Exploit the possiblities
Showing 1 - 22 of 22 RSS Feed

Files

Ibis-1.8.zip
Posted Aug 14, 2005
Authored by Marco Del Percio

Ibis, or Italian Broadcast IP Scanner, is a multithreaded broadcast scanner for Windows. Binary, source code, and documentation are included in the archive.

systems | windows, 2k
MD5 | 12b743328ce75bdb5c6a7f7d72038645
pmdump.exe
Posted Apr 1, 2005
Authored by Arne Vidstrom | Site ntsecurity.nu

pmdump.exe is a tool that dumps memory for a specified process to a file (as opposed to tools like memdump and dd which dump all of the RAM at once). It is useful for auditing things that might store passwords in memory (for example, VPN clients, email clients, and instant-messaging applications).

systems | windows
MD5 | 94c49f4cc016507e13114f00dcc62054
efuzz01.zip
Posted Nov 24, 2004
Authored by priestmaster | Site priestmaster.org

Efuzz is an easy to use Win32 tcp/udp protocol fuzzer which finds unknown buffer overflows in local and remote services. Uses config files to define the range of malformed requests. Includes C source, released under GPL.

tags | remote, overflow, local, udp, tcp, protocol, fuzzer
systems | windows, 32
MD5 | 3c8c380489c496390c8128be757b1a5d
createfile.cpp.txt
Posted Mar 30, 2004
Authored by Liu Die Yu | Site umbrella.name

WinBlox is a command line utility that can record, filter, and prevent file I/O operations. In record mode the WinBlox logs all I/O operation activity. A typical log record includes a date stamp, the operation type, the program name conducting the operation, and the target of I/O operation.

systems | windows
MD5 | 261e5caec167e591e3e4eb390a1d7ff8
fport.zip
Posted Jul 7, 2003
Authored by JD Glaser | Site foundstone.com

Fport v2.0 is powerful windows tool which reports all open TCP/IP and UDP ports and maps them to the owning application. This is the same information you would see using the 'netstat -an' command, but it also maps those ports to running processes with the PID, process name and path. Fport can be used to quickly identify unknown open ports and their associated applications. Supports Windows NT4, Windows 2000 and Windows XP.

tags | udp, tcp
systems | windows, 2k, xp
MD5 | 66c742a94e4f1f3881b0cd9d84727e4e
RpcScan101.zip
Posted Jul 7, 2003
Authored by Urity | Site securityfriday.com

RpcScan enumerates the RPC endpoint-map elements for port 135. You may differentiate between, for example, Windows NT 4.0 SP3 or before and Windows NT 4.0 SP4 or later, Windows 2000 SP2 or before and Windows 2000 SP3, default Windows XP and Windows XP SP1, Windows XP Home Edition and Windows XP Professional.

systems | windows, 2k, nt, xp
MD5 | 278d27c018954ed1629de81c5d86f632
SHEdit.zip
Posted Jan 12, 2003
Authored by Tibor Biro | Site tbiro.com

SHEdit is an offline editor for the SID History Active Directory attribute which goes around the limitation built into the DsAddSidHistory API, allowing an administrator in any domain to access any other domains in the forest as any user.

systems | windows
MD5 | 2de6403618bbcee297c5f19a2d3ef7b6
nbtdeputy101.zip
Posted Jan 6, 2003
Authored by Urity | Site securityfriday.com

NBTdeputy register a NetBIOS computer name on the network and is ready to respond to NetBT name-query requests. NBTdeputy helps to resolve IP address from NetBIOS computer name for Windows XP and .Net servers on your local network which have ports 137 and 138 open, similar to Proxy ARP.

tags | local
systems | windows, 2k, xp
MD5 | 2ea2f422d59d867df0518884886c6c69
tcpview.zip
Posted Dec 6, 2002
Authored by Mark Russinovich | Site sysinternals.com

Tcpview v2.3 is a tool for Windows which shows all TCP and UDP network connections and which program has each open including listening ports, local and remote addresses, and state of TCP connections. Similar to the powerful unix tool lsof. Tested on Windows NT/2000/XP and Windows 98/Me. Also works on Win95 with Winsock update. Screenshot available here.

tags | remote, local, udp, tcp
systems | windows, 2k, 9x, unix, nt
MD5 | 3c1b5907a17d041fbe63c46bd5124948
logagent.txt
Posted Aug 16, 2002
Authored by Floydman | Site securit.iquebec.com

LogAgent 2.1 is a tool made in Perl for recollecting log files from various applications and various machines into a central location in (almost) real-time in order to improve network activity awareness.

tags | perl
systems | windows
MD5 | 016665336c8dfa6a1530b9a282ed6f13
ComLog.pl
Posted Aug 16, 2002
Authored by Floydman | Site securit.iquebec.com

ComLog.pl, a WIN32 command prompt logger - The goal of this paper is to present a new Perl tool made to monitor DOS sessions on Windows NT/2K (should also work on XP). This tool can be used by administrators to keep a history of commands typed in the DOS command prompt and the associated output, for example on an IIS server. This can help admins to figure out what an attacker has done after compromising the machine via one of the numerous vulnerabilities available.

tags | perl, vulnerability
systems | windows, 2k, nt, 32
MD5 | 8cd836c9e931f3e30fdfcb6512faae37
promiscdetect.exe
Posted Apr 23, 2002
Authored by Arne Vidstrom | Site ntsecurity.nu

PromiscDetect for Windows NT 4.0 / 2000 / XP checks if your network adapter(s) is in promiscuous mode or not (that is, in most cases, if a sniffer is running on the computer or not). Of course the attacker might be intercepting the communication between the tool and the adapter, making the result unreliable, but there are probably many more cases out there where the tool will really detect a sniffer.

systems | windows, 2k, nt
MD5 | 117ec27602980ae13307a7c2021a5d90
locker.zip
Posted Jan 31, 2002
Authored by Robert Anthony Rota

Windows 2000 Group Policy may be disabled by locking the policy files. Microsoft does not have sufficient plans to replace the system files to fix this problem so we developed an application that can be run on a domain to search for Group Policy files and lock them. Once the Group Policy files are locked the subsequent logins will attempt to read the Group Policy Objects but will not be able to so the Group Policies will not be propagated to the user or the machine. This can be a serious problem depending on the domain's reliance on Group Policy. More info on Windows group policy available here.

systems | windows, 2k
MD5 | 4022f61b41897cd6a81f48d1fbc4de53
regbrws001.zip
Posted Nov 22, 2001
Authored by Urity | Site securityfriday.com

RegistryBrowser is a utility which demonstrates problems associated with stolen windows passwords by remotely browsing remote system registries using a specified user account. Tested on Windows NT and 2000.

tags | remote
systems | windows, 2k, nt
MD5 | 6c66b0fab36597e00164f63bb3e179fc
irs15.exe
Posted Oct 11, 2001
Authored by Mao | Site oxid.it

IP Restrictions Scanner (IRS) is a Windows NT/2k tool which finds out which network restrictions have been set for a particular service on a host. It combines "ARP Poisoning" and "Half-Scan" techniques and tries totally spoofed TCP connections to the selected port of the target.

Changes: Better temp file use to minimize false positives, bug fixes, and code cleanups.
tags | spoof, tcp
systems | windows, 2k, nt
MD5 | e3d49382b7b147c19cab5a1a6ef8b871
irs14.exe
Posted Sep 14, 2001
Authored by Mao | Site oxid.it

IP Restrictions Scanner (IRS) is a Windows NT/2k tool which finds out which network restrictions have been set for a particular service on a host. It combines "ARP Poisoning" and "Half-Scan" techniques and tries totally spoofed TCP connections to the selected port of the target.

Changes: Several bugs has been fixed and Winpcap v2.2 support added.
tags | spoof, tcp
systems | windows, 2k, nt
MD5 | d8a5b686645f405c2a28668e681587ba
irs12.exe
Posted Sep 11, 2001
Authored by Mao | Site oxid.it

IP Restrictions Scanner (IRS) is a Windows NT/2k tool which finds out which network restrictions have been set for a particular service on a host. It combines "ARP Poisoning" and "Half-Scan" techniques and tries totally spoofed TCP connections to the selected port of the target.

Changes: Several bugs fixed.
tags | spoof, tcp
systems | windows, 2k, nt
MD5 | c0fc717489cadc3baa7d04db7cf3ec31
irs10.exe
Posted Aug 29, 2001
Authored by Mao | Site oxid.it

IP Restrictions Scanner (IRS) is a Windows NT/2k tool which finds out which network restrictions have been set for a particular service on a host. It combines "ARP Poisoning" and "Half-Scan" techniques and tries totally spoofed TCP connections to the selected port of the target.

tags | spoof, tcp
systems | windows, 2k, nt
MD5 | af97176adef7c0d482b39ba138481247
dsns10.zip
Posted Aug 16, 2001
Authored by Hannes | Site lordi.styleliga.org

DSNS is advanced network scanner for Windows 2000. It uses fast and stealthy SYN scanning to find open ports and is able to probe the services that are running on that ports. So you can check proxies, scan for SMTP relaying hosts and more. Screenshot available here.

systems | windows, 2k
MD5 | de4db52bd321d22cb78fdd245f7523cb
scooplm003.zip
Posted Jul 24, 2001
Authored by Urity | Site securityfriday.com

ScoopLM searches out the password from LM/NTLM authentication information (LanManager and Windows NT challenge/response). Tested on Windows 2000.

Changes: This is version 3.
systems | windows, 2k, nt
MD5 | 30aa1c8af128d294665fe691cdaf122a
scooplm002.zip
Posted Apr 17, 2001
Authored by Urity | Site securityfriday.com

ScoopLM searches out the password from LM/NTLM authentication information (LanManager and Windows NT challenge/response). Tested on Windows 2000.

Changes: This is version 2.
systems | windows, 2k, nt
MD5 | 843c8e8991f9bb17cb5b82a21112409c
scooplm001.zip
Posted Mar 3, 2001
Authored by Urity | Site securityfriday.com

ScoopLM searches out the password from LM/NTLM authentication information (LanManager and Windows NT challenge/response). Tested on Windows 2000.

systems | windows, 2k, nt
MD5 | 6a074c77ea35b69566ebd31eb0145ad1
Page 1 of 1
Back1Next

Want To Donate?


Bitcoin: 18PFeCVLwpmaBuQqd5xAYZ8bZdvbyEWMmU

Top Authors In Last 30 Days

Recent News

News RSS Feed
Lebanese Government Hackers Hit Thousands Of Victims With Incredibly Simple Campaign
Posted Jan 19, 2018

tags | headline, government, malware, fraud, cyberwar, phish
Dridex Banking Trojan Compromises FTP Sites In New Campaign
Posted Jan 19, 2018

tags | headline, malware, bank, trojan, cybercrime, fraud
Triton Exploited Zero-Day Flaw To Target Industrial Systems
Posted Jan 19, 2018

tags | headline, hacker, malware, cyberwar, scada
Apple Sued Over Being Susceptible To Meltdown / Spectre
Posted Jan 19, 2018

tags | headline, flaw, apple, intel
Intel Fix Causes Reboots And Slowdowns
Posted Jan 18, 2018

tags | headline, flaw, intel
Text Bomb Is Latest Apple Bug
Posted Jan 18, 2018

tags | headline, phone, denial of service, flaw, apple
Industrial Systems Scrambling To Catch Up With Meltdown, Spectre
Posted Jan 18, 2018

tags | headline, flaw, scada, intel
German Hacker Offers Rare Look Inside Secretive World Of Julian Assange, WikiLeaks
Posted Jan 18, 2018

tags | headline, hacker, government, britain, data loss, germany
Google Intros Security Center Tool For G Suite
Posted Jan 18, 2018

tags | headline, google
Hackers Can't Dig Into Latest Xiaomi Phone Due To GPL Violations
Posted Jan 18, 2018

tags | headline, hacker, phone, google
View More News →
packet storm

© 2018 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close