exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 25 of 69 RSS Feed

Files from Mixter

Email addressmixter at newyorkoffice.com
First Active1999-09-23
Last Active2006-10-05
nsat-1.5-ia64-port.tgz
Posted Oct 5, 2006
Authored by Mixter | Site 1337.tsx.org

Nsat is a fast, stable bulk security scanner designed to audit remote network services and check for versions, security problems, gather information about the servers and the machine, and much more. Unlike many other auditing tools, nsat can collect information about services independently of vulnerabilities, which makes it less dependent on frequent updates as new vulnerabilities are found.

Changes: Ported to ia64.
tags | tool, remote, scanner, vulnerability
systems | unix
SHA-256 | d0b2a6b6ed3c4b0c04621b3ebab08786234a03ea8f86bb3d5d8e50771411f6c7
nsat-1.5.tgz
Posted Jan 6, 2003
Authored by Mixter | Site 1337.tsx.org

Nsat is a fast, stable bulk security scanner designed to audit remote network services and check for versions, security problems, gather information about the servers and the machine, and much more. Unlike many other auditing tools, nsat can collect information about services independently of vulnerabilities, which makes it less dependent on frequent updates as new vulnerabilities are found.

Changes: New compilation option to support scanning with POSIX threads instead of fork to enhance performance, compilation / stability fixes, and updated timing values. Ping dependence is now disabled by default.
tags | tool, remote, scanner, vulnerability
systems | unix
SHA-256 | 2ece807b3240a6e91ea88fd84c470a87de711c33554b231e071549388cb65114
neatdocs.tgz
Posted May 24, 2002
Authored by Mixter | Site 1337.tsx.org

NEAT is a script language driven exploit/vulnerability management tool that does active penetration testing. This is a pre-release with documentation and code snippets. NEAT is similar to raccess but is more sophisticated.

SHA-256 | 3504b18ed44995a578ca6d94d649f0788ec9ab3b7e95519729b758e51dae3931
neolock.tgz
Posted May 14, 2002
Authored by Mixter | Site 1337.tsx.org

Neolock is a tool that is a combination of console security locking tool (vlock) matrix console screensaver (cmatrix). Provides more discreet and nicer console locking.

SHA-256 | 01937d9fa051df13c9c2ce9e53868292bbdcdbd54089efe33b5a92a62ebed84f
ileech.tgz
Posted May 14, 2002
Authored by Mixter | Site 1337.tsx.org

Illeech is a collection of search engine harvesting scripts (google/altavista).

SHA-256 | de59bef71023f82b82ba35921b16bbc0df99d1434b1f29cd532ce50cdceb5b58
nsat-1.43.tgz
Posted May 14, 2002
Authored by Mixter | Site 1337.tsx.org

NSAT (Network Security Analysis Tool) is a fast, stable bulk security scanner designed to audit remote network services and check for versions, security problems, gather information about the servers and the machine and much more. Unlike many other auditing tools, it can collect information about services independently of vulnerabilities, which makes it "timeless", meaning it doesn't depend on frequent updates as new vulnerabilities are found.

Changes: New IDS evasion for HTTP (some whisker types), a webscan-only config file, and some code cleanups.
tags | tool, remote, scanner, vulnerability
systems | unix
SHA-256 | febfa779afcc82c93b4ce5767233a0cc0d134c5e59d4ac58c471b56ad3a506ea
nsat-1.41.tar.gz
Posted Feb 19, 2002
Authored by Mixter | Site 1337.tsx.org

NSAT (Network Security Analysis Tool) is a fast, stable bulk security scanner designed to audit remote network services and check for versions, security problems, gather information about the servers and the machine and much more. Unlike many other auditing tools, it can collect information about services independently of vulnerabilities, which makes it "timeless", meaning it doesn't depend on frequent updates as new vulnerabilities are found.

Changes: Added better remote OS detection (xprobe), added support for separate directory logging, greatly enhanced reliability when scanning firewalled or unresponsive hosts.
tags | tool, remote, scanner, vulnerability
systems | unix
SHA-256 | f229b7ddb5745a46d6b3ba6917503f79c7fde08d0df8fb0fb1473e5ab06b17fc
nsat-1.32.tar.gz
Posted Aug 2, 2001
Authored by Mixter | Site 1337.tsx.org

NSAT (Network Security Analysis Tool) is a fast, stable bulk security scanner designed to audit remote network services and check for versions, security problems, gather information about the servers and the machine and much more. Unlike many other auditing tools, it can collect information about services independently of vulnerabilities, which makes it "timeless", meaning it doesn't depend on frequent updates as new vulnerabilities are found.

Changes: Cleaned up code and logging system. Includes support for distributed scanning using NSAT agents. Now present on sourceforge (nsat.sf.net).
tags | tool, remote, scanner, vulnerability
systems | unix
SHA-256 | 52c7a15fcc0881bb6696c569c00d3de9ff3729c8d28d61f7e618baa5c0051e98
vulns.html
Posted Jul 23, 2001
Authored by Mixter | Site mixter.void.ru

Guidelines for C source code auditing - A basic reference containing some tips, approaches and methods for finding vulnerabilities in C code.

tags | paper, vulnerability
systems | unix
SHA-256 | b51ef94c9808338490069713f8eb6404b9f0ffddb2612c40f2369d7c13b0a159
libmix-122.tgz
Posted Apr 15, 2001
Authored by Mixter | Site mixter.void.ru

LibMix is a library that provides an API for various useful functions, including an AES encryption interface, various network front-ends and low level datagram functions, as well as functions for string manipulations and other miscellaneous utility functions. It also includes functions to transmit encrypted data via stateless spoofed datagrams (tfntransmit/tfnread).

Changes: Added lm_scan_run (callback function to easily build scanners and similar tools), and faster conversion functions, lm_addr and lm_ntoa.
tags | spoof
SHA-256 | 3ede82477a74c9bed8a16871140f28014546d82ae8bb96930b6d37e11009edbf
Q-2.4.tar.gz
Posted Apr 15, 2001
Authored by Mixter | Site mixter.void.ru

Q v2.4 is a client / server backdoor which features remote shell access with strong encryption for root and normal users, and a encrypted on-demand tcp relay/bouncer that supports encrypted sessions with normal clients using the included tunneling daemon. Also has stealth features like activation via raw packets, syslog spoofing, and single on-demand sessions with variable ports.

Changes: Now uses strong RSA/libiSSL encryption for sessions; compatibility with libmix1.2; many bugfixes.
tags | remote, shell, root, spoof, tcp
SHA-256 | 2d8a95a485190f541768a388e0121ea5d72b3a2fef27146e83365acda245229d
Mixter.txt
Posted Mar 6, 2001
Authored by Mixter, 000 Prize Winner!

Winning Packet Storm Contest Entry - Protecting Against the Unknown - A guide to improving network security to protect the Internet against future forms of security hazards. (Text Format)

tags | paper
SHA-256 | 15f4e5704be7d69962a1a4a2d64b19373699e3374703fdf9c33bd2868743dfde
issl.tgz
Posted Jan 26, 2001
Authored by Mixter | Site mixter.void.ru

iSSL is a library offering a minimal cryptographical API that uses the ciphers RSA and AES to establish SSL-alike, secure encrypted communications between two peers communicating through a network socket, including session key generation and public key exchange.

SHA-256 | c7b076983ae443493c28658e3f700e1ee7cb1fe373f4da1f97a31184309e9977
aes-netcat.tgz
Posted Dec 12, 2000
Authored by Mixter | Site members.tripod.com

aes-netcat is a patch with some includes for netcat 1.10 that adds an option to do password encrypted sessions using strong AES encryption. Doesn't include an AES algorithm but urls where to get them (15 candidates available).

tags | tool
systems | unix
SHA-256 | ed8bc2a6a4d5f9d88a1001545b97ad17846aaa75720ddca22d215d0a5062f8ef
libmix-120.tgz
Posted Dec 2, 2000
Authored by Mixter | Site mixter.void.ru

LibMix is a library that provides an API for various useful functions, including an AES encryption interface, various network front-ends and low level datagram functions, as well as functions for string manipulations and other miscellaneous utility functions. It also includes functions to transmit encrypted data via stateless spoofed datagrams (tfntransmit/tfnread).

Changes: Added exclude database function, to add and match classless ranges of IP addresses (for network scanners, access control, etc.), added new packet headers, updated manpages.
tags | spoof
SHA-256 | e91e91671ec8107ea5c701f575aa40fbaca42f747a3f260f3c34ab05a4de7de7
nsat-1.23.tgz
Posted Dec 2, 2000
Authored by Mixter | Site 1337.tsx.org

NSAT (Network Security Analysis Tool) is a fast, stable bulk security scanner designed to audit remote network services and check for versions, security problems, gather information about the servers and the machine and much more. Unlike many other auditing tools, it can collect information about services independently of vulnerabilities, which makes it "timeless", meaning it doesn't depend on frequent updates as new vulnerabilities are found.

Changes: Added range-based scan target exclusion, fixed cgi scanning for unicode urls, improved logfile output and bind version scanning, updated internal API.
tags | tool, remote, scanner, vulnerability
systems | unix
SHA-256 | 2ff2b2e8427ca17da865ad632118aa02872136a6622b836076a13a274e08ef09
transparency.txt
Posted Nov 13, 2000
Authored by Mixter | Site mixter.warrior2k.com

This paper discusses full disclosure, the necessity of legitimate network scanning, and the results of criminalizing security research and information. Overreactions to harmless activities not crossing legal boundaries are leading to a scenario where anyone acquiring basic information about a system needs to be afraid about potential consequences.

tags | paper
SHA-256 | e221f988e97f22109eda8c7087b9b887b9ed8deda208b3f903f4f85474a6bd52
nsat-1.22.tgz
Posted Aug 10, 2000
Authored by Mixter | Site 1337.tsx.org

NSAT (Network Security Analysis Tool) is a fast, stable bulk security scanner designed to audit remote network services and check for versions, security problems, gather information about the servers and the machine and much more. Unlike many other auditing tools, it can collect information about services independently of vulnerabilities, which makes it "timeless", meaning it doesn't depend on frequent updates as new vulnerabilities are found.

Changes: I've revised most parts for better stability and portability. Greatly improved output style, structured lists for services (many new optional tcp and rpc services to scan for added), vhost support, uses configuration file, external cgi list, improved X frontend, foreground scanning mode.
tags | tool, remote, scanner, vulnerability
systems | unix
SHA-256 | 461a3df9b3a2ca90e5ae7367fa87b9e9c40b2a804e947124fd42f56d560d7521
C-intro.tar.gz
Posted Aug 2, 2000
Authored by Mixter | Site 1337.tsx.org

Introduction to programming in C - Written with the goal of letting people get the most knowledge as fast as possible from it.

SHA-256 | 9439ef84c7e9724856d38b8067ccdb5e81490db2fac03db7cd2b1ac0b573b0fd
md5bd.c
Posted Jul 15, 2000
Authored by Mixter | Site 1337.tsx.org

md5bd.c is a shell server/backdoor that uses a md5 encrypted password to authenticate, therefore the password cannot be retrieved from the server.

tags | shell
SHA-256 | a4877757ba86f16bd156b9e926a303adac81bca585de68a7f81d07662984df4f
pat2.tgz
Posted May 24, 2000
Authored by Mixter | Site mixter.void.ru

Ping Analysis Tool II (PAT) performs icmp echo scans on a range of ip addresses as fast as physically possible. Features a dual-threaded scanning process and allows you to scan from a list of IP's.

SHA-256 | 8439bbaf530edef8540c0a91d5e8db14e343611eef1a9c0d9de2ea4f516e736e
libmix-108.tgz
Posted Apr 14, 2000
Authored by Mixter | Site mixter.void.ru

LibMix v1.08 is a library that provides an API for various useful functions, including an AES encryption interface, various network front-ends and low level datagram functions, as well as functions for string manipulations and other miscellaneous utility functions. It also includes functions to transmit encrypted data via stateless spoofed datagrams (tfntransmit/tfnread).

Changes: It now compiles as a shared object file (.so) by default, which makes it easier to link it with programs, and the whole library sources were cleaned up and rewritten in ANSI C++.
tags | spoof
SHA-256 | 4aae1256a63683a1da1511ff27fa8a427aebb21600240b29bc77fc7dd95c9c78
nbnbs.c
Posted Apr 14, 2000
Authored by Mixter | Site 1337.tsx.org

nbnbs.c is a NetBIOS name bulk security scanner for unix. It does long-range network scans for NetBIOS names (Windows and UNIX Samba servers) and logs positives. Based off of nbname.c by mynock and ADM.

systems | windows, unix
SHA-256 | 77d520ec6b6eb6156335fd5b225da0e5207d28fdb14cf91ee8d8c0764e0f58d8
Q-2.0.tgz
Posted Apr 7, 2000
Authored by Mixter | Site members.tripod.com

Q v2.0 is a client / server backdoor which features remote shell access with strong encryption for root and normal users, and a encrypted on-demand tcp relay/bouncer that supports encrypted sessions with normal clients using the included tunneling daemon. Also has stealth features like activation via raw packets, syslog spoofing, and single on-demand sessions with variable ports.

Changes: Security enhancments, easier usage, and better encryption.
tags | remote, shell, root, spoof, tcp
SHA-256 | 708411ad4b73a24961baed61737827818d04eda970f7ae85a0b814d5bf7def52
libmix-107.tgz
Posted Apr 7, 2000
Authored by Mixter | Site mixter.void.ru

LibMix v1.07 is a library that provides an API for various useful functions, including an AES encryption interface, various network front-ends and low level datagram functions, as well as functions for string manipulations and other miscellaneous utility functions. It also includes functions to transmit encrypted data via stateless spoofed datagrams (tfntransmit/tfnread).

Changes: Important bug fixes.
tags | spoof
SHA-256 | 81abb26a06a625cf09c0cef212cb1b761809502154a107cc2d39b61ff2b266a2
Page 1 of 3
Back123Next

File Archive:

January 2023

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Jan 1st
    0 Files
  • 2
    Jan 2nd
    13 Files
  • 3
    Jan 3rd
    5 Files
  • 4
    Jan 4th
    5 Files
  • 5
    Jan 5th
    9 Files
  • 6
    Jan 6th
    5 Files
  • 7
    Jan 7th
    0 Files
  • 8
    Jan 8th
    0 Files
  • 9
    Jan 9th
    18 Files
  • 10
    Jan 10th
    31 Files
  • 11
    Jan 11th
    30 Files
  • 12
    Jan 12th
    33 Files
  • 13
    Jan 13th
    25 Files
  • 14
    Jan 14th
    0 Files
  • 15
    Jan 15th
    0 Files
  • 16
    Jan 16th
    7 Files
  • 17
    Jan 17th
    25 Files
  • 18
    Jan 18th
    38 Files
  • 19
    Jan 19th
    6 Files
  • 20
    Jan 20th
    21 Files
  • 21
    Jan 21st
    0 Files
  • 22
    Jan 22nd
    0 Files
  • 23
    Jan 23rd
    24 Files
  • 24
    Jan 24th
    68 Files
  • 25
    Jan 25th
    22 Files
  • 26
    Jan 26th
    20 Files
  • 27
    Jan 27th
    17 Files
  • 28
    Jan 28th
    0 Files
  • 29
    Jan 29th
    0 Files
  • 30
    Jan 30th
    0 Files
  • 31
    Jan 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Hosting By
Rokasec
close