what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 176 - 200 of 218 RSS Feed

Files from thc

First Active1999-08-17
Last Active2024-09-03
parasite-1.1.tar.gz
Posted Jun 4, 2002
Authored by van Hauser, thc | Site thc.org

THC-Parasite v1.1 allows you to sniff on switched networks by using either ARP Spoofing or MAC Flooding. THC-Parasite is intelligent and its algorithms are designed to bypass the basic switch security.

tags | spoof
SHA-256 | b610d3a1f5525d3b5f3fa41e2d3efb3cfcea5af963e3f4aee759732839b7bf90
wardrive-2.3.tar.gz
Posted Jun 4, 2002
Authored by van Hauser, thc | Site thc.org

THC-WarDrive v2.3 is a linux based tool for mapping your city for wavelan networks with a GPS device while you are driving a car or walking through the streets. It is effective and flexible, supporting NMEA GPS devices.

Changes: Rewrote the GPS data gathering function. Fixed lots of bugs!
systems | linux
SHA-256 | 9810f45f7b163d85d8aaf5092726d2e26ba29ee6171d07999e36a2d771651a0f
hydra-1.6.tar.gz
Posted Jun 4, 2002
Authored by thc | Site thc.org

THC-Hydra is a parallel login hacker. With this tool you are able to attack several services at once (FTP, POP3, IMAP, Telnet, HTTP Auth, NNTP, VNC, ICQ, PCNFS, and more). Also included Socks5 and SSL support.

tags | web, cracker, imap
SHA-256 | 5fb2a998138aac2a9286b5f1f4bd416ed6dbd511b5f8992250ee75aaeb99cef4
amap-0.95.tar.gz
Posted Mar 6, 2002
Authored by van Hauser, thc, DJ Revmoon | Site thc.org

Amap is a scanning tool that allows you to identify the applications that are running on (a) specific port(s). It does this by connecting to the port(s) and sending trigger packets. These trigger packets will typically be an application protocol handshake (i.e. SSL). Amap then looks up the response in a list and prints out any match it finds. Adding new response identifications can be done just by adding them to an easy-to-read text file. With amap, you will be able to identify that SSL server running on port 3445 and some oracle listener on port 233!

tags | tool, protocol
SHA-256 | 1c3ecd0a4363f4c64267e66bacdc383383ad7bbb4691f4d438aaece8d92ae73d
wardrive-2.1.tar.gz
Posted Oct 12, 2001
Authored by van Hauser, thc | Site thc.org

THC-WarDrive v2.1 is a linux based tool for mapping your city for wavelan networks with a GPS device while you are driving a car or walking through the streets. It is effective and flexible, supporting NMEA GPS devices.

Changes: Added -R option to allow wavelan resets after 3 seconds, added -W option to print SSID and access point MAC, added start_wardrive, reset_wvlan.sh, and wardrive.conf, get_coords_from_stat.sh, and clean_stat.sh scripts, and fixed bugs.
tags | tool, wireless
systems | linux
SHA-256 | 8e82cd28f9c5f748d3b29c834dec5b9a6d0ea90c298d41b22c7ce6582952c966
thcrut-0.1.tar.gz
Posted Sep 27, 2001
Authored by thc | Site thc.org

THC-RUT (aRe yoU There) is a local network discovery tool developed to brute force its way into wvlan access points. It offers arp-request on ip-ranges and identifies the vendor of the NIC, spoofed DHCP, BOOTP and RARP requests, icmp-address mask request and router discovery techniques. This tool should be 'your first knife' on a foreign network.

tags | tool, local, spoof, wireless
SHA-256 | 57ed9bd93003205ae3738dab5fe7d6c2d887404f5fcbc0a7ef08c05f22715a55
hydra-1.3.tar.gz
Posted Sep 27, 2001
Authored by thc | Site thc.org

Hydra v1.4 is the world's first parallel login hacker. With this tool you are able to attack several services at once (FTP, POP3, IMAP, Telnet, HTTP Auth, etc).

tags | web, cracker, imap
SHA-256 | 1e7c26a3b9c5840830cbfe4b20c5f8dc16d52e1db7dc42711e493c8035da5d70
wardrive-2.0.tar.gz
Posted Sep 27, 2001
Authored by van Hauser, thc | Site thc.org

THC-WarDrive v2.0 is a linux based tool for mapping your city for wavelan networks with a GPS device while you are driving a car or walking through the streets. It is effective and flexible, supporting NMEA GPS devices.

tags | tool, wireless
systems | linux
SHA-256 | 867fdb212fef9c2ee86ba52fd23b7ca63a5d5187f61ddb0c34345adb112a82cf
probe-4.1.tar.gz
Posted Nov 15, 2000
Authored by thc | Site thc.org

Probe 4.1 is a host scanner compilation for Linux, featuring nmap, snmpscan, netbios auditing tool and super-cool vh shell script.

tags | shell
systems | linux
SHA-256 | 51f22f1c5671755c21d60b142762034033196be1d958c0d72af178d101a42b15
hydra-0.4.tar.gz
Posted Nov 15, 2000
Authored by thc | Site thc.org

THC-Hydra is the world's first parallel login hacker. With this tool you are able to attack several services at once.

tags | cracker
SHA-256 | d82493f90f1d1ffec70a5b561e9a21ada59a172ad0beb2e619f29d931c7434fb
fw-backd.htm
Posted Jan 27, 2000
Authored by van Hauser, thc | Site thc.org

Placing Backdoors Through Firewalls version 1.5 - Hackers often want to retain access to systems they have penetrated even in the face of obstacles such as new firewalls and patched vulnerabilities. To accomplish this the attackers must install a backdoor which does its job is not easily detectable. The kind of backdoor needed depends on the firewall architecture used. As a gimmick and proof-of-concept, a nice backdoor for any kind of intrusion is included.

tags | vulnerability
SHA-256 | 8ef7f3e0278b056d10da9fd260d41e5f483cc869ba0c8728679ae31bf89e3ad2
thc-hb09.zip
Posted Dec 23, 1999
Authored by thc, Doc Holiday, Ganymed

thc-hb09.zip is a Windows-based tool - A security-scanner included in a web browser for scanning webservers/NT-Servers.

tags | web
systems | windows
SHA-256 | 8ea2383c8fb90f66a26b7dc0a51aa16adf136b6dec9e85b36db0fa4bdf2c1b77
slkm-1.0.html
Posted Dec 23, 1999
Authored by thc, Plasmoid | Site thc.org

Article from THC explaining the techniques behind the ksolaris kernel module, and helps you to develop your own solaris kernel modules.

tags | kernel
systems | solaris
SHA-256 | 523a74adb51f1f49d8003ba66d604653ea04038a4bbaff3610402554557bde7d
slkm-1.0.tar.gz
Posted Dec 22, 1999
Authored by thc, Plasmoid | Site thc.org

slkm-1.0.tar.gz is the first public solaris loadable kernel module backdoor from THC. Features File hiding, File content and directory hiding, Switch to toggle file content and directory hiding, Process hiding (structured proc), Promiscous flag hiding, Converting magic uid to root uid, and Execution redirecting.

tags | kernel, root
systems | solaris
SHA-256 | 17ee6bad714538c7e2f84e0c24b4520aec71d93c1ad872d769c659a16755d851
anonymous-unix-0.9.tar.gz
Posted Oct 7, 1999
Authored by van Hauser, thc | Site thc.org

"Anonymizing UNIX Tools v0.9" - Tools for securing your UNIX systems(s), keeping your data and actions as private as possible, as described in Anonymizing UNIX Systems v0.9 Whitepaper.

systems | unix
SHA-256 | 9a9cb9fff4b40791ac3df85ebeab0f860cc0aa06678868412878fda29e08ace9
rwwwshell-1.6.perl
Posted Oct 7, 1999
Authored by van Hauser, thc | Site thc.org

Reverse-WWW-Tunnel-Backdoor version 1.6 - This backdoor should work through any firewall which has got the security policy to allow users to surf the WWW. Verified to work on Linux, Solaris, AIX and OpenBSD.

Changes: Included www-proxy authentication.
systems | linux, solaris, openbsd, aix
SHA-256 | 2dc02b8a40272350f1c66e2ee87bc8661f905a84b84f532a3a2dc4cd1167027c
thc-ts20.zip
Posted Aug 17, 1999
Authored by van Hauser, thc

THC-SCAN v2.0 - Latest release of an excellent phone scanner. See the video on how this scanner works here. Features in this release: ODBC support so you can import your results intro SQL or Excel Spreadsheets, source code, runs on any DOS emulating operating system, supports the usual Carrier and PBX Scanning mode plus a special manual mode for trying out PBXs and VMBs, many primary identifications possible and secondary id's for countries and ccitts, can identify VMBs and Unused numbers automatically if configured correctly, scan numbers specified in a textfile, autodetecting 8N1, 7E1 and 7O1 carrier modes, many more options and features.

SHA-256 | 509d24c79592cd2eab9e6f2cf83a5f3726b53953551346e60ee1ba80e8b37af6
thc-uht1.tgz
Posted Aug 17, 1999
Authored by thc

THC-UnixHackingTools #1 - A compilation of needfull unix hacking tools including backdoors, tunnels, cleaners, etc...

systems | unix
SHA-256 | 8c937441f8b9ce4ebf17b891bd877d1e77c2c6fd34835db2d1c568a655c57ab4
thf-hf10.zip
Posted Aug 17, 1999
Authored by thc

THF-Hopflud v1.0 - Hopflud is a TCL script for major Eggdrop Botnets. If running a Botnet with 30 Bots this scripts allows you to excess flood every channel on Irc.

SHA-256 | 1c860dd1c364c79a4c3ba4fbf4e1c6e08dc4cf7f6aabadd9005423448870a004
thf-ovs1.zip
Posted Aug 17, 1999
Authored by thc

THF-OverShaker v1.0 - OverShaker is an intellegent takeover script for IrcII and BitchX clients. It offers save massdeops, friend protection like re-opping, kick protection, badop re-deopping and much more.

SHA-256 | 3dd4ab659bcbe410cc72c109877402a62fc81c44e894760dd864854343736506
thf-wi10.zip
Posted Aug 17, 1999
Authored by thc

THF-WebIrc v1.0 - Tcl script and C programm generating web page from public chat on an Irc chanel. Included html-security and URL catcher, nothing scaring but cool.

tags | web
SHA-256 | b7060a7ebcf1d97eba5087ca11f2b7829effe423db06b87e76c41c67e6db72a5
THC Secure Deletion v2.0
Posted Aug 17, 1999
Authored by thc, VanHauser

THC-Secure Deletion v2.0 - Excellent tool to ensure that the files you have deleted are definitely wiped out.

SHA-256 | 914bb77920e9155e174a08725d39b6e703324eb40440612ba1e262c8c9466b2a
THC Secure Deletion v2.1
Posted Aug 17, 1999
Authored by van Hauser, thc

THC-Secure Deletion v2.1 for UNIX is the latest release of van Hauser's suite of secure deletion and overwriting utilities. Included are 'srm' - secure deletion of files

Changes: (all) added the -f(ast) option; (smem) added a new tool: smem, which wipes free memory; (srm/sfill/smem) added rlimit resets; (sfill/sswap) quadrupled the buffer size; (srm/sfill/sswap) fix for openbsd which doesn't know O_SYNC open(2); (srm) added the -d(ot) option. Ignores "." and ".." on the commandline; (srm) fixed directory and file link races.
systems | unix
SHA-256 | 5c1510de4af754b93772e3aeec828abb064f748da803441d952fe3bcd30223e9
secure_deletion14.tar.gz
Posted Aug 17, 1999
Authored by thc

THC-Secure Deletion 1.4 for UNIX.

systems | unix
SHA-256 | db24a4ad5b005092deeb5388d4c41127221a7437a38a9347f91d8a8656460f76
thc-at_t.zip
Posted Aug 17, 1999
Authored by thc

THC-At&t Booklet - The official At&t Security Booklet "Don

SHA-256 | 4457cd16c75d5b59b28a869a677c4a1fa45ce7a392f90399f8ce482401c50744
Page 8 of 9
Back56789Next

File Archive:

September 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Sep 1st
    261 Files
  • 2
    Sep 2nd
    17 Files
  • 3
    Sep 3rd
    38 Files
  • 4
    Sep 4th
    0 Files
  • 5
    Sep 5th
    0 Files
  • 6
    Sep 6th
    0 Files
  • 7
    Sep 7th
    0 Files
  • 8
    Sep 8th
    0 Files
  • 9
    Sep 9th
    0 Files
  • 10
    Sep 10th
    0 Files
  • 11
    Sep 11th
    0 Files
  • 12
    Sep 12th
    0 Files
  • 13
    Sep 13th
    0 Files
  • 14
    Sep 14th
    0 Files
  • 15
    Sep 15th
    0 Files
  • 16
    Sep 16th
    0 Files
  • 17
    Sep 17th
    0 Files
  • 18
    Sep 18th
    0 Files
  • 19
    Sep 19th
    0 Files
  • 20
    Sep 20th
    0 Files
  • 21
    Sep 21st
    0 Files
  • 22
    Sep 22nd
    0 Files
  • 23
    Sep 23rd
    0 Files
  • 24
    Sep 24th
    0 Files
  • 25
    Sep 25th
    0 Files
  • 26
    Sep 26th
    0 Files
  • 27
    Sep 27th
    0 Files
  • 28
    Sep 28th
    0 Files
  • 29
    Sep 29th
    0 Files
  • 30
    Sep 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close