what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 101 - 125 of 262 RSS Feed

Files

doorman-0.81.tgz
Posted Sep 7, 2005
Authored by Bruce Ward | Site doorman.sourceforge.net

The Doorman is a port-knocking listener daemon which helps users secure private servers. It allows a Unix server to run invisibly, with all TCP ports closed.

Changes: Fixed the silent doorman problem.
tags | tool, tcp, rootkit
systems | unix
SHA-256 | 3b5d27272081553f8751d3f4687b9218fa3bc905c56aa394990b3ac608cca24e
silentdoor.tar.gz
Posted Mar 17, 2005
Authored by doctor raid

SilentDoor is a connectionless, PCAP-based backdoor for linux that uses packet sniffing to bypass netfilter. It sniffs for UDP packets on port 53, runs each packet against a decryption scheme, if the packet validates than it runs a command. Can be masked to look like any other process. Remote command utility included.

tags | tool, remote, udp, rootkit
systems | linux, unix
SHA-256 | 5665922f8fe8b1dcf7030bfcdecfbb8c13d27e49c02f353d0579071ed562011c
backd00r.c
Posted Mar 15, 2005
Authored by darkXside

Unix bindshell backdoor that acts as psybnc if the password fails.

tags | tool, rootkit
systems | unix
SHA-256 | a63b89c1bb3957fc31dcd23b35f32b931de760ccb72b148bd7de29831ebf59f6
SInAR-0.2.tar.bz2
Posted Feb 18, 2005
Authored by Archim

SInAR Solaris rootkit v0.2. Invisible kernel based rootkit for Solaris 8, 9, and 10.

tags | tool, kernel, rootkit
systems | unix, solaris
SHA-256 | 8e59094c902a8a45f4cd71d579415c5f32b38e1e7a5960171b90f5a1b7db3da6
SInAR-0.1.tar.gz
Posted Jan 4, 2005
Authored by Archim

SInAR Solaris rootkit that was released at the 21st Chaos Communication Congress.

tags | tool, rootkit
systems | unix, solaris
SHA-256 | 2717af8649c7509bb5077c18ad3c6e759f11b3a129606742c0091ecb9c593e26
wX.tar.gz
Posted Nov 4, 2004
Authored by nemo | Site neil.slampt.net

WeaponX is a kernel based rootkit for Mac OSX which is roughly based on adore. It runs as a kernel extension, similar to a LKM. Requires Xcode. Readme available here.

tags | tool, kernel, rootkit
systems | unix, apple
SHA-256 | 3e90b2abe3d92f157460c7cb61234e34310154dedaf128616cccf864093686c1
n-du.tgz
Posted Sep 30, 2004
Authored by Serguei

N-du is a Unix backdoor which does not have any open ports. It waits for a special UDP or TCP packet, then opens a tcp port backdoor.

tags | tool, udp, tcp, rootkit
systems | unix
SHA-256 | 1d716fe2d428a1b091b2323219d12fa9adc4fb7bb83e3074c1b4ab462af6d467
pizzaicmp.c
Posted Sep 15, 2004
Authored by Evil | Site eviltime.com

ICMP-based triggered Linux kernel module that executes a local binary upon successful use.

tags | tool, kernel, local, rootkit
systems | linux, unix
SHA-256 | 3e96d2229d340dce20e03b329993d38a8230c2492d818ef162a0761d66676d30
osxrk-0.2.1.tbz
Posted Sep 10, 2004
Authored by gapple

MAC OS-X rootkit that has a lot of standard tools included, adds a TCP backdoor via inetd, does data recon, and more.

tags | tool, tcp, rootkit
systems | unix, apple, osx
SHA-256 | 21e6ef5bbf484ae909d8e4ab55e0e47d82f7478c4941f5cca236f04306b9f98e
nx_back.c
Posted Sep 10, 2004
Authored by nitr0x | Site nitrox.xt.pl

Simple unix-based backdoor that is very compact and provides a bindshell.

tags | tool, rootkit
systems | unix
SHA-256 | d2da29c47b3ffc365cc6f096647ffb62a5dbc2a4f8fd08c29068fed3eb20d0c9
cheetah.c
Posted Aug 26, 2004
Authored by Tal0n

Cheetah version 1.0 is a remote Linux/BSD backdoor that offer low CPU usage, Port/Backlog selection, a remote shell, user/password protection, and process faking.

tags | tool, remote, shell, rootkit
systems | linux, unix, bsd
SHA-256 | 14494a026dcba9f3ddc81a36464f7285e7aa4ab559ded6f69da75edda6346e4a
doorman-0.8.tgz
Posted Aug 5, 2004
Authored by Bruce Ward | Site doorman.sourceforge.net

The Doorman is a port-knocking listener daemon which helps users secure private servers. It allows a Unix server to run invisibly, with all TCP ports closed.

Changes: Fixed several bugs.
tags | tool, tcp, rootkit
systems | unix
SHA-256 | 5669f3b557c15b343f152b34edc206bd33e874613ddc50ea1418d89cd20dc8dd
lyceum-2.46.tar.gz
Posted Jul 24, 2004
Authored by phish

Lyceum is an advance stealthed client/server backdoor that uses encrypted spoofed UDP packets to administer the server and the two built-in ICMP backdoors. Each ICMP backdoor exploits a different feature of the protocol, the first creating a bi-directionally spoofed ICMP tunnel and the second uses passive nodes as zombies to relay ICMP backdoor traffic.

tags | tool, udp, spoof, protocol, rootkit
systems | unix
SHA-256 | 860ca6295d4f0a55057e5b9280edffa1b18da5925a54817cf734ab2fb853bf9a
doorman-0.7.tgz
Posted Jul 22, 2004
Authored by Bruce Ward | Site doorman.sourceforge.net

The Doorman is a port-knocking listener daemon which helps users secure private servers. It allows a Unix server to run invisibly, with all TCP ports closed.

tags | tool, tcp, rootkit
systems | unix
SHA-256 | fe08f9f4735f367d27a07601ee33249065b847e1e7f2bc91e9fdb851705818ab
pam_rootkit.tar.gz
Posted Jul 17, 2004
Authored by GML

This pam backdoor allows access to a machine using a backdoor password and arbitrary commands can also be executed without logging in. Logs normal users passwords to a log file. Configurable without recompilation.

tags | tool, arbitrary, rootkit
systems | unix
SHA-256 | 7f794ba5e8bc118b85ff262f027ec88781fe67d05316514d8796bbbf098b9f09
mix.c
Posted May 20, 2004
Authored by Serial Killah

Simple generic backdoor protected by a password encrypted with an MD5 hash. Gets added into inittab.

tags | tool, rootkit
systems | unix
SHA-256 | e882134c2334e44c8578e2e5edbc6cf3a3e29bd4f6d910f9a7118cca31ac094f
tumbler.tar.gz
Posted Apr 19, 2004
Authored by John Graham-Cumming | Site tumbler.sourceforge.net

tumbler is a protocol that enables a client piece of software to securely tell a server process on a remote machine to execute a predetermined command. tumbler is similar to port knocking and is designed so that a remote user can securely and stealthily enable and disable server processes, or open and close firewall holes on a computer connected to the Internet.

tags | tool, remote, protocol, rootkit
systems | unix
SHA-256 | 9be51278bb9e8b11bb91de779ebb180175c8e973892af7b6bd5a4df438c8acc6
toolkit.tgz
Posted Jan 6, 2004
Authored by r3dstorm

The R3dstorm Toolkit is a rootkit like utility which hides processes and files and was tested on Red Hat 9.0.

tags | tool, rootkit
systems | linux, redhat, unix
SHA-256 | 2b31937ef797c0b48a00e99462cb38c25d74fd46d7354bf828532adf1a57b757
SAdoor-20031217.tgz
Posted Dec 18, 2003
Authored by CMN | Site cmn.listprojects.darklab.org

SADoor is a non-listening remote administration tool for Unix systems. It sets up a listener in non-promiscuous mode for a specific sequence of packets arriving to the interface before allowing command mode. The commands are sent Blowfish encoded in the TCP payload and decoded and passed on to system(3).

Changes: Added a new client side application to edit database files. First release of winserver, a version of SADoor for Microsoft Windows.
tags | tool, remote, tcp, rootkit
systems | unix
SHA-256 | 94e0dcdf600116b079950ef2ffe319177b437da4b237b008bb960d77c075ed17
mybindshell2.c
Posted Dec 15, 2003
Authored by konewka | Site olek.org

Bindshell which has a password and defaults to tcp port 1348. Includes the ability to only allow certain IP's.

tags | tool, tcp, rootkit
systems | unix
SHA-256 | a99092c6a71a54dd9ddcfb2fa7d85132274feaf9c4e7738d40c42a4ecdc05cf2
tunnelshell_2.3.tgz
Posted Nov 21, 2003
Authored by fryxar | Site geocities.com

Tunnelshell is a client/server program written in C for Linux users that tunnels a shell using various methods which can bypass firewalls, such as fragmented packets, tcp ACK packets, UDP, ICMP, and raw IP packets (ipsec).

tags | tool, shell, udp, tcp, rootkit
systems | linux, unix
SHA-256 | 11113a593b4f526f8fca20dd243ea7d92507104f9d79654f598013a116da4886
superkit.tar.gz
Posted Nov 14, 2003
Authored by mostarac

Superkit is an extremely user-friendly rootkit that hides files, processes, and connections. It provides a password protected remote access connect-back shell initiated by a spoofed packet. It is loaded via /dev/kmem, without support for loadable modules required, and cannot be detected by checking the syscall table, because it redirects the kernel entry point to a private copy of the syscall table. A couple of backdoors are included.

tags | tool, remote, shell, kernel, spoof, rootkit
systems | unix
SHA-256 | 037050dd308f5665105f3ca4347b34ad15c25ee30bd808a2ca9a072a862ad100
pam_backdoor.tar.gz
Posted Nov 5, 2003
Authored by GML

Proof of concept PAM backdoor for Linux and FreeBSD that adds a magic password.

tags | tool, rootkit, proof of concept
systems | linux, unix, freebsd
SHA-256 | 016c0aa981fb671c3623d1daa0ce0b685f7973cd7dcffdc1a02430078f3d3814
rTelv2.8.zip
Posted Oct 30, 2003
Authored by PrOpHeT

Reverse telnet redirector / port redirector and front end console for Windows. Perfect for firewall bypassing from inside out. Can be used for bouncing connections, piping or relaying data, or as a quick MIM chat server. Windows executable form only.

tags | tool, rootkit
systems | windows, unix
SHA-256 | 47cf1f05ee4afcf1a9fffb776e893755bec1ac2504b8441ae53b46ed1f1ea43b
rrc_v0.2.tar.gz
Posted Oct 30, 2003
Authored by Roland

RRC (Roland Remote Control) v0.2 can be used to control a linux box from a remote location.

tags | tool, remote, rootkit
systems | linux, unix
SHA-256 | 719c7b410df362e95b1d5cb4c66aaedd13615bac51a55b16dbb1051e92f8e72a
Page 5 of 11
Back34567Next

Top Authors In Last 30 Days

Recent News

News RSS Feed
Juniper Networks Publishes Dozens Of New Security Advisories
Posted Apr 15, 2024

tags | headline, flaw, juniper
LockBit Copycat DarkVault Spurs Rebranding Rumor
Posted Apr 12, 2024

tags | headline, hacker, malware, cybercrime, fraud, cryptography
French Issue Alerte Rouge After Local Govs Knocked Offline By Cyberattack
Posted Apr 12, 2024

tags | headline, government, denial of service, france
More Legal Acrimony For Truth Social, As Executive Says He Was Hacked
Posted Apr 12, 2024

tags | headline, hacker, password, social
Palo Alto Networks Warns Of Exploited Firewall Vulnerability
Posted Apr 12, 2024

tags | headline, hacker, flaw
Roku Says More Than 500,000 Accounts Impacted In Cyberattack
Posted Apr 12, 2024

tags | headline, hacker, privacy, data loss, flaw
US Government On High Alert As Russian Hackers Steal Critical Correspondence From Microsoft
Posted Apr 12, 2024

tags | headline, hacker, government, microsoft, email, usa, russia, data loss, cyberwar
Apple Drops Term State-Sponsored Attacks From Its Threat Notification Policy
Posted Apr 11, 2024

tags | headline, government, privacy, phone, india, cyberwar, spyware, apple
Google Cloud Unveils New AI-Powered Security Capabilities
Posted Apr 11, 2024

tags | headline, botnet, google
Fortinet Patches FortiClientLinux Critical RCE Vulnerability
Posted Apr 11, 2024

tags | headline, flaw, patch
View More News →
packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close