Silencer holds three different functionalities. It will deploy a backdoor in a listening service that an attacker must connect to, feed the magic word, and then portscan the machine to find the bindshell spawned, it has an Apache backdoor that allows a connection over HTTP to drop to a shell, and it also has a read sniffer built in that goes through the kernel read() process and then logs it to /tmp/.es.rox. The authors ask to be contacted if anyone finds any systems or kernels that this does not work on.
41eb4095cd39cb456d3f839ae2f1d1ccad55ea5d5d7cc64453d8653a4a0b9510
This ELF infector appends two executables together. The payload inside this parasite opens a bind shell on the infected machine as the user who executed it.
f4f9282628fac3918df1ccfb4c92839b7ee9fbfe284516b282d78e48ae663acb
This utility is a basic terminal sniffer.
342b6b2e3101a53ec1e745340e78e6782a5ce0141ba04347c60ffadf34173299
Exploit for NetMerchant that allows for remote command execution.
e30fda7b60a08dc3612148a6ccee162a260d3ab4e8710e2ff20fee58a2b5224d
Hp-ux-bdf.c is a local root buffer overflow exploit for HP-UX's /usr/bin/bdf.
0e8e2833f271db51967945879c37ea8b040d8a327992db7a84525fd4e618c1ce