what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 51 - 69 of 69 RSS Feed

Files from Mixter

Email addressmixter at newyorkoffice.com
First Active1999-09-23
Last Active2006-10-05
q3smash.c
Posted Dec 2, 1999
Authored by Mixter

Qpopper 3.0b remote exploit for x86 Linux (tested on RedHat/2.0.38). Exploits pop_msg buffer overflow to spawn a remote root shell. Vulnerability exists on all platforms running Qpopper 3.0 through version 3.0b20.

tags | exploit, remote, overflow, shell, x86, root
systems | linux, redhat
SHA-256 | 9476acb99667dd313da9809ad43f391db697c087b2422c7cc4869e455abf12b1
exploit.txt
Posted Nov 29, 1999
Authored by Mixter | Site members.tripod.com

A tutorial on how to write shellcode and exploits, and how buffer overflows work in general. It aims to be detailed and suitable for novice exploit coders with some C understanding.

tags | paper, overflow, shellcode
systems | unix
SHA-256 | a589b984950281228fe3fb2d410cdf7e78ec852c53089f751095fb344aeea882
shutup.c
Posted Nov 23, 1999
Authored by Mixter

Local denial of service against syslog 1.3.

tags | denial of service, local
SHA-256 | d9f8b62e1fbc6cc30a10e8f39ca2ee1f949f9d7ea463a3663cc0475c6be4cdc2
Q-0.9.tgz
Posted Nov 22, 1999
Authored by Mixter | Site members.tripod.com

First public release of Q - a client / server backdoor with strong (256 bit AES) encryption for remote shell access. Also supports encrypted tcp relay/bouncer server that supports normal clients (with a local encryption tunneling daemon). Includes stealth features like activation via raw packets, syslog spoofing, and single-session servers that prevent it from appearing in netstat.

tags | tool, remote, shell, local, spoof, tcp, rootkit
systems | unix
SHA-256 | d7265225af4406ffa7e288ab5319b6ec454cdc37a2b202d271b4a02a5c08f0de
targa3.c
Posted Nov 9, 1999
Authored by Mixter | Site members.tripod.com

targa3 is a DoS exploit that sends random IP packets with parameters known to cause crashes on various machines, and can be used to determine if a systems IP stack is really stable and crash-proof under unexpected conditions.

tags | denial of service
SHA-256 | 6253f5fba61013437021a6884ee572f1df8670c179847720a71bf3779779e140
nsat-1.09.tgz
Posted Nov 2, 1999
Authored by Mixter | Site members.tripod.com

nsat is a bulk security scanner designed for recoverable long-time scans, optimized for speed and stability, that scans and audits about 60 different services and 170 cgis. Version 1.09.

Changes: Bulk scans now give complete scan results, and OS detection works.
tags | tool, cgi, scanner
systems | unix
SHA-256 | d0876dbad5fe3d16911a30598145a1c24c3911bd6854a69914abe48377f3e678
fwmail-1.1.tgz
Posted Oct 26, 1999
Authored by Mixter | Site members.tripod.com

fwmail is a small secure daemon for inetd that forwards incoming smtp traffic to another sendmail server, acting as a gateway, and optionally anonymizing the senders origin. Version 1.1.

systems | unix
SHA-256 | aa50ed680dff4ba963354310ae65f519721901b409409b2ad2f3d944d5b6794b
nsat-1.08.tgz
Posted Oct 26, 1999
Authored by Mixter | Site members.tripod.com

nsat is a bulk security scanner designed for recoverable long-time scans, optimized for speed and stability, that scans and audits about 60 different services and 170 cgis. Version 1.08.

tags | tool, cgi, scanner
systems | unix
SHA-256 | eb55372260ad6fd90f349dab6565c49e8a639a33693e0a0fdcfed17433e4eeeb
crack.txt
Posted Sep 23, 1999
Authored by Mixter

FAQ and Guide to Cracking.

SHA-256 | f96b59615054e2674105c72445e687034b98cca3d5630214722d9f85197f3153
gateway.tgz
Posted Sep 23, 1999
Authored by Mixter

Password protected remote shell daemon that integrates a syn flooder, bouncer/gateway, port scanner, and remote root exploits. Courtesy of Mixter

tags | remote, shell, root
SHA-256 | dc5c81225eb8af686fdafb3208906dd1a0e8283143bb5124545d1b007cf3224f
irixlp.c
Posted Sep 23, 1999
Authored by Mixter

Scans for the default logins on IRIX boxes. Courtesy of Mixter

systems | irix
SHA-256 | 24bb4b2576c66fa3a627292e52438a6d2321f903c3b4f9c6b6d8b7f9aeebb68e
lscan2.c
Posted Sep 23, 1999
Authored by Mixter

Multithreaded high speed scanner that scans for 6 different daemons, and records the version of every daemon for analysis. Courtesy of Mixter

SHA-256 | 079ae01a2da00d9398b7999c8fff4885d92b021fc74a2421ed49ce1ef25c600f
mw06.tgz
Posted Sep 23, 1999
Authored by Mixter

Unix internet worm; for a description see Mixter

tags | worm
systems | unix
SHA-256 | 609bcede019adb5abc05b16b1cf64384830158b88fb3af77f0d16db3fbc013bc
nscan.c
Posted Sep 23, 1999
Authored by Mixter

Performance/speed optimized bind scanner that finds dns servers vulnerable to the iquery exploit scanning from a list of IPS. Courtesy of Mixter

SHA-256 | abce6d0312c99f271671bb9f91432a13b67c3880124fa055ffb2cc2641edeb07
obsidian.tgz
Posted Sep 23, 1999
Authored by Mixter

A unix virus (ELF infector). Courtesy of Mixter

tags | virus
systems | unix
SHA-256 | 1cfbeeb3430678b41dd9255215bef1ee3e155ddf77d15af99abc986d849d2f70
phantom.tgz
Posted Sep 23, 1999
Authored by Mixter

Linux promiscous ethernet sniffer that sends sniffer traffic to a remote logging daemon. this sniffer comes with optional strong (96byte 3way) encryption. Courtesy of Mixter

tags | remote
systems | linux
SHA-256 | f5eb31166302e8ec42560988c71ab267bd3ddafde6e5fcafe3c0afbca1ae0fce
pot.tgz
Posted Sep 23, 1999
Authored by Mixter

Ping observation tool is a highspeed tool to sweep for smurf broadcast amplifiers, it compiles a broadcast amplifier list of the complete IPv4 address range in about 5 days (with enough bandwidth). Courtesy of Mixter

SHA-256 | b611b8c768e543ad2206b1866ac7fbe88a3f3808c88ab2a1e6d42c17cfcbd957
targa2.c
Posted Sep 23, 1999
Authored by Mixter

Remote DoS against 11 different IP stack holes on various OS's, supports attacking a c-class ip range. Courtesy of Mixter

tags | remote
SHA-256 | 01e05ac0dc003e26d6bdb5a7891945f9baf3f326dc0689def72651df0083064a
tfn.tgz
Posted Sep 23, 1999
Authored by Mixter

Distributed flood network client/server that can be installed on a large number of hosts and used to hit a target with high bandwidth simultaneously. communicates over icmp and supports udp, syn, icmp/8, smurf flood and more. Courtesy of Mixter

tags | udp
SHA-256 | 920026602cef824add5790e0ec01ac5d2241801552dbd49fb0516dfa99946b78
Page 3 of 3
Back123Next

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    8 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    11 Files
  • 23
    Apr 23rd
    68 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close