CGIAudit is a black-box debugging tool which automatically audits CGI entities with only an interface specification, the HTML form. Attack types that a CGI script or program become subject to are configurable, as well as server replies that denote a possible penetration success. Other features include a built-in spider, proxy support, and hexadecimal encoding of requests.
d126c77221362b232d8c30d9ff3b6318d53fa438bbc6f491cf482f578d240a23
Randsrc is a source address randomizer - Useful to test IDS or to make multiple connections to hosts which limit the number of connections from a single IP.
3dc221dee14f35a70250e4b63d37bf96d95118a8521476824739cd6de26b4ec4
Porkbind is a robust and recursive DNS server vulnerability scanner which retrieves version.bind information for the nameservers and produces a report.
fb7a21d8b5f93c12ff2934c69ef93177b0472495d7bf408dcab7194ce7d727c0
shadyshell.c is a flexible, obfuscated, and lightweight UDP portshell. Takes client input via netcat -u.
16c3e56c91fe42a99758dc394e3c954f75985e353ac20556e6c3104449fdc5f9
Gnapster and possibly other napster clients do not check the integrity of filenames in download requests. Any filename that the client user has read access to may be downloaded. Also includes some service denial techniques.
5712de51a767ac94e1223643e7f8b24f6f5b3594014d86267156adb3b30b5091
irii-dcc is a set of perl scripts which exploits a dos vulnerability in ircii-4.4 when sending and receiving a dcc chat request from/to a vulnerable client.
480639cea435396e89c11b39f8dea3c9b7d5cc7feb64de1783c33a07eca4a819
Porkbind retrieves version information for the nameservers of a domain and produces a report that describes possible vulnerabilities of each.
01a44bdfaa6dfb80b04ef2c830604c4afaa45a6a9b4cae13d918a5c240ce64ee
tcpsee is a tcpdump pipe written in C. It converts tcpdump's snarfed hex data to ASCII and has optional ANSI colors.
f87b03b194b80ebfd706405bdb319f02a5f85655b298e77077a0b816a8dcac19
TCPDecode accomplishes about the same thing the tcpdump2ascii, but it does so with much less code and provides an easier to read output.
a6eac96120866390646660bdabb8ef5e5b3f8a31249293e25ef780be0b0411f9
RedHat PAM/userhelper(8) exploit.
f18b4f73e5694842dfc5ecb7c1e365ae978f921c21ef0a6785f79e7e781884a2