A small whitepaper discussing code auditing in C.
11fb1c5a2417f1cd02c72bad9316aff637575f8a2d814bd9c9c5aa3d3fff2ca7
loginject is a Syslog message injector.
83a2a25125e17e3d3927a4705739122d03d904fd4cfd7fe52c0043c06aa369cd
TRPG is a root password generating tool. It can make use of multiple salts and generate passwords at least 45 characters in length.
36a091e201af2c333897f277f62a857fc28d9f22aa63b2cbf503467f094f6d04
Cheetah version 1.0 is a remote Linux/BSD backdoor that offer low CPU usage, Port/Backlog selection, a remote shell, user/password protection, and process faking.
14494a026dcba9f3ddc81a36464f7285e7aa4ab559ded6f69da75edda6346e4a
MusicDaemon versions 0.0.3 and below suffer from a remote denial of service and flaw where /etc/shadow can be extracted. Exploit included.
86d30b650082a4e71e7432e3cf564661de0639f7bc511f7a95e81c5f202a2ff8