exploit the possibilities
Showing 1 - 8 of 8 RSS Feed

Files from Floydman

First Active2002-05-15
Last Active2003-11-06
SIDTk10.zip
Posted Nov 6, 2003
Authored by Floydman | Site securit.iquebec.com

The SIDTk 1.0 is a collection of command-line tools aimed at improving host-based intrusion detection conditions on Windows desktops and servers. This kit includes ADSScan, an alternative data stream scanner, IntegCheck, a Tripwire clone, LogUser, a module to detect invalid user accounts, and various other utilities.

systems | windows
MD5 | da672503a181d9d36a75490749caa2d2
logids20free.zip
Posted Nov 6, 2003
Authored by Floydman | Site securit.iquebec.com

LogIDS 2.0 is a real-time, log-analysis based intrusion detection system able to analyze log files from various sources, and can be used with LogAgent 4.0 to supply these log files. This utility allows for a user specified formatting of each log file it utilizes which then enables an end user to define rules for each of the files given, resulting in one single interface to analyze and display all this data gathered from varied sources, IE. Event Viewer, ComLog, antivirus logs, personal firewall logs, Snort logs, LogAgent 4.0 Pro Logs, ADSscan, IntegCheck, just to name a few examples. The interface is also pretty innovative as the GUI is a logical representation of your network architecture, where each node possesses its own window where logs belonging to it are displayed. Sounds can also be emitted for alerts and warnings with this utility. Screen captures are available here.

Changes: Minimal cross-compatibility changes.
MD5 | 9ff43cf56c9ff7a970e6fce1e066b61f
logids10free.zip
Posted May 30, 2003
Authored by Floydman | Site securit.iquebec.com

LogIDS 1.0 is a real-time, log-analysis based intrusion detection system able to analyze log files from various sources, and can be used with LogAgent 4.0 to supply these log files. This utility allows for a user specified formatting of each log file it utilizes which then enables an end user to define rules for each of the files given, resulting in one single interface to analyze and display all this data gathered from varied sources, IE. Event Viewer, ComLog, antivirus logs, personal firewall logs, Snort logs, LogAgent 4.0 Pro Logs, ADSscan, IntegCheck, just to name a few examples. The interface is also pretty innovative as the GUI is a logical representation of your network architecture, where each node possesses its own window where logs belonging to it are displayed. Sounds can also be emitted for alerts and warnings with this utility. Screen captures are available here.

MD5 | f96604ce04c23e41dfef32bdd05ecc26
log40free.zip
Posted May 29, 2003
Authored by Floydman | Site securit.iquebec.com

This tool is a log file monitoring and centralization tool. You can use it to monitor the Event Viewer logs, and ASCII log files from just about any application, including, but not limited to, antivirus, personal firewalls, ComLog, Snort, etc. LogAgent 4.0 also comes with 2 companion tools that are ADSScan and the combo HashGen and IntegCheck. ADSScan is an alternate data streams scanner, and HashGen/IntegCheck is a MD5-SHA1 file system integrity checker, or also known as a host-based intrusion detection system.

MD5 | 68928c66d3b622655059be9ec939d474
comlog105free.zip
Posted May 29, 2003
Authored by Floydman | Site securit.iquebec.com

This tool is a command prompt (cmd.exe) logger, useful for generating intrusion evidence that was previously unavailable. With this tool, you can log command prompt sessions be it from the console, a compromised IIS system or through a netcat tunnel. Working a bit like a wrapper, ComLog takes the place of cmd.exe and passes the commands to be executed to the real cmd.exe which is renamed cm_.exe. Version 1.05 changes include MS-DOS icon added to the executable, and better camouflage to avoid detection by the monitored.

MD5 | 9ed0ade556bf85b90bdf1589de2b8e92
logagent.txt
Posted Aug 16, 2002
Authored by Floydman | Site securit.iquebec.com

LogAgent 2.1 is a tool made in Perl for recollecting log files from various applications and various machines into a central location in (almost) real-time in order to improve network activity awareness.

tags | perl
systems | windows
MD5 | 016665336c8dfa6a1530b9a282ed6f13
ComLog.pl
Posted Aug 16, 2002
Authored by Floydman | Site securit.iquebec.com

ComLog.pl, a WIN32 command prompt logger - The goal of this paper is to present a new Perl tool made to monitor DOS sessions on Windows NT/2K (should also work on XP). This tool can be used by administrators to keep a history of commands typed in the DOS command prompt and the associated output, for example on an IIS server. This can help admins to figure out what an attacker has done after compromising the machine via one of the numerous vulnerabilities available.

tags | perl, vulnerability
systems | windows, 2k, nt, 32
MD5 | 8cd836c9e931f3e30fdfcb6512faae37
logagnt20beta.txt
Posted May 15, 2002
Authored by Floydman | Site securit.iquebec.com

Logagent is a Windows tool in Perl which monitors several ascii logfiles and redirect any change made to a central location. Supports remote logging.

tags | remote, perl
systems | windows
MD5 | 94562194a468e624d9aa592f1285d8db
Page 1 of 1
Back1Next

File Archive:

June 2021

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Jun 1st
    35 Files
  • 2
    Jun 2nd
    14 Files
  • 3
    Jun 3rd
    40 Files
  • 4
    Jun 4th
    22 Files
  • 5
    Jun 5th
    1 Files
  • 6
    Jun 6th
    1 Files
  • 7
    Jun 7th
    19 Files
  • 8
    Jun 8th
    14 Files
  • 9
    Jun 9th
    39 Files
  • 10
    Jun 10th
    20 Files
  • 11
    Jun 11th
    22 Files
  • 12
    Jun 12th
    2 Files
  • 13
    Jun 13th
    1 Files
  • 14
    Jun 14th
    32 Files
  • 15
    Jun 15th
    34 Files
  • 16
    Jun 16th
    9 Files
  • 17
    Jun 17th
    33 Files
  • 18
    Jun 18th
    0 Files
  • 19
    Jun 19th
    0 Files
  • 20
    Jun 20th
    0 Files
  • 21
    Jun 21st
    0 Files
  • 22
    Jun 22nd
    0 Files
  • 23
    Jun 23rd
    0 Files
  • 24
    Jun 24th
    0 Files
  • 25
    Jun 25th
    0 Files
  • 26
    Jun 26th
    0 Files
  • 27
    Jun 27th
    0 Files
  • 28
    Jun 28th
    0 Files
  • 29
    Jun 29th
    0 Files
  • 30
    Jun 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2020 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close