what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 17 of 17 RSS Feed

Files

flister.txt
Posted Feb 24, 2005
Authored by joanna | Site invisiblethings.org

This is a textfile explaining what flister is and does. FLISTER is proof-of-concept code for detecting files hidden by both usermode and kernelmode Windows rootkits. It exploits the bugs in handling ZwQueryDirectoryFile() calls with ReturnSingleEntry set to TRUE. Flister works on Windows 2000, XP and 2003.

systems | windows
SHA-256 | 5b6b637cd51329f95822be40d03bfadd2f6be2edba391415b001239b956c157e
ifms100.zip
Posted Aug 17, 1999

Monitors paths and sends SMTP mail with changes discovered.

SHA-256 | e3944d25376ce0964b5dab2c84a6d55e1f274e72ae232d148a040120b8f35ccb
intactdemo10a.zip
Posted Aug 17, 1999
Authored by Intact

Intact v1.0a - Intact is a system integrity checker which will take a snapshot of your system and verify that none of your files, directories, registries, devices, settings, permissions and auditing have changed. Intact can be used to detect unauthorized intrustion, damage from viruses, trojan horses, rouge installation programs, security alterations, changes to auditing settings--pretty much any changes, additions or deletions which could compromise your system.

tags | trojan
SHA-256 | f56228666f37268a01f1def1703baeda5129a024cbc1d700c0854eefadba4c5b
nthandleex.zip
Posted Aug 17, 1999

Find out what files, registry keys and other objects processes have open, or which DLLs they have loaded. A flexible GUI will even show you who owns each process.

tags | registry
SHA-256 | b440c26a0be07ab303f221f2946440822115a72c998dfd9f9881e2d236c3f7dc
dsinstall.exe
Posted Aug 17, 1999
Authored by NTOBJECTives

Desktop Sentry is a security alert system for use with Microsoft Windows NT 4.0. It monitors your system and lets you know when someone attaches to any shares on your computer while you are connected to your local network or surfing the Internet. An excellent tool!

tags | local
systems | windows
SHA-256 | fbac1963a2879e5acf24f6589c54e1d4b8ca5a1a70079f23a0b72e643435b5b0
ievntslg.exe
Posted Aug 17, 1999

Send NT Event Log entries to a syslog daemon.

SHA-256 | 5b55453af5ba01e4dd1ccc7d3af79685378fede938c3b3da27a0e40a0b4e4fb9
cla_v1_b1.exe
Posted Aug 17, 1999
Authored by Cybersafe Corporation

Centrax Log Analyst (CLA) v1.b1 - Intrusion Detection software for Windows NT. Features: Detect threats and intrusion across an entire enterprise using an extensive list of activity signatures. Analyze event logs immediately using out-of-the-box security. Preserve and secure security logs in a centralized database to prevent alterations. Compile and archive large volumes of security logs for future reporting and trending. Generate easy-to-understand damage assessment reports. Free, full copy.

systems | windows
SHA-256 | 532c3fff202f41a7217313f3e506f1daa2dd2b30149ff7be6762a75a4c6c3865
cybersensor.zip
Posted Aug 17, 1999
Authored by Cybermedia Software Private Limited (CSPL)

CyberSensor enables spying on any WIN32 API call. You can install any number of prehandlers and posthandlers for the API call. It enables spying on a specific process, its children or allows you to put a system wide hook. Features: Network based Machine Activity Monitor (NMAM) will be able to spy remotely on all the machines in the network. This can be used for monitoring user activity. The activities which can be monitored include Registry, File System, Internet, E-mails, Security, etc; API Library for writing your own spys; Framework for adding new monitors to NMAM; No configuration requirements on individual machines in the network; Centralized User Interface for the entire network.

tags | registry
systems | windows
SHA-256 | 145b71e133fea316414d255689f84c1bf1d123d5ecb6375ed5857a35f4a38fb4
diskmon.zip
Posted Aug 17, 1999

This is a Gui/device driver program that watches all hard disk activity.

SHA-256 | 72cc5948d7fb67b2c015f5d417382c7dd3fcfaaa7aaddab060db5375a18ee618
bbnt1-04d.zip
Posted Aug 17, 1999

Big Brother system and network monitor ported to NT.

SHA-256 | 0ca1db6183ee9284a7a9ad1c10db39577d2f6ecec328157152da432cf7b1c03b
a2nt.zip
Posted Aug 17, 1999

Security management tools for NT.

SHA-256 | b6af68391feb5fd4b7e2778eed6b349d7f08a6b3520da436774346b287ceb0ba
bbnt1-03.zip
Posted Aug 17, 1999

Big Brother system and network monitor ported to NT.

SHA-256 | 5863060ea27e54bbb026020fb87db97f927b95c4a9773fd52e946629e0952aa5
bbnt1-04a.zip
Posted Aug 17, 1999

Big Brother system and network monitor ported to NT.

SHA-256 | 56651259eff0370eb0221f3b6963187ff90ebb4b185bd37dad6722031a3f588f
bbnt1-04b.zip
Posted Aug 17, 1999

Big Brother system and network monitor ported to NT.

SHA-256 | 451bd2fa47edb0621187e5c41249ab882a419cafa1241fcce12b4706a142a5af
HummerNT.zip
Posted Aug 17, 1999

HummingBird is a distributed component for any Intrusion Detection System. Features: Share security information with any Internet host, Powerful search-able database of security relevant data, Easy to use data visualization, Detects light but network wide attacks, Keeps historical data of system status, Hosts can be organized in a hierarchy for better management and information flow, Java interface for alert messages. HummingBird Project

tags | java
SHA-256 | ec0772e72faaffbc96772170d704e654b0d9e24a7ec4e4896594bd6b2f7ef374
ViperDB.zip
Posted Aug 17, 1999
Authored by J-Dog

ViperDB was created as a smaller & faster alternative to Tripwire. Instead of writing to one database, ViperDB writes to database files in each "watched" directory, decreasing the chances of an attacker being able to successfully modify your "watchd" filesystem.

SHA-256 | a8502431ea8bb96ec79c6cd4515f597da6e044ca5b5849f542ff5c01a00f653c
windog-dtk.zip
Posted Aug 17, 1999
Authored by CyberPsychotic

The foundation for a "Windows Deception Toolkit". This package contains "fake" telnet and sendmail daemons, coded in Perl, runs on Windows. Cool concept!

tags | perl
systems | windows
SHA-256 | d3262e107ed4706fceb6e66c9775bc4de711f7f5dc9dc3f8c3d2187b3168b567
Page 1 of 1
Back1Next

Top Authors In Last 30 Days

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close