Twenty Year Anniversary
Showing 1 - 6 of 6 RSS Feed

Files Date: 2001-11-21

ADMftpforce.tgz
Posted Nov 21, 2001
Authored by ADM, Holywarez

ADM ftp server brute force password cracker. Uses a dictionary, of course.

MD5 | 28e9ddbd0d191ac07daa74a3d963cb64
write.c
Posted Nov 21, 2001

Proof of concept code for the Solaris 2.6 and 2.7 (SPARC) "write" buffer overflow. Guile Cool

tags | exploit, overflow, proof of concept
systems | solaris
MD5 | 9ab94adaec92ed98f444ac24987c83be
shtroj2.c
Posted Nov 21, 2001
Authored by J.B. Lesage

shtroj2.c is an auto-hiding back door kernel module for linux that executes an arbitrary command when the environment variable TERM is set to a specific password on the execution of a program. Can be used to drop immediately to a functional tty-based shell instead of running /bin/login with sshd and telnetd.

tags | tool, arbitrary, shell, kernel, rootkit
systems | linux, unix
MD5 | 8808d003335d8e2600666db906b4e962
passlogd-0.1d.tar.gz
Posted Nov 21, 2001
Authored by Christian Void | Site morphine.com

Passlogd is a sniffer which logs traffic on the UDP syslog port, allowing a syslog receiver to have no open ports.

Changes: Fixed serious bugs that caused all hell to break loose. Since you do not like hell breaking loose in passlogd, you will upgrade.
tags | udp
systems | unix
MD5 | 859385e7cbfa3b9e193fc298e2f7a0f5
bushy.jpg
Posted Nov 21, 2001

This jpg has nothing to do with unix, but it is easily funny enough to warrant being in the unix humor section anyway. It is an unaltered press photo of GW Bush being accosted by a gooselike animal.

systems | unix
MD5 | c9729c4917dce2251caa339fcbc7e603
pdd-1.00.zip
Posted Nov 21, 2001
Authored by Joe Grand | Site atstake.com

PDD is the first tool of its kind for forensic analysis of Palm OS platform devices. pdd (Palm dd) is a Windows-based tool for Palm OS memory imaging and forensic acquisition. The Palm OS Console Mode is used to acquire memory card information and to create a bit-for-bit image of the selected memory region. No data is modified on the target device and the data retrieval is not detectable by the user of the PDA. Source code is available here.

systems | windows
MD5 | 2c81314a9a6662a8e418f2a38eb8c426
Page 1 of 1
Back1Next

Want To Donate?


Bitcoin: 18PFeCVLwpmaBuQqd5xAYZ8bZdvbyEWMmU

File Archive:

June 2018

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Jun 1st
    14 Files
  • 2
    Jun 2nd
    1 Files
  • 3
    Jun 3rd
    3 Files
  • 4
    Jun 4th
    18 Files
  • 5
    Jun 5th
    21 Files
  • 6
    Jun 6th
    8 Files
  • 7
    Jun 7th
    16 Files
  • 8
    Jun 8th
    18 Files
  • 9
    Jun 9th
    5 Files
  • 10
    Jun 10th
    2 Files
  • 11
    Jun 11th
    21 Files
  • 12
    Jun 12th
    32 Files
  • 13
    Jun 13th
    15 Files
  • 14
    Jun 14th
    16 Files
  • 15
    Jun 15th
    4 Files
  • 16
    Jun 16th
    1 Files
  • 17
    Jun 17th
    2 Files
  • 18
    Jun 18th
    15 Files
  • 19
    Jun 19th
    15 Files
  • 20
    Jun 20th
    15 Files
  • 21
    Jun 21st
    15 Files
  • 22
    Jun 22nd
    7 Files
  • 23
    Jun 23rd
    0 Files
  • 24
    Jun 24th
    0 Files
  • 25
    Jun 25th
    0 Files
  • 26
    Jun 26th
    0 Files
  • 27
    Jun 27th
    0 Files
  • 28
    Jun 28th
    0 Files
  • 29
    Jun 29th
    0 Files
  • 30
    Jun 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2018 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close