exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 226 - 250 of 262 RSS Feed

Files

utrojan.c
Posted Feb 7, 2000
Authored by Axess

Universal remote unix trojan - This wrapper can backdoor nearly any service on any platform. Tested on login / imapd / qpopd.

tags | tool, remote, trojan, rootkit
systems | unix
SHA-256 | 885fba40e10573bdedddaf334427dedeca14c2d38df6c931e2a697af2a02b6b8
ulogin.c
Posted Feb 4, 2000
Authored by Tragedy | Site etc-crew.org

Universal login trojan - Login trojan for pretty much any O/S. Tested on Linux, BSDI 2.0, FreeBSD, IRIX 6.x, 5.x, Sunos 5.5,5.6,5.7, and OSF1/DGUX4.0. Works by checking the DISPLAY environment variable before passing the session to the real login binary.

tags | tool, trojan, rootkit
systems | linux, unix, solaris, freebsd, irix
SHA-256 | fb412b9239e72a75c7f47ba4a4785c5cbfc7665494372801af49f21457eed13d
taskigt.tar.gz
Posted Jan 28, 2000
Authored by Noah | Site ns2.crw.se

Taskigt - A lkm that gives root to a process that read a special file in /proc.

tags | tool, root, rootkit
systems | unix
SHA-256 | f0eca75af3f14a4ae599be5eebdcfc86aed08224203ac1340f9cdd37f131da6f
phide.tar.gz
Posted Jan 28, 2000
Authored by Noah | Site ns2.crw.se

Phide - A lkm that hides processes under Linux 2.0. There already exist such thing for Linux 2.2 [like heroin.c or knark] but they're just for Linux 2.2.

tags | tool, rootkit
systems | linux, unix
SHA-256 | 715c4e1f504aff3133a4f88a6f5afd23aff686f72d2eaebaa14d0affcf818d55
pop3d-trojan.tar.gz
Posted Jan 24, 2000
Authored by Formatez

in.pop3d backdoor - Still functions as in.pop3d, but gives a shell with the proper password.

tags | tool, shell, rootkit
systems | unix
SHA-256 | 10dce7f841ee0b2ee76fb62470c2df3a484a462c99e837ac6c404d6590b28356
ovas0n.c
Posted Jan 10, 2000
Authored by misteri0

Opens a password protected backdoor and lets you execute commands, and then hides in the background. Based on gs.c.

tags | tool, rootkit
systems | unix
SHA-256 | 118f42a1b5e7124b4e829331a89a5b9f25e3c7b3cc532e337fd5d7b50f328bc9
kbdv2.c
Posted Jan 6, 2000
Authored by Spaceork

Kdb is a nice little backdoor that allows root access by modifing the SYS_stat and SYS_getuid system calls.

Changes: Works on 2.2 kernels.
tags | tool, root, rootkit
systems | unix
SHA-256 | 75bf99652d25caf83a0945b628a334c97577ac6b2b81e8b7140f072095ee8c0f
rkssh5.tar.gz
Posted Dec 16, 1999
Authored by Zelea | Site ne.jp

Patch to sshd-1.2.27 to make a global backdoor password. Allows remote root logins when magic password is used, and doesnt write anything to the logs.

Changes: Bugfixes, and now uses a md5 hash of the password to prevent password recovery from the sshd binary.
tags | tool, remote, root, rootkit
systems | unix
SHA-256 | eb267f7a7c636c4f0801a4620eafcdec5920ba846e3e94a1c63cf553d5b849ab
audpbackdoor.tar.gz
Posted Dec 7, 1999
Authored by Sventek | Site elxsi.de

A udp based backdoor, client and server are written in perl. Uses port 520 by default.

tags | tool, udp, perl, rootkit
systems | unix
SHA-256 | d8bf748b9c86b1dd64e03319f9248f83d6d987247fd3fb2c582a064534f62bfb
cgiback.tgz
Posted Dec 6, 1999
Authored by Overflow

CGI backdoor which can be compiled with or without logging. Password protected. Tested on Redhat 6.1.

tags | tool, cgi, rootkit
systems | linux, redhat, unix
SHA-256 | 02d250d186f01c30bca80ad68e647846982248754d106abadb01948f5566cd17
sshd.c.diff-1.2.27
Posted Nov 30, 1999
Authored by Ajax | Site users.dhp.com

A small patch to sshd v1.2.27 which accepts a magic password to authenticate, and does not log to utmp/wtmp or syslog.

tags | tool, rootkit
systems | unix
SHA-256 | fef5a827046990a0ea4068515a72d898772a4535c343b9f82da035c1616f137a
Q-0.9.tgz
Posted Nov 22, 1999
Authored by Mixter | Site members.tripod.com

First public release of Q - a client / server backdoor with strong (256 bit AES) encryption for remote shell access. Also supports encrypted tcp relay/bouncer server that supports normal clients (with a local encryption tunneling daemon). Includes stealth features like activation via raw packets, syslog spoofing, and single-session servers that prevent it from appearing in netstat.

tags | tool, remote, shell, local, spoof, tcp, rootkit
systems | unix
SHA-256 | d7265225af4406ffa7e288ab5319b6ec454cdc37a2b202d271b4a02a5c08f0de
knark-0.59.tar.gz
Posted Nov 21, 1999
Authored by Creed

Knark is a kernel based rootkit for Linux 2.2. Hides files in the filesystem, strings from /proc/net for netstat, processes, and program execution redirects for seamlessly bypassing tripwire / md5sum.

Changes: Remote command execution.
tags | tool, kernel, rootkit
systems | linux, unix
SHA-256 | 0a74c43e3e1e3f191114cf82097d3a11d695c91a6730013a6977c69ccf3c7273
knark-0.50.tar.gz
Posted Nov 16, 1999
Authored by Creed

Knark is a kernel-based rootkit for Linux 2.2. Hides files in the filesystem, strings from /proc/net for netstat, processes, and program execution redirects.

tags | tool, kernel, rootkit
systems | linux, unix
SHA-256 | 2ca87438b3600053b676be52bdbdb15dfd1129e0bf7612e3d6aac9135e2fdae0
bdoor.c
Posted Nov 16, 1999
Authored by CyberPsychotic

Unix backdoor which pretends to be a http daemon.

tags | tool, web, rootkit
systems | unix
SHA-256 | e8731998c6f8964470198eb94c4df8a820262e7bcd5c9ed5a0ceb724d820911a
falcon-ssh-diffs.tar.gz
Posted Nov 5, 1999
Authored by Falcon

Two rootkit / backdoor patches to ssh-1.2.27. The first diff turns ssh into a major backdoor. it will report itself as nscd in the process list, have ALL logging disabled, run on a different port, ignore all settings in the config file and allow a "magic word" login to all accounts, including root. The other patch simply adds a magic password to sshd, for use in patching an existing sshd.

tags | tool, root, rootkit
systems | unix
SHA-256 | 0c22682fe16b85f57f3fd1e4fa16eba7f88a069bc20ffd06c865232b67e63217
ssh-1.2.27rk.diff
Posted Nov 4, 1999
Authored by shadow | Site w00w00.org

w00w00's magic backdoor patch for ssh 1.2.27. Magic password, does not log, permits root login, etc.

tags | tool, root, rootkit
systems | unix
SHA-256 | b1284a90e4dccd597fa85ec3955f042eb2b49e8482af678c13bd0f0f633ff0c5
rkssh4.tar.gz
Posted Oct 19, 1999
Authored by Timecop

Patch to ssh-1.2.27 to make a global backdoor password. Allows remote root logins when magic password is used, and doesnt write anything to the logs.

tags | tool, remote, root, rootkit
systems | unix
SHA-256 | a839c849d2ea52b4152c72b96589319fa0576573ad8bebf8d338cbf254567e19
sol24.zip
Posted Aug 17, 1999

No information is available for this file. Archive password is set to p4ssw0rd. Use at your own risk.

tags | tool, rootkit
systems | unix
SHA-256 | 1c0ecf07b926b785faa723d041b07f4bc7ec0167fb5672211a4954ae6d834c69
sol25.zip
Posted Aug 17, 1999

No information is available for this file. Archive password is set to p4ssw0rd. Use at your own risk.

tags | tool, rootkit
systems | unix
SHA-256 | 81b7b155c7aeaa6e5f4a13cb3767c52de5b6ea0a26c39a84046fb36e95367b06
sun-5.5.1.zip
Posted Aug 17, 1999

No information is available for this file. Archive password is set to p4ssw0rd. Use at your own risk.

tags | tool, rootkit
systems | unix
SHA-256 | 6ab62d34531347f9baa97a4853641d0fbcd50c9324fc958d0caad9d1200e21bd
lrk4.unshad.tar.gz
Posted Aug 17, 1999
Authored by Lord Somer

Linux Rootkit 4 - Precompiled Unshadowed Distribution.

tags | tool, rootkit
systems | linux, unix
SHA-256 | 02fd3e589f011082945772cd8000e84c6c499f03e1b69a68ad3d77c7b42ca89d
rootkit.zip
Posted Aug 17, 1999

No information is available for this file. Archive password is set to p4ssw0rd. Use at your own risk. Archive password is set to p4ssw0rd. Use at your own risk. Archive password is set to p4ssw0rd. Use at your own risk. Archive password is set to p4ssw0rd. Use at your own risk.

tags | tool, rootkit
systems | unix
SHA-256 | fda05ac95076efa11544721c1a77b8e3
server.c
Posted Aug 17, 1999
Authored by ph1x, b4b0 #6

Gummo backdoor server - a basic but effective backdoor server.

tags | tool, rootkit
systems | unix
SHA-256 | 8e17d2175a09685c0f1ee330254435a8eba65f36c2345707fe427ff10b092d01
sm4ck.c
Posted Aug 17, 1999
Authored by Sector9 of rewted.org

sm4ck v0.1 adds three simple backdoors to the box you execute it on.

tags | tool, rootkit
systems | unix
SHA-256 | bb938a1abacf0fd1d7d14180708f02d8c8cb13a13cf985fd17fe257c313c261c
Page 10 of 11
Back7891011Next

Top Authors In Last 30 Days

Recent News

News RSS Feed
Life Imitates xkcd Comic As Florida Gang Beats Crypto Password From Retiree
Posted Sep 20, 2024

tags | headline, cybercrime, data loss, cryptography
1 In 10 Orgs Dumping Their Security Vendors After CrowdStrike Outage
Posted Sep 20, 2024

tags | headline, denial of service
Cyber Crooks Strut Away With Haute Couture Harvey Nichols Data
Posted Sep 20, 2024

tags | headline, hacker, privacy, britain, cybercrime, data loss, fraud
Noise Storms: Massive Amounts Of Spoofed Web Traffic Linked To China
Posted Sep 20, 2024

tags | headline, china
Tor Network Denies Report That Anonymity Is Completely Canceled
Posted Sep 20, 2024

tags | headline, government, privacy, cryptography
Marko Polo Hackers Found To Be Running Dozens Of Scams
Posted Sep 20, 2024

tags | headline, hacker, cybercrime, fraud, phish, cryptography
Re-Opened Three Mile Island Will Power AI Datacenters Under New Deal
Posted Sep 20, 2024

tags | headline, microsoft, botnet
Social Media Users Lack Control Over Data Used By AI, US FTC Says
Posted Sep 19, 2024

tags | headline, government, privacy, usa, data loss, botnet
Hackers Demand $6 Million From Seattle Airport Operators
Posted Sep 19, 2024

tags | headline, hacker, cybercrime, data loss, fraud, cryptography
Recent WhatsUp Gold Vulnerabilities Possibly Exploited In Ransomware Attacks
Posted Sep 19, 2024

tags | headline, malware, cybercrime, flaw, cryptography
View More News →
packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close