wgdecode extracts WinGate administrator passwords from Windows 9x/NT machine registries and decodes them.
908bb0f468a55441c09dc6cea4fc99ddcb9917e24f388a006adfafae37b75bcd
Countertrace is a userland iptables QUEUE target handler for Linux 2.4 kernels running Netfilter which attempts to give the illusion that there are multiple, imaginary IP hops between itself and the rest of the world. The imaginary hops that countertrace projects also have the ability to introduce accumulative, imaginary latency.
734617249e43f4c7bb9acecb2dc784d92d6b0c00aca3f8c6786f94e2e9c17a4c
Nessus is a free, up-to-date, and full featured remote security scanner for Linux, BSD, Solaris and some other systems. It is multithreaded, plugin-based, has a nice GTK interface, and currently performs over 910 remote security checks. It has powerful reporting capabilities (HTML, LaTeX, ASCII text) and not only points out problems, but suggests a solution for each of them. Windows version available here.
17348a524fbbce0e7b5a5bac9cde1c5de4f63bb00f7a0cd93013200287f7280a
Sendform.cgi v1.4.4 and below has a directory traversal vulnerability which allows remote attackers to read any file with the privileges of the web server. Fix available here. Bugtraq ID 5286.
694cdf39c7befd0a99c544d8c6c02d17f57020d35701886d6ec90789a6b1f585
Honeyd is a small daemon that creates virtual honey pot hosts on a network. The hosts can be configured to run arbitrary services, and their TCP personality can be adapted so that they appear to be running certain versions of operating systems. Any type of service on the virtual machine can be simulated according to a simple configuration file. Instead of simulating a service, it is also possible to proxy it to another machine.
71953be88fe40dd10108080de26dbd1c1ec9589f541747989be8d856255bcd05
This Linux LKM allows you to hide tasks to KSTAT, a tool used to find attackers in your system by a direct analysis of the kernel through /dev/kmem. StMichael_LKM 0.10 (default installation) will not detect this. Tested on Linux 2.4.x kernels.
dc49efaef89afbc43c5d83140237d54e06f4f046160e60f98d081ee41e55de3e
OpenSSL v0.9.6d and below remote exploit. In Spanish and HTML.
c34b8fba056f5bcd3a787b5a7169313629bd6aefd0786a4f6dd8dcd59e681114
openSSL is a robust, fully featured Open Source toolkit implementing the Secure Sockets Layer (SSL v2/v3) and Transport Layer Security (TLS v1) protocols with full-strength cryptography world-wide.
331be02e2bd7d7c7f0c991b8d04e0fb9c83d4dc9b94f9e3e75d5c4853518d122
Tcptraceroute is an implementation of traceroute which uses TCP SYN packets, instead of the more traditional UDP or ICMP ECHO packets. In doing so, it is able to trace through many common firewall filters.
1ef6c4736b55f47d3a2bb26b999cbb409953a112f637bcbec4106da2a0937bde
The Cross Site Scripting FAQ - Includes threat analysis, examples of cross site scripting attacks, cookie theft, how to protect yourself, and how to fix the holes.
661e74609dc323f6e78804ba0e5ebb3534a09bcb6cea0f0f0bbc0773b2ba234a
PHP exploit lab v1.0 - Attempts to browse, read, execute, and mysqlread.
1246fe064866a0ec61ae145cf847039bbc1ff2f2a60977d2c4104bfae6cf3569
CERT Advisory CA-2002-23 - OpenSSL prior to 0.9.6e, up to and including pre-release 0.9.7-beta2 contains four remotely exploitable buffer overflows. Overflows exist during the SSLv2 handshake process, SSLv3 handshake process, kerberos SSLv3 handshakes, and holding of ASCII representations of integers. Denial of service vulnerabilities exist in the handing of ASN.1 encoding. Version 0.9.6e of OpenSSL is recommended.
ef774b602053003d0d658ca5f315acab980139edbb7d5815b8b082e757868945
Windows port of RFParalize.c, which crashes Windows 95/98 remotely with a corrupt popup message. Ported by Cys
33ee27e58de8411db3d31bbdaf2063b3946217a0356bdfb82bce67321b3c9214