Nessus is a free, up-to-date, and full featured remote security scanner for Linux, BSD, Solaris and other systems. It is multithreaded, plugin-based, has a nice GTK interface, and currently performs over a thousand remote security checks. It has powerful reporting capabilities (HTML, LaTeX, ASCII text) and not only points out problems, but suggests a solution for each of them. Windows version available here.
8ef4e4953c3069a87bdcf639fae6f3c68322d76de42c723d2f50712db53b8946
FreeBSD and OpenBSD remote Samba v2.2.x call_trans2open i386 buffer overflow exploit. Tested against OpenBSD 3.0 and FreeBSD 4.6.2-RELEASE with Samba v2.2.x. Includes support for target brute forcing. Information about the vulnerability is available here.
f677c9d6fb78104c365cb38722fea0540f263fc2adf56d38ded0fbb35c2f2573
LKL is a userspace keylogger that runs under linux x86/arch. LKL logs everything which passes through the hardware keyboard port (0x60). Keycode to ASCII translation is supported.
679352f1e08ffc5cfe6292171c0f108c101f5a74762075a23257f7e477f502fe
CERT Advisory CA-2003-13 - Two remote vulnerabilities in the Snort IDS, versions 1.8 through 2.0 RC allow remote execution of code as root. It is not necessary for the attacker to know the IP address of the Snort device they wish to attack; merely sending malicious traffic where it can be observed by an affected Snort sensor is sufficient to exploit these vulnerabilities. Fix available here.
5a3ec3a941e459dab6ee1434d872c4142fa7d76c874532b7b896c46b440d6bbe
CORE Security Advisory CORE-2003-0307 - A remotely exploitable heap overflow vulnerability has been found in the Snort stream4 preprocessor module which allows remote code execution if a snort sensor picks up an exploit packet. Vulnerable versions include Snort 2.0 versions prior to RC1, Snort 1.9.x, 1.8.x, and IDS's with snort embedded. Includes information on exploitation using hping.
dfed14afc923672fedae803a8b7cc07e21bc0d52931be34ba0d08d9c33e81c92
Wellenreiter is a GTK/Perl wireless network discovery and auditing tool. its scanner window can be used to discover access-points, networks, and ad-hoc cards. It detects essid broadcasting or non-broadcasting networks and detects WEP capabilities and the manufacturer automatically. Dhcp and arp traffic will be decoded and displayed to give you further informations about the networks. A flexible sound event configuration lets it work in unattended. An ethereal / tcpdump-compatible dumpfile can be created. GPS is used to track the location of the discovered networks immediately. Automatic associating is possible with randomly generated MAC address. Wellenreiter runs also on low-resolution devices that can run GTK/Perl and Linux/BSD (such as iPaqs). An unique Essod-bruteforcer is now included too. prism2, Lucent, and Cisco based cards are supported.
5951e08289e6312bb1903b8db9375afa29fd3d4a3780d451be50975d1629d648
Blowdoor v3.0 is a backdoor for Unix systems and uses md5sum passwords for authentication.
d0efcb0d097e945cd6f9af81c4f3ccc3b2a09fd3782a8723520953441cad5ff3
Local exploit for sendmail 8.11.6 which takes advantage of the vulnerable prescan() function which allows users to input 0xff to skip the length check of the buffer. Includes targets for Slackware 8.0, Redhat 7.2, and Redhat 7.3.
6c7b5fd249e10c235502380844b5482f60d098427bce8782f3b77db91c26779f