what you don't know can hurt you
Showing 1 - 17 of 17 RSS Feed

Files

flister.txt
Posted Feb 24, 2005
Authored by joanna | Site invisiblethings.org

This is a textfile explaining what flister is and does. FLISTER is proof-of-concept code for detecting files hidden by both usermode and kernelmode Windows rootkits. It exploits the bugs in handling ZwQueryDirectoryFile() calls with ReturnSingleEntry set to TRUE. Flister works on Windows 2000, XP and 2003.

systems | windows, 2k
MD5 | 6b397c52997d672ac664f17d1eb83ed9
ifms100.zip
Posted Aug 17, 1999

Monitors paths and sends SMTP mail with changes discovered.

MD5 | b2d7be418678dfb02c4bf91ddd89d97f
intactdemo10a.zip
Posted Aug 17, 1999
Authored by Intact

Intact v1.0a - Intact is a system integrity checker which will take a snapshot of your system and verify that none of your files, directories, registries, devices, settings, permissions and auditing have changed. Intact can be used to detect unauthorized intrustion, damage from viruses, trojan horses, rouge installation programs, security alterations, changes to auditing settings--pretty much any changes, additions or deletions which could compromise your system.

tags | trojan
MD5 | 7bd9b4fab2bdd4ee005df7a27b68224d
nthandleex.zip
Posted Aug 17, 1999

Find out what files, registry keys and other objects processes have open, or which DLLs they have loaded. A flexible GUI will even show you who owns each process.

tags | registry
MD5 | dbe564c66a78b02d72b4bf9aa4e696af
dsinstall.exe
Posted Aug 17, 1999
Authored by NTOBJECTives

Desktop Sentry is a security alert system for use with Microsoft Windows NT 4.0. It monitors your system and lets you know when someone attaches to any shares on your computer while you are connected to your local network or surfing the Internet. An excellent tool!

tags | local
systems | windows, nt
MD5 | ebf7f578c0c30513afde1c163b84a60c
ievntslg.exe
Posted Aug 17, 1999

Send NT Event Log entries to a syslog daemon.

MD5 | 109ac978f641018eb27eb83500e93676
cla_v1_b1.exe
Posted Aug 17, 1999
Authored by Cybersafe Corporation

Centrax Log Analyst (CLA) v1.b1 - Intrusion Detection software for Windows NT. Features: Detect threats and intrusion across an entire enterprise using an extensive list of activity signatures. Analyze event logs immediately using out-of-the-box security. Preserve and secure security logs in a centralized database to prevent alterations. Compile and archive large volumes of security logs for future reporting and trending. Generate easy-to-understand damage assessment reports. Free, full copy.

systems | windows, nt
MD5 | aa20834c8926b8ea850a58613767b583
cybersensor.zip
Posted Aug 17, 1999
Authored by Cybermedia Software Private Limited (CSPL)

CyberSensor enables spying on any WIN32 API call. You can install any number of prehandlers and posthandlers for the API call. It enables spying on a specific process, its children or allows you to put a system wide hook. Features: Network based Machine Activity Monitor (NMAM) will be able to spy remotely on all the machines in the network. This can be used for monitoring user activity. The activities which can be monitored include Registry, File System, Internet, E-mails, Security, etc; API Library for writing your own spys; Framework for adding new monitors to NMAM; No configuration requirements on individual machines in the network; Centralized User Interface for the entire network.

tags | registry
systems | windows
MD5 | 5cdd396fce9fae10b31943bb397a2930
diskmon.zip
Posted Aug 17, 1999

This is a Gui/device driver program that watches all hard disk activity.

MD5 | 0d97ba77fa3e1215d33f2d0440d87b33
bbnt1-04d.zip
Posted Aug 17, 1999

Big Brother system and network monitor ported to NT.

MD5 | 51ccc75cc3d2ac49068ce32012c0899b
a2nt.zip
Posted Aug 17, 1999

Security management tools for NT.

MD5 | 0b35c77534f122c6cb86fb548d30c758
bbnt1-03.zip
Posted Aug 17, 1999

Big Brother system and network monitor ported to NT.

MD5 | d9ba1a50dffabeab61a4f7d30c5d41bc
bbnt1-04a.zip
Posted Aug 17, 1999

Big Brother system and network monitor ported to NT.

MD5 | 19f5302f4661c65f7993c1e3760331b2
bbnt1-04b.zip
Posted Aug 17, 1999

Big Brother system and network monitor ported to NT.

MD5 | 584656d356bee4cf696d995c44940374
HummerNT.zip
Posted Aug 17, 1999

HummingBird is a distributed component for any Intrusion Detection System. Features: Share security information with any Internet host, Powerful search-able database of security relevant data, Easy to use data visualization, Detects light but network wide attacks, Keeps historical data of system status, Hosts can be organized in a hierarchy for better management and information flow, Java interface for alert messages. HummingBird Project

tags | java
MD5 | c1f01efa1551220927618057e18c235e
ViperDB.zip
Posted Aug 17, 1999
Authored by J-Dog

ViperDB was created as a smaller & faster alternative to Tripwire. Instead of writing to one database, ViperDB writes to database files in each "watched" directory, decreasing the chances of an attacker being able to successfully modify your "watchd" filesystem.

MD5 | 8cc6e9bb36ec669611090310ab07c3b1
windog-dtk.zip
Posted Aug 17, 1999
Authored by CyberPsychotic

The foundation for a "Windows Deception Toolkit". This package contains "fake" telnet and sendmail daemons, coded in Perl, runs on Windows. Cool concept!

tags | perl
systems | windows
MD5 | 7af6c15c79e3bdd0eced2daaf99e7253
Page 1 of 1
Back1Next

Top Authors In Last 30 Days

Recent News

News RSS Feed
ATM Malware Available Online For Online $5,000
Posted Oct 18, 2017

tags | headline, malware, bank, cybercrime, fraud
Oracle Swats 252 Bugs In Patch Update
Posted Oct 18, 2017

tags | headline, flaw, patch, oracle
Child Safety Smartwatches Easy To Hack, Watchdog Says
Posted Oct 18, 2017

tags | headline, privacy, flaw
Domino's Pizza Delivers User Details To Spammers
Posted Oct 18, 2017

tags | headline, privacy, email, spam, fraud
Microsoft Never Disclosed 2013 Hack Of Secret Vulnerability Database
Posted Oct 18, 2017

tags | headline, hacker, microsoft, data loss, flaw
Adobe Patches Zero-Day Used To Plant Gov't Spying Software
Posted Oct 17, 2017

tags | headline, hacker, government, usa, flaw, cyberwar, adobe, zero day, nsa
UK TV Drama About North Korea Hit By Hackers
Posted Oct 17, 2017

tags | headline, hacker, government, britain, cyberwar, korea
Russia Tweaks Telegram With Tiny Fine For Decryption Denial
Posted Oct 17, 2017

tags | headline, government, privacy, russia, cryptography
Never Mind The WPA2 Drama... Details Emerge Of TPM Key Fail
Posted Oct 17, 2017

tags | headline, wireless, flaw, cryptography
Millions Of High Security Crypto Keys Crippled By Newly Discovered Flaw
Posted Oct 16, 2017

tags | headline, flaw, cryptography
View More News →
packet storm

© 2016 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close