UNIX/Win remote vulnerability exploit scanner with Fixes for Vulnerabilities. based on ben-z fts-rvscan scanner. Includes: WINSCAN (scans win/nt systems for latest trojans/remote exploits), VETE (single vuln/host scanner) VETES (single vuln/host w/o host checking), VETEMASS (mass vuln/host scanner), CMSD mass/get (a b c scanner and getter), AMD/get (mass a b c scanner and getter), MOUNTD/get ( mass a b c scanners/getter), many exploits, Fixes, and utils included. Courtesy of VetesGirl
e38728afd702dc9e75671a0904007209
FAQ and Guide to Cracking.
5cddbfc9b0d850f0e05115a8974c29f1
Password protected remote shell daemon that integrates a syn flooder, bouncer/gateway, port scanner, and remote root exploits. Courtesy of Mixter
acc988f4827b44f90a720f896c2eb244
Scans for the default logins on IRIX boxes. Courtesy of Mixter
6f7a1194760d964576634c4670e12676
Multithreaded high speed scanner that scans for 6 different daemons, and records the version of every daemon for analysis. Courtesy of Mixter
bdfb06a9f4ab1da6c89476fb9ee726e6
Unix internet worm; for a description see Mixter
736e2fe2d8c80fa9ca5d234f93dc5199
Performance/speed optimized bind scanner that finds dns servers vulnerable to the iquery exploit scanning from a list of IPS. Courtesy of Mixter
7e419c99e834a599ef0e660c96c1df8b
A unix virus (ELF infector). Courtesy of Mixter
fe05c556ed0eba60e85845882c1d88a7
Linux promiscous ethernet sniffer that sends sniffer traffic to a remote logging daemon. this sniffer comes with optional strong (96byte 3way) encryption. Courtesy of Mixter
a6d5701ffae09b789a0b79652af11d01
Ping observation tool is a highspeed tool to sweep for smurf broadcast amplifiers, it compiles a broadcast amplifier list of the complete IPv4 address range in about 5 days (with enough bandwidth). Courtesy of Mixter
6a524da038def8dfade4c34ff04749af
Remote DoS against 11 different IP stack holes on various OS's, supports attacking a c-class ip range. Courtesy of Mixter
2d1149cfee1e83a2c94d5adee766ab8c
Distributed flood network client/server that can be installed on a large number of hosts and used to hit a target with high bandwidth simultaneously. communicates over icmp and supports udp, syn, icmp/8, smurf flood and more. Courtesy of Mixter
4286277c823ee297b84142ebb50be118
Modified version of Todd Vierling's datapipe, where you can specify a name that will be displayed instead of the process' name. Linux - c source. Courtesy of soft project digital security for y2k
cdaa35efb206c77fa97902e982a1f5a2
Phf - test-cgi - htmlscript - view-source - wrap - campas - pfdisplay - webdist - aglimpse - php - nph-test-cgi scanner. Linux - c source. Courtesy of soft project digital security for y2k
b20b4bb2dde5c3f3da4ac9a8e821e782
Network datapipe. Linux - perl source. Courtesy of soft project digital security for y2k
3b5e520087adc9ed8de26d6f642bc1e7
Cryptographic utility using private key (4096 bytes), random salting. DOS - binary. Courtesy of soft project digital security for y2k
a0bd88d3847df6716da8bdc023e14306
Simple socket shell. Linux - c source. Courtesy of soft project digital security for y2k
08ffc15f750a67a31787a6d3ac1d782b
Log editor that cleans Utmp, Wtmp, LastLog, Messages, XferLog, Secure and MailLog. Linux - c source Courtesy of soft project digital security for y2k
048179d154135ce3607919f2b7aa9ce9
Utmp editor that permits to change id, tty and host of a user logged in the system. BFi3 8). Linux - c source. Courtesy of soft project digital security for y2k
b69bd13fe5c69a15d52d31d35608a368
Network datapipe with interactive mode, support for proxy server socks (v4 or v5), logging facility and option to concatenate more pipes. Documentation: 'PiPPA v2', BFi4 (December 98). Linux/WinNT - perl source. Courtesy of soft project digital security for y2k
7b32f257dff84a1fed0e3f3ba03d07a1
Loadable Kernel Module to hide in a system. It substitutes in 4kbytes a full rootkit. Only for 2.0.x kernels. Documentation: 'PR0GETT0 CAR0NTE - PARTE I' , BFi3 (Luglio 98); 'PR0GETT0 CAR0NTE - PARTE II' , BFi4 (December 98). Linux - LKM c source. Courtesy of soft project digital security for y2k
68ad39a66f1e0c78606c9fab4ea4fdc9
Trojan that enables file and printer sharing, and then enables sharing on all drives with full access. Documentation: 'WiND0WS E PASSW0RD' , BFi4 (December 98). Win9x - binary. Courtesy of soft project digital security for y2k
b86a9a61b74b83b7ff54b008338a8d33
Shell hidden into ICMP tunneling that uses 0x00 ECHO REPLY messages to carry data. Includes: 007Shell, ICMP Tunneling Library v1. Courtesy of soft project digital security for y2k
608b38de0eb56cb3747af992dde8b2c0
Kit including two tools that scan for exploitable versions of IMAP4; the scan can be accomplished by specifying a single host or using a file containing all the ip's. Includes: Imap4 scanner, Imap4 checker. Linux - c source. Courtesy of soft project digital security for y2k
0679ce9dabf065060c6da7b7168afa6b
rpc.ttdbserver scanner (adapted from statd scanner by BiT), it uses a file containing the list of ip's to scan. BFiSN98 (December 98). Linux - c source. Courtesy of soft project digital security for y2k
d20f1e355c0e5bf39de818f823390ee2