what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 16 of 16 RSS Feed

Files Date: 2012-12-29

Bluelog Bluetooth Scanner/Logger 1.1.0
Posted Dec 29, 2012
Authored by Tom Nardi | Site digifail.com

Bluelog is a Bluetooth scanner/logger written with speed in mind. It is intended to be used as a site survey tool, concerned more about accurately detecting the number of discoverable Bluetooth devices than individual device specifics. Bluelog also includes the unique "Bluelog Live" mode, which puts discovered devices into a constantly updating live webpage which you can serve up with your HTTP daemon of choice.

Changes: This is a stable release intended for general use. It adds many internal improvements, cleanups, and bugfixes, and is a suggested upgrade for all users.
tags | tool, web, wireless
systems | unix
SHA-256 | 53085aceeec913c3a9b7729ac19394b6db4d639a4adfbf180356183ec5a27905
Bing.com Hostname / IP Enumerator 0.3
Posted Dec 29, 2012
Authored by Andrew Horton | Site morningstarsecurity.com

This tool enumerates hostnames from Bing.com for an IP address. Bing.com is Microsoft's search engine which has an IP: search parameter. Written in Bash for Linux. Requires wget.

Changes: Fixed bug where version 0.2 stopped working, now uses bing.com instead of the mobile site, more detailed progress animation.
tags | tool, scanner, bash
systems | linux, unix
SHA-256 | 652f806668e2da16c60d530a21a840a2cbd6cb4da1794bfc93cc12dac7a062fe
Stegano 0.4
Posted Dec 29, 2012
Authored by Cedric Bonhomme | Site bitbucket.org

Stegano is a basic Python Steganography module. Stegano implements two methods of hiding: using the red portion of a pixel to hide ASCII messages, and using the Least Significant Bit (LSB) technique. It is possible to use a more advanced LSB method based on integers sets. The sets (Sieve of Eratosthenes, Fermat, Carmichael numbers, etc.) are used to select the pixels used to hide the information.

tags | tool, encryption, steganography, python
SHA-256 | a36f3721d12e6cacf44f111915f23f5a404801a7a9236c6fecdd4808d20bbbb9
Debian Security Advisory 2592-1
Posted Dec 29, 2012
Authored by Debian | Site debian.org

Debian Linux Security Advisory 2592-1 - Marko Myllynen discovered that elinks, a powerful text-mode browser, incorrectly delegates user credentials during GSS-Negotiate.

tags | advisory
systems | linux, debian
advisories | CVE-2012-4545
SHA-256 | 149c360062a76e5cec29b9d5823b3e815bd95780d8d20666f866ebe907200af3
Ubiquiti AirOS 5.5.2 Command Execution
Posted Dec 29, 2012
Authored by xistence

Ubiquiti AirOS versions 5.5.2 and below suffer from a remote post-authentication root-level command execution vulnerability.

tags | exploit, remote, root
SHA-256 | 31177e50c29169efd962af59bdd1dcd6fd98c00f6e95f81c9e27921a3d144b6a
Secunia Security Advisory 51693
Posted Dec 29, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - SUSE has issued an update for tomcat. This fixes multiple weaknesses, one security issue and three vulnerabilities, which can be exploited by malicious users to manipulate certain data and by malicious people to bypass certain security restrictions, manipulate certain data, gain access to potentially sensitive information, and cause a DoS (Denial of Service).

tags | advisory, denial of service, vulnerability
systems | linux, suse
SHA-256 | 94b833d5afca567dd8b6f81dfc4de063020f11be6eece639f82752267f247ab6
Secunia Security Advisory 51673
Posted Dec 29, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in i-GEN opLYNX, which can be exploited by malicious people to bypass certain security restrictions.

tags | advisory
SHA-256 | 7df638d8ded60fc9cf7d10f7806a26f013d9496308191c5e55e8a9255bb979b2
Secunia Security Advisory 51649
Posted Dec 29, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - SUSE has issued an update for opera. This fixes a security issue and two vulnerabilities, which can be exploited by malicious, local users to perform certain actions with escalated privileges and by malicious people to conduct spoofing attacks and potentially compromise a user's system.

tags | advisory, local, spoof, vulnerability
systems | linux, suse
SHA-256 | 9f54ac0e01adc9de3accec195e07f5da62202a62726a6e195e0800fda37b3988
Secunia Security Advisory 51638
Posted Dec 29, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Debian has issued an update for mahara. This fixes multiple vulnerabilities, which can be exploited by malicious users to conduct script insertion attacks and by malicious people to conduct click-jacking, cross-site scripting and request forgery attacks, and disclose potentially sensitive information.

tags | advisory, vulnerability, xss
systems | linux, debian
SHA-256 | 974b033350dc12b02a820eb5ef9cf13746f7ad11ed70d1325b58cde018653c76
Secunia Security Advisory 51654
Posted Dec 29, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - MustLive has discovered a weakness in MODx, which can be exploited by malicious people to determine valid usernames.

tags | advisory
SHA-256 | c97b887f44cfbeccf1887a3b46bda7830c8562c22efe6ea261fa150b0e1d9942
Secunia Security Advisory 51692
Posted Dec 29, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Some vulnerabilities have been reported in VLC Media Player, which can be exploited by malicious people to compromise a user's system.

tags | advisory, vulnerability
SHA-256 | 0226e658eee44741ea5e476f646cd0183e9cdf360eaa475ca1783c1d26261e3d
Secunia Security Advisory 51678
Posted Dec 29, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Multiple vulnerabilities have been reported in IBM InfoSphere Guardium, where one has an unknown impact and the others can be exploited by malicious users to potentially compromise a vulnerable system and by malicious people to conduct cross-site scripting attacks.

tags | advisory, vulnerability, xss
SHA-256 | 95358346677c36ee4518a6f67c6d78067bacf67efbe0d1c82b19d3d878b66305
Secunia Security Advisory 51569
Posted Dec 29, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Debian has issued an update for elinks. This fixes a weakness, which can be exploited by malicious people to conduct spoofing attacks.

tags | advisory, spoof
systems | linux, debian
SHA-256 | 8c522f343e38303eb3ac3e3871bfebfede5061ee0225e4a45e39b21836f9f0fa
Google Talk Decoder
Posted Dec 29, 2012
Authored by Kevin Devine

Google Talk decoder tool that demonstrates recovering passwords from accounts.

tags | tool
SHA-256 | f22e21c764b1d148dce047075c8e5e1ad98da47c9ae526044a697f021a0bbb66
Chrome Web Browser Decoder
Posted Dec 29, 2012
Authored by Kevin Devine

Chrome web browser decoder tool that demonstrates recovering passwords.

tags | tool, web
SHA-256 | 66d28558bf59fb4ed56c20e07d16601110120d4096f33f8d5a6591e5cef2732c
Skype Hash Dumper 1.0
Posted Dec 29, 2012
Authored by Kevin Devine

This is a tool that demonstrates dumping MD5 password hashes from the configuration file in Skype.

tags | tool
SHA-256 | 1c5bf93ebc41bc95553af5a1fa8a89d8ada7ff8cb06b4f21db26e8a540ca2921
Page 1 of 1
Back1Next

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    8 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    11 Files
  • 23
    Apr 23rd
    68 Files
  • 24
    Apr 24th
    23 Files
  • 25
    Apr 25th
    16 Files
  • 26
    Apr 26th
    14 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close