This python script is a modification of the heartbleed proof of concept exploit that looks for cookies, specifically user sessions.
6be146c172695396122c8d40d4638e904f2ee1a827bd6f5062014ed22f051f9f
HITBSecConf2006 Presentation - Client Honeypots - Its Not Only The Network.
e330bb5cd0ddf943f40890e4bda401671766859f0c31edeef80c1b2dfb8d4029
Snort 1.7 for Windows - This is a working port of Snort to Windows NT/2000/9x.
9158523305f16b03181280f71400362f5d8c75014152b3fcc0a2688e97d43131
Snort 1.6.2.2 ported to Windows - This is a working port of Snort to Windows NT/2000/9x. Changes include interface names, filenames, and syslog changes. Source available here.
9f853454f4330a398ff17c7d7961ca2d15d41680e45ecc3e2d3db6c48320f32f
Snort 1.6 ported to Windows - This is a working port of Snort to Windows NT/2000/9x. (Includes source and binaries). Changes include interface names, filenames, syslog changes.
ff9d6331b885789ffeb9729434a74185db36464c478ae5e923c591b0f9c1761d
Due to improper bounds checking in Ipswitch's IMAIL POP3 server, a buffer overflow occurs when a lengthy username is sent (via "USER <200-500 character username>"). It has been tested this on version 5.07, 5.05, and 5.06. DoS exploit included.
024c34f871eff512dad7f84e077f8d26c4ee44d0b3c97cadac9ee2725c368b32