exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 151 - 175 of 214 RSS Feed

Files from thc

First Active1999-08-17
Last Active2024-02-05
amap-4.0.tar.gz
Posted Jul 22, 2003
Authored by van Hauser, thc, DJ Revmoon | Site thc.org

Amap Version 4.0 is a next-generation scanning tool that allows you to identify the applications that are running on a specific port. It does this by connecting to the port(s) and sending trigger packets. These trigger packets will typically be an application protocol handshake (i.e. SSL). Amap then looks up the response in a list and prints out any match it finds. Adding new response identifications can be done just by adding them to an easy-to-read text file. With amap, you will be able to identify that SSL server running on port 3445 and some oracle listener on port 233!

Changes: Rewritten from scratch to enhance speed and reliability. There are also new features, better documentation, and various other bug fixes.
tags | tool, protocol
SHA-256 | 2093ae53f387b8dfbd45483389d5031cf82dd14770bd294b48f87d7917b52210
shagg-0.2.0.tar.gz
Posted Jul 18, 2003
Authored by thc | Site thc.org

THC-Shagg is an application to bruteforce check digit algorithms. It analyzes a given list of serial numbers and tries to find a matching algorithm and its setup. If such a setup is found, THC-Shagg is able to generate (extrapolate) new serial numbers, e.g. VISA and MasterCard credit card numbers, EAN numbers, IMEI, UPC or even EFT routing numbers.

SHA-256 | beaebc61b99d81db0fc58c65787d826e2032df6e00662b4ca2b8413ed3611e9d
login_hacker-1.1.tar.gz
Posted Jun 29, 2003
Authored by van Hauser, thc | Site thc.org

THC Modem Login Hacker - A tool that will attempt to break into modem dialups using scripts written for minicom. Extremely configurable and a must have for any penetration test.

SHA-256 | 828570b792839f01260c13d3a4c84290f8ec66299dfceef31ab46fc2941ec452
amap-2.7.tar.gz
Posted Jun 17, 2003
Authored by van Hauser, thc, DJ Revmoon | Site thc.org

Amap is a scanning tool that allows you to identify the applications that are running on a specific port. It does this by connecting to the port(s) and sending trigger packets. These trigger packets will typically be an application protocol handshake (i.e. SSL). Amap then looks up the response in a list and prints out any match it finds. Adding new response identifications can be done just by adding them to an easy-to-read text file. With amap, you will be able to identify that SSL server running on port 3445 and some oracle listener on port 233!

Changes: Added the ability to compile under Cygwin, Added some triggers and responses, and various bug fixes.
tags | tool, protocol
SHA-256 | 94fab83628b9447bc141df6b16c39f31750777f88ee84a8d1eb31ceb8b387221
amap-2.5.tar.gz
Posted May 31, 2003
Authored by van Hauser, thc, DJ Revmoon | Site thc.org

Amap is a scanning tool that allows you to identify the applications that are running on a specific port. It does this by connecting to the port(s) and sending trigger packets. These trigger packets will typically be an application protocol handshake (i.e. SSL). Amap then looks up the response in a list and prints out any match it finds. Adding new response identifications can be done just by adding them to an easy-to-read text file. With amap, you will be able to identify that SSL server running on port 3445 and some oracle listener on port 233!

Changes: Bug fix in the -o output and RPC scanning.
tags | tool, protocol
SHA-256 | 6df1e33d4c0dea8aae82e949aa3198c14cb677bce90ca0f5998b50a39229a476
thcrut-1.2.4g.tar.gz
Posted May 28, 2003
Authored by thc | Site thc.org

THC-RUT (aRe yoU There) is a local network discovery tool developed to brute force its way into wvlan access points. It offers arp-request on ip-ranges and identifies the vendor of the NIC, spoofed DHCP, BOOTP and RARP requests, icmp-address mask request and router discovery techniques. This tool should be 'your first knife' on a foreign network.

Changes: New OS Fingerprint implementation by gathering tcp stack informations, banners, open/closed port characteristics and timing values and tosses them through a perl regular expression matrix to determine the OS with high accuracy.
tags | local, spoof
SHA-256 | f41eda1909b90b1e54ab9977d800ab9eacb0016df82f2180d5a8da02b160d2b1
amap-2.1.tar.gz
Posted May 8, 2003
Authored by van Hauser, thc, DJ Revmoon | Site thc.org

Amap V2.1 is a scanning tool that allows you to identify the applications that are running on a specific port. It does this by connecting to the port(s) and sending trigger packets. These trigger packets will typically be an application protocol handshake (i.e. SSL). Amap then looks up the response in a list and prints out any match it finds. Adding new response identifications can be done just by adding them to an easy-to-read text file. With amap, you will be able to identify that SSL server running on port 3445 and some oracle listener on port 233!

Changes: More application fingerprints, better identification, speed enhancements, amapcrap added, new features and bugfixes.
tags | tool, protocol
SHA-256 | a2fcff73f3df3c1bcf73d1501e95403b8c981c8c823a2d9d6763f52252bbb3ad
THCunREAL_V0.2.ZIP
Posted Apr 30, 2003
Authored by thc, Johnny Cyberpunk | Site thc.org

Updated version of the remote root exploit for Realserver 8 on several Windows platforms.

Changes: New shellcode added and the code has been condensed.
tags | exploit, remote, root
systems | windows
SHA-256 | faac60e3244b42b5c4ede35ae529a0d44f8df9e59b986f1e0455c38db816a155
THCunREAL.zip
Posted Feb 11, 2003
Authored by thc, Johnny Cyberpunk | Site thc.org

Remote root exploit for Realserver 8 on several Windows platforms.

tags | exploit, remote, root
systems | windows
SHA-256 | 90292d4e257cdbfdf377651683c109aa8ae179a5a90d51aef9d7f78c2125337f
amap-1.2.1.tgz
Posted Dec 29, 2002
Authored by van Hauser, thc, DJ Revmoon | Site thc.org

Amap is a scanning tool that allows you to identify the applications that are running on a specific port. It does this by connecting to the port(s) and sending trigger packets. These trigger packets will typically be an application protocol handshake (i.e. SSL). Amap then looks up the response in a list and prints out any match it finds. Adding new response identifications can be done just by adding them to an easy-to-read text file. With amap, you will be able to identify that SSL server running on port 3445 and some oracle listener on port 233!

Changes: More application fingerprints, less bugs and SSL support!
tags | tool, protocol
SHA-256 | 81509d637b18008571d20a69abeb7186061b19f044b882b42974720a61efebdf
hydra-2.2.tar.gz
Posted Nov 24, 2002
Authored by thc | Site thc.org

THC-Hydra is a parallel login hacker. With this tool you are able to attack several services at once (Samba, FTP, POP3, IMAP, Telnet, HTTP Auth, LDAP, NNTP, VNC, ICQ, Socks5, PCNFS, Cisco and more). Includes SSL support and can be used with Nessus. Bugfix release.

tags | web, cracker, imap
systems | cisco
SHA-256 | b67fed5cd977e8ba18900852cae0931684c3d2fdabbd6cb40da704c831693658
thc-gd10.zip
Posted Aug 26, 2002
Authored by thc

THC Presents:GENERAL DIALER v1.00

tags | bbs
SHA-256 | 7d1e84b2df929f46eaa48b260380b8643367e833b37cc8f14dbef4e1f012d87d
flood-connect-1.5.tar.gz
Posted Aug 8, 2002
Authored by thc | Site thc.org

THC Flood Connect is a connection flooding tool which supports SSL, sending + dumping data, closing or keeping sessions etc. Just a small release.

SHA-256 | 26c6c3b52ddb9dd1279693d998faae8c9e6d4d005e4e421a1e423898ee4a5eb7
writing-linux-kernel-keylogger.txt
Posted Jul 24, 2002
Authored by thc, rd | Site thc.org

Writing Linux kernel based key loggers - Includes a sample key logger which can log user input and passwords.

tags | paper, kernel
systems | linux, unix
SHA-256 | 7f88f2d22ed4e054498403e9c2f923a531d0e030d05598992787c9f2a357b715
linux-390-shellcode-devel.txt
Posted Jul 24, 2002
Authored by thc, Johnny Cyberpunk | Site thc.org

Writing shellcode for Linux/390 mainframes. Includes port binding shellcode example.

tags | paper, shellcode
systems | linux, unix
SHA-256 | c882054b5eac3179b12735dc7e7d8bd4b960f0cbc421c7afa516ca6eb6614193
parasite-1.2.tar.gz
Posted Jul 12, 2002
Authored by van Hauser, thc | Site thc.org

THC-Parasite v1.2 allows you to sniff on switched networks by using either ARP Spoofing or MAC Flooding. THC-Parasite is intelligent and its algorithms are designed to bypass the basic switch security. Works on Linux, OpenBSD, and Solaris.

Changes: More portable.
tags | spoof
systems | linux, solaris, openbsd
SHA-256 | 88ed01c5809275069ed28ab27da53c28745abe567a2e31a9d02b41c7f4067e83
hydra-2.1.tar.gz
Posted Jun 13, 2002
Authored by thc | Site thc.org

THC-Hydra is a parallized login hacker which understands FTP, POP3, IMAP, Telnet, HTTP Auth, NNTP, VNC, ICQ, Socks5, PCNFS, samba, cisco enable, LDAP, and more. Includes SSL support. Hydra is now included in Nessus.

Changes: Added Samba, Cisco enable and LDAP support.
tags | web, cracker, imap
systems | cisco
SHA-256 | 18cf489547d06c85e5e7d6050ff0246134c609950137697f81a4716bd421c97a
shagg-0.1.1.tar.gz
Posted Jun 4, 2002
Authored by thc | Site thc.org

THC-Shagg is a modular application to bruteforce check digit algorithms. It is able to analyze the used algorithm, its weights and its partitions of a set of serial numbers, e.g. credit card numbers, social id numbers, and calling card numbers. After analysis new serial numbers can be generated from the saved results.

SHA-256 | bfd76ef8ac462ae19d1f7c9bc217599c41e7e1c5e79ab40188774f683a901e4c
cupass.txt
Posted Jun 4, 2002
Authored by thc, Doc Holiday | Site thc.org

The NetUserChangePassword function in Windows NT 4 enables an attacker to change the password of any user under special/default circumstances.

systems | windows
SHA-256 | 94faf138aef331f98dc6f9d7d0bc78b7ff08fa0c2127791fe549ae03bb16ef2c
rwwwshell-2.0.pl.gz
Posted Jun 4, 2002
Authored by van Hauser, thc | Site thc.org

Reverse-WWW-Tunnel-Backdoor v2.0 - This backdoor should work through any firewall which has got the security policy to allow users to surf the WWW. Verified to work on Linux, Solaris, AIX and OpenBSD.

Changes: Now has full HTTP v1.0 compliance.
systems | linux, solaris, openbsd, aix
SHA-256 | 012239d21cbf76e09bca91cb3f7c23c5960360129f2f512bc096f55b74fb111a
THC Secure Deletion v2.3
Posted Jun 4, 2002
Authored by van Hauser, thc | Site thc.org

THC-Secure Deletion v2.3 for UNIX is the latest release of van Hauser's suite of secure deletion and overwriting utilities. Included are 'srm' - secure deletion of files

Changes: Bug fixes.
systems | unix
SHA-256 | 1d5629b0f83a0352b0d2654208ad38a2aee6ce78c9f94f8d2b044b5316b164b7
parasite-1.1.tar.gz
Posted Jun 4, 2002
Authored by van Hauser, thc | Site thc.org

THC-Parasite v1.1 allows you to sniff on switched networks by using either ARP Spoofing or MAC Flooding. THC-Parasite is intelligent and its algorithms are designed to bypass the basic switch security.

tags | spoof
SHA-256 | b610d3a1f5525d3b5f3fa41e2d3efb3cfcea5af963e3f4aee759732839b7bf90
wardrive-2.3.tar.gz
Posted Jun 4, 2002
Authored by van Hauser, thc | Site thc.org

THC-WarDrive v2.3 is a linux based tool for mapping your city for wavelan networks with a GPS device while you are driving a car or walking through the streets. It is effective and flexible, supporting NMEA GPS devices.

Changes: Rewrote the GPS data gathering function. Fixed lots of bugs!
systems | linux
SHA-256 | 9810f45f7b163d85d8aaf5092726d2e26ba29ee6171d07999e36a2d771651a0f
hydra-1.6.tar.gz
Posted Jun 4, 2002
Authored by thc | Site thc.org

THC-Hydra is a parallel login hacker. With this tool you are able to attack several services at once (FTP, POP3, IMAP, Telnet, HTTP Auth, NNTP, VNC, ICQ, PCNFS, and more). Also included Socks5 and SSL support.

tags | web, cracker, imap
SHA-256 | 5fb2a998138aac2a9286b5f1f4bd416ed6dbd511b5f8992250ee75aaeb99cef4
amap-0.95.tar.gz
Posted Mar 6, 2002
Authored by van Hauser, thc, DJ Revmoon | Site thc.org

Amap is a scanning tool that allows you to identify the applications that are running on (a) specific port(s). It does this by connecting to the port(s) and sending trigger packets. These trigger packets will typically be an application protocol handshake (i.e. SSL). Amap then looks up the response in a list and prints out any match it finds. Adding new response identifications can be done just by adding them to an easy-to-read text file. With amap, you will be able to identify that SSL server running on port 3445 and some oracle listener on port 233!

tags | tool, protocol
SHA-256 | 1c3ecd0a4363f4c64267e66bacdc383383ad7bbb4691f4d438aaece8d92ae73d
Page 7 of 9
Back56789Next

File Archive:

March 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Mar 1st
    16 Files
  • 2
    Mar 2nd
    0 Files
  • 3
    Mar 3rd
    0 Files
  • 4
    Mar 4th
    32 Files
  • 5
    Mar 5th
    28 Files
  • 6
    Mar 6th
    42 Files
  • 7
    Mar 7th
    17 Files
  • 8
    Mar 8th
    13 Files
  • 9
    Mar 9th
    0 Files
  • 10
    Mar 10th
    0 Files
  • 11
    Mar 11th
    15 Files
  • 12
    Mar 12th
    19 Files
  • 13
    Mar 13th
    21 Files
  • 14
    Mar 14th
    38 Files
  • 15
    Mar 15th
    15 Files
  • 16
    Mar 16th
    0 Files
  • 17
    Mar 17th
    0 Files
  • 18
    Mar 18th
    10 Files
  • 19
    Mar 19th
    32 Files
  • 20
    Mar 20th
    46 Files
  • 21
    Mar 21st
    16 Files
  • 22
    Mar 22nd
    13 Files
  • 23
    Mar 23rd
    0 Files
  • 24
    Mar 24th
    0 Files
  • 25
    Mar 25th
    12 Files
  • 26
    Mar 26th
    31 Files
  • 27
    Mar 27th
    19 Files
  • 28
    Mar 28th
    0 Files
  • 29
    Mar 29th
    0 Files
  • 30
    Mar 30th
    0 Files
  • 31
    Mar 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close