Latin word list. (154214 words)
02a62fad2e8537658a5c23c6bd2b16ba9c39274bbbfc28d463bbe003c2868553
Japanese word list. (231200 words)
ffc34c1eb5e895163df5b593d09934daada17ab261fdf04b7df9f64a4f9cf400
Italian word list. (360852 words)
1560aa99be098c8bb0c4ae39030415b953a75495451d71dd712ebafa07b1cfc4
Hungarian word list. (18001 words)
971b94b41a91347c7462efda57faeb04097b68517681fe0344e484180dc41903
Greek word list. (111955 words)
6f77367526ced237b8b0fa0d3d4b17b585c6ee16a52a5048c5518993d607440a
German word list. (339429 words)
0eba866a66f5c44e1fd521b051e2de8f3e4aa943cf13e77277a171df7d3836b5
French word list. (276514 words)
530fc006ba5dd47b51f7ade0b4b189000c38c949eb34c31cd2a12689cf00d0cd
Finnish word list. (287698 words)
04e9074489e0cc3eaa416fe0e13cc3f2487ef25ed8b1ee7cfdf34c0a0e631dc8
Ethnologue word list. (84882 words)
dee2d33e7a924bf88112e02edbdde5e4fe5c8aff9d94de89286ec858dc2143df
English word list. (80024 words)
604cb165f60d346eb16c666cd8ba7c99bd4b5b88ab7e836ee709f420f0982994
Dutch word list. (356858 words)
09b5b3b497fb4cb0bc8a0ef4dbb8f47681253009dd1b6cd2f3edb264c9ee37f6
Danish word list. (25485 words)
2e11b16abe315b1da75cf6cd9584ca6686436e688c2cebc84d8e49bf0632d848
Czech word list. (162132 words)
b9a11bf44f0ad9d1a2ce9c98c1ec5bfd7cbc9b38369dd5b37bb24508d0503201
Croatian word list. (28130 words)
ef3e070541bef81255fdf4180c9951803e726edc5689bb1bc94df476777b3fa7
British word list. (7894 words)
945d600f0ff689d17fed6068e4c83b9fde17905dfc8f0354e3fd5c6e53593e85
African word list. (130621 words)
d83aa109c568c8c4af0cb7df20a11cf0262326a8f10330e441a9709e99fa8aa6
Chinese word list. (821 words)
00684ee714bbf45b948dddc91edcd19fb6cba5793511dbcc4dcd2597ff9bbeab
Mod_security is an Apache module whose purpose is to protect vulnerable applications and reject human or automated attacks. In addition to filtering requests, it also can create Web application audit logs. Understands regular expressions and POST payloads and runs on both branches of Apache.
3c0f0caac30d7f9e9fe9f7c8060dc034726aac11b2aba3ecb5d16c0aea592429
Port Scan Attack Detector (psad) is a collection of four lightweight daemons written in Perl and C that are designed to work with Linux firewalling code (iptables and ipchains) to detect port scans. It features a set of highly configurable danger thresholds (with sensible defaults provided), verbose alert messages that include the source, destination, scanned port range, begin and end times, TCP flags and corresponding nmap options, email alerting, and automatic blocking of offending IP addresses via dynamic configuration of ipchains/iptables firewall rulesets. In addition, for the 2.4.x kernels psad incorporates many of the TCP, UDP, and ICMP signatures included in Snort to detect highly suspect scans for various backdoor programs (e.g. EvilFTP, GirlFriend, SubSeven), DDoS tools (mstream, shaft), and advanced port scans (syn, fin, Xmas) which are easily leveraged against a machine via nmap. Psad also uses packet TTL, IP id, TOS, and TCP window sizes to passively fingerprint the remote operating system from which scans originate.
23aa86882c56d9f2814574058a8d1e31d5769553d07f4d73b59786b97e2860b9
This is a proof-of-concept tool to demonstrate possible distributed attacking concepts, such as sending packets from one workstation and sniffing the reply packets on another.
d9c7ac5f2dae560efd2e8381a3c102663f7bd295b34cd3d688847fd5cb3845af
Enum is a console-based Win32 information enumeration utility. Using null sessions, enum can retrieve userlists, machine lists, sharelists, namelists, group and member lists, password and LSA policy information. enum is also capable of a rudimentary brute force dictionary attack on individual accounts. &nbs;
ef78f9a8ba0b828bd878764098066000235132b2f9fef67ca988cb1f8dd17470
Porttool is the proof-of-concept code for the Windows LPC ports vulnerabilities reported by RAZOR to Microsoft.
8638fb3a54caa3088878ac46ac7f1f2c080dd71ed386b32ba7d5007f372c9070
ACL tools contains two tools: lsaacl and samacl. lsaacl allows allows you to display and edit security descriptors for LSA objects. samacl allows you to display and edit security descriptors for SAM objects.
ba7775253e27a833211ff12358821b81fad79f0e34f49f7581c5e1897feabf1a
The RPC tools package contains three separate tools for obtaining information from a system that is running RPC services. rpcdump allows you to dump the contents of the endpoint mapper database. ifids is similar to rpcdump but allows you to query a single RPC server and can even allow you to query an RPC server which is not listed in the endpoint map obtained with rpcdump above. walksam is a tool which allows you to dump the information of each user found within the SAM database via Named Pipes or using the additional protocol sequences used by Windows 2000 domain controllers.
1526cb1947be29fc1bf338f36f7c4b647ca7000ccaf9d08eccbceccb426bffcc
OpenSSL below v0.9.7c contain remotely exploitable vulnerabilities. More information available here.
ea9866c77f76bacc238efbeb4e59592d6677f7874ecdf583c67cebfceb8fa68c