Super Scan 2.03. Finally, a windows based port scanner which deserves its name, multi-threaded, fast as lightning with NO Windows TCP/Stack memory problems.
2d2808f6200ba66cc80fcb5626f8013ce0244986f42f3fa86fd52a516ddced35
Would you believe another buffer overflow in wuftpd? Exploit for wu-2.5.0(1).
6748c4c30e2293620d90597dffc8323dd09b5eb73cc4970bf1d6037744c4dde3
Remote buffer overflow exploit for ftpd from AIX 4.3.2 running on an RS6000. (power).
f0c984201d8083d24c2110284f243e70cb1da334d0f2090e3e7fbc36efda7ad6
Demo of lokkit.
60912690f810c637f1ba3f03dd980c5675984a9427fad5e9aed491e9da3c7e66
Lokkit v0.2 - Lokkit is an attempt to provide firewalling for the average Linux end user. Instead of having to configure firewall rules the Lokkit program asks a small number of simple questions and writes a firewall rule set for you. Lokkit is not designed to configure arbitary firewalls. To make it simple to understand it is solely designed to handle typical dialup user and cable modem setups. It is not the answer to a complex firewall configuration, and it is not the equal of an expert firewall designer.
3128cc0c8ba5d42be0bd3564ad564dacee06ecabd508f68e11327e56a1d6d4d8
Lokkit is an attempt to provide firewalling for the average Linux end user. Instead of having to configure firewall rules the Lokkit program asks a small number of simple questions and writes a firewall rule set for you. Lokkit is not designed to configure arbitary firewalls. To make it simple to understand it is solely designed to handle typical dialup user and cable modem setups. It is not the answer to a complex firewall configuration, and it is not the equal of an expert firewall designer (Official Site).
da8a09b51310de77f47c78252c1c8e3c1dc97e3ded32306b68ac45d53fa7e78c
ngrep v1.34 is a program that mimics as much functionality in GNU grep as possible, applied at the network layer. ngrep stands for network grep, and is a pcap-aware tool that will allow you to specify extended regular expressions to match against the data payloads of packets, and currently recognizes TCP and UDP, and works on ethernet, ppp and slip interfaces. Excellent tool. Check it out!
939652cf9f6d668430106174d30bf55b2ebcfca11a57e5555e63e483b590d841
Squiler's tutorial on phreaking.
6bf08b081bdd59c097b250f719066f6e4c1afbf1f98515bc196d65bc58649a00
Various means, methods, and implications of bugging the public switched phone network.
74c9f070e2f39ba5563461ce57744725d8c61783cb5f59b0c0cdc0bbae236275
Phreaking Tutorial (version 1.0) - this should get all those newbie phreakers out there started.
c75a9ba042b347b7db9b1b90a81eb0445055f3bc94ad312e30b0da1099ebacc0
Part II of Squiler's tutorial.
7b3e70949095ecdec4ee5486faf03db9eb275c4466ac2667165956096ad5e39a
Ad Blocking Tutorial (version 1.7) - are you tired of seeing stupid commercials and popups popping on your screen and chewing up your bandwidth? Then read this!
d37aff61fad79e851756fa572f2612a4179cf9206f06d62d60d763d3fdc3ead4
Anonymity Tutorial (version 1.2) - tired of people getting your IP over ICQ or IRC? Tired of website owners knowing everything about you? Tired of people tracing you by your Email address? Read this one and learn how to anonymize yourself!
084cde839bbfa6fbd8322567bb20b4011df934860d5d6aea088787c580c56d1d
Info Gathering Tutorial (version 1.3). Techniques that can be used to find information about people.
546743e1ca9d79e5ac6a5bcc5444dd1672874a8a33a7139545813d1b5605c568
Proxy/WinGate/SOCKS Tutorial (version 1.0) - don't know what a Proxy is? Don't know what a WinGate is? Don't know what a SOCKS firewall is? Want to learn how to increase your anonymity using them? Then read this one.
b0efb5e99953ae9c9d7abbb4e4ab6e62fe3879ba52e04281e9d5786ff44327c4
Windows Registry Tutorial (version 1.0) - learn more about the Windows registry. How does it work, what does it do and what happened to the old .ini files?
2e0f0a87b3e8bcfc106423cd91b0e20512ce85468259b01d71a12639dd4a1156
IRC Warfare Tutorial (version 1.0) - ever wanted to know how those lamers keep taking over your channel and/or kicking you off.
394b76c7518250a09463db6e565d7040c66cc26d3fefc0260040f718a3b6c226
I found the security vulnerability in uum Japanese Kana-Kanji FEP. This program is installed on many Japanese UNIX with default. /usr/bin/uum is a suid program, it overflows if the long argment is specified with -D option. I coded an exploit for the Linux, the local user can obtain a root privilege. I also confirmed this overflow on the following OSs. Solaris 2.6,2.7, IRIX 5.3,6.2,6.3,6.4,6.5.
75d10efd76a82f9cc72dc1429601602647de0c1bcc53dae1aed671cf4c40f5ed
A program to scan for Cold Fusion vulnerabilities. Simply feed it a list of domains and it will let you know if any are vulnerable.
13c76d2e2b6d763f841a14abdcb1978f46b2397943ecb7ba2327bc96bb94d18b
ExploitExpress is an engine that will parse scripts written in its own scripting 'language' and submit info to CGI scripts. Exploiting CGI scripts has never been easier.
35507765c8664ac313206fca3e23cead01e5af5ec3a4f2d38765ad95346748b9