SniffJoke is middleware software for Linux that is managed by a web interface and enables connection scrambling technology, also known as sniffer evasion techniques.
9827d120d3eeec10a358628ab21b7113
SniffJoke is middleware software for Linux that is managed by a web interface and enables connection scrambling technology, also known as sniffer evasion techniques.
cb7fa9ad394dba7ddee008a3cbeb06fe
ShellExecuteFisaco - This is a temporary, third-party patch to help mitigate the URL handling issue discovered in Windows XP and Windows Server 2003.
f1e965dcecdba44322c94fabd9b9ac62
SniffJoke implements sniffer/IDS evasion techniques. SniffJoke runs on a network connected box by selectively applying evasion techniques to sessions involving it. Evasion application is governed by user rules and implemented with a netfilter/ulogd module.
dbc8a3ad5fe1a0c2b56e1d82ffca25bc
SniffJoke implements sniffer/IDS evasion techniques. SniffJoke runs on a network connected box by selectively applying evasion techniques to sessions involving it. Evasion application is governed by user rules and implemented with a netfilter/ulogd module.
3197b8ba5c32b72df0aaa5632ee21e2c
Sandboxing tool for Windows.
fd23bff06be3802420033d4bfe13a45e
Apmislay (avoid+privacy+mislay) is a library to make anonymous connections without performance loss. It implements a simple technique based on IP spoofing and suits well for file sharing systems or anonymous transfers of large amount of data.
47ff6423957a002a9659007df4312623
BigBoo is a YABASST, Yet Another Block And Superblock Subversion Tool. It swallows, encrypts and hides your files in a ext2/ext3 or swap partition.
92a311d976af3b5d128519c2bf912806
SABBIA protocol anonymizes low latency connections by making a continuous and constant padding over the net. This is an example of implementation on a trusted core.
f8f1c2c8dc92c5ff3b9ebe199ddb235f
Innova is a framework that permits to manipulate network sessions starting at layer 3 and is transparent to the application. It runs entirely in userspace on Linux and supports plugins.
be2a3e42f36511feabe5bc650d4418ce
This code shows how to send hidden data steganographed into a simulation of common (worm) traffic.
556f37cbd09cef7aaa5b1ac44a48cf4e
sud (superuser daemon) permits a user to switch to root privileges and to use a suid program in a nosuid environment. It is based on a client/server model and on the ability to pass file descriptors between processes. sud permits you to choose your authentication method, and your effective credentials will be checked by using a Unix domain socket.
f44ca2810ff72b84ad8a10cd62752098
Generic time path analysis via ttysnoop-0.12c patching.
a2ebde4a8972189d7958d50c990d873f
Kernel Security Therapy Anti-Trolls (KSTAT) is a very powerful security tool to detect many kinds of rogue kernel rootkits. It analyzes the kernel through /dev/kmem and detects modified syscalls as well as various other problems. This version runs on 2.4.x only, and can assist in finding and removing trojan LKMs. It supports network socket dumps, sys_call fingerprinting, stealth module scanning, and more.
96954a3d4b4dd623480b5ed05a7b7523
Kstat is a powerful tool for Linux v2.4.x which displays information taken directly from kernel structures taken from /dev/kmem. This is especially useful when we can't trust output from usual sources and applications, for example after an unauthorized access to our systems. Effective if something like ps, ifconfig, lsmod, or system calls are patched.
01bdbde57c74a4e9a0c01c7eaf5b9794
TCP Congestion paper and proof of concept code - A vulnerability in the TCP protocol affects several OS's, allowing remote denial of service attacks. Includes a netfilter module which implements a new method of blocking the attack. More information on TCP congestion vulnerabilities available here
2a15af964e5f1cb85f3ee252a0a64826
Umpf is a system for managing encrypted files without using encrypted filesystems such as cfs/tcfs loop-aes/kerneli. Does not require root to run, is lightweight, and transparent.
13c17a159341c5fc25c40199d9d78af5
The Spapem project aims to how how to elude securelevel under *BSD systems by hiding the fact that the system has been rebooted. Includes code to restore the PID, a LKM to change the uptime, a generic rootkit example, a module to remove startup messages, and instructions for patching init(8).
ff292eb12a32ff7f232049be335cb144
SMS Spoofing Tool - Spoof your SMS by using this code with smsclient.
4893e2044a30ac7a59927d15e527537e
L.L.H.M. - Low Level Header Manipulation is a tool hides pieces of information in your files. Works on Win32.
ac5284de6f39df9f50c9dda36949630a
THC Backdoor for Linux - This is a simple but useful backdoor for Linux based on a FreeBSD lkm by pragmatic/THC.
7855b79979217cd5813788e01a0e1b83
THC Backdoor ported to OpenBSD - This is a simple but useful backdoor for OpenBSD based on a FreeBSD lkm by pragmatic/THC.
11ada1cc8831dc0a793e5b9c3a2c9b78
SRaw for OpenBSD is a kld which makes all users able to open raw sockets. Supported protocols are IPPROTO_RAW, IPPROTO_ICMP, IPPROTO_IPIP, IPPROTO_IPV4, IPPROTO_IGMP.
f5b4d4b2eec79664d724e25cee06d8b2
SRaw is a kld for FreeBSD which disables EPERM in socket() and permits to allocate inpcb even if the socket is raw and users haven't root permissions bypassing suser() in pru_attach() functions.
eb7720cc8aef3dc091d05c01307c65d8
This FreeBSD module shows how to intercept getpass(3) function and print anything that is typed without terminal echo.
545ecc2024316a312ab036592b8e802a