what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 20 of 20 RSS Feed

Files from vecna

Email addressvecna at s0ftpj.org
First Active2000-03-31
Last Active2011-05-17
SniffJoke IDS Evasion Tool 0.4
Posted May 17, 2011
Authored by s0ftpj, vecna | Site delirandom.net

SniffJoke is middleware software for Linux that is managed by a web interface and enables connection scrambling technology, also known as sniffer evasion techniques.

Changes: Implementation of sniffjoke-iptcpopt. Added manpage and docs update. Various other additions and fixes.
tags | web
systems | linux, unix
SHA-256 | 3ddbc8756a222412a41f8e31495b0a877901d1129de1745d59798a8f482a99d4
SniffJoke IDS Evasion Tool
Posted Apr 15, 2009
Authored by s0ftpj, vecna | Site delirandom.net

SniffJoke is middleware software for Linux that is managed by a web interface and enables connection scrambling technology, also known as sniffer evasion techniques.

tags | web
systems | linux
SHA-256 | 5ddc5fffbed7e6ff9f0d22260acc4ad37ef5df2df0d55152510d368444648800
sniffjoke-0.2.tar.gz
Posted May 23, 2007
Authored by s0ftpj, vecna | Site s0ftpj.org

SniffJoke implements sniffer/IDS evasion techniques. SniffJoke runs on a network connected box by selectively applying evasion techniques to sessions involving it. Evasion application is governed by user rules and implemented with a netfilter/ulogd module.

SHA-256 | fa26b5c1f7404da6b5ac31e14a7fe20607c48b583e5075bb8539ff76fdf04493
sniffjoke-0.1.tar.gz
Posted Mar 6, 2007
Authored by s0ftpj, vecna | Site s0ftpj.org

SniffJoke implements sniffer/IDS evasion techniques. SniffJoke runs on a network connected box by selectively applying evasion techniques to sessions involving it. Evasion application is governed by user rules and implemented with a netfilter/ulogd module.

SHA-256 | 235306c2ac3afe63439af4c38b56c6ce848e7c2f06a9113a6c7e7975c14779a1
apmislay-0.0.1.tar.gz
Posted Mar 6, 2007
Authored by s0ftpj, vecna | Site s0ftpj.org

Apmislay (avoid+privacy+mislay) is a library to make anonymous connections without performance loss. It implements a simple technique based on IP spoofing and suits well for file sharing systems or anonymous transfers of large amount of data.

tags | spoof
SHA-256 | 1361d415c01016679dab321c68085b3417b894004a9cb77ea39617715a4fa9db
SABBIAex-0.0.1.tar.gz
Posted Mar 6, 2007
Authored by s0ftpj, vecna | Site s0ftpj.org

SABBIA protocol anonymizes low latency connections by making a continuous and constant padding over the net. This is an example of implementation on a trusted core.

tags | protocol
SHA-256 | 5e527cac19b060ebb445c3a811d23707127e64c157a48427dbddc3de91179817
innova-0.0.1.tar.gz
Posted Mar 6, 2007
Authored by s0ftpj, vecna | Site s0ftpj.org

Innova is a framework that permits to manipulate network sessions starting at layer 3 and is transparent to the application. It runs entirely in userspace on Linux and supports plugins.

systems | linux
SHA-256 | 76a6b396d0382cb1e3ce80a6fdabd05fd9b1230c10e350f7bde29acae52e3420
blastersteg.tar.gz
Posted Mar 6, 2007
Authored by s0ftpj, vecna | Site s0ftpj.org

This code shows how to send hidden data steganographed into a simulation of common (worm) traffic.

tags | worm
SHA-256 | 72789619c48df1f96f8be7684eaa9420f1b13be1f7734eed11122fd57144ff76
gtpa-0.12c.tar.gz
Posted Mar 6, 2007
Authored by s0ftpj, vecna | Site s0ftpj.org

Generic time path analysis via ttysnoop-0.12c patching.

SHA-256 | 13016e6b61ab15b5890f728bf71f7270d8fdfbbb5dc4099f6534aa603a989044
euxploit.zip
Posted Oct 10, 2002
Authored by vecna

Remote exploit for the Eudora v5.x boundary buffer overflow. Works against Eudora v5.1 and 5.1.1 and is independent of Windows version.

tags | exploit, remote, overflow
systems | windows
SHA-256 | 90633dbef55dd736ab63d71a19ed60653fd9362cdb28994ff53c4c53cd5917ab
pirch98.zip
Posted Sep 5, 2002
Authored by vecna

Pirch98 irc client contains a buffer overflow which can allow remote code execution in the way that pirch 98 handles links to other channels and websites. The Pirch98 client now shipping at www.pirch.com has been fixed. Includes ASM source and Windows binary for an exploit which opens a shell on port 31337.

tags | exploit, remote, overflow, shell, code execution
systems | windows
SHA-256 | 7f56a90b8c077c19b9858745896eff56d0f85ffba292c9b650caa1e0a5c2dc2c
tcc.tar.gz
Posted Jun 5, 2002
Authored by s0ftpj, vecna | Site s0ftpj.org

TCP Congestion paper and proof of concept code - A vulnerability in the TCP protocol affects several OS's, allowing remote denial of service attacks. Includes a netfilter module which implements a new method of blocking the attack. More information on TCP congestion vulnerabilities available here

tags | remote, denial of service, tcp, vulnerability, protocol, proof of concept
SHA-256 | 0edb50b6b224df0e09b02f95c53904eddb7d8941511032d777f824bc13c0fd20
umpf.tar.gz
Posted Jun 3, 2002
Authored by s0ftpj, vecna | Site s0ftpj.org

Umpf is a system for managing encrypted files without using encrypted filesystems such as cfs/tcfs loop-aes/kerneli. Does not require root to run, is lightweight, and transparent.

tags | root
SHA-256 | 3aad55bb1c34d97b342fdc0a9b37279257a60a4cbdf3c450c433f6d11856d3c9
spapem.tar.gz
Posted Apr 17, 2001
Authored by s0ftpj, vecna | Site s0ftpj.org

The Spapem project aims to how how to elude securelevel under *BSD systems by hiding the fact that the system has been rebooted. Includes code to restore the PID, a LKM to change the uptime, a generic rootkit example, a module to remove startup messages, and instructions for patching init(8).

systems | bsd
SHA-256 | 82b43738fe9aaba0129a0e6210d475fb733357a302d34ecc0480bd867274d1d5
piove.tar.gz
Posted Jan 4, 2001
Authored by s0ftpj, vecna | Site s0ftpj.org

This FreeBSD module shows how to intercept getpass(3) function and print anything that is typed without terminal echo.

systems | freebsd
SHA-256 | 231f569e4f8c8dfa8c9421da154803e5c86e7b176b954311ca32ed72fd9e91b5
spf.c
Posted Jan 4, 2001
Authored by s0ftpj, vecna | Site s0ftpj.org

Simple Packet Forwarder for Linux on the datalink level. Uses Libvsk.

systems | linux
SHA-256 | c2ecda53d1964843248b9ebc23e2bc7249f516f195cae8a84c10f8ea0c299168
libvsk-1.0.tar.gz
Posted Jan 4, 2001
Authored by s0ftpj, vecna | Site s0ftpj.org

Libvsk is a set of libraries for network traffic manipulation from userlevel, with some functions of filtering/sniffing.

SHA-256 | 8bcc1a1790c4aa4e03c23b681e4033744bc8888256fc13f3662c29c20970762f
aasniff.tar.gz
Posted Jan 4, 2001
Authored by s0ftpj, vecna | Site s0ftpj.org

Anti Anti Sniffer Patch - Linux kernel patches to hide a sniffer from the most known anti-sniffers.

tags | kernel
systems | linux
SHA-256 | 7898d92bbea3bdade89593e2f3ef566f7eaca0acda46611ec918606a1e054c0f
sinto.c
Posted Nov 29, 2000
Authored by s0ftpj, vecna | Site s0ftpj.org

Sinto.c is an interactive tty hijacker for Linux.

systems | linux
SHA-256 | 2545a9c0855c78b989ac5e2761936838dd95a63705a98662686aeed743282260
Nmap 2.12 Stealth Xmas Patch
Posted Mar 31, 2000
Authored by vecna | Site vecna.unix.kg

Patch to nmap 2.12 to do another type of stealth scan similar to the xmas scan, which is not currently logged by iplog and some IDS software.

tags | tool, nmap
systems | unix
SHA-256 | 048c281f0945aad5f26df3cff014a677b6d32e1a25328c51839bee4cfda19c27
Page 1 of 1
Back1Next

File Archive:

May 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    May 1st
    44 Files
  • 2
    May 2nd
    5 Files
  • 3
    May 3rd
    11 Files
  • 4
    May 4th
    0 Files
  • 5
    May 5th
    0 Files
  • 6
    May 6th
    28 Files
  • 7
    May 7th
    3 Files
  • 8
    May 8th
    4 Files
  • 9
    May 9th
    54 Files
  • 10
    May 10th
    12 Files
  • 11
    May 11th
    0 Files
  • 12
    May 12th
    0 Files
  • 13
    May 13th
    17 Files
  • 14
    May 14th
    11 Files
  • 15
    May 15th
    17 Files
  • 16
    May 16th
    13 Files
  • 17
    May 17th
    22 Files
  • 18
    May 18th
    0 Files
  • 19
    May 19th
    0 Files
  • 20
    May 20th
    17 Files
  • 21
    May 21st
    18 Files
  • 22
    May 22nd
    7 Files
  • 23
    May 23rd
    111 Files
  • 24
    May 24th
    0 Files
  • 25
    May 25th
    0 Files
  • 26
    May 26th
    0 Files
  • 27
    May 27th
    0 Files
  • 28
    May 28th
    0 Files
  • 29
    May 29th
    0 Files
  • 30
    May 30th
    0 Files
  • 31
    May 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close