what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 6 of 6 RSS Feed

Files Date: 2000-10-30

be2100.zip
Posted Oct 30, 2000
Site boss.dids.com

Boss Everyware gives a clear picture of how a Windows computer is being used. It secretly logs program names, window titles, visited URLs, user names, and keystrokes. With its Report Manager, Boss Everyware provides a powerful tool for the analysis of logged data. Can monitor one or many computers.

systems | windows
SHA-256 | f0ac9d112f8a9e1e12a78511e23856c8e0b7483587f6711c637768ca91dae303
malice5.2.pl
Posted Oct 30, 2000
Authored by Natas | Site rsh.defacements.com

Malice v.5.2 scans for over 238 cgi vulnerabilities and uses anti-IDS tactics as discussed in RFP's famous whitepaper. Written in perl. Checks for known bugs and interesting directories.

tags | cgi, perl, vulnerability
systems | unix
SHA-256 | 8ccabde6d935c50454cdfa8e08465b2c79b64c11e8c2c0ab9f579093a0a8ca3b
assitch-2.6.tgz
Posted Oct 30, 2000
Authored by Thomas Biege | Site suse.de

Assitch is a remote packetfilter analyzer, that detects in and OUT rules by doing ACK scanning. (It's useless against state-full filters.) Assitch is 3 years old, but still useful for debugging filter rules.

tags | tool, remote, sniffer
SHA-256 | 66592b879e744c047d64cb18485d1014112959a8455bd5b9242187637f566877
biew-520.tar.bz2
Posted Oct 30, 2000
Authored by Nick Kurshev | Site biew.sourceforge.net

Biew is Binary vIEWer with built-in editor for binary, hexadecimal and disassembler modes. It contains a PentiumIII/K7Athlon/Cyrix-M2 disassembler, full preview of MZ, NE, PE, LE, LX, DOS.SYS, NLM, arch, ELF, a.out, coff32, PharLap, and rdoff executable formats, a code guider, a text viewer with russian codepages support, and many other features.

Changes: A Pentium IV disassembler, improved documentation, and lots of various enhancements and bugfixes.
systems | linux
SHA-256 | 0c61690e636e16954dfdb9eec1001653d7bb8232dcaf176c26d976db285fa3f7
fwlogwatch-0.0.23.tar.gz
Posted Oct 30, 2000
Authored by Boris Wesslowski | Site kyb.uni-stuttgart.de

fwlogwatch analyzes the ipchains packet filter logfiles and generates text and HTML summaries. Features realtime anomaly response capability and has an interactive report generator.

Changes: More customization options (colors, sorting, and response actions) and a Web interface for realtime response status information.
tags | tool, firewall
systems | unix
SHA-256 | 345ca2a677ec0578e2e285fda7c70b7ad93815ac5775fb7cd501f323b8d518aa
tripwire-2.3-47.bin.tar.gz
Posted Oct 30, 2000
Site tripwire.org

Tripwire is a very popular file integrity checker which saves checksums of selected files in a database. Any changes to these files are flagged and logged, including those that were added or deleted, with optional email / pager reporting. Databases and reports are cryptographically signed.

tags | tool, intrusion detection
systems | unix
SHA-256 | f48cf36fb22415dacf82f45381a8dabf6c5d2c8a446ac7c1010b333311b33a49
Page 1 of 1
Back1Next

File Archive:

November 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Nov 1st
    30 Files
  • 2
    Nov 2nd
    0 Files
  • 3
    Nov 3rd
    0 Files
  • 4
    Nov 4th
    12 Files
  • 5
    Nov 5th
    44 Files
  • 6
    Nov 6th
    18 Files
  • 7
    Nov 7th
    9 Files
  • 8
    Nov 8th
    8 Files
  • 9
    Nov 9th
    3 Files
  • 10
    Nov 10th
    0 Files
  • 11
    Nov 11th
    14 Files
  • 12
    Nov 12th
    20 Files
  • 13
    Nov 13th
    63 Files
  • 14
    Nov 14th
    18 Files
  • 15
    Nov 15th
    8 Files
  • 16
    Nov 16th
    0 Files
  • 17
    Nov 17th
    0 Files
  • 18
    Nov 18th
    18 Files
  • 19
    Nov 19th
    7 Files
  • 20
    Nov 20th
    13 Files
  • 21
    Nov 21st
    6 Files
  • 22
    Nov 22nd
    48 Files
  • 23
    Nov 23rd
    0 Files
  • 24
    Nov 24th
    0 Files
  • 25
    Nov 25th
    60 Files
  • 26
    Nov 26th
    0 Files
  • 27
    Nov 27th
    44 Files
  • 28
    Nov 28th
    0 Files
  • 29
    Nov 29th
    0 Files
  • 30
    Nov 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close