IP Sentinel is a tool that prevents unauthorized usage of IP addresses within an ethernet broadcast domain by answering ARP requests. After receiving faked replies, requesting parties store the MAC in their ARP tables and will send future packets to this invalid MAC, rendering the IP unreachable. Features chroot non-root operation.
48b53b8f19c25acf1368831f6082565e60816e1e7455da58e3eef0e6fcb9bfaa
ARPToxin is a fully functional command line ARP Poisoning utility for the Windows platform which uses winpcap. Includes preset modes of operation for different attacks and the ability to change any field in the ARP packet.
794c525f8ef11e769e466454613d9fb3b75d5984967282db6cc02e156eb01200
THC-Hydra is a high quality parallelized login hacker for Samba, Smbnt, Cisco AAA, FTP, POP3, IMAP, Telnet, HTTP Auth, LDAP, NNTP, MySQL, VNC, ICQ, Socks5, PCNFS, Cisco and more. Includes SSL support, parallel scans, and is part of Nessus.
47d15c2b336a796a3d5af5bbe31e65b6f185711aefe832cbdf160912af59d05e
Opera for Windows v7.x prior to v7.23 build 3227 remote exploit which sets up a web server and feeds Opera a URL that will create and execute a batch file on the clients computer.
891a85480af8748c80ed1edca1fb41307aeb3953d8d3d94c6e759652073767f1
Apache 1.3.*-2.0.48 remote users disclosure exploit - Checks Apache webservers for a wrong default configuration of mod_userdir which allows account name guessing and then attempts to login to the found accounts with ftp. Effective against Linux and *BSD boxes.
9ebf9d02a9390c8ff2fee63f5a4681199fc9a1055bff1cbd68bce1199fcc32d8
ThunderstormWks is a mass exploiter / scanner for the windows workstation vulnerability discussed in ms03-049. Can scan random IP ranges quickly and contains a ftp download payload.
694612fd27f60e80475796f0afdffdc554276104596f06a8469f36d6c0b7e7ed
Linux kernel do_brk local root exploit for kernel v2.4 prior to 2.4.23.
f98be0441d82e009d44e6c534ff42d61320cb3bbe6090cd293642c072981f3d8
Microsoft Workstation Service WKSSVC Remote Exploit for the bug discussed in MS03-049. This version does not crash services.exe until the shell exits.
b075c77144f36a6e676c63b82c7fd5d9f80b6895cbd35ae9696d1dc5ef967471
Eznet v3.5.0 and below remote stack overflow exploit which includes shell code that downloads and runs an executable from a web server.
764cf4e0bf5f01b4ed6cff73b4071a15737bdaddab4b8c634e3fcbdaa9e41918
Eznet v3.5.0 and below contains a stack overflow in eZnet.exe which can be exploited in a GET request to SwEzModule.dll.
f6257c897987cc1e3d11a346e0c9313375ab796a397fcf72b2e85cc15cd1b584
Tclworm.tcl is a worm coded in TCL/Expect which exploits easily guessed passwords.
0c9228c982c7b924b7ccb6422167e490a8ec9d7bbd96d8253170385626c0bcf4