exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 20 of 20 RSS Feed

Files Date: 1999-09-24

superscan.zip
Posted Sep 24, 1999
Authored by Robin Keir

Super Scan 2.03. Finally, a windows based port scanner which deserves its name, multi-threaded, fast as lightning with NO Windows TCP/Stack memory problems.

tags | tcp
systems | windows
SHA-256 | 2d2808f6200ba66cc80fcb5626f8013ce0244986f42f3fa86fd52a516ddced35
wuftp25.tgz
Posted Sep 24, 1999

Would you believe another buffer overflow in wuftpd? Exploit for wu-2.5.0(1).

tags | exploit, overflow
SHA-256 | 6748c4c30e2293620d90597dffc8323dd09b5eb73cc4970bf1d6037744c4dde3
ftpd-aix
Posted Sep 24, 1999
Authored by synnergy, Dvorak | Site synnergy.net

Remote buffer overflow exploit for ftpd from AIX 4.3.2 running on an RS6000. (power).

tags | remote, overflow
systems | aix
SHA-256 | f0c984201d8083d24c2110284f243e70cb1da334d0f2090e3e7fbc36efda7ad6
lokkit-demo.tar.gz
Posted Sep 24, 1999

Demo of lokkit.

tags | tool, firewall
systems | unix
SHA-256 | 60912690f810c637f1ba3f03dd980c5675984a9427fad5e9aed491e9da3c7e66
lokkit-0.2.tar.gz
Posted Sep 24, 1999

Lokkit v0.2 - Lokkit is an attempt to provide firewalling for the average Linux end user. Instead of having to configure firewall rules the Lokkit program asks a small number of simple questions and writes a firewall rule set for you. Lokkit is not designed to configure arbitary firewalls. To make it simple to understand it is solely designed to handle typical dialup user and cable modem setups. It is not the answer to a complex firewall configuration, and it is not the equal of an expert firewall designer.

tags | tool, firewall
systems | linux, unix
SHA-256 | 3128cc0c8ba5d42be0bd3564ad564dacee06ecabd508f68e11327e56a1d6d4d8
lokkit-1.0pre1.tar.gz
Posted Sep 24, 1999

Lokkit is an attempt to provide firewalling for the average Linux end user. Instead of having to configure firewall rules the Lokkit program asks a small number of simple questions and writes a firewall rule set for you. Lokkit is not designed to configure arbitary firewalls. To make it simple to understand it is solely designed to handle typical dialup user and cable modem setups. It is not the answer to a complex firewall configuration, and it is not the equal of an expert firewall designer (Official Site).

tags | tool, firewall
systems | linux, unix
SHA-256 | da8a09b51310de77f47c78252c1c8e3c1dc97e3ded32306b68ac45d53fa7e78c
ngrep-1.34.tar.gz
Posted Sep 24, 1999
Authored by nocarrier

ngrep v1.34 is a program that mimics as much functionality in GNU grep as possible, applied at the network layer. ngrep stands for network grep, and is a pcap-aware tool that will allow you to specify extended regular expressions to match against the data payloads of packets, and currently recognizes TCP and UDP, and works on ethernet, ppp and slip interfaces. Excellent tool. Check it out!

tags | tool, udp, tcp
systems | unix
SHA-256 | 939652cf9f6d668430106174d30bf55b2ebcfca11a57e5555e63e483b590d841
advphreak.txt
Posted Sep 24, 1999

Squiler's tutorial on phreaking.

tags | paper
SHA-256 | 6bf08b081bdd59c097b250f719066f6e4c1afbf1f98515bc196d65bc58649a00
bug.txt
Posted Sep 24, 1999
Authored by hybrid, faith | Site hybrid.dtmf.org

Various means, methods, and implications of bugging the public switched phone network.

tags | magazine
SHA-256 | 74c9f070e2f39ba5563461ce57744725d8c61783cb5f59b0c0cdc0bbae236275
phreaking.txt
Posted Sep 24, 1999

Phreaking Tutorial (version 1.0) - this should get all those newbie phreakers out there started.

tags | paper
SHA-256 | c75a9ba042b347b7db9b1b90a81eb0445055f3bc94ad312e30b0da1099ebacc0
squiler2.txt
Posted Sep 24, 1999

Part II of Squiler's tutorial.

tags | paper
SHA-256 | 7b3e70949095ecdec4ee5486faf03db9eb275c4466ac2667165956096ad5e39a
adblock.txt
Posted Sep 24, 1999

Ad Blocking Tutorial (version 1.7) - are you tired of seeing stupid commercials and popups popping on your screen and chewing up your bandwidth? Then read this!

tags | paper
SHA-256 | d37aff61fad79e851756fa572f2612a4179cf9206f06d62d60d763d3fdc3ead4
anonymity.txt
Posted Sep 24, 1999

Anonymity Tutorial (version 1.2) - tired of people getting your IP over ICQ or IRC? Tired of website owners knowing everything about you? Tired of people tracing you by your Email address? Read this one and learn how to anonymize yourself!

tags | paper
SHA-256 | 084cde839bbfa6fbd8322567bb20b4011df934860d5d6aea088787c580c56d1d
info.txt
Posted Sep 24, 1999

Info Gathering Tutorial (version 1.3). Techniques that can be used to find information about people.

tags | paper
SHA-256 | 546743e1ca9d79e5ac6a5bcc5444dd1672874a8a33a7139545813d1b5605c568
proxy.txt
Posted Sep 24, 1999

Proxy/WinGate/SOCKS Tutorial (version 1.0) - don't know what a Proxy is? Don't know what a WinGate is? Don't know what a SOCKS firewall is? Want to learn how to increase your anonymity using them? Then read this one.

tags | paper
SHA-256 | b0efb5e99953ae9c9d7abbb4e4ab6e62fe3879ba52e04281e9d5786ff44327c4
registry.txt
Posted Sep 24, 1999

Windows Registry Tutorial (version 1.0) - learn more about the Windows registry. How does it work, what does it do and what happened to the old .ini files?

tags | paper, registry
systems | windows
SHA-256 | 2e0f0a87b3e8bcfc106423cd91b0e20512ce85468259b01d71a12639dd4a1156
irc.zip
Posted Sep 24, 1999

IRC Warfare Tutorial (version 1.0) - ever wanted to know how those lamers keep taking over your channel and/or kicking you off.

SHA-256 | 394b76c7518250a09463db6e565d7040c66cc26d3fefc0260040f718a3b6c226
ex_uum.c
Posted Sep 24, 1999
Authored by Unyun | Site shadowpenguin.backsection.net

I found the security vulnerability in uum Japanese Kana-Kanji FEP. This program is installed on many Japanese UNIX with default. /usr/bin/uum is a suid program, it overflows if the long argment is specified with -D option. I coded an exploit for the Linux, the local user can obtain a root privilege. I also confirmed this overflow on the following OSs. Solaris 2.6,2.7, IRIX 5.3,6.2,6.3,6.4,6.5.

tags | exploit, overflow, local, root
systems | linux, unix, solaris, irix
SHA-256 | 75d10efd76a82f9cc72dc1429601602647de0c1bcc53dae1aed671cf4c40f5ed
cfscan.zip
Posted Sep 24, 1999
Authored by wiltered_fire

A program to scan for Cold Fusion vulnerabilities. Simply feed it a list of domains and it will let you know if any are vulnerable.

tags | web, vulnerability
SHA-256 | 13c76d2e2b6d763f841a14abdcb1978f46b2397943ecb7ba2327bc96bb94d18b
ExploitExpress.zip
Posted Sep 24, 1999
Authored by wiltered_fire

ExploitExpress is an engine that will parse scripts written in its own scripting 'language' and submit info to CGI scripts. Exploiting CGI scripts has never been easier.

tags | web, cgi
SHA-256 | 35507765c8664ac313206fca3e23cead01e5af5ec3a4f2d38765ad95346748b9
Page 1 of 1
Back1Next

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    0 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    0 Files
  • 23
    Apr 23rd
    0 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close