The Linux Intrusion Detection System is a patch which enhances the kernel's security. When it's in effect, many system administration operations can be made impossible even for root. You can turn the security protection on or off on the fly and you can hide sensitive processes and prevent anyone from using ptrace or any other capability on your system. LIDS can also provide raw device and I/O access protection.
cbaab72e4f20d696eea4e7251c3a4edfe3d75660587798d51395378d701d87e6
XScreenSaver is a modular screen saver and locker for the X Window System. It is highly customizable and allows the use of any program that can draw on the root window as a display mode. It is also more stable than xlock.
363307e21737a48b4ca59bded453f00008e46fa84e58c6f349f30e4110dcca81
Openwall Advisory - Passive Analysis of SSH Traffic. This advisory demonstrates several weaknesses in implementations of SSH protocols. When exploited, they let the attacker obtain sensitive information by passively monitoring encrypted SSH sessions. The information can later be used to speed up brute-force attacks on passwords, including the initial login password and other passwords appearing in interactive SSH sessions, such as those used with su(1) and Cisco IOS "enable" passwords. All attacks described in this advisory require the ability to monitor (sniff) network traffic between one or more SSH servers and clients.
bfeb7cdafd8058c9afd04d84449f245f170f6508d8227c5fdcf97b1a9b102c98
IIS 5.0 / Windows 2000 WebDAV remote denial of service exploit - Sends a specially crafted request, as described in MS01-016.
025cc976603fe7243eaee030053fb6e90d63847d20684126b98f538d5ccadbca
FreeBSD 23 byte execve code.
5297d7b01c14324cdd6cab82dc510abfbfc8418025d9ca092cd05332f6d6e238
Named v8.2.x remote root exploit - Uses the tsig bug. Only includes linux shellcode.
d5e607468e5db97a21778c60ad95951a67c88c8da40feb92ff587708b01bae99
This code exploits a bug in the glob() function used in some ftpd's (like proftpd, netbsd ftpd, iis ftpd). It sends a 'ls' command for which will take up about 100% of a systems memory, creating a very effective dos.
7f1cdb3862da20f5231d975f2a3cbd7fb8960b8beeaf13ca49ae65058f1a1479
Apache backdoor - Backdoors apache 1.3.17 / 1.3.19 to spawn a root shell when a certain page is requested.
e698c564d4808ff114e58bf39b34e7af99192e7dd9bcc390a7b4266e71965926
Win32 port of MD5Crack.
0bb1c55e2cdc8f43131518137fdd9b3a519365af7903c0af8020c013deffa344
ftpsed.pl is a perl script which exploits a denial of service vulnerability in Proftpd v1.2 and below. Requires a username and password.
697c7292c32b0c1b43a2055599df28cd1aac80583e074fdfabc4a4b2853e3725
Joe 2.8 local exploit - Requires sysadmin intervention. Tested on FreeBSD 4.2-Release.
f9e4feab1aeef09555b1b33372679785c883b5a1fe388035f561b68cdbce1373
Saint Jude LKM is a Linux Kernel Module for the 2.2.0 and 2.4.0 series of kernels. This module implements the Saint Jude model for improper privilege transitions. This will permit the discovery of local, and ultimately, remote root exploits during the exploit itself. Once discovered, Saint Jude will terminate the execution, preventing the root exploit from occurring. This is done without checking for attack signatures of known exploits, and thus should work for both known and unknown exploits.
f7f922f8f16946ab95f37c07600d7d52e13c7d3e3b2865374f613ca83947a95c
Saint Jude LKM is a Linux Kernel Module for 2.2.0 and greater kernels. This module implements the Saint Jude model for improper privilege transitions. This will permit the discovery of local, and ultimately, remote root exploits during the exploit itself. Once discovered, Saint Jude will terminate the execution, preventing the root exploit from occurring. This is done without checking for attack signatures of known exploits, and thus should work equally well for both known and unknown exploits.
c105819d64f6618d2359f51876d4b6557c65033cc7bb9236e94192f35a1f1e23
Logplay is a sound-capable alert system with a modular design. It can monitor system logs, load averages, network connectivity, and is modular to support user-specific monitors. Logplay alerts the user via a sound (using anything Sox's play script understands), an e-mail, or system commands. It should run on almost any *nix system, or any system that has Perl, given that you can run it in the background and you write a module.
81716dcb4f91ce68a1dbfbeff61585a3fc2553f70d0edda0ffb5643a161688b8
fwipe overwrites your file a specified number of times (default: 5) and then deletes it. It is extremely secure; it will not be confused by filenames containing special characters, and is suitable for use against law enforcement.
fee232d53a5cc6244852f216e41d1e0b4976221f14a16c93e40c90ae6c7eaf0f