Twenty Year Anniversary
Showing 1 - 14 of 14 RSS Feed

Files Date: 2000-12-13
Posted Dec 13, 2000
Authored by JD Glaser | Site

NTOMax v2.0 - A scriptable, server stress testing tool.This tool takes a text file as input and runs a server through a series of tests based on the input. The purpose of this tool is to find buffer overflows and DOS points in a server.

tags | overflow
MD5 | 6928a8bfb0d42e926b563f6dfa88740f
Posted Dec 13, 2000
Authored by Robin Keir | Site

Trout v2.0 is a visual (i.e. GUI as opposed to command-line) traceroute and Whois program. Pinging can be set at a controllable rate as can the frequency of repeatedly scanning the selected host. The built-in simple Whois lookup can be used to identify hosts discovered along the route to the destination computer. Parallel pinging and hostname lookup techniques make this traceroute program perhaps the fastest currently available.

MD5 | 86bea5f3b024ade783a1790d95c2741d
Posted Dec 13, 2000
Authored by Robin Keir | Site

SuperScan v3.0 - SuperScan is a powerful connect-based TCP port scanner, pinger and hostname resolver. Multithreaded and asynchronous techniques make this program extremely fast and versatile.

tags | tcp
MD5 | 0071813eb4668769a15fcd2d1ca1686d
Posted Dec 13, 2000
Authored by Robin Keir | Site

DDoSPing v2.0 is a Win 9x/NT GUI scanner for the DDoS agents Wintrinoo, Trinoo, Stacheldraht and TFN.

tags | denial of service
MD5 | 92dbe2bfc9673ec480aea091b042093b
Posted Dec 13, 2000
Authored by Robin Keir | Site

BOPing is a network scanner for the infamous Back Orifice trojan. It is many times faster than the ping sweeper built in to the original client program. This is intended as a vigilante tool to notify victims who unknowingly have the trojan on their system. It includes the ability to notify detected victims by sending them a BO message box message directly from within the program.

tags | trojan
MD5 | 061f1d24551da1881a25eb144341698c
Posted Dec 13, 2000
Authored by Robin Keir | Site

Patchit v2.0 is a file byte-patching utility. This is driven by a simple scripting language. It can patch sequences of bytes in any file, search for byte patterns (with wildcards) and also extract and utilize DLL exported function addresses as source positions in files to be patched.

MD5 | 38ec13b906d6b9b617e088171cced2e8
Posted Dec 13, 2000
Authored by Robin Keir | Site

BinText v3.0 is a small and fast text extractor that will be of particular interest to programmers. It can extract text from any kind of file and includes the ability to find plain ASCII text, Unicode (double byte ANSI) text and Resource strings, providing useful information for each item in the optional "advanced" view mode. It's comprehensive filtering helps prevent unwanted text being listed. The gathered list can be searched and saved to a separate file as either a plain text file or in informative tabular format.

MD5 | e06a602d752700d5fb98d6d731b0279d
Posted Dec 13, 2000
Authored by Robin Keir | Site

Showin is a utility which can display hidden password editbox fields (text behind the asterisks *****). This will work in many programs although Microsoft have changed the way things work in some of their applications, most notably MS Office products and Windows 2000. ShoWin will not work in these cases. Neither will it work for password entry boxes on web pages, at least with most web browsers.

tags | web
systems | windows, 2k
MD5 | 0ba0909771ca10a8a0cb050e933fc975
Posted Dec 13, 2000
Authored by Robin Keir | Site

FileWatch v1.0 is a file change monitor. FileWatch (originally called ICEWatch 1.x) is a small utility that can monitor a given file for changes. Monitoring can detect file size changes or simply file writes, both with minimal impact on system resources (no polling is performed). The primary use of this utility is for monitoring changes in the log file of a personal firewall program and being able to spawn a separate application when changes are detected, but the tool can be applied to any number of other uses.

MD5 | 9f7d541b29435c7f2a9f636d73a45c6f
Posted Dec 13, 2000
Authored by JD Glaser | Site

Forensic Toolkit v2.0 is a file properties analyzer designed to examine the files on a disk drive for unauthorized activity. Lists files by their last access time, search for access times between certain time frames, and scan the disk for hidden files and data streams.

MD5 | 2f6f81a9bd0dcd266f6901961e3baa4f
Posted Dec 13, 2000
Authored by JD Glaser | Site

NTLast v3.0 is a security audit tool for Windows NT. It can help identify and track who has gained access to your system, and document the details. Includes raw time output for Excel analysis and additional features for Webmasters.

systems | windows, nt
MD5 | 6f46575a1866d7ccd6967e16a210d62c
Posted Dec 13, 2000
Authored by Invisibl | Site

Angst is a simple active packet sniffer, based on libpcap and libnet. Dumps into a file the payload of all the TCP packets received on the specified ports. Also, it floods the local network with random MAC addresses (like macof v1.1 by Ian Vitek), causing switches to send packets to all ports. Only compiled and tested on OpenBSD.

tags | tool, local, sniffer, tcp
systems | openbsd
MD5 | c4f6bf87a638d04f21494adc6f8f2ecf
Posted Dec 13, 2000
Authored by Robert Salizar | Site

Stealth IP Stack is a kernel patch for Linux 2.2.18 which makes your machine almost invisible on the network without impeding normal network operation. Many denial of service attacks, such as stream, are much less effective with this patch installed, and port scanners slow to a crawl. It works by restricting TCP RST packets (no "Connection Refused"), restricting ICMP_UNREACH on udp (Prevents UDP portscans), restricting all ICMP and IGMP requests. A sysctl interface is used so these features can be turned on and off on the fly.

Changes: Ported to Linux 2.2.18.
tags | denial of service, kernel, udp, tcp
systems | linux
MD5 | 50a37ed3eb2e15a3dcdd2d76310cada7
Posted Dec 13, 2000
Authored by synnergy, Juan M. Bello Rivas | Site

Overwriting the .dtors section - This paper presents a concise explanation of a technique to gain control of a C program's flow of execution given that it has been compiled with gcc. This exploit technique has several advantages over changing the stack pointer, including ease of determining the exact position where we want to write and point to our shellcode, and is simpler than a GOT patch.

tags | shellcode
MD5 | f693cc32d668324c2205e77036aa3fd1
Page 1 of 1

File Archive:

October 2018

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Oct 1st
    26 Files
  • 2
    Oct 2nd
    15 Files
  • 3
    Oct 3rd
    15 Files
  • 4
    Oct 4th
    15 Files
  • 5
    Oct 5th
    15 Files
  • 6
    Oct 6th
    2 Files
  • 7
    Oct 7th
    3 Files
  • 8
    Oct 8th
    23 Files
  • 9
    Oct 9th
    16 Files
  • 10
    Oct 10th
    15 Files
  • 11
    Oct 11th
    19 Files
  • 12
    Oct 12th
    16 Files
  • 13
    Oct 13th
    2 Files
  • 14
    Oct 14th
    2 Files
  • 15
    Oct 15th
    15 Files
  • 16
    Oct 16th
    20 Files
  • 17
    Oct 17th
    19 Files
  • 18
    Oct 18th
    21 Files
  • 19
    Oct 19th
    0 Files
  • 20
    Oct 20th
    0 Files
  • 21
    Oct 21st
    0 Files
  • 22
    Oct 22nd
    0 Files
  • 23
    Oct 23rd
    0 Files
  • 24
    Oct 24th
    0 Files
  • 25
    Oct 25th
    0 Files
  • 26
    Oct 26th
    0 Files
  • 27
    Oct 27th
    0 Files
  • 28
    Oct 28th
    0 Files
  • 29
    Oct 29th
    0 Files
  • 30
    Oct 30th
    0 Files
  • 31
    Oct 31st
    0 Files

Top Authors In Last 30 Days

File Tags


packet storm

© 2018 Packet Storm. All rights reserved.

Security Services
Hosting By