Simple UK GSM mobile network mail-bombing utility.
fa1c075f2a2f366d0d4b7b0e0c7a3091066aaa7868feb157fd2a0044ab8735ca
nbtstat.pl is a simple Perl script that provides the basic functionality of the nbtstat utility that is available on Windows. It grabs the NetBIOS name table from a remote machine. This is a Perl port of eSDee's nbtstat.c (http://www.netric.org/tools.htm), written with portability in mind. It only requires Perl and the IO::Socket module.
13166a14ceb220484c98d39013a6a4c0060355f3bb85f104f1f59e07c7141da8
WifiScanner is an analyzer and detector of 802.11b stations and access points which can listen alternatively on all the 14 channels, write packet information in real time, search access points and associated client stations, and can generate a graphic of the architecture using GraphViz. All network traffic may be saved in the libpcap format for post analysis. It works under Linux with a PrismII card and with the linux-wlan driver.
16751fe94097aa634d7d4fe4759ee5cfc710cf6685c825ca389f2f27494305d6
tacshell is a drop-in replacement for sdshell, the functionality used with RSA's ACE/Server. It uses the TACACS+ protocol for authentication.
ede71e0999d7bfd053f9057721f96d6f11df13cf7aa73e4d659afe677f8e6f14
Tutorial written by Covert Systems Research. It defines several of the common types of vulnerabilities together with their counterpart command line exploit sequences. The descriptions of these types of vulnerabilities range from stack to heap, function pointer and format string weaknesses. This whitepaper has been developed to help those seeking to improve their exploitation skills while also aiming to give the reader the knowledge for a more surgical aspect to manipulating vulnerable programs.
df7d9d5f892763880a05d4e45b7e6b4aa2abc083b26886bb80971593a3d97615
NGSSoftware Insight Security Research Advisory #NISR27052004 - It is possible to cause a number of buffer overruns within the WildTangent WTHoster and Web Driver modules via any method that takes a filename as a parameter. Version 4.0 tested and others are possibly affected.
1fd4a6d0da967ff355c42ac21d6118964e275521cf330235468cd3d7fe398cc5
Sun-Java-App-Server PE version 8.0 suffers from a path disclosure vulnerability when returning server error 500 pages.
80f7cd44aca210a567313a3abe3eec919dc378cf120eb973210189e875ca9082
Technical Cyber Security Alert TA04-147A - A heap overflow vulnerability in the Concurrent Versions System (CVS) could allow a remote attacker to execute arbitrary code on a vulnerable system. Systems affected: Concurrent Versions System (CVS) versions prior to 1.11.16. CVS Features versions prior to 1.12.8.
eb076a8b5b46b1ff5cdb1e09fb7058dfaf0b977564279a22443f627e735d5bc8
Use Of TCP/IP Reserved Port Zero Causes Integrated Lights-Out (iLO) To Stop Responding. LAN management products that use port zero when accessing an Integrated Lights-Out (iLO) in a ProLiant server will cause iLO to become unresponsive. Port zero is specified as a reserved port by the Internet Engineering Task Force (IETF) and should not be used.
89bf8595009c96fdcd64a1994970dee44c3b8ddbf57df3ebd1eaf1ce3c2b6205
MiniShare HTTP server version 1.3.2 is susceptible to a denial of service attack due to mismanagement of requests. If a HEAD or GET request is sent with only one line following it, the server will crash.
5c8714016e397698c8a92f9d1d06a4284a4966ce9ff23ddb246c6e039dd72d94