exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 51 - 75 of 486 RSS Feed

Files

RegLookup Registry Parser 1.0.0
Posted Jun 20, 2011
Authored by Timothy D. Morgan | Site projects.sentinelchicken.org

RegLookup is a small command line utility for parsing and searching registry files from Windows NT and later.

Changes: SK records and security descriptors are now accessible in pyregfi. Key caching was added to regfi, and SK caching was reintroduced. Minor API simplifications were made and documentation was improved. Numerous bugs were fixed.
tags | registry
systems | windows, unix
SHA-256 | c9123786bc1be1a714c59e2fabae693d434698ce4d3fc44847cb847bff26b686
HTTPConsole 1.0.0.0 For Windows
Posted May 31, 2011
Authored by AutoSec Tools | Site autosectools.com

This is an HTTP console to remote administer Windows hosts with a browser-based, AJAX-enabled, command-line interface. Server requires .NET 3.5. Written in C# and JavaScript.

tags | remote, web, javascript
systems | windows
SHA-256 | 7dec994beced4f331b24fde32be7a2e3088ff3ecf40ecae45cd2ec54a69a686b
RegLookup Registry Parser 0.99.0
Posted May 2, 2011
Authored by Timothy D. Morgan | Site projects.sentinelchicken.org

RegLookup is a small command line utility for parsing and searching registry files from Windows NT and later.

Changes: This 1.0 release candidate contains major improvements to regfi usability. regfi was made a proper library, and major improvements were made to the API. Python bindings (pyregfi) were added for regfi. The Make-based build system was replaced with a SCons-based one. Numerous improvements were made in regfi for multithreaded use and memory management. API documentation was improved.
tags | registry
systems | windows, unix
SHA-256 | b7ae9e5c13f949ef958da4cba741067516bbc4c2800e033ff0d6ad4506945406
Windows Credential Editor 1.2
Posted Apr 18, 2011
Authored by Hernan Ochoa | Site ampliasecurity.com

Windows Credentials Editor (WCE) allows to list logon sessions and add, change, list and delete associated credentials (ex.: LM/NT hashes and Kerberos tickets). This can be used, for example, to perform pass-the-hash on Windows, obtain NT/LM hashes from memory (from interactive logons, services, remote desktop connections, etc.) which can be used to perform further attacks, obtain Kerberos tickets and reuse them in other Windows or Unix systems.

Changes: It now supports logon sessions and NTLM credentials just by reading memory without performing code injection.
tags | remote
systems | linux, windows
SHA-256 | 099e55d14489dafd73cfdfa5499d3104b38a4256c3df9a93abae54beaa077d30
Registry String Wiper
Posted Apr 10, 2011
Authored by Paolo Iorio | Site paoloiorio.it

This windows binary is a lightweight tool for removing strings in the Windows registry.

tags | registry
systems | windows
SHA-256 | 930084f1b07b611ad257a6cfe7c757a97c1013ed722666b27d57b5aa114e5604
Windows Credential Editor 1.1
Posted Mar 15, 2011
Authored by Hernan Ochoa | Site ampliasecurity.com

Windows Credentials Editor (WCE) allows you to list logon sessions and add, change, list and delete associated credentials (ex.: LM/NT hashes). This can be used, for example, to perform pass-the-hash on Windows and also obtain NT/LM hashes from memory (credentials not stored locally including domain credentials from interactive logons, services, remote desktop connections, etc.) which can be used in further attacks.

Changes: This new version fixes issues when running WCE via RDP/Terminal Services, reads NTLM credentials just by reading memory (no code injection needed, although the tool implements both methods), and includes a tool (getlsasrvaddr.exe) to automatically obtain the addresses needed.
tags | remote
systems | linux, windows
SHA-256 | d5947a1b05bc5936dec425b3b826c1e9cea6c3295335bf93a05f071088349b99
StreamArmor 1.5
Posted Feb 14, 2011
Site streamarmor.com

StreamArmor is a sophisticated tool for discovering hidden alternate data streams (ADS) that can also clean them completely from the system. StreamArmor comes with a fast multi-threaded ADS scanner which can recursively scan over the entire system and quickly uncover all hidden streams. All such discovered streams are represented using specific color patterns based on threat level which makes it easy for human eye to distinguish between suspicious and normal streams.

Changes: Various updates.
SHA-256 | c4abda4dc0f936509d8cc7ca35674cf26dcd0c3faf8b62d020758ff3d43a2ff2
BinPack Portable Security Environment 2.0.1
Posted Dec 11, 2010
Authored by Garrett Gee | Site westcoasthackers.net

BinPack is a portable security environment for Windows. With 100+ security tools in the repository, you can easily convert any system into a hacking platform in minutes.

systems | windows
SHA-256 | 40998045d55d1a966a8b323f752174b62aae73bdd9c817bcd067012f3a054d63
Ostinato Traffic Generator 0.3 Windows Binary
Posted Dec 10, 2010
Authored by Srivats P | Site code.google.com

Ostinato is an open-source, cross-platform packet/traffic generator and analyzer with a friendly GUI. It aims to be "Wireshark in Reverse" and thus become complementary to Wireshark. This is the windows binary release.

Changes: IGMP, MLD, HexDump (user defined content) protocols added. Several bugfixes.
tags | tool
systems | windows
SHA-256 | 4cfa61d55987c4bf069662dc1c30e6c0faf532d55dedfc3af8bdfdadea41f160
Ostinato Traffic Generator 0.3 Mac OS X
Posted Dec 10, 2010
Authored by Srivats P | Site code.google.com

Ostinato is an open-source, cross-platform packet/traffic generator and analyzer with a friendly GUI. It aims to be "Wireshark in Reverse" and thus become complementary to Wireshark. This is the Mac OS X release.

Changes: IGMP, MLD, HexDump (user defined content) protocols added. Several bugfixes.
tags | tool
systems | windows, apple, osx
SHA-256 | 790089a6b37cb6940e2218fe426932092d202eb51608d26002a2219c50e57ae8
Ostinato Traffic Generator 0.3 Source Code
Posted Dec 10, 2010
Authored by Srivats P | Site code.google.com

Ostinato is an open-source, cross-platform packet/traffic generator and analyzer with a friendly GUI. It aims to be "Wireshark in Reverse" and thus become complementary to Wireshark.

Changes: IGMP, MLD, HexDump (user defined content) protocols added. Several bugfixes.
tags | tool
systems | windows, unix
SHA-256 | d257270879533212d7fec9f5260b4d3163e0822f8ffdde0fa3f96779fd12e1bb
MioStar Data Extration Tool 0.2
Posted Nov 29, 2010
Authored by Ruben Unteregger | Site megapanzer.com

MioStar is an offspring of the SkypeTrojan. Unlike the SkypeTrojan MioStar puts its focus on hooking functions that deal with sensitive data like account information or network traffic. Currently it extracts passwords from software such as Safari, Google Chrome, GoogleTalk, Microsoft Live Messenger, Microsoft Live Mail and more.

SHA-256 | 1babc614fb1173afaa45fc60efa685fa89cb828d2574d09f3eb85745fcbc1701
WinAppDbg Python Module 1.4
Posted Aug 26, 2010
Site sourceforge.net

The WinAppDbg python module allows developers to quickly add Windows application debugging facilities to your Python scripts.

Changes: Fully supports Python 2.4 through 2.7. Fully supports Windows XP through Windows 7, 32 and 64 bit editions. Various new additions and improvements.
tags | python
systems | windows
SHA-256 | c1c19a0790716c5f9303bea91e75baf88dbc048fc0d61fd7767c8acec1f1468a
Ostinato Traffic Generator 0.1.1 Source Code
Posted Jul 3, 2010
Authored by Srivats P | Site code.google.com

Ostinato is an open-source, cross-platform packet/traffic generator and analyzer with a friendly GUI. It aims to be "Wireshark in Reverse" and thus become complementary to Wireshark. This is the source code release.

tags | tool
SHA-256 | 1dc61c4eaecd4c6a551681aba65e673b9a81b4b9641e995851602110eed82607
Ostinato Traffic Generator 0.1.1 Windows Release
Posted Jul 3, 2010
Authored by Srivats P | Site code.google.com

Ostinato is an open-source, cross-platform packet/traffic generator and analyzer with a friendly GUI. It aims to be "Wireshark in Reverse" and thus become complementary to Wireshark. This is the windows binary release.

tags | tool
systems | windows
SHA-256 | bd436eed319e11749300c699f484de570d3c1c39246a161e54f2302c431fcc28
Metasploit Meterpreter Killer 2
Posted May 27, 2010
Authored by Mert SARICA | Site mertsarica.com

This is a small tool that scans memory to detect and kill Metasploit's meterpreter.

Changes: Added a logging feature, auto kill feature, detection mode only and exclusion support.
SHA-256 | a7dfd039754050a977ff7100a38b46030b8e3be34f1eff000e0c24fcd93bcb35
Metasploit Meterpreter Killer
Posted May 22, 2010
Authored by Mert SARICA | Site mertsarica.com

This is a small tool that scans memory to detect and kill Metasploit's meterpreter.

SHA-256 | a1ce3de5edbc686b1357ef7bbc5200ca6b808f04917031dba8e86e17585f8ed0
ScoopyNG - The VMware Detection Tool
Posted Apr 23, 2010
Authored by Tobias Klein

ScoopyNG combines the detection tricks of Scoopy Doo and Jerry as well as some new techniques to determine if a current OS is running inside a VMware Virtual Machine (VM) or on a native system. ScoopyNG should work on all modern uni-, multi- and multi-core cpu's. ScoopyNG is able to detect VMware even if "anti-detection-mechanisms" are deployed.

SHA-256 | 2d85b2d9706260fbcc4f2d2841c4301c97e18a67ae40072ee2956cbf75b2f720
ReFrameworker 1.1
Posted Apr 20, 2010
Authored by Erez Metula

ReFrameworker is a general purpose Framework modifier, used to reconstruct framework Runtimes by creating modified versions from the original implementation that was provided by the framework vendor. ReFrameworker performs the required steps of runtime manipulation by tampering with the binaries containing the framework's classes, in order to produce modified binaries that can replace the original ones. This tarball includes both the binary and source code releases.

SHA-256 | 0150edfe2da9666ab255444c54509fb5f54575c6e51ee5e18f42df461e8bee05
StreamArmor ADS Discovery Tool 1.0
Posted Mar 30, 2010
Site streamarmor.com

StreamArmor is a sophisticated tool for discovering hidden alternate data streams (ADS) that can also clean them completely from the system. StreamArmor comes with a fast multi-threaded ADS scanner which can recursively scan over the entire system and quickly uncover all hidden streams. All such discovered streams are represented using specific color patterns based on threat level which makes it easy for human eye to distinguish between suspicious and normal streams.

SHA-256 | b4edb0ddb4cf443c06ecdc7ade05e2b382760d2c669384164c61922999e15c22
RegLookup Register Parser 0.12.0
Posted Mar 9, 2010
Authored by Timothy D. Morgan | Site projects.sentinelchicken.org

RegLookup is a small command line utility for parsing and searching registry files from Windows NT and later.

Changes: Big data support was improved and added to reglookup-recover. A -i option was added to reglookup for assisting with timeline generation. Unicode support was improved by correctly interpreting UTF-16LE key and value names. Data type interpretation was moved into regfi, and the regfi library interface was reorganized. regfi documentation was improved and Doxygen formatting was added.
tags | registry
systems | windows
SHA-256 | 2efcef5aae5418aac5d3ebe7af46e05349622d4e16ab73186e38b6c28762a94e
Smart Tool To Remove Hidden Rootkit Services
Posted Mar 6, 2010
Site spywareanalytics.com

AdvancedWinServiceManager is a smart tool to remove hidden rootkit services. It makes it easy to eliminate such malicious services by separating out third party services from Windows services. By default it shows only third party services along with more details such as Company Name, Description, Install Date, File Path etc at one place which helps in quickly differentiating between legitimate and malicious services. It comes with rich features such as detecting hidden rootkit services, exporting the service list to html based log file, displaying only third party services etc.

systems | windows
SHA-256 | dcce7bf4b916b166e1a6a4571c36f88fb61258c125eb3adfa0dc30770328021c
WebRaider 0.2.3.8
Posted Mar 3, 2010
Authored by Ferruh Mavituna

WebRaider is a proof of concept quality tool to get a reverse shell out of SQL injection (MS-SQL) by using One Click Ownage.

tags | shell, sql injection, proof of concept
SHA-256 | 745e39d9782621659e4b684fd301e6cd6374a5d4ec94298eadb8e858bdd7080d
createEventObject Pointer Vulnerability Mitigation
Posted Jan 19, 2010
Authored by Derek Soeder

This is another dirty mitigation for another Internet Explorer zero-day vulnerability. This mitigation works by registering as a Browser Helper Object, then modifying MSHTML.DLL in memory to break createEventObject.

SHA-256 | 8c85083512e2220e17ed05326b82b0f41b1ad183aa7d0a19e8113810fac21dad
Terminal Server License Bypass
Posted Jan 11, 2010
Authored by Zorzan Urban Pawel | Site pawelzorzan.eu

This registry code allows any terminal client access to a Terminal Server. It bypasses the Microsoft "Terminal Server License" and allows the client to create a session on the server without a CAL (Client Access License) or MS Open License. It works on WinNT, Win2000, Win2003 server and Win2008 server.

tags | registry, bypass
systems | windows
SHA-256 | 9cec54ca3bf48377115aba5d8a681eeb8b070d26a3b7949518b42ec39e09b6cb
Page 3 of 20
Back12345Next

Top Authors In Last 30 Days

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close