.:[ packet storm ]:.
                           
this is full disclosure
this is full disclosure

 Section:  .. / web  /

Page 1 of 8
<< 1 2 3 4 5 6 7 8 >> Files 1 - 25 of 183
Currently sorted by: File NameSort By: Last Modified, File Size

 ///  File Name: 80log.sh
Description:
80log.sh is a shell script which uses netcat to log the HTTP server versions of multiple or single web servers.
Author:Killah
Homepage:http://www.hack.gr/users/killah
File Size:885
Last Modified:Oct 6 20:19:10 2002
MD5 Checksum:752d16bd6eb68da0d1b68ad8fa501037

 ///  File Name: Achilles-0-16-b.zip
Description:
Achilles is a tool designed for testing the security of web applications. Achilles is a proxy server, which acts as a man-in-the-middle during an HTTP session. A typical HTTP proxy will relay packets to and from a client browser and a web server. Achilles will intercept an HTTP sessions data in either direction and give the user the ability to alter the data before transmission. When in intercept mode, Achilles will pretend to be the server and negotiate two SSL sessions, one with the client browser and another with the web server. As data is transmitted between the two nodes, Achilles decrypts the data and gives the user the ability to alter and/or log the data in clear text before transmission.
Homepage:http://www.digizen-security.com/projects.html
File Size:415805
Last Modified:Dec 21 18:08:05 2000
MD5 Checksum:f97848d8b940fc4115a5457a1dde15aa

 ///  File Name: achilles-0-27.zip
Description:
Achilles is a tool for Windows designed for testing the security of web applications. Achilles is a proxy server, which acts as a man-in-the-middle during an HTTP session. A typical HTTP proxy will relay packets to and from a client browser and a web server. Achilles will intercept an HTTP session?s data in either direction and give the user the ability to alter the data before transmission. For example, during a normal HTTP SSL connection a typical proxy will relay the session between the server and the client and allow the two end nodes to negotiate SSL. In contrast, when in intercept mode, Achilles will pretend to be the server and negotiate two SSL sessions, one with the client browser and another with the web server. As data is transmitted between the two nodes, Achilles decrypts the data and gives the user the ability to alter and/or log the data in clear text before transmission.
Homepage:http://www.digizen-security.com/projects.html
File Size:433167
Last Modified:Aug 16 01:06:47 2001
MD5 Checksum:53c77733109f3d7b33a5143703e8cf05

 ///  Directory: / analog /
Description:
Unavailable.
Total Files:1
Last Modified:Sep 5 23:00:57 2007

 ///  File Name: antispyd-0.0.4.tar.gz
Description:
Antispyd is an HTTP/HTTPS threat filtering proxy server. The main characteristic of this project is the modularity of its conception. The program is organized around an HTTP/HTTPS gateway service and a set of filters that can be enabled or disabled, and are all configurable with a single configuration file. Current filters are: URL filtering, content filtering, content-type filtering, cookie removal, pop-up removal, shell code attack blocking, Web traffic anonymizing, and a signature-based filtering engine. All filtering is done on the fly, without blocking downloads in any case. It uses only POSIX primitives and is built with autotools, and was created with security in mind.
Author:janium
Homepage:http://antispyd.sourceforge.net/
File Size:108455
Last Modified:Oct 13 01:02:50 2005
MD5 Checksum:f53ef8852f2f896304d6a14eab7d9113

 ///  File Name: antispyd-0.0.8.tar.gz
Description:
Antispyd is an HTTP/HTTPS threat filtering proxy server. The main characteristic of this project is the modularity of its conception. The program is organized around an HTTP/HTTPS gateway service and a set of filters that can be enabled or disabled, and are all configurable with a single configuration file. Current filters are: URL filtering, content filtering, content-type filtering, cookie removal, pop-up removal, shell code attack blocking, Web traffic anonymizing, and a signature-based filtering engine. All filtering is done on the fly, without blocking downloads in any case. It uses only POSIX primitives and is built with autotools, and was created with security in mind.
Author:janium
Homepage:http://antispyd.sourceforge.net/
File Size:356002
Last Modified:Oct 26 11:57:39 2005
MD5 Checksum:24d3c0005ae0c4d231ce1c0d42323df1

 ///  File Name: arse.c
Description:
Arse.c brute forces valid logins from many default Apache instalations by checking if the server returns a 404 or a 403.
Author:Incubus
Homepage:http://www.securax.org/incubus
File Size:2797
Last Modified:Aug 10 17:02:55 2000
MD5 Checksum:4083f4193e367934ca70f6c6efedd353

 ///  File Name: AttackAPI.zip
Description:
AttackAPI provides simple and intuitive web programmable interface for composing attack vectors with JavaScript and other client (and server) related technologies. The current release supports several browser based attacking techniques, simple but powerful JavaScript console and powerful attack channel and associated API for controlling zombies.
Author:petko d. petkov
Homepage:http://www.gnucitizen.org/projects/attackapi/
File Size:66859
Last Modified:Oct 20 18:12:30 2006
MD5 Checksum:a3b5bf02dada5efadfcde71310e5503f

 ///  File Name: attrition.pl
Description:
attrition.pl gets the latest x (you specify how many) defacements from attrition. Just use the script to save the latest defacements to a file and then include them on your page through SSI.
Author:Bansh33
Homepage:http://www.r00tabega.com
File Size:982
Last Modified:Apr 13 16:36:08 2000
MD5 Checksum:a978960346c0eed91a011c4ccdbc10a9

 ///  File Name: browserrecon-1.0-php.tar.gz
Description:
browserrecon is a framework that performs client-side HTTP fingerprinting. Be sure to hit their site to download the latest fingerprints database.
Author:Marc Ruef
Homepage:http://www.computec.ch/projekte/browserrecon/
File Size:8367
Last Modified:May 9 13:50:03 2008
MD5 Checksum:8dc3b53449d21666803e0b051280d3af

 ///  File Name: Bscan.c
Description:
Bscan is a banner grabber for httpd which uses non-blocking sockets for improved speed.
Author:DrBIOS,Bagabontu
File Size:8546
Last Modified:Jan 24 02:28:53 2003
MD5 Checksum:2f77c7ea5bdc18fe67c42343f78e8536

 ///  File Name: bulletins.txt
Description:
This is an article discussing some dangers of Myspace bulletins. It includes proof of concept code that can be used to download hundreds of thousands of bulletins that most users assume to be only accessible by friends.
Author:stderr
Homepage:http://stderr.linuxinit.net/
File Size:8645
Last Modified:Jul 2 05:34:00 2006
MD5 Checksum:ca8ab8c1de038f57e1ef013f912f5ae6

 ///  File Name: centurion.tar.gz
Description:
Centurion checks any cgi script on remote server for vulnerabilities like directory traversal bugs, null byte, and incorrect filtering of meta characters. Tested on CGI, PL, PHP, and SHTML.
Author:Lbyte
Homepage:http://lbyte.void.ru
File Size:2993
Last Modified:Apr 17 02:46:04 2002
MD5 Checksum:db9b9c51c5dbe5a50845950f12b1ae10

 ///  File Name: cgiaudit-1.0.tar.gz
Description:
CGIAudit is a black-box debugging tool which automatically audits CGI entities with only an interface specification, the HTML form. Attack types that a CGI script or program become subject to are configurable, as well as server replies that denote a possible penetration success. Other features include a built-in spider, proxy support, and hexadecimal encoding of requests.
Author:S
File Size:69018
Last Modified:Jan 11 13:09:36 2002
MD5 Checksum:8a5e585d220f86b1b68363490dbefde2

 ///  File Name: cgiproxy.1.4.1-SSL.tar.gz
Description:
CGIProxy is a Perl CGI script that acts as an Internet proxy. Through it, you can retrieve resources that may be inaccessible from your own machine. No user info is transmitted, so it can be used as an anonymous proxy. HTTP and FTP are supported. Options include text-only browsing (to save bandwidth), selective cookie and script removal, simple ad filtering, encoded target URLs, configuration by end user, and more.
Homepage:http://www.jmarshall.com/tools/cgiproxy/
Changes:This release runs 15% faster, fixes bug with meta "refresh" tags causing duplicate entry forms, and fixes another entry form bug.
File Size:94105
Last Modified:Mar 9 21:38:22 2001
MD5 Checksum:8dc0cad35f429db6d902b0c3b2524b45

 ///  File Name: cgiproxy.1.4.1.tar.gz
Description:
CGIProxy is a Perl CGI script that acts as an Internet proxy. Through it, you can retrieve resources that may be inaccessible from your own machine. No user info is transmitted, so it can be used as an anonymous proxy. HTTP and FTP are supported. Options include text-only browsing (to save bandwidth), selective cookie and script removal, simple ad filtering, encoded target URLs, configuration by end user, and more.
Homepage:http://www.jmarshall.com/tools/cgiproxy/
Changes:This release runs 15% faster, fixes a bug with meta "refresh" tags causing duplicate entry forms, and fixes another entry form bug.
File Size:49038
Last Modified:Mar 9 21:37:08 2001
MD5 Checksum:4269d23d3796f14654fb19983a90fd8a

 ///  File Name: comclear-1.2.tar.gz
Description:
ComClear is a history cleaner for Netscape Navigator and Communicator which allows a user to choose from deleting the cache, cookies, history, and drop-down list. Comclear has both a command-line version and a GTK+ version, the latter of which is run automatically when ComClear is run from an X session.
Homepage:http://www.neuro-tech.net/comclearu.xml
Changes:This release has better RPM packaging, and a GNOME application link.
File Size:43157
Last Modified:Apr 15 14:42:11 2001
MD5 Checksum:ace74974ceef363fb895815ea7b2fd83

 ///  File Name: cookiemonster_v1.6.zip
Description:
Cookie Monster is a cookie analysis tool written in Python. Cookie Monster will grab cookies from a host and assign each character a number. This number can be used to perform mathematical calculations on the differences in order to find a pattern and see if cookie prediction is possible.
Author:Tom Neaves
Homepage:http://www.tomneaves.com/
File Size:3450
Last Modified:Mar 10 21:31:44 2010
MD5 Checksum:c8965e9b954a6b7684b304c5e80a7dda

 ///  File Name: cookietools-0.3.tgz
Description:
cookietools is comprised of three pieces. First, the cookiesniffer, which is a simple and powerful cookie sniffer that recognizes (through heuristics) and reconstructs (through libnids) new and existing HTTP connections, parsing any valid or partially valid HTTP message. The output is a set of files containing the gathered information with time-stamps in a format that can be trivially searched and parsed with standard UNIX tools such as grep, awk, cut and sed. It supports wireless (AP_DLT_IEEE802_11) networks. Second, there is a set of bash scripts that are used to quickly analyze the logs of cookiesniffer. In addition to this, there is the cookieserver that allows you to impersonate the cookies of someone else in your browser using the logs of cookiesniffer. This attack is also called "side-jacking", "cookie replay attack" and "HTTP session hijacking".
Author:Michele Dallachiesa
Homepage:http://xenion.antifork.org/cookietools/index.html
File Size:36592
Last Modified:Dec 11 22:33:48 2007
MD5 Checksum:4cbb1095b1f842daa12d0e0ba7ddbfd4

 ///  File Name: corkscrew-1.3.tar.gz
Description:
corkscrew is a small program for tunneling SSH through HTTP proxies. It features easy configuration and support for several Unix variants.
Homepage:http://www.agroman.net/corkscrew/
File Size:55361
Last Modified:Apr 15 15:04:17 2001
MD5 Checksum:c61f469224ac97ed231e355ea671afd8

 ///  File Name: corkscrew-1.4.tar.gz
Description:
corkscrew is a small program for tunneling SSH through HTTP proxies. It features easy configuration and support for several Unix variants.
Homepage:http://www.agroman.net/corkscrew/
Changes:Fixed bug causing corkscrew not to run on Solaris and HPUX.
File Size:55610
Last Modified:Apr 22 15:56:24 2001
MD5 Checksum:948d1c97029011f78e034a55feef9a58

 ///  File Name: corkscrew-2.0.tar.gz
Description:
corkscrew is a small program for tunneling SSH through HTTP proxies. It features easy configuration and support for several Unix variants.
Homepage:http://www.agroman.net/corkscrew/
Changes:Added support for basic HTTP authentication.
File Size:56749
Last Modified:Aug 28 03:11:11 2001
MD5 Checksum:35df77e7f0e59c0ec4f80313be52c10a

 ///  File Name: cpt1.tar.gz
Description:
Proxy Toolkit is coded in Java and checks to see what information a web proxy forwards.
Author:Toxic Ocean
Homepage:http://www.blackhat.be
File Size:9259
Last Modified:Sep 27 00:56:58 2001
MD5 Checksum:4e1a802f5639dd03e31d7a28712f80e1

 ///  File Name: DansGuardian-2.4.6-5.source.tar.gz
Description:
DansGuardian is a web content filter which currently runs on Linux, FreeBSD, OpenBSD and Solaris. It filters the actual content of pages based on many methods including phrase matching, PICS filtering and URL filtering. It does not purely filter based on a banned list of sites like lesser totally commercial filters. DansGuardian is designed to be completely flexible and allows you to tailor the filtering to your exact needs. It can be as Draconian or as un-obstructive as you want.
Homepage:http://dansguardian.org
File Size:125761
Last Modified:Oct 22 02:31:13 2002
MD5 Checksum:8aa42b299cd798c80ff09ed866a91b63

 ///  File Name: DansGuardian-2.6.1-5.source.tar.gz
Description:
DansGuardian is a web content filter which currently runs on Linux, FreeBSD, OpenBSD and Solaris. It filters the actual content of pages based on many methods including phrase matching, PICS filtering and URL filtering. It does not purely filter based on a banned list of sites like lesser totally commercial filters. DansGuardian is designed to be completely flexible and allows you to tailor the filtering to your exact needs. It can be as Draconian or as un-obstructive as you want.
Homepage:http://dansguardian.org
Changes:This release fixes a workaround where a user could put a double forward slash in the path of a URL to bypass some of the filtering.
File Size:153214
Last Modified:Nov 11 00:23:24 2003
MD5 Checksum:0e08d5071548c2e41a3e44c7403d95a7






 ///  File Name: dansguardian-2.8.0.4.source.tar.gz
Description:
DansGuardian is a web content filter which currently runs on Linux, FreeBSD, OpenBSD and Solaris. It filters the actual content of pages based on many methods including phrase matching, PICS filtering and URL filtering. It does not purely filter based on a banned list of sites like lesser totally commercial filters. DansGuardian is designed to be completely flexible and allows you to tailor the filtering to your exact needs. It can be as Draconian or as un-obstructive as you want.
Homepage:http://dansguardian.org
Changes:Corrections to Brazillian messages in Portuguese. Updates to Lithuanian messages. Updates to INSTALL file to stop confusing debian users. Fixed libz problem in Makefile for OSX. Various other fixes.
File Size:194475
Last Modified:Feb 26 00:38:35 2005
MD5 Checksum:91d65adf4087a863ad605dddd6e18046

 ///  File Name: decss.tar.gz
Description:
DeCSS is a handy Perl script which removes CSS tags from HTML pages.
Homepage:http://www.pigdog.org/decss/
File Size:4090
Last Modified:Feb 18 14:16:48 2000
MD5 Checksum:1dd7fe2c77e0c4d3ceafbbd9caa61356

 ///  File Name: deluge-0.9.11.tar.gz
Description:
Deluge is a Web site stress testing tool designed to mimic different types of users/customers. Simulated users can be robotic (various wandering types), or script-based. Scripts are recorded using an included proxy server, and support variables for variation during multiple attacks. An evaluation program is also included to turn the large resulting log files into useful, readable data.
Homepage:http://sourceforge.net/projects/deluge
File Size:222051
Last Modified:Feb 4 22:11:15 2001
MD5 Checksum:12ee7d3268d92ca21a35946446cd17e4

 ///  File Name: dom-checker-1.00.tgz
Description:
A simple utility to thoroughly validate DOM, XMLHttpRequest, and cookie security restriction handling in modern web browsers. Notable features include exhaustive hierarchy crawling, cross-domain IPC system for blind write verification, page transition checks, and more.
Author:Filipe Almeida,Michal Zalewski
Homepage:http://code.google.com/p/dom-checker/
File Size:11631
Last Modified:Jan 25 19:20:06 2008
MD5 Checksum:e28d130fba312da6a933f088e0ea34e2

 ///  File Name: doorman.zip
Description:
Doorman@JUMPERZ.NET is a GUI based local HTTP/HTTPS proxy server tool for manual web application testing.
Author:Kanatoko
Homepage:http://www.jumperz.net/index.php?i=2&a=0&b=4
File Size:3496777
Last Modified:Sep 7 02:17:22 2006
MD5 Checksum:a2c11f8a502346ae8877039cc4b2b979

 ///  File Name: dradis-v1.2.tar.gz
Description:
dradis is a tool for sharing information during security testing. While plenty of tools exist to help in the different stages of the test, not so many exist to share interesting information captured. When a team of testers is working on the same set of targets, having a common repository of information is essential to avoid duplication of efforts.
Author:etd
Homepage:http://dradis.nomejortu.com/
File Size:2011899
Last Modified:May 7 13:42:52 2008
MD5 Checksum:481beae4f13e322aad1066ba943aafd4

 ///  File Name: dradis-v2.0.0.tar.gz
Description:
dradis is a tool for sharing information during security testing. While plenty of tools exist to help in the different stages of the test, not so many exist to share interesting information captured. When a team of testers is working on the same set of targets, having a common repository of information is essential to avoid duplication of efforts.
Author:etd
Homepage:http://dradis.nomejortu.com/
File Size:2862748
Last Modified:Jan 30 14:12:23 2009
MD5 Checksum:a8256dd584ba7bc5b58a87d6768bc141

 ///  File Name: dradis-v2.0.1.tar.gz
Description:
dradis is a tool for sharing information during security testing. While plenty of tools exist to help in the different stages of the test, not so many exist to share interesting information captured. When a team of testers is working on the same set of targets, having a common repository of information is essential to avoid duplication of efforts.
Author:etd
Homepage:http://dradis.nomejortu.com/
Changes:First security patch. Minor bug fixes. Some additions.
File Size:2873873
Last Modified:Feb 24 19:46:32 2009
MD5 Checksum:92cf99745c32b0e0938aa430d83274dc

 ///  File Name: dradis-v2.1.0.tar.gz
Description:
dradis is a tool for sharing information during security testing. While plenty of tools exist to help in the different stages of the test, not so many exist to share interesting information captured. When a team of testers is working on the same set of targets, having a common repository of information is essential to avoid duplication of efforts.
Author:etd
Homepage:http://dradis.nomejortu.com/
Changes:The server component now features an import/export plugin architecture, import/export plugin generators, a sample WordXML export plugin, and a sample WikiMedia import plugin. The client component now features an import extension that allows nmap output to be imported, the ability to import a note from a plain text file, and more a powerful add extension that can add a note from the console.
File Size:2929903
Last Modified:Apr 17 13:50:06 2009
MD5 Checksum:eea6efa3957c53d2fa2b12cf30229498

 ///  File Name: dradis-v2.2.0.tar.gz
Description:
dradis is a tool for sharing information during security testing. While plenty of tools exist to help in the different stages of the test, not so many exist to share interesting information captured. When a team of testers is working on the same set of targets, having a common repository of information is essential to avoid duplication of efforts.
Author:etd
Homepage:http://dradis.nomejortu.com/
Changes:The following changes were made to the server component: Attachments can be added to nodes. "Refresh" buttons were added to the tree and the notes list. The use of "webrick" is forced even if mongrel is installed, since there is no SSL support in mongrel. The framework version information was centralized. autoExpandColumn now works on IE. Rails runs in "production" mode. The following changes were made to the client component: dradis can be used with wxRuby 2.0.0. Error handling was improved for REST Web service communication errors. REST credentials configuration in ./conf/dradis.xml was made easier.
File Size:3274609
Last Modified:Jun 12 12:14:28 2009
MD5 Checksum:cee8d97028b1878e51b2db747af69418

 ///  File Name: dradis-v2.4.0.tar.gz
Description:
dradis is a tool for sharing information during security testing. While plenty of tools exist to help in the different stages of the test, not so many exist to share interesting information captured. When a team of testers is working on the same set of targets, having a common repository of information is essential to avoid duplication of efforts.
Author:etd
Homepage:http://dradis.nomejortu.com/
Changes:In the server component, you can drag\'n\'drop your notes. New Rake tasks were added to backup the project, reset the environment, etc. The upload plugin gives better feedback in case of an exception. Nmap Upload now uses the Nmap::Parser library. A plugin was added to import data from the OSVDB. Bugs were fixed in the client component.
File Size:3793200
Last Modified:Sep 11 18:30:55 2009
MD5 Checksum:a0e57a670956c0dd9ae5a4a777350f82

 ///  File Name: dradis-v2.4.1.tar.gz
Description:
dradis is a tool for sharing information during security testing. While plenty of tools exist to help in the different stages of the test, not so many exist to share interesting information captured. When a team of testers is working on the same set of targets, having a common repository of information is essential to avoid duplication of efforts.
Author:etd
Homepage:http://dradis.nomejortu.com/
Changes:This release fixes several bugs in the client and server components.
File Size:3793141
Last Modified:Nov 3 00:08:45 2009
MD5 Checksum:1705042bdcb0f54b1a8254568b7ac06c

 ///  File Name: dradis-v2.5.0.tar.gz
Description:
dradis is a tool for sharing information during security testing. While plenty of tools exist to help in the different stages of the test, not so many exist to share interesting information captured. When a team of testers is working on the same set of targets, having a common repository of information is essential to avoid duplication of efforts.
Author:etd
Homepage:http://dradis.nomejortu.com/
Changes:The Note editor (Textile) was improved. An HTML export plugin was added for producing reports in HTML format. A Nikto Upload plugin was added. A Burp Upload plugin was added. The "First Time User Wizard" introduction was improved. You can keep track of all the activity with the built-in RSS feed. A new Rake task was added: dradis:backup. Rake dradis:reset now creates a backup of the project by default. Rake dradis:reset now clears the old log files. The structure of the Nmap Upload plugin data was improved. The ExtJS 3.0 and Rails 2.3.5 libraries were upgraded. Bugs were fixed.
File Size:4739901
Last Modified:Feb 5 20:56:28 2010
MD5 Checksum:1c9020a0991471afad3490ae728587f9

 ///  File Name: elza-1.3.1.zip
Description:
The ELZA is a scripting language written in PERL aimed at automating HTTP requests, while maintaining fill browser-like behavoir, which enables it to go to places within web sites unaccessible to netcat, telnet, or similar tools. Features: Extraction of _dynamic_ URLs from from HTML;Handling of forms, passing custom form fields and field values, collecting hidden form fields; Following redirects and refreshes; Handling of cookies, honoring their Path and Domain attributes; HTTP Referer, User-Agent, and other HTTP headers for perfect mimicry; HTTP basic authorization including dictionary attacks; Looping for repeated requesting or dictionary attacks; Conditional execution; HTTPS communication via a SSL tunnel; Forms hijacking. Scripts written in ELZA can be executed remotely via POST or forked for load generation.
Author:Philip Stoev
Homepage:http://phiphi.hypermart.net
File Size:28873
Last Modified:Nov 26 16:40:19 1999
MD5 Checksum:029eb167341c19143de29397c18857f1

 ///  File Name: elza-1.4.3.zip
Description:
The ELZA is a scripting language aimed at automating requests on web pages. Scripts written in ELZA are capable of mimicring browser behavoir almost perfectly, making it extremely difficult for remote servers to distinguish their activity from the activity generated by ordinary users and browsers. This gives those scripts the opportunity to act upon servers that will not respond to requests generated using netcat, rebol, telnet or similar tool. As a result, one can hijack heavily protected HTML forms, perform dictionary attacks on login forms, and do sophisticated CGI scanning.
Author:Philip Stoev
Homepage:http://phiphi.hypermart.net/elza-entry.html
File Size:41330
Last Modified:Jan 4 03:48:35 2000
MD5 Checksum:b6e8d6a733c07a4081837b70f88c6c08

 ///  File Name: elza-1.4.7-beta.zip
Description:
The ELZA is a scripting language aimed at automating requests on web pages. Scripts written in ELZA are capable of mimicking browser behavior almost perfectly, making it extremely difficult for remote servers to distinguish their activity from the activity generated by ordinary users and browsers. This gives those scripts the opportunity to act upon servers that will not respond to requests generated using netcat, rebol, telnet or similar tool. As a result, one can hijack heavily protected HTML forms, perform dictionary attacks on login forms, and do sophisticated CGI scanning.
Author:Philip Stoev
Homepage:http://phiphi.hypermart.net/pub/
Changes:Beta release - Includes some new features.
File Size:85719
Last Modified:Dec 21 18:11:51 2000
MD5 Checksum:69e706ec55eae97e6246d661df5e5d59

 ///  File Name: FG-Injector-0.9a.tar.bz2
Description:
FG-Injector is a tool that leverages the pentester's work by facilitating the exploitation of SQL Injection vulnerabilities. It includes a a powerful proxy feature for intercepting and modifying HTTP requests, a network spy module to allow the analyst view HTTP requests and their corresponding responses and an inference engine for automating SQL injection exploitation. The Inference Engine Module of the FG-Injector Framework automates the generation and injection of SQL statements needed for exploitation of a Blind SQL Injection. This module will work also for regular injections using the same method. It can produce blind injections on web/app servers using MS SQL Server, MySQL, and PostgresSql DBMSs.
Homepage:http://www.flowgate.net/
File Size:2107215
Last Modified:Apr 20 22:57:47 2007
MD5 Checksum:bf8954ef2c77f16f70b919e7f9d813a6

 ///  File Name: FireCat.tgz
Description:
FireCat is a new Firefox Framework Map collection of the most useful security oriented extensions. It stands for FireFox Catalog of Auditing Toolbox. Included is a zip file of the extensions and a pdf that provides a diagram of everything included.
Author:Security Database Team
Homepage:http://www.security-database.com/
File Size:83395
Last Modified:Mar 20 11:14:17 2007
MD5 Checksum:f42fa4fa01b5c59bc6e75f452b057fa3

 ///  File Name: FormScalpelv1.0.11BETA.zip
Description:
Form Scalpel v1.0.11 for Windows is designed to aid security professionals to assess the resilience of a web sites forms to various forms of attack. Given the growing sophistication and variety of sites and development techniques utilized, a generic tool specifically aimed at making this job easier was required. Thus "Form Scalpel" was born. The tool automatically extracts form/s from a given web page and automatically splits out all fields for editing and manipulation - making it a simple task to formulate detailed GET and POST requests. The application supports HTTP and HTTPS connections and will function over proxy servers.
Author:Curryman
Homepage:http://ugc.org.uk/~curryman
File Size:2740611
Last Modified:Sep 20 00:40:47 2001
MD5 Checksum:cc2ae1b4a6b71dd864d1bab764dc9e8c

 ///  File Name: Fortify-1.4.6-unix-alpha.tar.gz
Description:
Fortify provides full strength, 128-bit encryption facilities to the export editions of Netscape Navigator and Communicator. These facilites are used when connecting to an encrypting web server (with the SSL protocol). Fortify also adds the ability to generate 1024-bit RSA keys internally (these are typically used for client certificates), plus the ability to send and receive e-mail messages using strong 128-bit encryption (with the S/MIME protocol).
Author:Farrell McKay
Homepage:http://www.fortify.net
Changes:This is a transitionary release to support Communicator 4.72.
File Size:361153
Last Modified:Mar 7 03:50:02 2000
MD5 Checksum:0569aee45038ff534791ac042064ab82

 ///  File Name: fscan-both.tgz
Description:
Fast HTTP Auth Scanner is a new web security scanner for Windows that allows brute-force attacks against web based devices that require HTTP authentication. Source and binary included.
Author:Andres Tarasco
Homepage:http://www.514.es/
File Size:323885
Last Modified:Jul 25 00:28:45 2007
MD5 Checksum:adf7b4531948a7db469cf130dfd3ecf9

 ///  File Name: gatekeeper32.zip
Description:
GateKeeper 3.2 s a little bit of JavaScript code that you can use to restrict access to some or all of your web pages without the need for CGI scripting or server based authentication methods. Access is via password.
Author:Jbarta
Homepage:http://junior.apk.net/~jbarta/tutor/keeper/index.html
File Size:8156
Last Modified:Nov 30 22:27:51 1999
MD5 Checksum:4c690231a98acc2ffd62f74c51f6109c

 ///  File Name: genraid3r.c
Description:
CGI exploit generator that enables an engineer to test standard known CGI exploits with a utility that is customizable which will print to STDOUT and without the need for a browser.
Author:J0hny_Lightning
File Size:3464
Last Modified:Mar 4 00:31:54 2003
MD5 Checksum:80b74700aefdebdec85ccd622519430f

 ///  File Name: GetRAW.tar.gz
Description:
GetRAW for Windows will query any web server on any given port for banner, date, server, content modification, ETag, Accept-Range, Content Length, current connection and content. Uses the perl IO::Socket::INET module. Includes source and win32 executable.
Author:x1b
File Size:567068
Last Modified:Jan 9 03:45:42 2004
MD5 Checksum:63e1c04929b85905dce3097e3e49225a

 ///  File Name: GoogleCall.zip
Description:
GoogleCall uses Google's Click-to-Call service to send a number with a forged Caller ID. It automates the process of sending multiple calls to someone with multiple forged Caller IDs.
Author:Jeffball55
File Size:97490
Last Modified:Nov 21 21:45:29 2006
MD5 Checksum:ecc5f5cdd45cdbf9167e4bdba6c87bd4






 ///  File Name: haxlinx.htm
Description:
Links to local files can be used to subvert restricted access Windows machines which have access to a web browser. Executable program loggers and restrictions are defeated by using .CPLs. Large problems for network administrators could arise if students and employees, whose access was restricted, start to use the links provided on the document. This one can be used for Windows NT as well.
Author:Rev
File Size:1992
Last Modified:Feb 23 16:16:05 2000
MD5 Checksum:9fae71d04c9b880a9d5d9f832c3977ce

 ///  File Name: hhp-webinfo.pl
Description:
This little utility will use a public service (netcraft) to check the web server version and operating system of a remote host.
Author:Loophole
Homepage:http://www.hhp-programming.net
File Size:1262
Last Modified:Dec 30 22:22:56 2000
MD5 Checksum:a5cdbc365ef4c4de7316495a0af1d224

 ///  File Name: hnn.pl
Description:
hnn.pl grabs current or archived news from hackernews.com.
Author:MerXorcist
File Size:957
Last Modified:Apr 9 22:33:07 2000
MD5 Checksum:de8835194ce0fece69cc5d3e7d5b5d64

 ///  File Name: hns.pl
Description:
hns.pl grabs current news only from www.net-security.org.
Author:MerXorcist
File Size:710
Last Modified:Apr 10 19:36:15 2000
MD5 Checksum:e3750e4d90d3e60a128155560f536c03

 ///  File Name: hnsmarc.pl
Description:
hnsmarc.pl grabs current news from www.net-security.org, rewritten using the LWP-Package instead of lynx for increased portability and less resource usage.
Author:CG1H3R0
File Size:1116
Last Modified:Apr 12 18:07:10 2000
MD5 Checksum:18d8b9567aac18896d206f2845cf591b

 ///  File Name: htdump-0.9t.tar.gz
Description:
htdump directs an HTTP query to stdout. It has many options and SSL support, making it a good debugging and learning tool for Web/CGI developers or a powerful automation tool.
Author:Ren Hoek
Homepage:http://arak.cs.hro.nl/~ren/linux/
File Size:214317
Last Modified:Mar 13 19:38:00 2000
MD5 Checksum:45aa9f2832ce15db5174721591078395

 ///  File Name: htmlbar.msi
Description:
HTML Source Code Explorer Bar 2.0 is a plug-in for Internet Explorer that allows you to view the form fields for any HTML form being served and easily repopulate the fields (even hidden fields) with the input of your choice and submit the data. This tool can be very useful for penetration testing input validation on CGI scripts, etc.
Author:Richard van den Berg
Homepage:http://www.vdberg.org/~richard/htmlbar.html
File Size:157696
Last Modified:Jun 11 02:39:12 2003
MD5 Checksum:7abc1851659bb76fb79605c27dd03f17

 ///  File Name: htmlcodes.shtml
Description:
Full table of HTML ASCII characters and Symbols.
File Size:29172
Last Modified:Jun 10 12:33:34 2004
MD5 Checksum:3dd8daa5e072eef2140dcbbd5d9947d9

 ///  File Name: http_filter.tar.gz
Description:
HTTP Filter v1.4 is a HTTP tunnel with filtering and multiplexing which sits in front of not-so-secure Web servers (like IIS), and it accepts requests, applies a set of rules to them, and allows the requests to be passed through to the back-end Web server only if they pass all filters.
Homepage:http://glob.com.au/http_filter
Changes:An issue with HTTP/1.1 persistant connections was resolved. Previous versions only applied filtering to the first request of the connection.
File Size:10605
Last Modified:Aug 26 01:08:23 2001
MD5 Checksum:8682dd9a95b52c6ad1e5625dec7690e8

 ///  File Name: httpda.pl
Description:
HTTPda is a perl script that searches a remote site for forms, .cgi and .pl files.
Author:Crazy Einstein
Homepage:http://lbyte.void.ru
File Size:7017
Last Modified:Dec 11 00:53:46 2002
MD5 Checksum:465b8871a98763d32337fd999d039419

 ///  File Name: httprecon-1.3.zip
Description:
httprecon is an advanced web server fingerprinting tool that makes use of nine test cases when mapping the target service. Win32 binary release.
Author:Marc Ruef
Homepage:http://www.computec.ch/projekte/httprecon/
File Size:990438
Last Modified:Dec 11 22:57:13 2007
MD5 Checksum:4dea03e14a51c0bf95600e9eb0b0993e

 ///  File Name: httprecon-1.3src.zip
Description:
httprecon is an advanced web server fingerprinting tool that makes use of nine test cases when mapping the target service. Source release.
Author:Marc Ruef
Homepage:http://www.computec.ch/projekte/httprecon/
File Size:500577
Last Modified:Dec 11 22:57:35 2007
MD5 Checksum:2828728d929614dab78e30c9f28ebd32

 ///  File Name: httprox.txt
Description:
Httprox is a perl-based HTTP proxy that modifies or adds an HTTP header for all outgoing HTTP traffic. It can handle multiple connections and is useful for Web-application penetration testing, such as modification of the Cookie, User-Agent and Referrer fields, or adding HTTP headers that would normally not be present.
Author:Craig Heffner
Homepage:http://www.craigheffner.com/security
File Size:4552
Last Modified:Oct 13 20:23:14 2006
MD5 Checksum:e10a97075e3d43e3d85baada44328db1

 ///  File Name: httpscan_2.c
Description:
Httpscan_2.c displays the http server version.
Author:Necrose
Homepage:http://www.truncode.org
File Size:2192
Last Modified:Aug 20 02:33:24 2002
MD5 Checksum:21a6fa57af7c77b28784806c10c08e7f

 ///  Directory: / httptype /
Description:
httptype reads a list of http hosts and optionally the port number for each of these. It queries each host, displaying the type of HTTP server running on that host.
Total Files:4
Last Modified:Sep 5 23:00:59 2007

 ///  File Name: httptype-1.3.9.tar.gz
Description:
Httptype is a program that returns the http host software of a website. It is written in Perl.
Homepage:http://staff.ncst.ernet.in/~philip/downloads/httptype
Changes:New stable version. You can now use URLs in a host file as well. Unsupported URL schemes will return a warning and be skipped. This version also tries to figure out the server type of SSL hosts.
File Size:15254
Last Modified:Aug 30 01:10:02 2002
MD5 Checksum:6941ca3c2c8dd990f6e56dfce2fd9668

 ///  File Name: insider.zip
Description:
Insider v1.0 is a utility to set up a reverse backdoor for Win32 platforms that simply connects out to a server over HTTP and has the server tunnel commands back over the inbound connection.
Author:Nick Snickers
Homepage:http://www15.brinkster.com/nick102799/insider/
File Size:40003
Last Modified:Jul 22 16:27:29 2003
MD5 Checksum:fcb667a91f7f0be4ebe53db28e325844

 ///  File Name: JaPCrypt-0.1a.tar.gz
Description:
JaPCrypt stands for Javascript and PHP Encryption. It is a PHP/JavaScript suite that allows data encryption over HTTP.
Author:Gerardo Di Giacomo
Homepage:http://japcrypt.sourceforge.net/
File Size:20781
Last Modified:Feb 6 14:29:54 2008
MD5 Checksum:1335f3ce5e81cbcf6f529b6ab51af4d4

 ///  File Name: Liskit_1.6.zip
Description:
Liskit is a tool for finding directory traversal bugs in webservers by trying to download a file called "a", placed outside of the webroot. Liskit has found directory traversals in several webservers.
Author:T-Omicron
Homepage:http://t-Omicr0n.hexyn.be
File Size:3468
Last Modified:Apr 8 21:12:15 2001
MD5 Checksum:68b2ec72088692a4e759b22eb156aec5

 ///  File Name: lsa_v1.1.zip
Description:
LSA v1.1 for unix, linux, and windows is a tool written in PHP for testing PHP and system security settings, virtual hosts, and local accounts. You can write own plugins for LSA.
Author:eaS7
Homepage:http://lbyte.void.ru
File Size:47117
Last Modified:Dec 17 22:11:16 2002
MD5 Checksum:5071c695149010f466390dc81c86606d

 ///  File Name: mailprotect_2005_05_14.zip
Description:
Mail Protect was written as a quick and easy way to add an anti-spam version of an email address to web pages. It supports iso 8859 encoding of characters and JavaScript as a means of thwarting automated email harvesting while leaving the email address usable by any modern web browser.
Author:Monty McDougal
Homepage:http://www.foolmoon.net/security
File Size:15508
Last Modified:Aug 14 01:30:57 2005
MD5 Checksum:9243f8df7eb9eb707908dda0d5f8eae0

 ///  File Name: MassiveEnumerationToolset-0.5.tar.g..>
Description:
MASSIVE Enumeration Toolset, or MET, is a small tool that helps mine information from google.com. It supports Johnny's GHDB (Google Hacking Database XML Format) and Google's SOAP and Mobile APIs. Written in Python.
Author:Petko Petkov
Homepage:http://www.gnucitizen.org/met/download/
File Size:104368
Last Modified:Aug 31 02:34:08 2005
MD5 Checksum:ba6a26170c64e7b53031c75e783cb4f0

 ///  File Name: met-0.5.tar.gz
Description:
Massive Enumeration Toolset (MET) is a collection of python based scripts designed to perform various Passive Information Gathering techniques which can be helpful when evaluating the security of public computer networks.
Author:Petko Petkov
Homepage:http://www.gnucitizen.org/met/download/
File Size:104368
Last Modified:Nov 20 15:04:08 2005
MD5 Checksum:ba6a26170c64e7b53031c75e783cb4f0

 ///  File Name: mod_dosevasive.1.7.1.tar.gz
Description:
The Apache DoS Evasive Maneuvers Module is a module for Apache 1.3 and 2.0 that detects and fights off DoS attacks and brute force attempts by adding addresses to a 10-second '403 List' and rejecting rapidly repeated requests for the same URL from the same addresses. This module can be configured to talk to ipchains, ipfilter, or any other tool designed to push the attack out to the network layer, and provides email notification in the event of an attack.
Author:Jonathan A. Zdziarski
Homepage:http://www.nuclearelephant.com/projects/dosevasive
File Size:79081
Last Modified:Aug 27 01:57:04 2003
MD5 Checksum:db59ce8070c3b954c4ea101e17e4a4a0

 ///  File Name: mod_dosevasive.1.9.tar.gz
Description:
The Apache DoS Evasive Maneuvers Module is a module for Apache 1.3 and 2.0 that detects and fights off DoS attacks and brute force attempts by adding addresses to a 10-second '403 List' and rejecting rapidly repeated requests for the same URL from the same addresses. This module can be configured to talk to ipchains, ipfilter, or any other tool designed to push the attack out to the network layer, and provides email notification in the event of an attack. Also support iPlanet and Netscape webservers.
Author:Jonathan A. Zdziarski
Homepage:http://www.nuclearelephant.com/projects/dosevasive
Changes:Support for NSAPI has been added (SunONE Servers: iPlanet, Netscape). A TEMP_HOME definition has been added to make changing the location of temporary data easier.
File Size:23850
Last Modified:Oct 30 13:55:23 2003
MD5 Checksum:994333fa0ea901ae035919ce869332b0






 ///  File Name: haxlinx.htm
Description:
Links to local files can be used to subvert restricted access Windows machines which have access to a web browser. Executable program loggers and restrictions are defeated by using .CPLs. Large problems for network administrators could arise if students and employees, whose access was restricted, start to use the links provided on the document. This one can be used for Windows NT as well.
Author:Rev
File Size:1992
Last Modified:Feb 23 16:16:05 2000
MD5 Checksum:9fae71d04c9b880a9d5d9f832c3977ce

 ///  File Name: hhp-webinfo.pl
Description:
This little utility will use a public service (netcraft) to check the web server version and operating system of a remote host.
Author:Loophole
Homepage:http://www.hhp-programming.net
File Size:1262
Last Modified:Dec 30 22:22:56 2000
MD5 Checksum:a5cdbc365ef4c4de7316495a0af1d224

 ///  File Name: hnn.pl
Description:
hnn.pl grabs current or archived news from hackernews.com.
Author:MerXorcist
File Size:957
Last Modified:Apr 9 22:33:07 2000
MD5 Checksum:de8835194ce0fece69cc5d3e7d5b5d64

 ///  File Name: hns.pl
Description:
hns.pl grabs current news only from www.net-security.org.
Author:MerXorcist
File Size:710
Last Modified:Apr 10 19:36:15 2000
MD5 Checksum:e3750e4d90d3e60a128155560f536c03

 ///  File Name: hnsmarc.pl
Description:
hnsmarc.pl grabs current news from www.net-security.org, rewritten using the LWP-Package instead of lynx for increased portability and less resource usage.
Author:CG1H3R0
File Size:1116
Last Modified:Apr 12 18:07:10 2000
MD5 Checksum:18d8b9567aac18896d206f2845cf591b

 ///  File Name: htdump-0.9t.tar.gz
Description:
htdump directs an HTTP query to stdout. It has many options and SSL support, making it a good debugging and learning tool for Web/CGI developers or a powerful automation tool.
Author:Ren Hoek
Homepage:http://arak.cs.hro.nl/~ren/linux/
File Size:214317
Last Modified:Mar 13 19:38:00 2000
MD5 Checksum:45aa9f2832ce15db5174721591078395

 ///  File Name: htmlbar.msi
Description:
HTML Source Code Explorer Bar 2.0 is a plug-in for Internet Explorer that allows you to view the form fields for any HTML form being served and easily repopulate the fields (even hidden fields) with the input of your choice and submit the data. This tool can be very useful for penetration testing input validation on CGI scripts, etc.
Author:Richard van den Berg
Homepage:http://www.vdberg.org/~richard/htmlbar.html
File Size:157696
Last Modified:Jun 11 02:39:12 2003
MD5 Checksum:7abc1851659bb76fb79605c27dd03f17

 ///  File Name: htmlcodes.shtml
Description:
Full table of HTML ASCII characters and Symbols.
File Size:29172
Last Modified:Jun 10 12:33:34 2004
MD5 Checksum:3dd8daa5e072eef2140dcbbd5d9947d9

 ///  File Name: http_filter.tar.gz
Description:
HTTP Filter v1.4 is a HTTP tunnel with filtering and multiplexing which sits in front of not-so-secure Web servers (like IIS), and it accepts requests, applies a set of rules to them, and allows the requests to be passed through to the back-end Web server only if they pass all filters.
Homepage:http://glob.com.au/http_filter
Changes:An issue with HTTP/1.1 persistant connections was resolved. Previous versions only applied filtering to the first request of the connection.
File Size:10605
Last Modified:Aug 26 01:08:23 2001
MD5 Checksum:8682dd9a95b52c6ad1e5625dec7690e8

 ///  File Name: httpda.pl
Description:
HTTPda is a perl script that searches a remote site for forms, .cgi and .pl files.
Author:Crazy Einstein
Homepage:http://lbyte.void.ru
File Size:7017
Last Modified:Dec 11 00:53:46 2002
MD5 Checksum:465b8871a98763d32337fd999d039419

 ///  File Name: httprecon-1.3.zip
Description:
httprecon is an advanced web server fingerprinting tool that makes use of nine test cases when mapping the target service. Win32 binary release.
Author:Marc Ruef
Homepage:http://www.computec.ch/projekte/httprecon/
File Size:990438
Last Modified:Dec 11 22:57:13 2007
MD5 Checksum:4dea03e14a51c0bf95600e9eb0b0993e

 ///  File Name: httprecon-1.3src.zip
Description:
httprecon is an advanced web server fingerprinting tool that makes use of nine test cases when mapping the target service. Source release.
Author:Marc Ruef
Homepage:http://www.computec.ch/projekte/httprecon/
File Size:500577
Last Modified:Dec 11 22:57:35 2007
MD5 Checksum:2828728d929614dab78e30c9f28ebd32

 ///  File Name: httprox.txt
Description:
Httprox is a perl-based HTTP proxy that modifies or adds an HTTP header for all outgoing HTTP traffic. It can handle multiple connections and is useful for Web-application penetration testing, such as modification of the Cookie, User-Agent and Referrer fields, or adding HTTP headers that would normally not be present.
Author:Craig Heffner
Homepage:http://www.craigheffner.com/security
File Size:4552
Last Modified:Oct 13 20:23:14 2006
MD5 Checksum:e10a97075e3d43e3d85baada44328db1

 ///  File Name: httpscan_2.c
Description:
Httpscan_2.c displays the http server version.
Author:Necrose
Homepage:http://www.truncode.org
File Size:2192
Last Modified:Aug 20 02:33:24 2002
MD5 Checksum:21a6fa57af7c77b28784806c10c08e7f

 ///  Directory: / httptype /
Description:
httptype reads a list of http hosts and optionally the port number for each of these. It queries each host, displaying the type of HTTP server running on that host.
Total Files:4
Last Modified:Sep 5 23:00:59 2007

 ///  File Name: httptype-1.3.9.tar.gz
Description:
Httptype is a program that returns the http host software of a website. It is written in Perl.
Homepage:http://staff.ncst.ernet.in/~philip/downloads/httptype
Changes:New stable version. You can now use URLs in a host file as well. Unsupported URL schemes will return a warning and be skipped. This version also tries to figure out the server type of SSL hosts.
File Size:15254
Last Modified:Aug 30 01:10:02 2002
MD5 Checksum:6941ca3c2c8dd990f6e56dfce2fd9668

 ///  File Name: insider.zip
Description:
Insider v1.0 is a utility to set up a reverse backdoor for Win32 platforms that simply connects out to a server over HTTP and has the server tunnel commands back over the inbound connection.
Author:Nick Snickers
Homepage:http://www15.brinkster.com/nick102799/insider/
File Size:40003
Last Modified:Jul 22 16:27:29 2003
MD5 Checksum:fcb667a91f7f0be4ebe53db28e325844

 ///  File Name: JaPCrypt-0.1a.tar.gz
Description:
JaPCrypt stands for Javascript and PHP Encryption. It is a PHP/JavaScript suite that allows data encryption over HTTP.
Author:Gerardo Di Giacomo
Homepage:http://japcrypt.sourceforge.net/
File Size:20781
Last Modified:Feb 6 14:29:54 2008
MD5 Checksum:1335f3ce5e81cbcf6f529b6ab51af4d4

 ///  File Name: Liskit_1.6.zip
Description:
Liskit is a tool for finding directory traversal bugs in webservers by trying to download a file called "a", placed outside of the webroot. Liskit has found directory traversals in several webservers.
Author:T-Omicron
Homepage:http://t-Omicr0n.hexyn.be
File Size:3468
Last Modified:Apr 8 21:12:15 2001
MD5 Checksum:68b2ec72088692a4e759b22eb156aec5

 ///  File Name: lsa_v1.1.zip
Description:
LSA v1.1 for unix, linux, and windows is a tool written in PHP for testing PHP and system security settings, virtual hosts, and local accounts. You can write own plugins for LSA.
Author:eaS7
Homepage:http://lbyte.void.ru
File Size:47117
Last Modified:Dec 17 22:11:16 2002
MD5 Checksum:5071c695149010f466390dc81c86606d

 ///  File Name: mailprotect_2005_05_14.zip
Description:
Mail Protect was written as a quick and easy way to add an anti-spam version of an email address to web pages. It supports iso 8859 encoding of characters and JavaScript as a means of thwarting automated email harvesting while leaving the email address usable by any modern web browser.
Author:Monty McDougal
Homepage:http://www.foolmoon.net/security
File Size:15508
Last Modified:Aug 14 01:30:57 2005
MD5 Checksum:9243f8df7eb9eb707908dda0d5f8eae0

 ///  File Name: MassiveEnumerationToolset-0.5.tar.g..>
Description:
MASSIVE Enumeration Toolset, or MET, is a small tool that helps mine information from google.com. It supports Johnny's GHDB (Google Hacking Database XML Format) and Google's SOAP and Mobile APIs. Written in Python.
Author:Petko Petkov
Homepage:http://www.gnucitizen.org/met/download/
File Size:104368
Last Modified:Aug 31 02:34:08 2005
MD5 Checksum:ba6a26170c64e7b53031c75e783cb4f0

 ///  File Name: met-0.5.tar.gz
Description:
Massive Enumeration Toolset (MET) is a collection of python based scripts designed to perform various Passive Information Gathering techniques which can be helpful when evaluating the security of public computer networks.
Author:Petko Petkov
Homepage:http://www.gnucitizen.org/met/download/
File Size:104368
Last Modified:Nov 20 15:04:08 2005
MD5 Checksum:ba6a26170c64e7b53031c75e783cb4f0

 ///  File Name: mod_dosevasive.1.7.1.tar.gz
Description:
The Apache DoS Evasive Maneuvers Module is a module for Apache 1.3 and 2.0 that detects and fights off DoS attacks and brute force attempts by adding addresses to a 10-second '403 List' and rejecting rapidly repeated requests for the same URL from the same addresses. This module can be configured to talk to ipchains, ipfilter, or any other tool designed to push the attack out to the network layer, and provides email notification in the event of an attack.
Author:Jonathan A. Zdziarski
Homepage:http://www.nuclearelephant.com/projects/dosevasive
File Size:79081
Last Modified:Aug 27 01:57:04 2003
MD5 Checksum:db59ce8070c3b954c4ea101e17e4a4a0

 ///  File Name: mod_dosevasive.1.9.tar.gz
Description:
The Apache DoS Evasive Maneuvers Module is a module for Apache 1.3 and 2.0 that detects and fights off DoS attacks and brute force attempts by adding addresses to a 10-second '403 List' and rejecting rapidly repeated requests for the same URL from the same addresses. This module can be configured to talk to ipchains, ipfilter, or any other tool designed to push the attack out to the network layer, and provides email notification in the event of an attack. Also support iPlanet and Netscape webservers.
Author:Jonathan A. Zdziarski
Homepage:http://www.nuclearelephant.com/projects/dosevasive
Changes:Support for NSAPI has been added (SunONE Servers: iPlanet, Netscape). A TEMP_HOME definition has been added to make changing the location of temporary data easier.
File Size:23850
Last Modified:Oct 30 13:55:23 2003
MD5 Checksum:994333fa0ea901ae035919ce869332b0






 ///  File Name: mailprotect_2005_05_14.zip
Description:
Mail Protect was written as a quick and easy way to add an anti-spam version of an email address to web pages. It supports iso 8859 encoding of characters and JavaScript as a means of thwarting automated email harvesting while leaving the email address usable by any modern web browser.
Author:Monty McDougal
Homepage:http://www.foolmoon.net/security
File Size:15508
Last Modified:Aug 14 01:30:57 2005
MD5 Checksum:9243f8df7eb9eb707908dda0d5f8eae0

 ///  File Name: MassiveEnumerationToolset-0.5.tar.g..>
Description:
MASSIVE Enumeration Toolset, or MET, is a small tool that helps mine information from google.com. It supports Johnny's GHDB (Google Hacking Database XML Format) and Google's SOAP and Mobile APIs. Written in Python.
Author:Petko Petkov
Homepage:http://www.gnucitizen.org/met/download/
File Size:104368
Last Modified:Aug 31 02:34:08 2005
MD5 Checksum:ba6a26170c64e7b53031c75e783cb4f0

 ///  File Name: met-0.5.tar.gz
Description:
Massive Enumeration Toolset (MET) is a collection of python based scripts designed to perform various Passive Information Gathering techniques which can be helpful when evaluating the security of public computer networks.
Author:Petko Petkov
Homepage:http://www.gnucitizen.org/met/download/
File Size:104368
Last Modified:Nov 20 15:04:08 2005
MD5 Checksum:ba6a26170c64e7b53031c75e783cb4f0

 ///  File Name: mitmproxy-0.2.tar.gz
Description:
MITMProxy is an interactive, SSL-aware HTTP proxy that allows viewing, modification and replaying of requests.
Homepage:http://corte.si/posts/code/mitmproxy/index.html
File Size:91172
Last Modified:Apr 8 21:11:23 2010
MD5 Checksum:14e856ae95434947be1bd7e51cd0c9b1

 ///  File Name: mod_dosevasive.1.7.1.tar.gz
Description:
The Apache DoS Evasive Maneuvers Module is a module for Apache 1.3 and 2.0 that detects and fights off DoS attacks and brute force attempts by adding addresses to a 10-second '403 List' and rejecting rapidly repeated requests for the same URL from the same addresses. This module can be configured to talk to ipchains, ipfilter, or any other tool designed to push the attack out to the network layer, and provides email notification in the event of an attack.
Author:Jonathan A. Zdziarski
Homepage:http://www.nuclearelephant.com/projects/dosevasive
File Size:79081
Last Modified:Aug 27 01:57:04 2003
MD5 Checksum:db59ce8070c3b954c4ea101e17e4a4a0

 ///  File Name: mod_dosevasive.1.9.tar.gz
Description:
The Apache DoS Evasive Maneuvers Module is a module for Apache 1.3 and 2.0 that detects and fights off DoS attacks and brute force attempts by adding addresses to a 10-second '403 List' and rejecting rapidly repeated requests for the same URL from the same addresses. This module can be configured to talk to ipchains, ipfilter, or any other tool designed to push the attack out to the network layer, and provides email notification in the event of an attack. Also support iPlanet and Netscape webservers.
Author:Jonathan A. Zdziarski
Homepage:http://www.nuclearelephant.com/projects/dosevasive
Changes:Support for NSAPI has been added (SunONE Servers: iPlanet, Netscape). A TEMP_HOME definition has been added to make changing the location of temporary data easier.
File Size:23850
Last Modified:Oct 30 13:55:23 2003
MD5 Checksum:994333fa0ea901ae035919ce869332b0

 ///  File Name: mod_dosevasive_1.10.tar.gz
Description:
The Apache DoS Evasive Maneuvers Module is a module for both Apache 1.3 and 2.0 that provides functionality for detecting and fighting off DoS attacks and brute force attacks. It does this by adding addresses to a 10-second '403 List' and rejecting rapidly repeated requests for the same URL from the same addresses, using an internal hash table, on a per-child basis. This module can be configured to talk to ipchains, ipfilter, or any other tool designed to push the attack out to the network layer, and provides email notification in the event of an attack.
Author:Jonathan Zdziarski
Homepage:http://www.nuclearelephant.com/projects/dosevasive/
File Size:19567
Last Modified:Jan 22 15:13:58 2005
MD5 Checksum:5e5eee54b3fba64c83898828693931ff

 ///  File Name: mod_evasive_1.10.1.tar.gz
Description:
Mod_evasive is a module for Apache to provide evasive action in the event of an HTTP DoS or DDoS attack or brute force attack. It can be easily configured to talk to ipchains, firewalls, routers, and etcetera. mod_evasive reports abuses via email and syslog facilities. Detection is performed by creating an internal dynamic hash table of IP Addresses and URIs, and denying any single IP address from requesting the same page more than a few times per second or making more than 50 requests with the same child per second.
Author:Jonathan A. Zdziarski
Homepage:http://www.zdziarski.com/projects/mod_evasive/
File Size:20454
Last Modified:Feb 5 13:47:38 2007
MD5 Checksum:784fca4a124f25ccff5b48c7a69a65e5

 ///  File Name: mod_id_1.0.tar.gz
Description:
Mod_Id is an interesting Apache Module which is an IDS system watching for suspicious URL's.
Author:Burak
Homepage:http://www.hacettepe.edu.tr/~burak
File Size:31774
Last Modified:Feb 27 02:19:40 2001
MD5 Checksum:695e16ef65ffaf086eaca589a1f92212

 ///  File Name: mod_psldap-0.92.tar.gz
Description:
mod_psldap is an Apache module that performs authentication and authorization against an LDAP server with LDAP based session management. It also provides Web 2.0 based capabilities to add, edit, move, and create new records in the LDAP store, leveraging XSL stylesheets to offload heavy processing to the clients and reduce bandwidth consumption by up to 95% or more.
Homepage:http://sourceforge.net/projects/mod-psldap/
Changes:This is a bug fix release to address variations on the initially tested configurations. It also restores isolation of site specific configurations to simplify an upgrade.
File Size:174265
Last Modified:Apr 5 21:13:55 2010
MD5 Checksum:f95255035a62dabd6bd3a49cca975a3f

 ///  File Name: mod_psldap-0.93.tar.gz
Description:
mod_psldap is an Apache module that performs authentication and authorization against an LDAP server with LDAP based session management. It also provides Web 2.0 based capabilities to add, edit, move, and create new records in the LDAP store, leveraging XSL stylesheets to offload heavy processing to the clients and reduce bandwidth consumption by up to 95% or more.
Homepage:http://sourceforge.net/projects/mod-psldap/
Changes:This release provides new core capabilities to support new actions to register users. It also adds LDAP attributes and client side drag and drop editing of the LDAP records to reassign records to superiors, people to managers, and members to groups. A client side form validation framework was introduced, which simplifies validation through leverage of custom attributes on the input elements.
File Size:226115
Last Modified:Apr 21 11:13:13 2010
MD5 Checksum:b70448db24ace891bf9a181736163968

 ///  File Name: mod_rootme-0.1.tgz
Description:
mod_rootme is a very cool module for the Apache 1.3 series that sets up a backdoor inside of Apache where a simple GET request will allow a remote administrator the ability to grab a root shell on the system without any logging.
Author:Christophe Devine
File Size:47410
Last Modified:Jun 22 04:11:01 2004
MD5 Checksum:54e895013b25378a00bd8e93c46e32ad

 ///  File Name: mod_rootme-0.2.tgz
Description:
mod_rootme is a very cool module that sets up a backdoor inside of Apache where a simple GET request will allow a remote administrator the ability to grab a root shell on the system without any logging.
Author:Christophe Devine
Changes:Updated to support the 2.x series.
File Size:170277
Last Modified:Jun 22 19:54:49 2004
MD5 Checksum:1d844070391bfd012d183f9ff7564756

 ///  File Name: mod_rootme-0.3.tgz
Description:
mod_rootme is a very cool module that sets up a backdoor inside of Apache where a simple GET request will allow a remote administrator the ability to grab a root shell on the system without any logging.
Author:Christophe Devine
Changes:This version adds support for a large number of unix systems, including the BSDs, Solaris, OSF/Tru64 and more.
File Size:11894
Last Modified:Jun 25 08:41:00 2004
MD5 Checksum:5ae58a3aca398a4c2534413269dc13b6

 ///  File Name: mod_securid-2.0.1.tar.gz
Description:
The mod_securid Apache module implements RSA SecurID authentication for the Apache Web server. It allows administrators to restrict access to Web sites (or parts of Web sites) to users authenticated using a SecurID token and an ACE server.
Author:Erwan Legrand
Homepage:http://www.deny-all.com/mod_securid/v2/
File Size:91791
Last Modified:Mar 3 05:45:00 2004
MD5 Checksum:e0c27ca61e7b3f8265a3c14422158858

 ///  File Name: mod_securid-2.0.3.tar.gz
Description:
The mod_securid Apache module implements RSA SecurID authentication for the Apache Web server. It allows administrators to restrict access to Web sites (or parts of Web sites) to users authenticated using a SecurID token and an ACE server.
Author:Erwan Legrand
Homepage:http://www.deny-all.com/mod_securid/v2/
Changes:Added configure script. Added process maintenance. Fixed a few bugs.
File Size:164545
Last Modified:Nov 26 20:46:44 2006
MD5 Checksum:789f3705c9b6609d22e880cc0acceea1

 ///  File Name: mod_security-1.7.2.tar.gz
Description:
Mod_security is an Apache module whose purpose is to protect vulnerable applications and reject human or automated attacks. In addition to filtering requests, it also can create Web application audit logs. Understands regular expressions and POST payloads and runs on both branches of Apache.
Homepage:http://www.modsecurity.org
Changes:This release fixes several bugs, one of which is a potentially exploitable local vulnerability (Apache 2.x users only). It also introduces a SecFilterOutputMimeTypes directive to control which documents will be scanned on output.
File Size:268128
Last Modified:Oct 29 23:17:12 2003
MD5 Checksum:4d2fb794efa24ff6d66f9f0c070ef9ce

 ///  File Name: mod_security-1.7.3.tar.gz
Description:
Mod_security is an Apache module whose purpose is to protect vulnerable applications and reject human or automated attacks. In addition to filtering requests, it also can create Web application audit logs. Understands regular expressions and POST payloads and runs on both branches of Apache.
Homepage:http://www.modsecurity.org
Changes:The number of variables whose contents are normalized before rules are applied has been increased, resulting in more predictable regular expression matching. Binaries for Windows were made available and bugs were fixed.
File Size:266417
Last Modified:Nov 18 19:43:02 2003
MD5 Checksum:2ea27b2b246d1b0c5afdd50011f3747d

 ///  File Name: mod_security-1.7.4.tar.gz
Description:
Mod_security is an Apache module whose purpose is to protect vulnerable applications and reject human or automated attacks. In addition to filtering requests, it also can create Web application audit logs. Understands regular expressions and POST payloads and runs on both branches of Apache.
Homepage:http://www.modsecurity.org
Changes:A bug in the Apache 2 version that would confuse PHP has been fixed and another bug causing the "nolog" action to not prevent the request from being logged to the audit log has been fixed.
File Size:272360
Last Modified:Dec 14 07:43:21 2003
MD5 Checksum:629945812ca7aab4ef2f76ad00172444

 ///  File Name: mod_security-1.7.tar.gz
Description:
Mod_security is an Apache module whose purpose is to protect vulnerable applications and reject human or automated attacks. In addition to filtering requests, it also can create Web application audit logs. Understands regular expressions and POST payloads and runs on both branches of Apache.
Homepage:http://www.modsecurity.org
Changes:Added a new anti-evasion technique to fight null-byte attacks, Added output filtering to Apache 2.x, Added the ability to filter cookies (names, values, etc) directly, Added SecServerSignature to mask the web server, Added new action, allow, to finish filter processing and let the request through, Added new action, chain, to chain several filter together (logical AND), and now includes Netware support.
File Size:252858
Last Modified:Oct 20 23:38:52 2003
MD5 Checksum:c6b152d726c5383be4f112e294c19d03

 ///  File Name: mod_security-1.8.4.tar.gz
Description:
Mod_security is an Apache module whose purpose is to protect vulnerable applications and reject human or automated attacks. In addition to filtering requests, it also can create Web application audit logs. Understands regular expressions and POST payloads and runs on both branches of Apache.
Homepage:http://www.modsecurity.org
Changes:Cool bug fixes.
File Size:351172
Last Modified:Sep 22 03:13:50 2004
MD5 Checksum:a7fdaadfbce17845aef2e48a548bd2ae

 ///  File Name: mod_security-1.8.5.tar.gz
Description:
Mod_security is an Apache module whose purpose is to protect vulnerable applications and reject human or automated attacks. In addition to filtering requests, it also can create Web application audit logs. Understands regular expressions and POST payloads and runs on both branches of Apache. Windows binary available here.
Homepage:http://www.modsecurity.org
Changes:This is is a maintenance release, which fixes minor problems found in v1.8.4.
File Size:350914
Last Modified:Nov 1 14:51:37 2004
MD5 Checksum:c42aa33d1d9f3bbc7cb4f9d5fc84f54b

 ///  File Name: mod_security_1.3b.tar.gz
Description:
Mod_security is an Apache module whose purpose is to protect vulnerable applications and reject human or automated attacks. In addition to filtering requests, it also can create Web application audit logs. Understands regular expressions and POST payloads.
Homepage:http://www.webkreator.com/mod_security/download
Changes:Selective filtering has been introduced. You can now filter requests based on the contents of individual variables (HTTP headers, environment variables, and individual script arguments) coming either from GET or POST.
File Size:12967
Last Modified:Dec 15 17:38:28 2002
MD5 Checksum:55a6ab4938c0f27140ead7ecac3bf5ca

 ///  File Name: mod_wasap-0.0.11.tar.gz
Description:
WASap is an Apache module for the 1.3.x series that acts as an application level firewall. It can filter and block malignant requests.
Author:Phillip Whelan,Oscar Peredo
Homepage:http://wasap.exis.cl/
File Size:41593
Last Modified:Nov 5 00:42:50 2003
MD5 Checksum:f0fc90492c8231b445d023e84f7d603f

 ///  File Name: modsecurity-1.8.7.tar.gz
Description:
Mod Security is an intrusion detection and prevention engine for Web applications which operates as an Apache module or Java Servlet filter. Its purpose is to increase Web application security, protecting Web applications from known and unknown attacks. It is flexible and easy to configure, monitors HTTP traffic (including POST payload), enhances logging, performs automatic built-in checks, and simultaneously allows administrators to create custom rules for their individual needs.
Homepage:http://www.modsecurity.org/
Changes:Minor security fixes, bug fixes and enhancements. Improved cookie parsers. Fixed evasion tactics.
File Size:313004
Last Modified:Mar 25 01:02:43 2005
MD5 Checksum:0dd48656e451c711358c097dc80e0369






 ///  File Name: modsecurity-apache-1.9.1.tar.gz
Description:
Mod Security is an intrusion detection and prevention engine for Web applications which operates as an Apache module or Java Servlet filter. Its purpose is to increase Web application security, protecting Web applications from known and unknown attacks. It is flexible and easy to configure, monitors HTTP traffic (including POST payload), enhances logging, performs automatic built-in checks, and simultaneously allows administrators to create custom rules for their individual needs.
Homepage:http://www.modsecurity.org/
Changes:Some small security improvements, and improvements, also some enhancements.
File Size:395659
Last Modified:Dec 1 01:51:54 2005
MD5 Checksum:d648ba26b1dba708a06344072bea984c

 ///  File Name: modsecurity-apache_2.0.3.tar.gz
Description:
Mod Security is an intrusion detection and prevention engine for Web applications which operates as an Apache module or Java Servlet filter. Its purpose is to increase Web application security, protecting Web applications from known and unknown attacks. It is flexible and easy to configure, monitors HTTP traffic (including POST payload), enhances logging, performs automatic built-in checks, and simultaneously allows administrators to create custom rules for their individual needs.
Homepage:http://www.modsecurity.org/
Changes:Version 2.0 is a major rewrite and includes XML support, event correlation, transaction scoring, anomaly detection, data persistence, wealth of anti-evasion functions, regex back-references, support for sessions, and much more.
File Size:302451
Last Modified:Nov 1 17:26:25 2006
MD5 Checksum:7993fd01121c6562cc4e3829ba343f94

 ///  File Name: modsecurity-apache_2.0.4.tar.gz
Description:
Mod Security is an intrusion detection and prevention engine for Web applications which operates as an Apache module or Java Servlet filter. Its purpose is to increase Web application security, protecting Web applications from known and unknown attacks. It is flexible and easy to configure, monitors HTTP traffic (including POST payload), enhances logging, performs automatic built-in checks, and simultaneously allows administrators to create custom rules for their individual needs.
Homepage:http://www.modsecurity.org/
Changes:Fixed some bugs.
File Size:303477
Last Modified:Nov 30 02:01:50 2006
MD5 Checksum:b63f093c7a24b766e6e8c9c8ffc13084

 ///  File Name: modsecurity-apache_2.1.0.tar.gz
Description:
Mod Security is an intrusion detection and prevention engine for Web applications which operates as an Apache module or Java Servlet filter. Its purpose is to increase Web application security, protecting Web applications from known and unknown attacks. It is flexible and easy to configure, monitors HTTP traffic (including POST payload), enhances logging, performs automatic built-in checks, and simultaneously allows administrators to create custom rules for their individual needs.
Homepage:http://www.modsecurity.org/
Changes:Improved performance and reduced memory consumption (200% improvement). Includes the generic Web application security rules from the Core Rules project. The manual has been extensively improved.
File Size:650133
Last Modified:Mar 4 04:00:21 2007
MD5 Checksum:2e919766f2878c4ee46334816004dd15

 ///  File Name: NatACL.20040508.tar.gz
Description:
NatACL is an authentication daemon for NAT and transparent proxying that man in the middles outbound HTTP requests and forces the user to a login/password page requesting credentials to allow the outbound connection. After proper credentials are received, NAT rules are automatically generated.
Author:Fabio Yasusi Yamamoto
File Size:26553
Last Modified:May 10 03:07:58 2004
MD5 Checksum:9a752673abf7c8931bef4b6f9595c7c7

 ///  File Name: NatACL.20050311.tar.gz
Description:
NatACL is an authentication daemon for NAT and transparent proxying that man in the middles outbound HTTP requests and forces the user to a login/password page requesting credentials to allow the outbound connection. After proper credentials are received, NAT rules are automatically generated.
Author:Fabio Yasusi Yamamoto
Changes:Various additions and fixes.
File Size:62350
Last Modified:Mar 17 01:21:38 2005
MD5 Checksum:10a8a90b2521de703e432223b157f580

 ///  File Name: nncookct.zip
Description:
Netscape Navigator Cookie Cutter - Let you choose which cookies to use under Windows Netscape.
Homepage:http://www.roninsg.com/nncookct.htm
File Size:77496
Last Modified:Jan 1 00:35:31 2001
MD5 Checksum:86e6e99134299a355ec53ba16ceab2d4

 ///  File Name: Pantera_Release_0.1.1.zip
Description:
OWASP Pantera Web Assessment Studio (WAS) is a mix between a pentest proxy, an application scanner and an intelligence analysis framework. Pantera leaves the analysis and automatic (repetitive) stuff to the engine, leaving only the important decisions to the security expert. It has been designed by professionals with many years of experience in the application security industry to offer users the necessary features required for them to create secure code. Pantera uses an improved version of SpikeProxy to provide a powerful web application analysis engine.
Author:Pantera Proxy
Homepage:http://www.owasp.org/index.php/Category:OWASP_Pantera_Web_Assessment_Studio_Project
File Size:1786718
Last Modified:Oct 30 15:52:50 2006
MD5 Checksum:f6c29bb2d28ad6f0cbaab6d51bcd2b84

 ///  File Name: Pantera_Release_0.1.2.zip
Description:
OWASP Pantera Web Assessment Studio (WAS) is a mix between a pentest proxy, an application scanner and an intelligence analysis framework. Pantera leaves the analysis and automatic (repetitive) stuff to the engine, leaving only the important decisions to the security expert. It has been designed by professionals with many years of experience in the application security industry to offer users the necessary features required for them to create secure code. Pantera uses an improved version of SpikeProxy to provide a powerful web application analysis engine.
Author:Pantera Proxy
Homepage:http://www.owasp.org/index.php/Category:OWASP_Pantera_Web_Assessment_Studio_Project
Changes:Tons of changes - See changelog.
File Size:1207676
Last Modified:Nov 30 13:23:57 2006
MD5 Checksum:8ac3928d4351c9f49819ffc2d3e1a274

 ///  File Name: pcap20.msi
Description:
ProxyCap enables users to tunnel Internet applications through HTTP, SOCKS v4, and SOCKS v5 Proxy Servers. It can be told which applications will connect to the Internet through a proxy and under what circumstances. This is done through a user friendly interface, without the need to reconfigure any clients. ProxyCap provides a flexible rule system and allows the end user to define their own tunneling rules. ProxyCap version 2.0 introduces support for UDP-based networking clients, optional remote name resolution, and more detailed Session Logs.
Author:Proxy Labs
Homepage:http://proxylabs.netwu.com/
File Size:323584
Last Modified:Oct 16 02:47:24 2003
MD5 Checksum:ed8e88a6437ad28cb638935fad8e6f3f

 ///  File Name: pcap201.msi
Description:
ProxyCap enables users to tunnel Internet applications through HTTP, SOCKS v4, and SOCKS v5 Proxy Servers. It can be told which applications will connect to the Internet through a proxy and under what circumstances. This is done through a user friendly interface, without the need to reconfigure any clients. ProxyCap provides a flexible rule system and allows the end user to define their own tunneling rules. ProxyCap version 2.0 introduces support for UDP-based networking clients, optional remote name resolution, and more detailed Session Logs.
Author:Proxy Labs
Homepage:http://proxylabs.netwu.com/
File Size:324096
Last Modified:May 4 00:48:59 2004
MD5 Checksum:8848e7f85383047a4afa48483dcde0aa

 ///  File Name: pcap202.msi
Description:
ProxyCap enables users to tunnel Internet applications through HTTP, SOCKS v4, and SOCKS v5 Proxy Servers. It can be told which applications will connect to the Internet through a proxy and under what circumstances. This is done through a user friendly interface, without the need to reconfigure any clients. ProxyCap provides a flexible rule system and allows the end user to define their own tunneling rules.
Author:Proxy Labs
Homepage:http://proxylabs.netwu.com/
File Size:304640
Last Modified:Feb 25 18:27:40 2005
MD5 Checksum:be335287cf5dbfae344b1be88bff4be1

 ///  File Name: pcap203.msi
Description:
ProxyCap enables users to tunnel Internet applications through HTTP, SOCKS v4, and SOCKS v5 Proxy Servers. It can be told which applications will connect to the Internet through a proxy and under what circumstances. This is done through a user friendly interface, without the need to reconfigure any clients. ProxyCap provides a flexible rule system and allows the end user to define their own tunneling rules.
Author:Proxy Labs
Homepage:http://proxylabs.netwu.com/
File Size:304640
Last Modified:Jul 13 03:38:39 2005
MD5 Checksum:d5d5d8f52ae48f76b574e5794fb1d7aa

 ///  Directory: / pcweek /
Description:
The PC Week Crack
Total Files:2
Last Modified:Sep 5 23:01:02 2007

 ///  File Name: php.hidden-vars.txt
Description:
PHP forms can be subverted if the programmer assumed hidden fields are secure variables. Exploit description included.
Author:Daniel River Phoenix
File Size:1578
Last Modified:Dec 17 12:37:57 1999
MD5 Checksum:d9d9a8727747c201139d1120478e59cc

 ///  File Name: phpav-1.0.txt
Description:
phpAV is a script designed to work as antivirus for malicious PHP scripts. It will search a given directory and related files for dangerous functions and provide a report.
Author:Milos Zivanovic
File Size:4062
Last Modified:Jan 4 19:56:47 2010
MD5 Checksum:9b31aa1d0d3e2ef711952dc35d888ba6

 ///  File Name: phpav-1.1.txt
Description:
phpAV is a script designed to work as antivirus for malicious PHP scripts. It will search a given directory and related files for dangerous functions and provide a report.
Author:Milos Zivanovic
File Size:5165
Last Modified:Jan 6 23:48:03 2010
MD5 Checksum:0019c4dadfdf0ad16cce207d5a56bdc4

 ///  File Name: pixpirate.pl
Description:
Pixpirate.pl will goto a source URL, download all other sub-URL's from an index of URL's, then goto each of those source url's, downloading every jpg file that it comes into contact with.
Author:Ajax
Homepage:http://users.dhp.com/~ajax/code/ss
File Size:12166
Last Modified:Dec 2 19:10:56 2000
MD5 Checksum:dd5c3e955dc00e9e2c75f59d05543ddc

 ///  File Name: Pound-1.5.tgz
Description:
Pound is a reverse HTTP proxy, load balancer, and SSL wrapper. It proxies client HTTPS requests to HTTP backend servers, distributes the requests among several servers while keeping sessions, supports HTTP/1.1 requests even if the backend server(s) are HTTP/1.0, and sanitizes requests.
Author:roseg
Homepage:http://www.apsis.ch/pound/index.html
File Size:120219
Last Modified:Oct 17 01:15:48 2003
MD5 Checksum:e838381f7fb49136c531895a0e93c31d

 ///  File Name: Pound-1.6.tgz
Description:
Pound is a reverse HTTP proxy, load balancer, and SSL wrapper. It proxies client HTTPS requests to HTTP backend servers, distributes the requests among several servers while keeping sessions, supports HTTP/1.1 requests even if the backend server(s) are HTTP/1.0, and sanitizes requests.
Author:roseg
Homepage:http://www.apsis.ch/pound/index.html
Changes:Various bug fixes.
File Size:121075
Last Modified:Nov 30 22:41:04 2003
MD5 Checksum:530c26184be5da7715207423339cf2b1

 ///  File Name: Pound-1.8.tgz
Description:
Pound is a reverse HTTP proxy, load balancer, and SSL wrapper. It proxies client HTTPS requests to HTTP backend servers, distributes the requests among several servers while keeping sessions, supports HTTP/1.1 requests even if the backend server(s) are HTTP/1.0, and sanitizes requests.
Author:roseg
Homepage:http://www.apsis.ch/pound/index.html
Changes:See the changelog.
File Size:139707
Last Modified:Jun 1 03:02:58 2005
MD5 Checksum:f8a15e9019ce778afae952a83c172145

 ///  File Name: Pound-1.9.tgz
Description:
Pound is a reverse HTTP proxy, load balancer, and SSL wrapper. It proxies client HTTPS requests to HTTP backend servers, distributes the requests among several servers while keeping sessions, supports HTTP/1.1 requests even if the backend server(s) are HTTP/1.0, and sanitizes requests.
Author:roseg
Homepage:http://www.apsis.ch/pound/index.html
Changes:See the changelog.
File Size:143284
Last Modified:Jun 18 14:26:50 2005
MD5 Checksum:f1ec64357e0a53ed8050847517209525

 ///  File Name: Pound-2.0.tgz
Description:
Pound is a reverse HTTP proxy, load balancer, and SSL wrapper. It proxies client HTTPS requests to HTTP backend servers, distributes the requests among several servers while keeping sessions, supports HTTP/1.1 requests even if the backend server(s) are HTTP/1.0, and sanitizes requests.
Author:roseg
Homepage:http://www.apsis.ch/pound/index.html
Changes:See the changelog.
File Size:143345
Last Modified:Feb 2 06:29:43 2006
MD5 Checksum:ddbd39a9f2beaf625ec7e7a9a2379801

 ///  File Name: Pound-2.1.tgz
Description:
Pound is a reverse HTTP proxy, load balancer, and SSL wrapper. It proxies client HTTPS requests to HTTP backend servers, distributes the requests among several servers while keeping sessions, supports HTTP/1.1 requests even if the backend server(s) are HTTP/1.0, and sanitizes requests.
Author:roseg
Homepage:http://www.apsis.ch/pound/index.html
Changes:Added support for PCRE and Hoard libraries. Various rewrites and bug fixes.
File Size:136877
Last Modified:Aug 17 02:31:24 2006
MD5 Checksum:d51fefbaef369c94b87785400e52120f

 ///  File Name: Pound-2.2.tgz
Description:
Pound is a reverse HTTP proxy, load balancer, and SSL wrapper. It proxies client HTTPS requests to HTTP backend servers, distributes the requests among several servers while keeping sessions, supports HTTP/1.1 requests even if the backend server(s) are HTTP/1.0, and sanitizes requests.
Author:roseg
Homepage:http://www.apsis.ch/pound/index.html
Changes:Added the host to LogLevel 2. Added support for tcmalloc. Fixed problem with the initialisation of host_mut.
File Size:146076
Last Modified:Dec 21 22:15:50 2006
MD5 Checksum:a94e781ced1b2f3a7f8b8051f4d95713






 ///  File Name: proxytest.pl
Description:
proxytest.pl is a perl script that reads in a list of proxies from a text file and checks their state.
Author:Andrea Purificato
Homepage:http://rawlab.altervista.org
File Size:2952
Last Modified:Apr 28 20:05:21 2006
MD5 Checksum:98163d1a3063701248933a04275bbb1e

 ///  File Name: prtunnel-0.1.2.tar.gz
Description:
prtunnel tunnels a TCP connection to a remote server using an HTTP or SOCKS5 proxy, which is useful if you want to send packets from programs that don't have native proxy support through a proxy.
Author:Josh Beam
Homepage:http://joshbeam.com/software.html
Changes:Bugs fixed.
File Size:11067
Last Modified:Jan 10 04:32:46 2003
MD5 Checksum:8fc2d6028d8a92a223ebeabf967699b9

 ///  File Name: pudding01.tar.gz
Description:
Pudding is a proxy which recodes HTTP requests using most of RFP's IDS evasion encoding methods, plus random UTF-8 encoding support. Allows any web aware program/exploit/cgi-scanner to evade IDS without modification of the original code. Encoding methods include all uppercase, hex encoding, /./ directory insertion, fake parameters, premature URL endings, windows delimiters, and random UTF8 encoding.
Author:Roelof Temmingh
Homepage:http://www.sensepost.com
File Size:6236
Last Modified:Jan 12 19:40:35 2001
MD5 Checksum:c59f537e8c2babca36afbce55c28089b

 ///  File Name: redir-httpd.c
Description:
redir-httpd is an ultra-minimalist, non-RFC-compliant HTTP server that will ONLY issue redirects to another site. It's good for running on home systems that have permanent connectivity (i.e. DSL and cable-modem subscribers). It should be short enough to be easily understood (and thus audited for potential security issues), and still fairly robust.
Homepage:http://www.technopagan.org
File Size:5421
Last Modified:Jan 8 18:45:27 2001
MD5 Checksum:2d3c8337450315d0a149061df88218be

 ///  File Name: refspoof.c
Description:
Refspoof acts like a proxy server and is able to spoof your HTTP referrer and user-agent. This comes in handy to bypass certain authentication mechanisms or user-agent limitations for some download managers.
Author:softxor
Homepage:http://bunnies.phpnet.us/
File Size:7029
Last Modified:Dec 8 18:15:01 2006
MD5 Checksum:efa2344a37c1108a34821fce25644a3b

 ///  File Name: screamingCobra-1.04.tar.gz
Description:
ScreamingCobra is an application for remote vulnerability discovery in ANY UNKNOWN web applications such as CGIs and PHP pages. Simply put, it attempts to find vulnerabilities in all web applications on a host without knowing anything about the applications. Modern CGI scanners scan a host for CGIs with known vulnerabilities. ScreamingCobra is able to 'find' the actual vulnerabilities in ANY CGI, whether it has been discovered before or not.
Author:Samy Kamkar
Homepage:http://cobra.LucidX.com
Changes:Several bug fixes, support for adding attacking techiques and a Windows binary has been added.
File Size:414990
Last Modified:Jan 13 21:23:34 2002
MD5 Checksum:a36d646cb96a64a95f7aa2f5c07224e7

 ///  File Name: sendfile.pl
Description:
sendfile.pl is a tool which uses echo to send files to any webserver which has an unchecked open() call in a cgi script.
Author:Vade79
Homepage:http://www.realhalo.org
File Size:3066
Last Modified:May 14 02:32:18 2000
MD5 Checksum:33971fcef545107c5761f80bcf94e386

 ///  File Name: SH_Tool_1.1.0.exe
Description:
Security Hardening Tool for Web Servers. Examines the web server's security configuration and provides heuristic analysis of the web server's configuration files to detect security configuration errors.
Homepage:http://www.syhunt.com
File Size:963584
Last Modified:May 12 20:03:37 2004
MD5 Checksum:22a1695c356ec42f31e7b985d1431b95

 ///  File Name: SP147.tgz
Description:
SPIKE proxy is a web application analysis tool which uses the SPIKE API to help reverse engineer new and unknown network protocols. Provides security analysis features for Web applications, a multi-threaded design, man in the middle SSL proxying, form rewriting, SQL injection detection, handles Connection: keep-alive properly (it is possible to log in to Hotmail with it), and rewrites User-Agent to pretend to be running IE. Requires pyOpenSSL 0.5.1 from the SPIKE Web page. Several working examples are included. Screenshot available here. Changelog available here.
Author:Dave Aitel
Homepage:http://www.immunitysec.com/spike.html
Changes:Internet Explorer compatibility has been fixed, the core engine is more capable against a wider range of web pages and it is now possible to restrict use of the proxy.
File Size:622289
Last Modified:Jan 31 16:48:25 2003
MD5 Checksum:1e99a36ca340970366bf96f460ec3602

 ///  File Name: spikeproxy-1.3.tar.gz
Description:
SPIKE proxy is a web application analysis tool which uses the SPIKE API to help reverse engineer new and unknown network protocols. Provides security analysis features for Web applications, a multi-threaded design, man in the middle SSL proxying, form rewriting, SQL injection detection, handles Connection: keep-alive properly (it is possible to log in to Hotmail with it), and rewrites User-Agent to pretend to be running IE. Requires pyOpenSSL pre 0.5 from the SPIKE Web page. Several working examples are included. Screenshot available here. Changelog available here.
Author:Dave Aitel
Homepage:http://www.immunitysec.com/spike.html
Changes:Core engine fixed, crawling support fixed, directory and file scan added.
File Size:328214
Last Modified:Sep 27 10:46:18 2002
MD5 Checksum:77fe8f73662ee35c16a20c836a330f3f

 ///  File Name: spikeproxy-1.4.6.tar.gz
Description:
SPIKE proxy is a web application analysis tool which uses the SPIKE API to help reverse engineer new and unknown network protocols. Provides security analysis features for Web applications, a multi-threaded design, man in the middle SSL proxying, form rewriting, SQL injection detection, handles Connection: keep-alive properly (it is possible to log in to Hotmail with it), and rewrites User-Agent to pretend to be running IE. Requires pyOpenSSL pre 0.5 from the SPIKE Web page. Several working examples are included. Screenshot available here. Changelog available here.
Author:Dave Aitel
Homepage:http://www.immunitysec.com/spike.html
Changes:Fixed NTLM support for some people, Added "False 404 Detection" which can be customized through the Configuration menu.
File Size:621209
Last Modified:Nov 19 01:23:23 2002
MD5 Checksum:209f932aee7e3047c52e9783424b9dac

 ///  File Name: spkproxy1.0.tar.gz
Description:
SPIKE proxy is a proxy which uses the SPIKE API to help reverse engineer new and unknown network protocols. Provides security analysis features for Web applications, a multi-threaded design, man in the middle SSL proxying, handles Connection: keep-alive properly (it is possible to log in to Hotmail with it), and rewrites User-Agent to pretend to be running IE. Requires pyOpenSSL pre 0.5 from the SPIKE Web page. Several working examples are included.
Author:Dave Aitel
Homepage:http://www.immunitysec.com/spike.html
File Size:16436
Last Modified:Jul 14 21:18:41 2002
MD5 Checksum:8bf40cc6cecfff2da3663229ce715a79

 ///  File Name: spkproxy1.1.tar.gz
Description:
SPIKE proxy is a proxy which uses the SPIKE API to help reverse engineer new and unknown network protocols. Provides security analysis features for Web applications, a multi-threaded design, man in the middle SSL proxying, handles Connection: keep-alive properly (it is possible to log in to Hotmail with it), and rewrites User-Agent to pretend to be running IE. Requires pyOpenSSL pre 0.5 from the SPIKE Web page. Several working examples are included. Screenshot available here.
Author:Dave Aitel
Homepage:http://www.immunitysec.com/spike.html
Changes:A HTML based GUI is now included, allowing the user to quickly look for SQL injection bugs/overflows on an entire site or rewrite individual requests.
File Size:52021
Last Modified:Jul 23 23:39:26 2002
MD5 Checksum:931c52d01f7fed1abf47c46fc8320cae

 ///  File Name: sqlime_source.zip
Description:
SQL-Me is a Firefox Add-on tool that was designed to help test for SQL injection vulnerabilities in a given system.
Homepage:http://www.securitycompass.com/
File Size:159113
Last Modified:Dec 10 20:23:17 2007
MD5 Checksum:053241d7bc2d8e479358ce27a1d418d6

 ///  File Name: squid-nufw-helper-1.1.3.tar.gz
Description:
squid-nufw-helper is an external ACL helper for Squid that provides Single Sign On capabilities. It uses the NuFW firewall suite and supports the NuFW users SQL logging scheme. The module allows for strict SSO identification and authentication of users on any Squid proxy, including transparent proxies.
Author:Vincent Deffontaines
Changes:-a switch now useless. Handles automatic reconnection to MySQL sever.
File Size:179428
Last Modified:Nov 24 14:41:14 2008
MD5 Checksum:cca0d60557dacbde89a68c7aeb0dad29

 ///  File Name: squid_nufw_helper-1.0.0-rc1.tar.gz
Description:
squid-nufw-helper is an external ACL helper for Squid that provides Single Sign On capabilities. It uses the NuFW firewall suite and supports the NuFW users SQL logging scheme. The module allows for strict SSO identification and authentication of users on any Squid proxy, including transparent proxies.
Author:Vincent Deffontaines
File Size:6667
Last Modified:Jul 28 14:54:59 2004
MD5 Checksum:c9a529abc2d0795dec84dc732888ef1c

 ///  File Name: squidefender-1.3.tar.gz
Description:
Squidefender is a Perl script which analyzes a squid log file in native format to detect attacks. This can be used to automatically adapt your firewall when an attack has occurred. The power of squidefender lies in its configuration options, which let you easily add new attacks to scan for. Another interesting option of squidefender is its ability to use different message templates based on the attack found.
Homepage:http://www.jeroen.se/squidefender.php
Changes:IPs can now be blocked for a specified time based on the pattern.
File Size:24920
Last Modified:Nov 11 00:44:49 2003
MD5 Checksum:6f770e1296f00093afca9121293401d2

 ///  File Name: Squipy.zip
Description:
Squipy is a proxy server that allows you to capture and modify HTTP traffic.
Author:Pepelux
Homepage:http://www.pepelux.org/
File Size:1005581
Last Modified:Feb 1 20:57:42 2010
MD5 Checksum:03f927d76353641025c95ad73b698ecc

 ///  File Name: sslclient.tar.gz
Description:
The SSL client stress tool is a small program which is capable of stress testing any SSL-based server. It has been tested with Apache+mod_ssl and IIS. It can be easily modified to stress test any custom SSL implementation, and can also stress test static-page HTTP servers.
Homepage:http://sslclient.sourceforge.net
File Size:953451
Last Modified:Dec 31 00:51:18 2000
MD5 Checksum:543b9c72c39fd59fb7f3d6dbdeb61e30

 ///  File Name: stompy.tgz
Description:
Stompy is a free tool to perform a fairly detailed black-box assessment of WWW session identifier generation algorithms. Session IDs are commonly used to track authenticated users, and as such, whenever they're predictable or simply vulnerable to brute-force attacks, we do have a problem.
Author:Michal Zalewski
Homepage:http://lcamtuf.coredump.cx/
File Size:24523
Last Modified:Jan 29 11:26:19 2007
MD5 Checksum:d5f3de170e61b5ec865dfc5d0c1790a1

 ///  File Name: stproxy-0.9.1.tar.gz
Description:
stproxy is small and simple single-threaded HTTP/SSL proxy server released under the GNU General Public License (GPL). stproxy uses as little resources as possible, while still being very fast and efficient.
Author:Adam Hurkala
Changes:Added support for HEAD method.
File Size:132552
Last Modified:Nov 16 02:22:26 2007
MD5 Checksum:e866b16e098629bb809e239487573f3d

 ///  File Name: stproxy-0.9.tar.gz
Description:
stproxy is small and simple single-threaded HTTP/SSL proxy server released under the GNU General Public License (GPL). stproxy uses as little resources as possible, while still being very fast and efficient.
Author:Adam Hurkala
File Size:132429
Last Modified:Oct 15 18:40:31 2007
MD5 Checksum:b48901b9d7df43d013353273af7e8e6a

 ///  File Name: surfjack-0.1b.zip
Description:
surfjack is a tool that allows you to hijack HTTP connection to steal cookies.
Author:Sandro Gauci
Homepage:http://www.enablesecurity.com/
File Size:7738
Last Modified:Aug 12 23:24:33 2008
MD5 Checksum:3d7198ac087f82d1103d553251725621

 ///  File Name: susanoo-0.1.tar.gz
Description:
Susanoo is a simple editor written for Konqueror browser that allows for manipulation of cookies.
Author:rugginello
Homepage:http://rugginello.altervista.org/
File Size:16097
Last Modified:Nov 9 12:46:17 2007
MD5 Checksum:0e0ae686ea99b5d1b5e878c581c338eb

 ///  File Name: swfintruder-0.9.tgz
Description:
SWFIntruder (pronounced Swiff Intruder) is the first tool specifically developed for analyzing and testing security of Flash applications at runtime. Some features include predefined attack patterns, highly customizable attacks, semi-automated cross site scripting checks, and more.
Author:Stefano Di Paola
Homepage:http://www.mindedsecurity.com/
File Size:108777
Last Modified:Dec 5 23:08:33 2007
MD5 Checksum:24b530abb076f5682cf36581c94fd035






 ///  File Name: w3af-beta5.tar.bz2
Description:
w3af, is a Web Application Attack and Audit Framework. The framework and the plugins are fully written in python. Each plugin will add a functionality like cross site scripting detection or SQL injection exploitation.
Author:Andres Riancho
Homepage:http://w3af.sourceforge.net/
Changes:This version implements some really interesting features like virtual daemons and w3afAgents.
File Size:10275597
Last Modified:Oct 22 18:08:31 2007
MD5 Checksum:e6e662fc3e221756641b6456ad008bb6

 ///  File Name: wbclk256.zip
Description:
WebClicker v2.56 uses public proxies to create artificial banner ad clicks. Emulates complete browser HTTP transfer and can be used for banner/link exchanges and toplists as well.
Author:Moritz Bartl
Homepage:http://www.headstrong.de
Changes:customizable proxy timeout, play WAV sound file when done, flashes window when done, minimizing the simple form is now possible, improved memory management and a few more bugs fixed.
File Size:665743
Last Modified:Feb 26 00:22:51 2002
MD5 Checksum:146167107b4ca5dde0f49960a2050601

 ///  File Name: WebRoot.pl
Description:
WebRoot is a bruteforce directory/file scanner, which looks for files and directories on a website which might contain interesting data, but which are not referenced anywhere on the site (for example, include-files and database files located under the webroot).
Author:CIRT.DK
Homepage:http://www.cirt.dk/tools
File Size:33274
Last Modified:May 2 17:29:34 2005
MD5 Checksum:732f06410340490735aede5191f5c270

 ///  File Name: WebRoot1.txt
Description:
WebRoot is a bruteforce directory/file scanner, which looks for files and directories on a website which might contain interesting data, but which are not referenced anywhere on the site (for example, include-files and database files located under the webroot).
Author:CIRT.DK
Homepage:http://www.cirt.dk/tools
File Size:48446
Last Modified:Aug 14 18:27:22 2005
MD5 Checksum:432a8f74011576549714305613cd5a3b

 ///  File Name: webscan_0.1.0.tar.gz
Description:
Webscan is a web site fuzzer that checks for remote vulnerabilities such as sql injection, cross site scripting, remote code execution, file disclosure, directory traversal, php includes, shell escapes, and insecure perl open() calls.
Author:Gunzip
Homepage:http://members.xoom.it/gunzip
File Size:27586
Last Modified:Nov 7 23:33:51 2003
MD5 Checksum:f83438c6f3e10d4d87a6ee0820bebbba

 ///  File Name: webspider_1.1.pl
Description:
Webspider v1.1 is a perl script that, when given a start page, will "follow" every link it finds, scanning the HTML code for the use of CGI's. WebSpider will report every CGI used by a webmaster in seconds.
Author:T-Omicron
Homepage:http://t-omicr0n.hexyn.be
File Size:6419
Last Modified:Apr 20 21:18:23 2001
MD5 Checksum:84f662378857cb44c6ad1c862b682e26

 ///  File Name: WebStorm1_2.zip
Description:
WebStorm is an IP scanner for Windows which checks webserver versions. Features include Webserver type filtering, option to use a HTTP Proxy server for scans, and saving the list or just IP's in the list to a file.
Author:Askin
File Size:1824771
Last Modified:Jan 31 00:35:15 2002
MD5 Checksum:681a0ca1f28aed8bdcfc7f0d41f87556

 ///  File Name: webstretch-0.1.6.zip
Description:
Webstretch is a tool that enables a user to view and alter all aspects of communications with a web site via a proxy. Primarily used for security based penetration testing of web sites, it can also be used for debugging during development.
Author:Simon Shanks
Homepage:http://sourceforge.net/projects/webstretch/
File Size:87120
Last Modified:Jul 12 13:03:00 2004
MD5 Checksum:9735902dfef21696141a40f636b5d60c

 ///  File Name: webterm-0.0.2.tar.gz
Description:
WebTerm is a program in three parts that sends a shell over HTTP. These include a cgi binary, a client-side terminal, and another binary to execute commands via /bin/sh.
Author:Seunghyun Seo
Homepage:http://igrus.inha.ac.kr/~seo/
File Size:26184
Last Modified:Sep 10 01:42:29 2002
MD5 Checksum:cc636b605562308f9ff82f78256dbb0c

 ///  File Name: whopper.pl-0.3.txt
Description:
World Hopper is a simple yet powerful tool used to connect to remote services through a chain of HTTP (CONNECT) proxy servers for the sole purpose of gaining a higher level of anonymity. It opens a listening socket at port 1337 (default) and then waits for a client to connect. When a client connects, World Hopper builds a chain of proxy servers. Tested with: telnet, pop3 and irc.
Author:Vincent 'rastakid' van Scherpenseel
Homepage:http://proximus.syn-ack.org/whopper/
File Size:6934
Last Modified:Jul 20 03:13:16 2005
MD5 Checksum:7b39d4347b995a8882a930adda4948de

 ///  File Name: wpc-0_1b.tar.gz
Description:
WPC is a simple application that tries to guess usernames and passwords for password-protected web pages. This security tool is intended for webmasters.
Author:g1soft
Homepage:http://members.xoom.com/g1soft/
Changes:Better command line options handling, and some additional small features.
File Size:31897
Last Modified:Nov 29 19:32:57 1999
MD5 Checksum:6833ec8c7582fdd5f2516b498a1735df

 ///  File Name: wpc-0_2.tar.gz
Description:
Unavailable.
File Size:34165
Last Modified:Apr 23 03:46:48 2000
MD5 Checksum:da78f9f89001044a36e9d6011bcc3350

 ///  File Name: wpc-0_2b.tar.gz
Description:
WPC is a simple application that tries to guess usernames and passwords for password-protected web pages. This security tool is intended for webmasters.
Author:g1soft
Homepage:http://members.xoom.com/g1soft/
Changes:Filters for specific http responses, improved http code, "configure" script tweaks.
File Size:37620
Last Modified:May 12 19:47:27 2000
MD5 Checksum:c9a05f7f489304b58188f88bbb5212b0

 ///  File Name: wpoison-dev.tgz
Description:
Wpoison (May 28 snapshot) is a tool which attempts to find any SQL-injection vulnerabilities on a remote web document, finding bugs in dynamic content such as php and asp. Readme available here.
Author:M. Meadele
Homepage:http://wpoison.sourceforge.net
File Size:21280
Last Modified:May 29 02:44:00 2002
MD5 Checksum:a3f98ae45b8cfdcd96d13c73b76bc2ad

 ///  File Name: wsh-1.0.tar.gz
Description:
Wsh is a remote UNIX shell that works via HTTP. The client script provides a shell-like prompt, encapsulating user commands into HTTP POST requests and sending them to the server script. The server script extracts and executes commands and returns STDOUT and STDERR output. Features include command line history support, file upload/download, and it can work through an HTTP proxy server.
Homepage:http://dyatlov.ru
File Size:3414
Last Modified:Jun 12 23:16:37 2002
MD5 Checksum:7b6fba0bdc10c46d09d4229de1558599

 ///  File Name: wsh-1.1.2.tar.gz
Description:
Wsh is a remote UNIX shell that works via HTTP. The client script provides a shell-like prompt, encapsulating user commands into HTTP POST requests and sending them to the server script. The server script extracts and executes commands and returns STDOUT and STDERR output. Features include command line history support, file upload/download, and it can work through an HTTP proxy server.
Homepage:http://dyatlov.ru
Changes:Fixed bugs.
File Size:4071
Last Modified:Sep 20 19:12:33 2002
MD5 Checksum:70d3400b56d74486f441f6e1baf34d03

 ///  File Name: wsh-2.0.1.tar.gz
Description:
Wsh is a remote UNIX shell that works via HTTP. The client script provides a shell-like prompt, encapsulating user commands into HTTP POST requests and sending them to the server script. The server script extracts and executes commands and returns STDOUT and STDERR output. Features include command line history support, file upload/download, and it can work through an HTTP proxy server.
Homepage:http://dyatlov.ru
Changes:SSL Support and new configuration script.
File Size:16227
Last Modified:Jun 16 19:32:28 2003
MD5 Checksum:8bfe7a7f6d2c8641bff43e34e07d32b2

 ///  File Name: xssme_source-0.2.1.zip
Description:
XSS-Me is a Firefox Add-on tool that was designed to help test for cross site scripting vulnerabilities in a given system.
Homepage:http://www.securitycompass.com/
File Size:95781
Last Modified:Dec 10 20:21:52 2007
MD5 Checksum:ff44ef6f4d17d86f8f18c4b344cb5dc6

 ///  File Name: yaph-0.91.tar.gz
Description:
YAPH, or Yet Another Proxy Hunter, is a stealth proxy hunter that finds public access proxy servers on the Internet and validates proxy lists. YAPH reveals SOCK4, SOCKS5 and HTTP (CONNECT method) proxies.
Author:Proxy Labs
Homepage:http://www.proxylabs.com/yaph/
File Size:492260
Last Modified:Feb 10 22:56:48 2003
MD5 Checksum:8e224cc7a6d8e4cab4c6daa21cfa0837






 ///  File Name: w3af-beta5.tar.bz2
Description:
w3af, is a Web Application Attack and Audit Framework. The framework and the plugins are fully written in python. Each plugin will add a functionality like cross site scripting detection or SQL injection exploitation.
Author:Andres Riancho
Homepage:http://w3af.sourceforge.net/
Changes:This version implements some really interesting features like virtual daemons and w3afAgents.
File Size:10275597
Last Modified:Oct 22 18:08:31 2007
MD5 Checksum:e6e662fc3e221756641b6456ad008bb6

 ///  File Name: wbclk256.zip
Description:
WebClicker v2.56 uses public proxies to create artificial banner ad clicks. Emulates complete browser HTTP transfer and can be used for banner/link exchanges and toplists as well.
Author:Moritz Bartl
Homepage:http://www.headstrong.de
Changes:customizable proxy timeout, play WAV sound file when done, flashes window when done, minimizing the simple form is now possible, improved memory management and a few more bugs fixed.
File Size:665743
Last Modified:Feb 26 00:22:51 2002
MD5 Checksum:146167107b4ca5dde0f49960a2050601

 ///  File Name: WebRoot.pl
Description:
WebRoot is a bruteforce directory/file scanner, which looks for files and directories on a website which might contain interesting data, but which are not referenced anywhere on the site (for example, include-files and database files located under the webroot).
Author:CIRT.DK
Homepage:http://www.cirt.dk/tools
File Size:33274
Last Modified:May 2 17:29:34 2005
MD5 Checksum:732f06410340490735aede5191f5c270

 ///  File Name: WebRoot1.txt
Description:
WebRoot is a bruteforce directory/file scanner, which looks for files and directories on a website which might contain interesting data, but which are not referenced anywhere on the site (for example, include-files and database files located under the webroot).
Author:CIRT.DK
Homepage:http://www.cirt.dk/tools
File Size:48446
Last Modified:Aug 14 18:27:22 2005
MD5 Checksum:432a8f74011576549714305613cd5a3b

 ///  File Name: webscan_0.1.0.tar.gz
Description:
Webscan is a web site fuzzer that checks for remote vulnerabilities such as sql injection, cross site scripting, remote code execution, file disclosure, directory traversal, php includes, shell escapes, and insecure perl open() calls.
Author:Gunzip
Homepage:http://members.xoom.it/gunzip
File Size:27586
Last Modified:Nov 7 23:33:51 2003
MD5 Checksum:f83438c6f3e10d4d87a6ee0820bebbba

 ///  File Name: webspider_1.1.pl
Description:
Webspider v1.1 is a perl script that, when given a start page, will "follow" every link it finds, scanning the HTML code for the use of CGI's. WebSpider will report every CGI used by a webmaster in seconds.
Author:T-Omicron
Homepage:http://t-omicr0n.hexyn.be
File Size:6419
Last Modified:Apr 20 21:18:23 2001
MD5 Checksum:84f662378857cb44c6ad1c862b682e26

 ///  File Name: WebStorm1_2.zip
Description:
WebStorm is an IP scanner for Windows which checks webserver versions. Features include Webserver type filtering, option to use a HTTP Proxy server for scans, and saving the list or just IP's in the list to a file.
Author:Askin
File Size:1824771
Last Modified:Jan 31 00:35:15 2002
MD5 Checksum:681a0ca1f28aed8bdcfc7f0d41f87556

 ///  File Name: webstretch-0.1.6.zip
Description:
Webstretch is a tool that enables a user to view and alter all aspects of communications with a web site via a proxy. Primarily used for security based penetration testing of web sites, it can also be used for debugging during development.
Author:Simon Shanks
Homepage:http://sourceforge.net/projects/webstretch/
File Size:87120
Last Modified:Jul 12 13:03:00 2004
MD5 Checksum:9735902dfef21696141a40f636b5d60c

 ///  File Name: webterm-0.0.2.tar.gz
Description:
WebTerm is a program in three parts that sends a shell over HTTP. These include a cgi binary, a client-side terminal, and another binary to execute commands via /bin/sh.
Author:Seunghyun Seo
Homepage:http://igrus.inha.ac.kr/~seo/
File Size:26184
Last Modified:Sep 10 01:42:29 2002
MD5 Checksum:cc636b605562308f9ff82f78256dbb0c

 ///  File Name: whopper.pl-0.3.txt
Description:
World Hopper is a simple yet powerful tool used to connect to remote services through a chain of HTTP (CONNECT) proxy servers for the sole purpose of gaining a higher level of anonymity. It opens a listening socket at port 1337 (default) and then waits for a client to connect. When a client connects, World Hopper builds a chain of proxy servers. Tested with: telnet, pop3 and irc.
Author:Vincent 'rastakid' van Scherpenseel
Homepage:http://proximus.syn-ack.org/whopper/
File Size:6934
Last Modified:Jul 20 03:13:16 2005
MD5 Checksum:7b39d4347b995a8882a930adda4948de

 ///  File Name: wpc-0_1b.tar.gz
Description:
WPC is a simple application that tries to guess usernames and passwords for password-protected web pages. This security tool is intended for webmasters.
Author:g1soft
Homepage:http://members.xoom.com/g1soft/
Changes:Better command line options handling, and some additional small features.
File Size:31897
Last Modified:Nov 29 19:32:57 1999
MD5 Checksum:6833ec8c7582fdd5f2516b498a1735df

 ///  File Name: wpc-0_2.tar.gz
Description:
Unavailable.
File Size:34165
Last Modified:Apr 23 03:46:48 2000
MD5 Checksum:da78f9f89001044a36e9d6011bcc3350

 ///  File Name: wpc-0_2b.tar.gz
Description:
WPC is a simple application that tries to guess usernames and passwords for password-protected web pages. This security tool is intended for webmasters.
Author:g1soft
Homepage:http://members.xoom.com/g1soft/
Changes:Filters for specific http responses, improved http code, "configure" script tweaks.
File Size:37620
Last Modified:May 12 19:47:27 2000
MD5 Checksum:c9a05f7f489304b58188f88bbb5212b0

 ///  File Name: wpoison-dev.tgz
Description:
Wpoison (May 28 snapshot) is a tool which attempts to find any SQL-injection vulnerabilities on a remote web document, finding bugs in dynamic content such as php and asp. Readme available here.
Author:M. Meadele
Homepage:http://wpoison.sourceforge.net
File Size:21280
Last Modified:May 29 02:44:00 2002
MD5 Checksum:a3f98ae45b8cfdcd96d13c73b76bc2ad

 ///  File Name: wsh-1.0.tar.gz
Description:
Wsh is a remote UNIX shell that works via HTTP. The client script provides a shell-like prompt, encapsulating user commands into HTTP POST requests and sending them to the server script. The server script extracts and executes commands and returns STDOUT and STDERR output. Features include command line history support, file upload/download, and it can work through an HTTP proxy server.
Homepage:http://dyatlov.ru
File Size:3414
Last Modified:Jun 12 23:16:37 2002
MD5 Checksum:7b6fba0bdc10c46d09d4229de1558599

 ///  File Name: wsh-1.1.2.tar.gz
Description:
Wsh is a remote UNIX shell that works via HTTP. The client script provides a shell-like prompt, encapsulating user commands into HTTP POST requests and sending them to the server script. The server script extracts and executes commands and returns STDOUT and STDERR output. Features include command line history support, file upload/download, and it can work through an HTTP proxy server.
Homepage:http://dyatlov.ru
Changes:Fixed bugs.
File Size:4071
Last Modified:Sep 20 19:12:33 2002
MD5 Checksum:70d3400b56d74486f441f6e1baf34d03

 ///  File Name: wsh-2.0.1.tar.gz
Description:
Wsh is a remote UNIX shell that works via HTTP. The client script provides a shell-like prompt, encapsulating user commands into HTTP POST requests and sending them to the server script. The server script extracts and executes commands and returns STDOUT and STDERR output. Features include command line history support, file upload/download, and it can work through an HTTP proxy server.
Homepage:http://dyatlov.ru
Changes:SSL Support and new configuration script.
File Size:16227
Last Modified:Jun 16 19:32:28 2003
MD5 Checksum:8bfe7a7f6d2c8641bff43e34e07d32b2

 ///  File Name: xssme_source-0.2.1.zip
Description:
XSS-Me is a Firefox Add-on tool that was designed to help test for cross site scripting vulnerabilities in a given system.
Homepage:http://www.securitycompass.com/
File Size:95781
Last Modified:Dec 10 20:21:52 2007
MD5 Checksum:ff44ef6f4d17d86f8f18c4b344cb5dc6

 ///  File Name: yaph-0.91.tar.gz
Description:
YAPH, or Yet Another Proxy Hunter, is a stealth proxy hunter that finds public access proxy servers on the Internet and validates proxy lists. YAPH reveals SOCK4, SOCKS5 and HTTP (CONNECT method) proxies.
Author:Proxy Labs
Homepage:http://www.proxylabs.com/yaph/
File Size:492260
Last Modified:Feb 10 22:56:48 2003
MD5 Checksum:8e224cc7a6d8e4cab4c6daa21cfa0837






 ///  File Name: wpc-0_2.tar.gz
Description:
Unavailable.
File Size:34165
Last Modified:Apr 23 03:46:48 2000
MD5 Checksum:da78f9f89001044a36e9d6011bcc3350

 ///  File Name: wpc-0_2b.tar.gz
Description:
WPC is a simple application that tries to guess usernames and passwords for password-protected web pages. This security tool is intended for webmasters.
Author:g1soft
Homepage:http://members.xoom.com/g1soft/
Changes:Filters for specific http responses, improved http code, "configure" script tweaks.
File Size:37620
Last Modified:May 12 19:47:27 2000
MD5 Checksum:c9a05f7f489304b58188f88bbb5212b0

 ///  File Name: wpoison-dev.tgz
Description:
Wpoison (May 28 snapshot) is a tool which attempts to find any SQL-injection vulnerabilities on a remote web document, finding bugs in dynamic content such as php and asp. Readme available here.
Author:M. Meadele
Homepage:http://wpoison.sourceforge.net
File Size:21280
Last Modified:May 29 02:44:00 2002
MD5 Checksum:a3f98ae45b8cfdcd96d13c73b76bc2ad

 ///  File Name: wsh-1.0.tar.gz
Description:
Wsh is a remote UNIX shell that works via HTTP. The client script provides a shell-like prompt, encapsulating user commands into HTTP POST requests and sending them to the server script. The server script extracts and executes commands and returns STDOUT and STDERR output. Features include command line history support, file upload/download, and it can work through an HTTP proxy server.
Homepage:http://dyatlov.ru
File Size:3414
Last Modified:Jun 12 23:16:37 2002
MD5 Checksum:7b6fba0bdc10c46d09d4229de1558599

 ///  File Name: wsh-1.1.2.tar.gz
Description:
Wsh is a remote UNIX shell that works via HTTP. The client script provides a shell-like prompt, encapsulating user commands into HTTP POST requests and sending them to the server script. The server script extracts and executes commands and returns STDOUT and STDERR output. Features include command line history support, file upload/download, and it can work through an HTTP proxy server.
Homepage:http://dyatlov.ru
Changes:Fixed bugs.
File Size:4071
Last Modified:Sep 20 19:12:33 2002
MD5 Checksum:70d3400b56d74486f441f6e1baf34d03

 ///  File Name: wsh-2.0.1.tar.gz
Description:
Wsh is a remote UNIX shell that works via HTTP. The client script provides a shell-like prompt, encapsulating user commands into HTTP POST requests and sending them to the server script. The server script extracts and executes commands and returns STDOUT and STDERR output. Features include command line history support, file upload/download, and it can work through an HTTP proxy server.
Homepage:http://dyatlov.ru
Changes:SSL Support and new configuration script.
File Size:16227
Last Modified:Jun 16 19:32:28 2003
MD5 Checksum:8bfe7a7f6d2c8641bff43e34e07d32b2

 ///  File Name: xssme_source-0.2.1.zip
Description:
XSS-Me is a Firefox Add-on tool that was designed to help test for cross site scripting vulnerabilities in a given system.
Homepage:http://www.securitycompass.com/
File Size:95781
Last Modified:Dec 10 20:21:52 2007
MD5 Checksum:ff44ef6f4d17d86f8f18c4b344cb5dc6

 ///  File Name: yaph-0.91.tar.gz
Description:
YAPH, or Yet Another Proxy Hunter, is a stealth proxy hunter that finds public access proxy servers on the Internet and validates proxy lists. YAPH reveals SOCK4, SOCKS5 and HTTP (CONNECT method) proxies.
Author:Proxy Labs
Homepage:http://www.proxylabs.com/yaph/
File Size:492260
Last Modified:Feb 10 22:56:48 2003
MD5 Checksum:8e224cc7a6d8e4cab4c6daa21cfa0837





 .:. TopPrivacy Statement | Copyright Notice