1 Ansvif 1.5.2 By packetstormsecurity.com Published On :: Tue, 21 Jun 2016 01:07:50 GMT Ansvif is "A Not So Very Intelligent Fuzzer". It feeds garbage arguments and data into programs trying to induce a fault. Full Article
1 Ansvif 1.6 By packetstormsecurity.com Published On :: Sun, 02 Oct 2016 18:22:22 GMT Ansvif is "A Not So Very Intelligent Fuzzer". It feeds garbage arguments and data into programs trying to induce a fault. Full Article
1 Ansvif 1.6.1 By packetstormsecurity.com Published On :: Mon, 21 Nov 2016 17:32:58 GMT Ansvif is "A Not So Very Intelligent Fuzzer". It feeds garbage arguments and data into programs trying to induce a fault. Full Article
1 Ansvif 1.6.2 By packetstormsecurity.com Published On :: Sat, 25 Feb 2017 16:14:25 GMT Ansvif is "A Not So Very Intelligent Fuzzer". It feeds garbage arguments and data into programs trying to induce a fault. Full Article
1 Ansvif 1.7 By packetstormsecurity.com Published On :: Thu, 13 Apr 2017 02:33:30 GMT Ansvif is "A Not So Very Intelligent Fuzzer". It feeds garbage arguments and data into programs trying to induce a fault. Full Article
1 Ansvif 1.8 By packetstormsecurity.com Published On :: Tue, 12 Sep 2017 05:07:12 GMT Ansvif is "A Not So Very Intelligent Fuzzer". It feeds garbage arguments and data into programs trying to induce a fault. Full Article
1 Ansvif 1.8.1 By packetstormsecurity.com Published On :: Thu, 26 Oct 2017 03:01:43 GMT Ansvif is "A Not So Very Intelligent Fuzzer". It feeds garbage arguments and data into programs trying to induce a fault. Full Article
1 Ansvif 1.8.1.1 By packetstormsecurity.com Published On :: Fri, 29 Dec 2017 16:24:13 GMT Ansvif is "A Not So Very Intelligent Fuzzer". It feeds garbage arguments and data into programs trying to induce a fault. Full Article
1 Ansvif 1.9 By packetstormsecurity.com Published On :: Mon, 16 Apr 2018 20:22:22 GMT Ansvif is "A Not So Very Intelligent Fuzzer". It feeds garbage arguments and data into programs trying to induce a fault. Full Article
1 Ansvif 1.9.1 By packetstormsecurity.com Published On :: Thu, 19 Apr 2018 14:12:07 GMT Ansvif is "A Not So Very Intelligent Fuzzer". It feeds garbage arguments and data into programs trying to induce a fault. Full Article
1 BadParser 1.6.42218.0 By packetstormsecurity.com Published On :: Tue, 24 Apr 2018 04:08:17 GMT BadParser is a vulnerability parser designed to aid in the testing of fuzzers by simulating different kinds of memory corruption issues. Vulnerabilities are simulated by causing write-access violations at specific addresses, which serve as unique identifiers for the different issues. BadParser supports JSON and XML input files, with other file formats planned. Full Article
1 Ansvif 1.10 By packetstormsecurity.com Published On :: Mon, 27 Aug 2018 17:54:37 GMT Ansvif is "A Not So Very Intelligent Fuzzer". It feeds garbage arguments and data into programs trying to induce a fault. Full Article
1 Ansvif 1.11a By packetstormsecurity.com Published On :: Tue, 23 Oct 2018 23:34:30 GMT Ansvif is "A Not So Very Intelligent Fuzzer". It feeds garbage arguments and data into programs trying to induce a fault. Full Article
1 Ansvif 1.11 By packetstormsecurity.com Published On :: Thu, 03 Jan 2019 03:00:48 GMT Ansvif is "A Not So Very Intelligent Fuzzer". It feeds garbage arguments and data into programs trying to induce a fault. Full Article
1 Ansvif 1.12 By packetstormsecurity.com Published On :: Wed, 30 Oct 2019 16:06:59 GMT Ansvif is "A Not So Very Intelligent Fuzzer". It feeds garbage arguments and data into programs trying to induce a fault. Full Article
1 Trust Fined £225k For Leaving Files In Abandoned Hospital By packetstormsecurity.com Published On :: Tue, 19 Jun 2012 15:39:27 GMT Full Article headline government data loss ireland
1 Pwn2Own Tokyo 2019 Victimize Sony, Samsung, And Amazon Devices By packetstormsecurity.com Published On :: Mon, 11 Nov 2019 15:12:06 GMT Full Article headline hacker amazon flaw sony conference japan samsung
1 2015 UniCredit Data Breach Affects 3 Million Italian Clients By packetstormsecurity.com Published On :: Mon, 28 Oct 2019 16:58:05 GMT Full Article headline hacker privacy data loss italy
1 rdp2tcp Tunneling Tool 0.1 By packetstormsecurity.com Published On :: Mon, 10 Jan 2011 11:11:11 GMT rdp2tcp is a tunneling tool on top of remote desktop protocol (RDP). It uses RDP virtual channel capabilities to multiplex several TCP ports forwarding over an already established rdesktop session. Full Article
1 nfacct Bash Completion 1.1 By packetstormsecurity.com Published On :: Mon, 18 Apr 2016 03:33:33 GMT This is bash programmable completion for the netfilter.org accounting tool nfacct. Full Article
1 conntrack-tools Bash Completion 1.0 By packetstormsecurity.com Published On :: Mon, 18 Apr 2016 04:44:44 GMT This is bash programmable completion for the conntrack-tools from netfilter.org. The package contains completions for conntrack, conntrackd, and nfct. Full Article
1 Raptor WAF 0.01 By packetstormsecurity.com Published On :: Tue, 31 May 2016 03:33:33 GMT Raptor is a web application firewall written in C that uses DFA to block SQL injection, cross site scripting, and path traversals. Full Article
1 Web-Based Firewall Logging Tool 1.1.0 By packetstormsecurity.com Published On :: Sat, 06 Aug 2016 18:50:51 GMT Webfwlog is a Web-based firewall log reporting and analysis tool. It allows users to design reports to use on logged firewall data in whatever configuration they desire. Included are sample reports as a starting point. Reports can be sorted with a single click, or "drilled-down" all the way to the packet level, and saved for later use. Supported log formats are netfilter, ipfilter, ipfw, ipchains, and Windows XP. Netfilter support includes ulogd MySQL or PostgreSQL database logs using the iptables ULOG target. Full Article
1 FireHOL 3.1.0 By packetstormsecurity.com Published On :: Tue, 29 Nov 2016 18:53:55 GMT FireHOL a simple yet powerful way to configure stateful iptables firewalls. It can be used for almost any purpose, including control of any number of internal/external/virtual interfaces, control of any combination of routed traffic, setting up DMZ routers and servers, and all kinds of NAT. It provides strong protection (flooding, spoofing, etc.), transparent caches, source MAC verification, blacklists, whitelists, and more. Its goal is to be completely abstracted and powerful but also easy to use, audit, and understand. Full Article
1 FireHOL 3.1.1 By packetstormsecurity.com Published On :: Tue, 10 Jan 2017 23:02:22 GMT FireHOL a simple yet powerful way to configure stateful iptables firewalls. It can be used for almost any purpose, including control of any number of internal/external/virtual interfaces, control of any combination of routed traffic, setting up DMZ routers and servers, and all kinds of NAT. It provides strong protection (flooding, spoofing, etc.), transparent caches, source MAC verification, blacklists, whitelists, and more. Its goal is to be completely abstracted and powerful but also easy to use, audit, and understand. Full Article
1 FireHOL 3.1.2 By packetstormsecurity.com Published On :: Wed, 08 Feb 2017 23:02:22 GMT FireHOL a simple yet powerful way to configure stateful iptables firewalls. It can be used for almost any purpose, including control of any number of internal/external/virtual interfaces, control of any combination of routed traffic, setting up DMZ routers and servers, and all kinds of NAT. It provides strong protection (flooding, spoofing, etc.), transparent caches, source MAC verification, blacklists, whitelists, and more. Its goal is to be completely abstracted and powerful but also easy to use, audit, and understand. Full Article
1 FireHOL 3.1.3 By packetstormsecurity.com Published On :: Sat, 18 Feb 2017 16:01:21 GMT FireHOL a simple yet powerful way to configure stateful iptables firewalls. It can be used for almost any purpose, including control of any number of internal/external/virtual interfaces, control of any combination of routed traffic, setting up DMZ routers and servers, and all kinds of NAT. It provides strong protection (flooding, spoofing, etc.), transparent caches, source MAC verification, blacklists, whitelists, and more. Its goal is to be completely abstracted and powerful but also easy to use, audit, and understand. Full Article
1 FireHOL 3.1.4 By packetstormsecurity.com Published On :: Sun, 20 Aug 2017 18:22:22 GMT FireHOL a simple yet powerful way to configure stateful iptables firewalls. It can be used for almost any purpose, including control of any number of internal/external/virtual interfaces, control of any combination of routed traffic, setting up DMZ routers and servers, and all kinds of NAT. It provides strong protection (flooding, spoofing, etc.), transparent caches, source MAC verification, blacklists, whitelists, and more. Its goal is to be completely abstracted and powerful but also easy to use, audit, and understand. Full Article
1 FireHOL 3.1.5 By packetstormsecurity.com Published On :: Tue, 19 Sep 2017 02:44:24 GMT FireHOL a simple yet powerful way to configure stateful iptables firewalls. It can be used for almost any purpose, including control of any number of internal/external/virtual interfaces, control of any combination of routed traffic, setting up DMZ routers and servers, and all kinds of NAT. It provides strong protection (flooding, spoofing, etc.), transparent caches, source MAC verification, blacklists, whitelists, and more. Its goal is to be completely abstracted and powerful but also easy to use, audit, and understand. Full Article
1 IPTables Bash Completion 1.7 By packetstormsecurity.com Published On :: Mon, 27 Nov 2017 17:22:22 GMT iptables-bash_completion provides programmable completion for the iptables and ip6tables programs from netfilter.org. Following the logic of iptables, options are shown only if they are valid at the current context. Additionally to the completion on options, matches and targets, it supports dynamic retrieval of data from the system i.e: chain-, set-names, interfaces, hostnames, etc. Environment variables allow to fine grade completion options. IP and MAC addresses can be fed by file. Full Article
1 FireHOL 3.1.6 By packetstormsecurity.com Published On :: Mon, 13 Aug 2018 19:38:27 GMT FireHOL a simple yet powerful way to configure stateful iptables firewalls. It can be used for almost any purpose, including control of any number of internal/external/virtual interfaces, control of any combination of routed traffic, setting up DMZ routers and servers, and all kinds of NAT. It provides strong protection (flooding, spoofing, etc.), transparent caches, source MAC verification, blacklists, whitelists, and more. Its goal is to be completely abstracted and powerful but also easy to use, audit, and understand. Full Article
1 Web-Based Firewall Logging Tool 1.1.1 By packetstormsecurity.com Published On :: Fri, 09 Nov 2018 17:59:24 GMT Webfwlog is a Web-based firewall log reporting and analysis tool. It allows users to design reports to use on logged firewall data in whatever configuration they desire. Included are sample reports as a starting point. Reports can be sorted with a single click, or "drilled-down" all the way to the packet level, and saved for later use. Supported log formats are netfilter, ipfilter, ipfw, ipchains, and Windows XP. Netfilter support includes ulogd MySQL or PostgreSQL database logs using the iptables ULOG target. Full Article
1 IPSet List 3.7.1 By packetstormsecurity.com Published On :: Tue, 12 Feb 2019 18:41:58 GMT ipset_list is a wrapper script written in bash for listing sets of the netfilter ipset program. It allows you to match and display sets, headers, and elements in various ways. The output can optionally be colorized. An interactive mode allows to select the query options in a wizard based manner. Full Article
1 Web-Based Firewall Logging Tool 1.1.2 By packetstormsecurity.com Published On :: Fri, 20 Sep 2019 22:17:54 GMT Webfwlog is a Web-based firewall log reporting and analysis tool. It allows users to design reports to use on logged firewall data in whatever configuration they desire. Included are sample reports as a starting point. Reports can be sorted with a single click, or "drilled-down" all the way to the packet level, and saved for later use. Supported log formats are netfilter, ipfilter, ipfw, ipchains, and Windows XP. Netfilter support includes ulogd MySQL or PostgreSQL database logs using the iptables ULOG target. Full Article
1 Mandos Encrypted File System Unattended Reboot Utility 1.8.11 By packetstormsecurity.com Published On :: Thu, 09 Apr 2020 15:00:12 GMT The Mandos system allows computers to have encrypted root file systems and at the same time be capable of remote or unattended reboots. The computers run a small client program in the initial RAM disk environment which will communicate with a server over a network. All network communication is encrypted using TLS. The clients are identified by the server using an OpenPGP key that is unique to each client. The server sends the clients an encrypted password. The encrypted password is decrypted by the clients using the same OpenPGP key, and the password is then used to unlock the root file system. Full Article
1 Zeek 3.1.2 By packetstormsecurity.com Published On :: Wed, 15 Apr 2020 18:53:26 GMT Zeek is a powerful network analysis framework that is much different from the typical IDS you may know. While focusing on network security monitoring, Zeek provides a comprehensive platform for more general network traffic analysis as well. Well grounded in more than 15 years of research, Zeek has successfully bridged the traditional gap between academia and operations since its inception. Today, it is relied upon operationally in particular by many scientific environments for securing their cyber-infrastructure. Zeek's user community includes major universities, research labs, supercomputing centers, and open-science communities. Full Article
1 Packet Fence 10.0.0 By packetstormsecurity.com Published On :: Thu, 16 Apr 2020 15:37:31 GMT PacketFence is a network access control (NAC) system. It is actively maintained and has been deployed in numerous large-scale institutions. It can be used to effectively secure networks, from small to very large heterogeneous networks. PacketFence provides NAC-oriented features such as registration of new network devices, detection of abnormal network activities including from remote snort sensors, isolation of problematic devices, remediation through a captive portal, and registration-based and scheduled vulnerability scans. Full Article
1 Falco 0.22.1 By packetstormsecurity.com Published On :: Fri, 17 Apr 2020 15:34:40 GMT Sysdig falco is a behavioral activity monitoring agent that is open source and comes with native support for containers. Falco lets you define highly granular rules to check for activities involving file and network activity, process execution, IPC, and much more, using a flexible syntax. Falco will notify you when these rules are violated. You can think about falco as a mix between snort, ossec and strace. Full Article
1 nfstream 4.0.1 By packetstormsecurity.com Published On :: Thu, 23 Apr 2020 19:38:17 GMT nfstream is a Python package providing fast, flexible, and expressive data structures designed to make working with online or offline network data both easy and intuitive. It aims to be the fundamental high-level building block for doing practical, real world network data analysis in Python. Additionally, it has the broader goal of becoming a common network data processing framework for researchers providing data reproducibility across experiments. Full Article
1 Bing.com Hostname / IP Enumerator 1.0.2 By packetstormsecurity.com Published On :: Mon, 27 Apr 2020 15:28:49 GMT This tool enumerates hostnames from Bing.com for an IP address. Bing.com is Microsoft's search engine which has an IP: search parameter. Written in Bash for Linux. Requires wget. Full Article
1 Red Hat Security Advisory 2020-1765-01 By packetstormsecurity.com Published On :: Tue, 28 Apr 2020 20:20:53 GMT Red Hat Security Advisory 2020-1765-01 - The Common UNIX Printing System provides a portable printing layer for Linux, UNIX, and similar operating systems. Issues addressed include a buffer overflow vulnerability. Full Article
1 Red Hat Security Advisory 2020-1880-01 By packetstormsecurity.com Published On :: Tue, 28 Apr 2020 20:38:42 GMT Red Hat Security Advisory 2020-1880-01 - GLib provides the core application building blocks for libraries and applications written in C. It provides the core object system used in GNOME, the main loop implementation, and a large set of utility functions for strings and common data structures. The Intelligent Input Bus is an input method framework for multilingual input in Unix-like operating systems. Issues addressed include an improper authorization vulnerability. Full Article
1 sshprank 1.1.1 By packetstormsecurity.com Published On :: Mon, 04 May 2020 17:17:27 GMT sshprank is a fast SSH mass-scanner, login cracker, and banner grabber tool using the python-masscan and shodan modules. Full Article
1 Zeek 3.1.3 By packetstormsecurity.com Published On :: Fri, 08 May 2020 20:03:43 GMT Zeek is a powerful network analysis framework that is much different from the typical IDS you may know. While focusing on network security monitoring, Zeek provides a comprehensive platform for more general network traffic analysis as well. Well grounded in more than 15 years of research, Zeek has successfully bridged the traditional gap between academia and operations since its inception. Today, it is relied upon operationally in particular by many scientific environments for securing their cyber-infrastructure. Zeek's user community includes major universities, research labs, supercomputing centers, and open-science communities. Full Article
1 nfstream 5.1.0 By packetstormsecurity.com Published On :: Fri, 08 May 2020 20:09:48 GMT nfstream is a Python package providing fast, flexible, and expressive data structures designed to make working with online or offline network data both easy and intuitive. It aims to be the fundamental high-level building block for doing practical, real world network data analysis in Python. Additionally, it has the broader goal of becoming a common network data processing framework for researchers providing data reproducibility across experiments. Full Article
1 Packet Fence 10.0.1 By packetstormsecurity.com Published On :: Fri, 08 May 2020 20:10:28 GMT PacketFence is a network access control (NAC) system. It is actively maintained and has been deployed in numerous large-scale institutions. It can be used to effectively secure networks, from small to very large heterogeneous networks. PacketFence provides NAC-oriented features such as registration of new network devices, detection of abnormal network activities including from remote snort sensors, isolation of problematic devices, remediation through a captive portal, and registration-based and scheduled vulnerability scans. Full Article
1 Google Splats 21 Bugs In Chrome 54 Patch Run By packetstormsecurity.com Published On :: Fri, 14 Oct 2016 15:36:02 GMT Full Article headline flaw google patch chrome
1 Google Removing SHA-1 Support In Chrome 56 By packetstormsecurity.com Published On :: Sat, 19 Nov 2016 04:18:33 GMT Full Article headline google chrome cryptography
1 Google Fixes 12 High-Severity Flaws In Chrome Browser By packetstormsecurity.com Published On :: Sat, 03 Dec 2016 15:20:36 GMT Full Article headline flaw google patch chrome
1 openssh-3.6.1p2-backdoor.patch.gz By packetstormsecurity.com Published On :: Mon, 14 Jul 2003 22:48:44 GMT OpenSSH 3.6.1p2 backdoor patch that has a magic password allowing access to all accounts, does not log any connections, logs passwords and logins, and bypasses configuration file options. Full Article