exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 15 of 15 RSS Feed

Files from Mark Osborne

Email addressmark at loud-fat-bloke.co.uk
First Active2003-01-04
Last Active2017-05-29
MailSecRep Email Analysis Tool For Outlook
Posted May 29, 2017
Authored by Mark Osborne

MailSecRep adds an Outlook button to analyze email for spoofing, hostile links, and malware attachments.

tags | tool, spoof
systems | unix
SHA-256 | ebf7adf8f19f92735060cb03fa16818cfec6fb47856cd6457d21837df76b598a
Tinycrypt.asm Training Ransomware Virus
Posted Sep 9, 2016
Authored by Mark Osborne

Tinycrypt.asm is a training ransomware virus that is fully configurable to your needs but it is designed to be very controllable. It was designed to be used with the PoShFoTo incident response toolkit.

tags | tool, encryption, virus
SHA-256 | d69c41d85e494c771d84d2ee2805586148307dc2162ea290443e61ae27b7d432
PoShFoTo - PowerShell Forensics Toolkit
Posted May 30, 2016
Authored by Mark Osborne

PoShFoTo is the PowerShell Forensics Toolkit, which contains a dozen PowerShell tools that allow you to do basic incident response and malware forensics. It includes Hex Dumper, Registry timeline generator, File timeline generator, and PE-block analyzer.

tags | tool, registry, forensics
SHA-256 | 2516e4a082ce0e53db6d6ba8ddfba777505de06d31bfefcccdabcff2c0057a2b
DAWIN - Distributed Audit and Wireless Intrustion Notification 2.0
Posted Apr 28, 2015
Authored by Mark Osborne | Site loud-fat-bloke.co.uk

DA-WIN, a wireless IDS, provides an organization a continuous wireless scanning capability that is light touch and simple. It utilizes compact and discreet sensors that can easily be deployed reducing the total cost of protection and simplifying the effort required for absolute, categoric regulatory compliance. This archive includes a dd image to be used on a Raspberry Pi and a user manual.

Changes: Bug fixes.
tags | tool, wireless
systems | unix
SHA-256 | eec29a64f031854e639f5edda7e65d034b41f755867195fb575def106ccf5112
DAWIN - Distributed Audit and Wireless Intrustion Notification
Posted Sep 17, 2014
Authored by Mark Osborne | Site loud-fat-bloke.co.uk

DA-WIN, a wireless IDS, provides an organization a continuous wireless scanning capability that is light touch and simple. It utilizes compact and discreet sensors that can easily be deployed reducing the total cost of protection and simplifying the effort required for absolute, categoric regulatory compliance. This archive includes a dd image to be used on a Raspberry Pi and a user manual.

tags | tool, wireless
systems | linux
SHA-256 | 900a69552ae4f2e1b99cd5231bc485c4e70297254407c0b371ac96a0d19853b9
NTP Spoofed "monlist query" Denial Of Service Proof Of Concept
Posted Mar 19, 2014
Authored by Mark Osborne

NTP_SPQUERY.C is a spoofed "monlist query" program which can generate packets like those used in reflected amplification NTP attacks that were common in early 2014. Written entirely in C, it requires no special libs or header files. It has been designed to run on most LINUXs.

tags | exploit, denial of service, spoof, proof of concept
SHA-256 | b2921a12ef46feaba746bf166e1ad786a8a6d84e3174834a115c9770328ac219
DNS Reflection / Amplification Attack Tool
Posted Jul 30, 2013
Authored by Mark Osborne

dns_spquery.c is written in C and sends a DNS recursive name query to a name server of your choice with a spoofed source IP address selected at runtime. This tool was written in order to demonstrate a DNS reflection / amplification attack for testing purposes.

tags | denial of service, spoof
SHA-256 | ee5f524a0cc4f2a2315ce105359420522610fbfdd31f128381a65dfc971bbaca
Obeseus Distributed Denial Of Service Detector 7.1a
Posted May 22, 2013
Authored by Mark Osborne, Simon Ratcliffe | Site loud-fat-bloke.co.uk

Obeseus is a light-weight, high-speed ip DDOS detector that has been designed to run on an Intel probe running an advanced 10 Gb/s FPGA card. It detects TCP floods, Fragment Floods, raw ICMP/TCP/UDP, reflected (DNS / SMURF) and BOGON misuse. It also detects application misuse in HTTP and UDP.

tags | tool, denial of service
systems | linux, unix
SHA-256 | 874b8fa0bc6bc615a63f6ed39567f07ad521a790408f16ea34c9f9f982b496c2
Obeseus Distributed Denial Of Service Detector
Posted Nov 3, 2009
Authored by Mark Osborne, Simon Ratcliffe | Site loud-fat-bloke.co.uk

Obeseus is a light-weight, high-speed ip DDOS detector that has been designed to run on an Intel probe running an advanced 10 Gb/s FPGA card. Firmware Routines on the card ensure that the attack is identified right down to host/port with zero load on the PCI bus. This is the pre-port to FPGA beta version written in "c" with PCAP and BPF.

tags | tool
systems | unix
SHA-256 | b67e244ec592a0c5a1242966f36937d8dfd7d5e17d6725951479d2a05fc108b9
Loud Listener Packet Recorder
Posted Apr 9, 2009
Authored by Mark Osborne | Site loud-fat-bloke.co.uk

Loud Listener is a light-weight high speed voice packet recorder that can target a particular call based on SIP URL or TG, designed to satisfy regulatory lawful Intercept requirements. This proof of concept code has been designed to be pushed to an FPGA on an accelerated platform but in its current form, it will run on most versions of Linux.

tags | telephony, proof of concept
systems | linux
SHA-256 | 57e5623476d8c06864d49cb43d5ee359c127b0dbbb7a3705578f3519de6a4cef
iamdohv1.tgz
Posted Dec 23, 2003
Authored by Mark Osborne

i-am-doh is a utility that filters approximately 75% of all false-positives given by an IDS. It uses existing reliable tools like Nmap, Nessus, and Amap to validate IDS alerts based on the following criteria and techniques: OS identification, service identification, port scanning, vulnerability scanning, online CVE and bug interpretation, and server importance weighting.

tags | tool, sniffer
SHA-256 | 8240812efc3fddb3c130b13349ca734da19a96a92366c88e4e6aa21be0bd7fd3
widzv1.8.zip
Posted Sep 13, 2003
Authored by Mark Osborne

WIDZ version 1.8 is an IDS system for 802.11 that guards access points and monitors local frequencies for potentially malevolent activity. It detects scans, association floods, and bogus or rogue APs. It can easily be integrated with SNORT or RealSecure.

Changes: Improved scanning, more signatures for many common attacks including WLANJack and FATAJACK, custom scripting facility added, and various bug fixes.
tags | tool, local, wireless
SHA-256 | 7eaaaa7ef04553766dafd60b7eabb6d62e07109fd991ce91186616fb307e0c95
fata_jack.c
Posted Apr 10, 2003
Authored by Mark Osborne | Site loud-fat-bloke.co.uk

fatajack is a modified Wlan Jack that sends a deauth instead of an auth. This tool highlights poor AP security and works by sending authentication requests to an AP with an inappropriate authentication algorithm and status code. This causes most makes to drop the relevant associated session.

tags | tool, wireless
SHA-256 | 5b4c8235dc1aa20a0096f52dea4f1c9832db9cee0de8bddad235a411167b0ced
widzv1-5.zip
Posted Feb 4, 2003
Authored by Mark Osborne

WIDZ version 1.5 is a proof of concept IDS system for 802.11 that guards an AP(s) and Monitors local frequencies for potentially malevolent activity. It detects scans, association floods, and bogus/Rogue AP's. It can easily be integrated with SNORT or RealSecure.

Changes: Rewritten to work with the HOSTAP driver, Configurable MAC black list, Configurable SID black list, Custom script directory to process specific events.
tags | tool, local, proof of concept, wireless
SHA-256 | bba8b890ad9df45e6ae49f336a63ff99c182541545f7c64b5f1175fb906b5632
widzv1-0.zip
Posted Jan 4, 2003
Authored by Mark Osborne

WIDZ version 1 is a proof of concept IDS system for 802.11 that guards an AP(s) and Monitors local frequencies for potentially malevolent activity. It detects scans, association floods, and bogus/Rogue AP's. It can easily be integrated with SNORT or RealSecure.

tags | tool, local, proof of concept, wireless
SHA-256 | 8f8488eea9838a824c0a830e09fb3cac0fd6fbd51a0708fb1eaebae8e6f21294
Page 1 of 1
Back1Next

File Archive:

March 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Mar 1st
    16 Files
  • 2
    Mar 2nd
    0 Files
  • 3
    Mar 3rd
    0 Files
  • 4
    Mar 4th
    32 Files
  • 5
    Mar 5th
    28 Files
  • 6
    Mar 6th
    42 Files
  • 7
    Mar 7th
    17 Files
  • 8
    Mar 8th
    13 Files
  • 9
    Mar 9th
    0 Files
  • 10
    Mar 10th
    0 Files
  • 11
    Mar 11th
    15 Files
  • 12
    Mar 12th
    19 Files
  • 13
    Mar 13th
    21 Files
  • 14
    Mar 14th
    38 Files
  • 15
    Mar 15th
    15 Files
  • 16
    Mar 16th
    0 Files
  • 17
    Mar 17th
    0 Files
  • 18
    Mar 18th
    10 Files
  • 19
    Mar 19th
    32 Files
  • 20
    Mar 20th
    46 Files
  • 21
    Mar 21st
    16 Files
  • 22
    Mar 22nd
    13 Files
  • 23
    Mar 23rd
    0 Files
  • 24
    Mar 24th
    0 Files
  • 25
    Mar 25th
    12 Files
  • 26
    Mar 26th
    31 Files
  • 27
    Mar 27th
    19 Files
  • 28
    Mar 28th
    0 Files
  • 29
    Mar 29th
    0 Files
  • 30
    Mar 30th
    0 Files
  • 31
    Mar 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close