695a5f484944a28cc21d046a722bd518b7e6417b534fba5f1fbe
SysWatch is a perl / cgi script that allows you to view current system information, disk utilization, resource utilization all in your web browser.
cc28d6f7ceb389374a6875ed6db1cbe730a4a9b1aef223691b6d79cc8596ac56
MIME Defanger is a flexible MIME e-mail scanner designed to protect Windows clients from viruses and other harmful executables. It works with Sendmail 8.10 / 8.11 and will alter or delete various parts of a MIME message according to a flexible configuration file.
aa09583049c2dc09d442ad91672b0f11e4ddc10b62246bf491f93d2adefe03a8
Godmessage worm is a worm based on Godmessage IV. Untested dangerous code. Archive password is set to p4ssw0rd. Use at your own risk.
3346db355c6be01b0aaa5c128b82b86b8f3b56605b03829b4ee95fc9fa06d88a
S.A.F.E.R. Security Bulletin 001026.EXP.1.8 - iPlanet Web Server 4.x for Solaris, Linux, and Windows NT contains a remotely exploitable buffer overflow if server side parsing is enabled with the "parsed html" option.
22b7bfa6cd36594ff96d31ea269f256e311351303fa334059f3529b110ff1068