exploit the possibilities
Showing 76 - 100 of 455 RSS Feed

Files

sshtime.txt
Posted Oct 13, 2006
Authored by Marco Ivaldi | Site 0xdeadbeef.info

sshtime v0.1 is a simple OpenSSH timing attack tool based on expect meant to remotely analyze timing differences in sshd "Permission denied" replies. Depending on OpenSSH version and configuration, it may lead to disclosure of valid usernames.

systems | unix
MD5 | b51722d1efa1aaaf9438ec4899fc55ca
huk-0.1.tar.gz
Posted Oct 9, 2006
Authored by Carlos Barros | Site gotfault.net

Huk is a tool aimed to test password fragility using the brute-force method, multi-threaded and completely modular. The main difference for other tools is that Huk modules are compiled as "shared objects", what make it easy do develop and deploy new modules.

systems | unix
MD5 | e7d34ede97d64d3d430e49b9e45eae5e
rkhunter-1.2.9.tar.gz
Posted Oct 5, 2006
Authored by Michael Boelen | Site rootkit.nl

Rootkit Hunter scans files and systems for known and unknown rootkits, backdoors, and sniffers. The package contains one shell script, a few text-based databases, and optional Perl modules. It should run on almost every Unix variety except Solaris and NetBSD.

Changes: Please note this is a non-critical re-release due to fixing tracker issues.
tags | tool, shell, perl, integrity, rootkit
systems | netbsd, unix, solaris
MD5 | b442c1a332746a7c40767aa587a5ca8a
WarMySqlBrute.c
Posted Oct 3, 2006
Authored by WarGame

Simple MySQL brute forcing program written in C that uses an external user and password list.

systems | unix
MD5 | 629c684a003ba90e1378d81bd9f2d66b
rhj.tar
Posted Aug 3, 2006
Authored by Angelo Rosiello | Site rosiello.org

rhj will let you exploit the ptrace() syscall to monitor and hijack some syscalls run-time. At the moment few syscalls are supported (i.e. send(), recv(), read(), write()) since the program is still a proof of concept.

tags | proof of concept
systems | unix
MD5 | 8985c9e8108fdae75debbb6eb55bd9b6
lbd-0.1.sh.txt
Posted May 31, 2006
Authored by Stefan Behte | Site ge.mine.nu

lbd (load balancing detector) is a bash shell script which detects if a given domain uses DNS and/or HTTP load balancing.

tags | web, shell, bash
systems | unix
MD5 | 63b241ddeaebcf6183cbaf62a3a71e07
clfuzz.tar.gz
Posted Apr 12, 2006
Authored by Pranay Kanwar | Site metaeye.org

clfuzz is a command line argument fuzzer written in Python. It is very useful for auditing setuid binaries for command line overflows.

tags | overflow, python, fuzzer
systems | unix
MD5 | 299ca5891acce1aab09e284802c0e9ea
mysql-miner.pl
Posted Apr 12, 2006
Authored by amat

A perl script that automates the process of guessing MySQL tables through SQL injection by first determining the number of arguments in the SELECT statement and then brute forcing table names from a word list.

tags | perl, sql injection
systems | unix
MD5 | 139728a02194d7681ee38ffb79990720
TFTP-bruteforce.tar.gz
Posted Apr 6, 2006
Authored by Janis Vizulis - Arhont Ltd | Site hackingexposedcisco.com

TFTP-bruteforcer is a fast TFTP filename bruteforcer written in perl.

tags | cracker, perl
systems | unix
MD5 | e4b8103d5eae2ff3a0df51acffdc7a6c
pirana-0.2.1.tar.gz
Posted Apr 4, 2006
Authored by Jean-Sebastien Guay-Leroux | Site guay-leroux.com

PIRANA is an exploitation framework that tests the security of a email content filter. By means of a vulnerability database, the content filter to be tested will be bombarded by various emails containing a malicious payload intended to compromise the computing platform. PIRANA's goal is to test whether or not any vulnerability exists on the content filtering platform.

systems | unix
MD5 | 28d3bb7afbac462f6abdd1eaf62aa020
rkhunter-1.2.8.tar.gz
Posted Feb 26, 2006
Authored by Michael Boelen | Site rootkit.nl

Rootkit Hunter scans files and systems for known and unknown rootkits, backdoors, and sniffers. The package contains one shell script, a few text-based databases, and optional Perl modules. It should run on almost every Unix variety except Solaris and NetBSD.

Changes: Added support for Fedora core 4, FreeBSD 4.11, 5.2, 5.3, 5.4, 6.0, CentOS 3.3, CentOS 3.5, 4.1 and 4.2, Debian 3.1 (AMD64), RHEL WS/AS/ES 3 Taroon update 6, RHEL WS 4 Nahant Update 1 and 2, and Slackware 10.2.
tags | tool, shell, perl, integrity, rootkit
systems | netbsd, unix, solaris
MD5 | 41122193b5006b617e03c637a17ae982
sqlbftools-1.2.tar.gz
Posted Feb 14, 2006
Authored by Ilo-- | Site reversing.org

Adaptive http-sql bruteforce tool version 2 for MySQL injection bruteforcing.

tags | web, sql injection
systems | unix
MD5 | ecd90f49930017d7f5bc6dfb8757f0af
bsqlbf.pl.txt
Posted Feb 14, 2006
Authored by Alejandro Ramos | Site unsec.net

Proof of concept tool to be used for blind SQL injection attacks.

tags | sql injection, proof of concept
systems | unix
MD5 | b35af1cf6570aa23440513c412e1577b
slad2-1.0.tar.gz
Posted Jan 15, 2006
Authored by lgrunwald | Site dn-systems.org

System Local Audit Daemon can run standalone or managed by systems like IBM-Tivoli, HP-OpenView, or Nessus to perform local security checks. It runs on the target hosts and enables them to call security tools like John the Ripper, Tiger, Tripwire, or a virus scanner via a unified XML interface. It is part of the BOSS Project.

tags | local, virus
systems | unix
MD5 | e0f4c6c3ac98dc876b45aeb60243dcc7
unhide.tgz
Posted Jan 8, 2006
Authored by YJesus | Site security-projects.com

Unhide is a forensic tool to find hidden processes and TCP/UDP ports that are hidden via rootkits, LKMs, or other techniques.

tags | udp, tcp
systems | unix
MD5 | 32530671eda828f669d8fc4636c7cc37
pmacct-0.9.3.tar.gz
Posted Oct 28, 2005
Authored by Paolo Lucente | Site ba.cnr.it

pmacct is a small set of passive network monitoring tools to measure, account and aggregate IPv4 and IPv6 traffic; aggregation revolves around the key concept of primitives (VLAN id, source and destination MAC addresses, hosts, networks, AS numbers, ports, IP protocol and ToS/DSCP field are supported) which may be arbitrarily combined to build custom aggregation methods; support for historical data breakdown, triggers and packet tagging, filtering and sampling. Aggregates can be stored into memory tables, SQL databases (MySQL or PostgreSQL) or simply printed to stdout. Data is collected from the network either using libpcap (and optionally promiscuous mode) or reading NetFlow v1/v5/v7/v8/v9 and sFlow v2/v4/v5 datagrams, both unicast and multicast.

tags | protocol
systems | unix
MD5 | c1f544fa9e0e74c7b75ead77707fa3d1
lssocks.c
Posted Aug 31, 2005

A small utility that shows all connections by reading open inodes and will even show related PIDs. Very useful for backdoor detection when you cannot trust other binaries.

systems | unix
MD5 | 7bc6d09c0dc44e4c28392e2b02283a6f
AntiExploit-1.3b6.tar.gz
Posted Aug 24, 2005
Authored by Enrico Kern | Site hzeroseven.org

AntiExploit is an exploit scanner to detect local intruders. It scans for over 3900 suspicious files, has daily database updates, and will act if a file is accessed. It uses the dazuko kernel module, which is also used by clamAV, Amavis, and other virus scanners.

Changes: Various bug fixes and feature improvements.
tags | kernel, local, virus
systems | unix
MD5 | 514fb2703a69df699ff342fc469c8c8f
pandora1.1.tar.gz
Posted Aug 14, 2005
Site pandoramon.sourceforge.net

Pandora is a distributed system to monitor processes, performance, status, application or operating parameters of almost any system (AIX, Solaris, Linux, Windows, BSD and Nokia's IPSO). It has a decentralized management system, based in flexible user profiles, that allows generation of graphical reports, defined alarms, and a full incident management system to operate a 24x7 monitoring team.

systems | linux, windows, unix, solaris, bsd, aix
MD5 | b642fc823afac446d9d010b3396b2ac0
flawseeker-v.3.0.pl.txt
Posted Aug 7, 2005
Authored by nuTshell

Simple perl script that can be used to track overflows.

tags | overflow, perl
systems | unix
MD5 | 056be4c4fd2fee1972fae10eceafcf41
nessuswc-v1.2.tar.gz
Posted Jul 19, 2005
Authored by Frank4DD | Site frank4dd.com

NessusWC provides a simple HTTP Web interface to the Nessus Security Scanner. It connects to local or remote Nessus version 2 daemons via SSL (using OpenSSL libraries), retrieves the plugins, configures a scan for a single target host, and saves the results in HTML format. As a result, even users with limited security knowledge can scan their machines. Scan results are stored in a central place.

Changes: New scan template feature.
tags | tool, remote, web, local, scanner
systems | unix
MD5 | ca5f37cc0b86ee861a80ed1189ea7c37
nessQuick-v0.05.zip
Posted Jun 24, 2005
Authored by Randy M. Nash | Site atriskonline.com

NessQuick consists of perl scripts designed to assist in managing the output from Nessus scans and creating an alternate report format. These scripts help produce a report that lists all vulnerabilities and then enumerates each host that was found to contain that vulnerability. Pulls the .nbe files into a MySQL database.

Changes: Completely rewritten.
tags | tool, scanner, perl, vulnerability
systems | unix
MD5 | 08efea8a480625f404dcdb31ce8b86cb
ISR-form-v1.0.tar.gz
Posted Jun 18, 2005
Authored by Francisco Amato | Site infobyte.com.ar

Simple html parsing tool that extracts all form related information and generates reports of the data. Allows for quick analyzing of data.

systems | unix
MD5 | 9d91c42fdb01b52d9e341115a9adafe2
rkhunter-1.2.7.tar.gz
Posted May 30, 2005
Authored by Michael Boelen | Site rootkit.nl

Rootkit Hunter scans files and systems for known and unknown rootkits, backdoors, and sniffers. The package contains one shell script, a few text-based databases, and optional Perl modules. It should run on almost every Unix variety except Solaris and NetBSD.

Changes: Includes a bugfix for the updater, and improved support for Bind, RHEL AS, CentOS, Mandrake, E-smith, and FreeBSD.
tags | tool, shell, perl, integrity, rootkit
systems | netbsd, unix, solaris
MD5 | 288ba8a87352716384823c9ea1958fa7
rkhunter-1.2.4.tar.gz
Posted Apr 28, 2005
Authored by Michael Boelen | Site rootkit.nl

Rootkit Hunter scans files and systems for known and unknown rootkits, backdoors, and sniffers. The package contains one shell script, a few text-based databases, and optional Perl modules. It should run on almost every Unix variety except Solaris and NetBSD.

Changes: Supports E-smith (SME 6.0), updated Fedora core 2 hashes, and many cool improvements to the installer and the tools. Also fixes a bug with the --allow-ssh-root-user option.
tags | tool, shell, perl, integrity, rootkit
systems | netbsd, unix, solaris
MD5 | d3f653233376af34bcdd2837cff56a3a
Page 4 of 19
Back23456Next

Top Authors In Last 30 Days

Recent News

News RSS Feed
Swinburne University Confirms Over 5,000 Individuals Affected In Data Breach
Posted Apr 16, 2021

tags | headline, privacy, data loss
Bitcoin Tumbles After Turkey Bans Crypto Payments Citing Risks
Posted Apr 16, 2021

tags | headline, government, bank, turkey, cryptography
US Imposes Sanctions On Russia Over Cyber Attacks
Posted Apr 15, 2021

tags | headline, hacker, government, usa, russia, data loss, cyberwar, military
Stories Of Dealing With Ransomware Gangs
Posted Apr 15, 2021

tags | headline, malware, cryptography
Google Releases Chrome 90 With HTTPS By Default
Posted Apr 15, 2021

tags | headline, privacy, google, chrome, cryptography
Is It Still Possible To Run Malware In A Browser Using JavaScript And Rowhammer? Yes, Yes It Is
Posted Apr 15, 2021

tags | headline, malware, flaw, mozilla, firefox
FBI Deletes Web Shells From Hundreds Of Compromised Microsoft Exchange Servers Before Alerting Admins
Posted Apr 14, 2021

tags | headline, hacker, government, microsoft, email, usa, flaw, fbi, backdoor
Facebook Will Not Notify More Than 530M Users Exposed In 2019 Breach
Posted Apr 14, 2021

tags | headline, privacy, data loss, facebook, social
Reddit Takes Bug Bounty Program Public
Posted Apr 14, 2021

tags | headline, hacker, social
100,000 Google Sites Used To Install SolarMarket RAT
Posted Apr 14, 2021

tags | headline, malware, google
View More News →
packet storm

© 2020 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close