Exploit the possiblities
Showing 1 - 17 of 17 RSS Feed


Posted Feb 24, 2005
Authored by joanna | Site invisiblethings.org

This is a textfile explaining what flister is and does. FLISTER is proof-of-concept code for detecting files hidden by both usermode and kernelmode Windows rootkits. It exploits the bugs in handling ZwQueryDirectoryFile() calls with ReturnSingleEntry set to TRUE. Flister works on Windows 2000, XP and 2003.

systems | windows, 2k
MD5 | 6b397c52997d672ac664f17d1eb83ed9
Posted Aug 17, 1999

Monitors paths and sends SMTP mail with changes discovered.

MD5 | b2d7be418678dfb02c4bf91ddd89d97f
Posted Aug 17, 1999
Authored by Intact

Intact v1.0a - Intact is a system integrity checker which will take a snapshot of your system and verify that none of your files, directories, registries, devices, settings, permissions and auditing have changed. Intact can be used to detect unauthorized intrustion, damage from viruses, trojan horses, rouge installation programs, security alterations, changes to auditing settings--pretty much any changes, additions or deletions which could compromise your system.

tags | trojan
MD5 | 7bd9b4fab2bdd4ee005df7a27b68224d
Posted Aug 17, 1999

Find out what files, registry keys and other objects processes have open, or which DLLs they have loaded. A flexible GUI will even show you who owns each process.

tags | registry
MD5 | dbe564c66a78b02d72b4bf9aa4e696af
Posted Aug 17, 1999
Authored by NTOBJECTives

Desktop Sentry is a security alert system for use with Microsoft Windows NT 4.0. It monitors your system and lets you know when someone attaches to any shares on your computer while you are connected to your local network or surfing the Internet. An excellent tool!

tags | local
systems | windows, nt
MD5 | ebf7f578c0c30513afde1c163b84a60c
Posted Aug 17, 1999

Send NT Event Log entries to a syslog daemon.

MD5 | 109ac978f641018eb27eb83500e93676
Posted Aug 17, 1999
Authored by Cybersafe Corporation

Centrax Log Analyst (CLA) v1.b1 - Intrusion Detection software for Windows NT. Features: Detect threats and intrusion across an entire enterprise using an extensive list of activity signatures. Analyze event logs immediately using out-of-the-box security. Preserve and secure security logs in a centralized database to prevent alterations. Compile and archive large volumes of security logs for future reporting and trending. Generate easy-to-understand damage assessment reports. Free, full copy.

systems | windows, nt
MD5 | aa20834c8926b8ea850a58613767b583
Posted Aug 17, 1999
Authored by Cybermedia Software Private Limited (CSPL)

CyberSensor enables spying on any WIN32 API call. You can install any number of prehandlers and posthandlers for the API call. It enables spying on a specific process, its children or allows you to put a system wide hook. Features: Network based Machine Activity Monitor (NMAM) will be able to spy remotely on all the machines in the network. This can be used for monitoring user activity. The activities which can be monitored include Registry, File System, Internet, E-mails, Security, etc; API Library for writing your own spys; Framework for adding new monitors to NMAM; No configuration requirements on individual machines in the network; Centralized User Interface for the entire network.

tags | registry
systems | windows
MD5 | 5cdd396fce9fae10b31943bb397a2930
Posted Aug 17, 1999

This is a Gui/device driver program that watches all hard disk activity.

MD5 | 0d97ba77fa3e1215d33f2d0440d87b33
Posted Aug 17, 1999

Big Brother system and network monitor ported to NT.

MD5 | 51ccc75cc3d2ac49068ce32012c0899b
Posted Aug 17, 1999

Security management tools for NT.

MD5 | 0b35c77534f122c6cb86fb548d30c758
Posted Aug 17, 1999

Big Brother system and network monitor ported to NT.

MD5 | d9ba1a50dffabeab61a4f7d30c5d41bc
Posted Aug 17, 1999

Big Brother system and network monitor ported to NT.

MD5 | 19f5302f4661c65f7993c1e3760331b2
Posted Aug 17, 1999

Big Brother system and network monitor ported to NT.

MD5 | 584656d356bee4cf696d995c44940374
Posted Aug 17, 1999

HummingBird is a distributed component for any Intrusion Detection System. Features: Share security information with any Internet host, Powerful search-able database of security relevant data, Easy to use data visualization, Detects light but network wide attacks, Keeps historical data of system status, Hosts can be organized in a hierarchy for better management and information flow, Java interface for alert messages. HummingBird Project

tags | java
MD5 | c1f01efa1551220927618057e18c235e
Posted Aug 17, 1999
Authored by J-Dog

ViperDB was created as a smaller & faster alternative to Tripwire. Instead of writing to one database, ViperDB writes to database files in each "watched" directory, decreasing the chances of an attacker being able to successfully modify your "watchd" filesystem.

MD5 | 8cc6e9bb36ec669611090310ab07c3b1
Posted Aug 17, 1999
Authored by CyberPsychotic

The foundation for a "Windows Deception Toolkit". This package contains "fake" telnet and sendmail daemons, coded in Perl, runs on Windows. Cool concept!

tags | perl
systems | windows
MD5 | 7af6c15c79e3bdd0eced2daaf99e7253
Page 1 of 1

Want To Donate?

Bitcoin: 18PFeCVLwpmaBuQqd5xAYZ8bZdvbyEWMmU

Top Authors In Last 30 Days

Recent News

News RSS Feed
AMD Promises Firmware Fixes For Security Processor Bugs
Posted Mar 21, 2018

tags | headline, flaw
FBI Raids Home Of Spy Sat Techie Over Leak Of Secret Comms Source Code On Facebook
Posted Mar 21, 2018

tags | headline, government, usa, data loss, spyware, fbi
Facebook Boss Summoned Over Cambridge Analytica Claims
Posted Mar 21, 2018

tags | headline, government, britain, fraud, cyberwar, facebook
Check Out These 12 New Hubble Images
Posted Mar 21, 2018

tags | headline, space, science
McCabe Claims Russian Probe Behind His Firing
Posted Mar 20, 2018

tags | headline, government, usa, russia, fraud, cyberwar
The Dark Web: How Much Is Your Bank Account Worth?
Posted Mar 20, 2018

tags | headline, hacker, bank, cybercrime, fraud
1 In 5 Michigan State Staffers Fail Phishing Test
Posted Mar 20, 2018

tags | headline, government, usa, phish
Apple Moves On HSTS Abuse In Safari
Posted Mar 20, 2018

tags | headline, apple, safari, cryptography
Alex Stamos Might Be Leaving Facebook
Posted Mar 20, 2018

tags | headline, facebook
Warrant Issued For Cambridge Analytica
Posted Mar 20, 2018

tags | headline, government, usa, britain, data loss, fraud, facebook, social
View More News →
packet storm

© 2018 Packet Storm. All rights reserved.

Security Services
Hosting By