Tping is a TCP ping program.
72a03941aafe05451616951b0b49766935e762add8b4d53fc83376928a2720ee
Wsh is a remote UNIX shell that works via HTTP. The client script provides a shell-like prompt, encapsulating user commands into HTTP POST requests and sending them to the server script. The server script extracts and executes commands and returns STDOUT and STDERR output. Features include command line history support, file upload/download, and it can work through an HTTP proxy server.
b834c4db84d318669ff633451ab7d72bf8e3903505c69f880c2913014e41e80b
Poor Mans IDS is a couple of scripts which check certain files on your host (any you like) for changes in content, ownership, and mode. Rather than only mailing if something is wrong (like other IDSs), this lean IDS will send you a daily (or weekly or hourly, depending on how you set-up your cron job) security audit, containing details of what it found.
298794e2cf9d6abfa7c29c30582db1988cec10ea7123f8b7f3fb6b9c7b1ea774
XScreenSaver is a modular screen saver and locker for the X Window System. It is highly customizable and allows the use of any program that can draw on the root window as a display mode. It is also more stable than xlock and has more than 150 modes.
eea036fc9ca7808a03160267f4bd4d26f2a94a3e832ca55fa1175905c62ae4be
Fenris is a multipurpose tracer, stateful analyzer and partial decompiler intended to simplify bug tracking, security audits, code, algorithm, protocol analysis and computer forensics by providing a structural program trace, general information about internal constructions, execution path, memory operations, I/O, conditional expression info, and much more. A small demonstration how this tool works can be found here.
447932c5e732d97ca339be5ddc5f94b42a695561b36cbd93615154bb8cd4e733
Morpheus request share files denial of service exploit. Ported to Cygwin by Luigi Grandini
ffc476b90e9c53aacd410867129ca28b410dec076d56ea21751f205cba44b39c
Execiis.c is a remote exploit for Bugtraq ID 2708 - Microsoft IIS CGI filename decode error. Ported to Cygwin by Luigi Grandini
41e56d9794973e1c019e15f98d3bc785395e501be437d345c64524ff25a8d55e
Cfingerd prior to v1.4.3 remote root exploit for linux/x86. Exploits a format string vulnerability in the syslog() call. Ported to Cygwin by Luigi Grandini
001eab558ecb8deaea5ecfd0cb633b3f88ddc7ca656b976fb86de7009f824ec4
Eeye Advisory - IIS 4.0 and 5.0 for Windows NT and 2000 contain a remotely exploitable heap overflow which allows remote code execution. The bug is in transfer chunking in combination with the processing of HTR request sessions.
48ccb83f54a8646059f912592e5f6d519b887ca5833838d10ec76f21014b6fa0
Mysniff is a libpcap sniffer with RC4 encryption. It sniffs the first 128 bytes of data sent to ftp / telnet / pop2 / pop3 / imap & rlogin servers, therefore revealing the logins & passwords used.
31d07614c6db216761d571488cd56ba9006a9b15466be23101f8ff713dcf3cc5
Gobbles Security Advisory - IrcIT v3.1 and below contains remotely exploitable buffer overflows.
97ee352d2d7fd9fa4acd8cc8a695704a73bac3426eeff5e2abf032545734f145
The Oracle 9iAS Reports Server contains a remotely exploitable buffer overrun vulnerability in one of its CGI's. By supplying an overly long database name parameter to the rwcgi60 with the setauth method, an attacker can run code with the privileges of the web server, or SYSTEM on windows.
36a7f0df817729ef91da8556ccad29083ab8e3a5fd0b1f644b31ce787342fffa
The Oracle TNS Listener version 9i contains a buffer overflow vulnerability which can be exploited over tcp port 1521 to gain remote SYSTEM / root access. By supplying an overly long SERVICE_NAME parameter an attacker can execute code before any logging is done.
09848a3033d275f59cf4d5ef91914e928a9a4fc43a64f46b30fa0e2a771e35d4
THC-Hydra is a parallized login hacker which understands FTP, POP3, IMAP, Telnet, HTTP Auth, NNTP, VNC, ICQ, Socks5, PCNFS, samba, cisco enable, LDAP, and more. Includes SSL support. Hydra is now included in Nessus.
18cf489547d06c85e5e7d6050ff0246134c609950137697f81a4716bd421c97a