exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 25 of 84 RSS Feed

Files

zmbscap-0.1.tar.gz
Posted Feb 20, 2007
Site metaeye.org

The zombie scapper is an automated perl tool for detecting and stopping distributed denial of service programs. The tool automatically searches and scans the desired target for programs by looking for the ports that are used by the zombie masters. It stops the zombie masters by sending a kill/stop trigger.

tags | denial of service, perl
SHA-256 | 3aac75a0f3674fc2c159d06c02b9fcbf0b3f267f5461c229e51495b8838c264c
scrutinizer-1.03.tar.gz
Posted Jan 11, 2005
Authored by Markus Roth | Site solutix.ch

The scrutinizer toolkit is designed to protect Web servers from HTTP (D)DoS attacks. It is a toolkit consisting of an analysis engine which analyzes Web server access logfiles in almost real time, an Apache module which is able to block wrongdoers on the Web server, an extension to block offenders with netfilter firewalls, and a set of visualization tools. The analysis engine uses statistical anomaly detection to expose offenders. The engine has to be trained with old log files so that it can adapt itself to your system.

Changes: Bugfix release.
tags | web, denial of service
SHA-256 | fe8229e6e1ba3f1138f6fe88ad1f3fe367b3d0b464201a4e94efcfcf33a39440
scrutinizer-1.02.tar.gz
Posted Dec 31, 2004
Authored by Markus Roth | Site solutix.ch

The scrutinizer toolkit is designed to protect Web servers from HTTP (D)DoS attacks. It is a toolkit consisting of an analysis engine which analyzes Web server access logfiles in almost real time, an Apache module which is able to block wrongdoers on the Web server, an extension to block offenders with netfilter firewalls, and a set of visualization tools. The analysis engine uses statistical anomaly detection to expose offenders. The engine has to be trained with old log files so that it can adapt itself to your system.

tags | web, denial of service
SHA-256 | 3b5c3fcb0185c82c422da19ec48bef0aa8aa70190c1c6004f02a7d7f8184948d
webdevil-v1.tar.gz
Posted May 17, 2004
Authored by Mike Jackson

Webdevil is a tool used to create a distributed performance test against webservers by keeping connections alive until the server times them out. Slave daemon is included to assist in stress testing.

tags | denial of service
SHA-256 | 25e78e914b5eb91d497b9fe75d5d5c553156aa5477b01c8871545759d820db53
icmpenum-1.1.1.tgz
Posted Oct 21, 2003
Authored by Simple Nomad | Site razor.bindview.com

This is a proof-of-concept tool to demonstrate possible distributed attacking concepts, such as sending packets from one workstation and sniffing the reply packets on another.

tags | denial of service
SHA-256 | d9c7ac5f2dae560efd2e8381a3c102663f7bd295b34cd3d688847fd5cb3845af
icmpdoor.tar.gz
Posted Oct 21, 2003
Authored by l0om

Small ICMP based backdoor and DDoS slave + master. In German and English.

tags | denial of service
SHA-256 | 650e68d37c407e05229b2b7179a5778c05c7cf7efc35ddd259732a9ed2f2d190
pud.tgz
Posted Sep 12, 2002
Authored by Contem@efnet

Pud is a peer-to-peer ddos client/server which does not rely on hubs or leafs to function properly. It can connect as many nodes together as you like, and if one node dies, the rest will always stay up).

tags | denial of service
SHA-256 | 9fd29bf12ea572080b4675c6dad7c694fa13ab7b629dad469dcf2acdad083443
DOSnet.c
Posted Sep 5, 2002
Authored by Thomas O'Connor | Site thomasoconnor.org

DOSnet.c is a ddos script which runs from root and connects to an IRC network to take commands via ctcp.

tags | denial of service, root
SHA-256 | 810ec57269166a34419a04f48d96542b7b5390830ab053a935466d5db09e24b3
d7-pH-orgasm.tgz
Posted Jun 3, 2002
Authored by Phrail | Site divisi0n7.org

Orgasm v1.0 is a distributed reflection denial of service attack. More information available here.

tags | denial of service
SHA-256 | d6dad5cb55226f0e8e534dbe17c2c41b0a68f7e8bc1f3cf035f779e1ea82e508
drdos_v2.0.tar.gz
Posted May 15, 2002
Authored by GML

Drdos v2.0 is a tool for distributed reflection denial of service attacks.

tags | denial of service
SHA-256 | 456d80aab4b5ffa8109f6d73877742da6799b8a3e6ae666b0dd14e32b80c4cd7
find_ddos_v42_linux.tar.Z
Posted Jan 31, 2002
Site nipc.gov

Find_ddos v4.2 (linux) - The NIPC has developed a tool to assist in combating ddos agents. The tool scans a local system that is either known or suspected to contain a DDOS program. The tool will detect several known denial-of-service attack tools including tfn2k client, tfn2k daemon, trinoo daemon, trinoo master, tfn daemon, tfn client, stacheldraht master, stacheldraht client, stachelddraht demon and tfn-rush client. Solaris version also available.

tags | denial of service, local
systems | linux, solaris
SHA-256 | 63805d1dc1a201e9c5c99849a4f4092d618ba023fbae47f723f306c23a32ca93
ddos.txt
Posted Aug 2, 2001

DDoS IRC bots are becoming popular Distributed Denial Of Service attack method. They do not require unix clients to operate and are easy to use. Hypnosis

tags | denial of service
systems | unix
SHA-256 | 7b9f4c5a21a18d7a89bee7d7f37ea92e1dfdd7ef36abdfa0866b9af09d57d03e
skd36.zip
Posted Jul 19, 2001
Authored by Edrin

Skydance v3.6 is a distributed denial of service tool for Windows. Uses the IP_HDRINCL option. Tested on Win98 and Win2k. Uses ICMP for communication.

tags | denial of service
systems | windows
SHA-256 | a60ab7490d90ddc3b7b5a27d0532f12cbfc6684dbb168f89e17b31b688699739
knight.c
Posted Jul 12, 2001
Authored by Bysin

Knight.c Knight is a distributed denial of service client that is very light weight and is very powerful. It goes on IRC and joins a channel, then accepts commands via IRC (to prevent from getting caught). It has features like, an automatic updater via http or ftp, a checksum generater, a syn flooder, a tcp flooder, a udp flooder, slice2, spoofing to subnets, and more. This program has been used to create DDoS nets of over 1000 clients.

tags | web, denial of service, udp, spoof, tcp
SHA-256 | 21ad07db066936bcec2b7118ae378bf626ab22dd9dc92cc85a6f1b74dca8339e
ddos.sh
Posted May 31, 2001
Authored by MrFloat

ddos.sh is a tool which causes NT servers which are vulnerable to the unicode bug to pingflood a target host.

tags | denial of service
SHA-256 | 2d7e66d75fe888f77e399806ba501f39d1b3f355120879700ba3c3935bb0d818
ddnsf.tar.gz
Posted Mar 27, 2001
Authored by Extirpater

Distributed DNS Flooder v0.1b - A powerful attack against DNS servers.

tags | denial of service
SHA-256 | 103df02808e448b0350bfd7fc00522a43bca6f8945d61ee79851f123f124dedd
stick.tgz
Posted Mar 20, 2001
Authored by Coretez Giovanni | Site eurocompton.net

Stick is a distributed denial of service attack which targets IDS systems. It takes a snort rule file as input. Binary distribution.

tags | denial of service
SHA-256 | 89ef57709270ee0e91c6187ac1f214db2ab67e8d4fa823aa1fe5020290150c79
stick.htm
Posted Mar 16, 2001
Site eurocompton.net

The Stick DDOS tool is a resource starvation attack against IDS systems. Many IDS systems are affected.

tags | denial of service
SHA-256 | fb3c089efbb1b77760eceff0d11ba3affad8b80eb75f0658ffc53976bb76031a
ramenfind.v0.4.gz
Posted Feb 16, 2001
Site sans.org

Ramenfind v0.4 is a local Ramen worm detection and removal tool. Final release unless problems are found.

Changes: Ramenfind now handles a new ramen variant, which creates /usr/sbin/update.
tags | worm, denial of service, local
SHA-256 | 320257e648f002eda11a46020e3a2f7c6a850a287966cd4d5c4b549e73b7ac8e
ramenfind.v0.3.gz
Posted Feb 11, 2001
Site sans.org

Ramenfind v0.3 is a local Ramen worm detection and removal tool. Final release unless problems are found.

tags | worm, denial of service, local
SHA-256 | 3daa564079eb078a3001ddd85ac60d43fde930b5546611ad9cbc74cff71de82c
stachelantigl.tar.gz
Posted Jan 26, 2001
Authored by Psychoid, Randomizer

Stacheldraht v1.666 + antigl + yps distributed denial of service tool.

tags | denial of service
SHA-256 | 3968f24900971c19c5ef5de6a214e0dcd9b32eff57d3a4771c9bd01d8246d735
ramenfind.v0.2.gz
Posted Jan 25, 2001
Site sans.org

Ramen worm local detection tool. Still in beta.

tags | worm, denial of service, local
SHA-256 | 2007b10e2daa210941ac3eb39c5d0a26bb0cd5d8a08d8e284cf209ff5a7b36eb
ramen-clean.zip
Posted Jan 24, 2001
Authored by PhantasmP | Site hwa-security.net

Ramen-Clean is a perl script which checks to see if your system is infected with the Ramen Linux Worm, and cleans it.

tags | worm, denial of service, perl
systems | linux
SHA-256 | ec6151123ba6ffb27be8c53ad7721d5f82d64dbd9038c509816cf188450a54c3
flitz-0.1.tgz
Posted Jan 8, 2001
Authored by Xphere | Site home.wanadoo.nl

Flitz is a DDOS tool which features spoofed ip/tcp/udp flood, flooding in parallel, distributed smurf attack and status report of the slave. With one stop command, you can stop all the slaves at once.

tags | denial of service, udp, spoof, tcp
SHA-256 | 9346b94e8f0ca0ba742335190ffba0de3a9812e72964aefb7757767c7f553e0f
ddosping.zip
Posted Dec 13, 2000
Authored by Robin Keir | Site foundstone.com

DDoSPing v2.0 is a Win 9x/NT GUI scanner for the DDoS agents Wintrinoo, Trinoo, Stacheldraht and TFN.

tags | denial of service
SHA-256 | 57e4cd81c86b8688f78c15c437701b1ad27ae8e1d7f7f442aaa71aca2ec3d421
Page 1 of 4
Back1234Next

Top Authors In Last 30 Days

Recent News

News RSS Feed
US Air Force Reveals The B-21 Raider Stealth Bomber
Posted Dec 3, 2022

tags | headline, government, usa, military
Rackspace Rocked By Security Incident
Posted Dec 3, 2022

tags | headline, hacker, email, denial of service
Darknet Markets Generate Millions In Revenue Selling Stolen Personal Data
Posted Dec 3, 2022

tags | headline, hacker, privacy, cybercrime, data loss, fraud
New Malware Is Nuking Data In Russian Courts
Posted Dec 3, 2022

tags | headline, government, malware, russia, data loss
After FTX Collapse, Pressure Builds For Tougher Crypto Rules
Posted Dec 2, 2022

tags | headline, government, bank, data loss, fraud, cryptography
Proton Calendar On iOS Encrypts More Of Your Work/Life Cloud Data
Posted Dec 2, 2022

tags | headline, privacy, cryptography
Mozilla, Microsoft Drop TrustCor As Root Certificate Authority
Posted Dec 2, 2022

tags | headline, microsoft, mozilla, firefox, cryptography
Nvidia Patches 29 GPU Driver Bugs That Could Lead To Code Execution, Device Takeover
Posted Dec 2, 2022

tags | headline, flaw, patch
Researchers Used A Sirius XM Bug To Easily Hijack A Bunch Of Different Cars
Posted Dec 1, 2022

tags | headline, hacker, flaw
Browser Zero Days Linked To Commercial IT Firm In Spain
Posted Dec 1, 2022

tags | headline, microsoft, google, mozilla, firefox, zero day, chrome
View More News →
packet storm

© 2022 Packet Storm. All rights reserved.

Hosting By
Rokasec
close