exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 25 of 1,840 RSS Feed

Files Date: 1999-09-23

vetescan09-22-1999.tar.gz
Posted Sep 23, 1999

UNIX/Win remote vulnerability exploit scanner with Fixes for Vulnerabilities. based on ben-z fts-rvscan scanner. Includes: WINSCAN (scans win/nt systems for latest trojans/remote exploits), VETE (single vuln/host scanner) VETES (single vuln/host w/o host checking), VETEMASS (mass vuln/host scanner), CMSD mass/get (a b c scanner and getter), AMD/get (mass a b c scanner and getter), MOUNTD/get ( mass a b c scanners/getter), many exploits, Fixes, and utils included. Courtesy of VetesGirl

tags | tool, remote, scanner, trojan, vulnerability
systems | unix
SHA-256 | 2306f8780f31748ead0ffe10e582608ecf9b2166d79b2055271422ea30f66f9d
crack.txt
Posted Sep 23, 1999
Authored by Mixter

FAQ and Guide to Cracking.

SHA-256 | f96b59615054e2674105c72445e687034b98cca3d5630214722d9f85197f3153
gateway.tgz
Posted Sep 23, 1999
Authored by Mixter

Password protected remote shell daemon that integrates a syn flooder, bouncer/gateway, port scanner, and remote root exploits. Courtesy of Mixter

tags | remote, shell, root
SHA-256 | dc5c81225eb8af686fdafb3208906dd1a0e8283143bb5124545d1b007cf3224f
irixlp.c
Posted Sep 23, 1999
Authored by Mixter

Scans for the default logins on IRIX boxes. Courtesy of Mixter

systems | irix
SHA-256 | 24bb4b2576c66fa3a627292e52438a6d2321f903c3b4f9c6b6d8b7f9aeebb68e
lscan2.c
Posted Sep 23, 1999
Authored by Mixter

Multithreaded high speed scanner that scans for 6 different daemons, and records the version of every daemon for analysis. Courtesy of Mixter

SHA-256 | 079ae01a2da00d9398b7999c8fff4885d92b021fc74a2421ed49ce1ef25c600f
mw06.tgz
Posted Sep 23, 1999
Authored by Mixter

Unix internet worm; for a description see Mixter

tags | worm
systems | unix
SHA-256 | 609bcede019adb5abc05b16b1cf64384830158b88fb3af77f0d16db3fbc013bc
nscan.c
Posted Sep 23, 1999
Authored by Mixter

Performance/speed optimized bind scanner that finds dns servers vulnerable to the iquery exploit scanning from a list of IPS. Courtesy of Mixter

SHA-256 | abce6d0312c99f271671bb9f91432a13b67c3880124fa055ffb2cc2641edeb07
obsidian.tgz
Posted Sep 23, 1999
Authored by Mixter

A unix virus (ELF infector). Courtesy of Mixter

tags | virus
systems | unix
SHA-256 | 1cfbeeb3430678b41dd9255215bef1ee3e155ddf77d15af99abc986d849d2f70
phantom.tgz
Posted Sep 23, 1999
Authored by Mixter

Linux promiscous ethernet sniffer that sends sniffer traffic to a remote logging daemon. this sniffer comes with optional strong (96byte 3way) encryption. Courtesy of Mixter

tags | remote
systems | linux
SHA-256 | f5eb31166302e8ec42560988c71ab267bd3ddafde6e5fcafe3c0afbca1ae0fce
pot.tgz
Posted Sep 23, 1999
Authored by Mixter

Ping observation tool is a highspeed tool to sweep for smurf broadcast amplifiers, it compiles a broadcast amplifier list of the complete IPv4 address range in about 5 days (with enough bandwidth). Courtesy of Mixter

SHA-256 | b611b8c768e543ad2206b1866ac7fbe88a3f3808c88ab2a1e6d42c17cfcbd957
targa2.c
Posted Sep 23, 1999
Authored by Mixter

Remote DoS against 11 different IP stack holes on various OS's, supports attacking a c-class ip range. Courtesy of Mixter

tags | remote
SHA-256 | 01e05ac0dc003e26d6bdb5a7891945f9baf3f326dc0689def72651df0083064a
tfn.tgz
Posted Sep 23, 1999
Authored by Mixter

Distributed flood network client/server that can be installed on a large number of hosts and used to hit a target with high bandwidth simultaneously. communicates over icmp and supports udp, syn, icmp/8, smurf flood and more. Courtesy of Mixter

tags | udp
SHA-256 | 920026602cef824add5790e0ec01ac5d2241801552dbd49fb0516dfa99946b78
pipefakeps.c
Posted Sep 23, 1999
Authored by s0ftpj

Modified version of Todd Vierling's datapipe, where you can specify a name that will be displayed instead of the process' name. Linux - c source. Courtesy of soft project digital security for y2k

systems | linux
SHA-256 | d23b53bdf0ea1b506dff4e2c80c97ab54f38030dedca8bb1aad3509be2f43820
cgiscan.c
Posted Sep 23, 1999
Authored by s0ftpj

Phf - test-cgi - htmlscript - view-source - wrap - campas - pfdisplay - webdist - aglimpse - php - nph-test-cgi scanner. Linux - c source. Courtesy of soft project digital security for y2k

tags | cgi, php
systems | linux
SHA-256 | dfcf5bca361e966d45696564142eb1ef582869eb7125b7e08b2a334e90c89eec
pippa_v1.txt
Posted Sep 23, 1999
Authored by s0ftpj

Network datapipe. Linux - perl source. Courtesy of soft project digital security for y2k

tags | perl
systems | linux
SHA-256 | 9f34e070f8fde69e2243a38d517d94a0b2bc5c4e428f5e851096d9eca76a9cf1
crypt7.zip
Posted Sep 23, 1999
Authored by s0ftpj

Cryptographic utility using private key (4096 bytes), random salting. DOS - binary. Courtesy of soft project digital security for y2k

SHA-256 | 45661fb44f86e0a6eb8f4540a72487cc87027263d194c393469e0131568a989a
tcpshell.c
Posted Sep 23, 1999
Authored by s0ftpj

Simple socket shell. Linux - c source. Courtesy of soft project digital security for y2k

tags | shell
systems | linux
SHA-256 | 74808fb4a85ba8f28e76373d228771acebdce18a467f7358fdf7453271429fa5
hideme.c
Posted Sep 23, 1999
Authored by s0ftpj

Log editor that cleans Utmp, Wtmp, LastLog, Messages, XferLog, Secure and MailLog. Linux - c source Courtesy of soft project digital security for y2k

systems | linux
SHA-256 | 53330974c17923ab0e9ffe80cb6194db9f47475505178ebb727a990cff50e197
shapechange.c
Posted Sep 23, 1999
Authored by s0ftpj

Utmp editor that permits to change id, tty and host of a user logged in the system. BFi3 8). Linux - c source. Courtesy of soft project digital security for y2k

systems | linux
SHA-256 | 25b88edefcc2babc93951bbaaede6fa44e7e1739c20d5085efb86d3e54354192
pippa_v2.txt
Posted Sep 23, 1999
Authored by s0ftpj

Network datapipe with interactive mode, support for proxy server socks (v4 or v5), logging facility and option to concatenate more pipes. Documentation: 'PiPPA v2', BFi4 (December 98). Linux/WinNT - perl source. Courtesy of soft project digital security for y2k

tags | perl
systems | linux, windows
SHA-256 | 3cf8f7d9b648939a354658af5b6ebd82e9e4ccf594c21661d07872318d10198a
carogna.c
Posted Sep 23, 1999
Authored by s0ftpj

Loadable Kernel Module to hide in a system. It substitutes in 4kbytes a full rootkit. Only for 2.0.x kernels. Documentation: 'PR0GETT0 CAR0NTE - PARTE I' , BFi3 (Luglio 98); 'PR0GETT0 CAR0NTE - PARTE II' , BFi4 (December 98). Linux - LKM c source. Courtesy of soft project digital security for y2k

tags | kernel
systems | linux
SHA-256 | 8d359b0bc902e70a6892c3f7627024d37781658ad8a1645786fa0e45e1dc4dfc
shareall.zip
Posted Sep 23, 1999
Authored by s0ftpj

Trojan that enables file and printer sharing, and then enables sharing on all drives with full access. Documentation: 'WiND0WS E PASSW0RD' , BFi4 (December 98). Win9x - binary. Courtesy of soft project digital security for y2k

tags | trojan
systems | windows
SHA-256 | 7a6bc9282ef21fc92fb45bda834017b89f6b8c67b37c27d8806be058ffaae86c
007shell.tgz
Posted Sep 23, 1999
Authored by s0ftpj

Shell hidden into ICMP tunneling that uses 0x00 ECHO REPLY messages to carry data. Includes: 007Shell, ICMP Tunneling Library v1. Courtesy of soft project digital security for y2k

tags | shell
SHA-256 | f083e35df72f5406144b7351e8d4774b12d4e651f613cb4f5bc6174cb5ccb427
imap4.tgz
Posted Sep 23, 1999
Authored by s0ftpj

Kit including two tools that scan for exploitable versions of IMAP4; the scan can be accomplished by specifying a single host or using a file containing all the ip's. Includes: Imap4 scanner, Imap4 checker. Linux - c source. Courtesy of soft project digital security for y2k

systems | linux
SHA-256 | 7564e2d776360b4679f088a324c2b88136600a6078f5a0b16e6ea93c39c3f97b
ttdbsscan.c
Posted Sep 23, 1999
Authored by s0ftpj

rpc.ttdbserver scanner (adapted from statd scanner by BiT), it uses a file containing the list of ip's to scan. BFiSN98 (December 98). Linux - c source. Courtesy of soft project digital security for y2k

systems | linux
SHA-256 | 05145d5b163d2e69ed1cfd957250b9a0f75515bc8b529e83c010a091cee75de9
Page 1 of 74
Back12345Next

File Archive:

October 2022

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Oct 1st
    10 Files
  • 2
    Oct 2nd
    0 Files
  • 3
    Oct 3rd
    0 Files
  • 4
    Oct 4th
    0 Files
  • 5
    Oct 5th
    0 Files
  • 6
    Oct 6th
    0 Files
  • 7
    Oct 7th
    0 Files
  • 8
    Oct 8th
    0 Files
  • 9
    Oct 9th
    0 Files
  • 10
    Oct 10th
    0 Files
  • 11
    Oct 11th
    0 Files
  • 12
    Oct 12th
    0 Files
  • 13
    Oct 13th
    0 Files
  • 14
    Oct 14th
    0 Files
  • 15
    Oct 15th
    0 Files
  • 16
    Oct 16th
    0 Files
  • 17
    Oct 17th
    0 Files
  • 18
    Oct 18th
    0 Files
  • 19
    Oct 19th
    0 Files
  • 20
    Oct 20th
    0 Files
  • 21
    Oct 21st
    0 Files
  • 22
    Oct 22nd
    0 Files
  • 23
    Oct 23rd
    0 Files
  • 24
    Oct 24th
    0 Files
  • 25
    Oct 25th
    0 Files
  • 26
    Oct 26th
    0 Files
  • 27
    Oct 27th
    0 Files
  • 28
    Oct 28th
    0 Files
  • 29
    Oct 29th
    0 Files
  • 30
    Oct 30th
    0 Files
  • 31
    Oct 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Hosting By
Rokasec
close