what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 26 - 50 of 1,840 RSS Feed

Files Date: 1999-09-23 to 1999-09-24

valvnet20b2.zip
Posted Sep 23, 1999
Authored by s0ftpj

ValV-N.e.T. v2.0b2: (Not Earthy Trojan) Remake of NETbus 1.7, with some more options, and a polymorphic engine to make the patch invisible to any antivirus. Courtesy of soft project digital security for y2k

tags | trojan
SHA-256 | 37e9f9e53ab9b9568df86b60856ded9740dd3cfd759f5ea8d3a2284367414394
vlv_patch20b2.zip
Posted Sep 23, 1999
Authored by s0ftpj

Highly customizable patcher. Courtesy of soft project digital security for y2k

SHA-256 | e0ac1169a49a20b7b98add83b8191fc82ec0166a8c4c283e00794edc51090928
aces-2_8.tgz
Posted Sep 23, 1999
Authored by s0ftpj

Aces High v2.8: TCP/UDP/RPC/finger/NFS/samba/web/phone scanner with string comparing option. Courtesy of soft project digital security for y2k

tags | web, udp, tcp
SHA-256 | 8c9909d7f012b5bfdd0dfd8e5bb0910c6137e5568622a8ca16f35363f6795d97
rst.c
Posted Sep 23, 1999
Authored by s0ftpj

RST: RST Storm: destroys TCP links. For linux. Courtesy of soft project digital security for y2k

tags | tcp
systems | linux
SHA-256 | 024f435c8f2f9f12c704f017860fc2888db533f9a57c78237f722d7a40618c4a
orodruin.c
Posted Sep 23, 1999
Authored by s0ftpj

Orodruin: TCP forger. Courtesy of soft project digital security for y2k

tags | tcp
SHA-256 | 1ad47cd4cd119825a6b5d4998cbb0604e02ed3c3bdff77735f1824d2bf9fcdac
proscan.c
Posted Sep 23, 1999
Authored by s0ftpj

ProScan: Tool to scan a LAN in order to find interfaces in PROMISC mode. It's accomplished by using non-standard queries. For linux. Courtesy of soft project digital security for y2k

systems | linux
SHA-256 | da41fafe76cbfd71270b97f8eb8f558b84be249d10b7088a88653ff8435013ad
syslogdk-0_1.tgz
Posted Sep 23, 1999
Authored by s0ftpj

Syslogd kit v0.1: Kit including various tools for generating fake logs and read/redirect logs generated by SYSKLOGD. Includes: Shub-Niggurath, vru vru vruk, WALLA WALLA v0.1, WALLA WALLA v0.2. For linux. Courtesy of soft project digital security for y2k

systems | linux
SHA-256 | 3e9112e23ba7e88cb1d4b938d368fa7b8afb514c1430573f772ee241dcc52970
acctk-0_2.tgz
Posted Sep 23, 1999
Authored by s0ftpj

Kit including various tools to hide from logs generated by ACCT. Includes: ACCT Knocker, hydra v0.1, Leipzig v0.1, LocalFuck v0.1, Obscura Mens v0.1, Xytaxehedron v0.1, Xytaxehedron v0.1i (Marzo 99). Linux/*BSD - c sources. Courtesy of soft project digital security for y2k

systems | linux, bsd
SHA-256 | 7d714e3ad1b9373a9dc6912217f454124591be3e8da35d7daae5344b3386a15e
wu-tang.c
Posted Sep 23, 1999
Authored by s0ftpj

Vulnerable Wu-FTPD versions scanner (adapted from statd scanner by BiT). Linux - c source. Courtesy of soft project digital security for y2k

systems | linux
SHA-256 | 4f3d30ac928157295b1fd55c20dfc4a31ec3789458d59a07a592306b805653cc
dead-1_0.tgz
Posted Sep 23, 1999
Authored by s0ftpj

Simple war dialer. Documentation: 'WAR DIALER X LINUX'. Linux - c source. Courtesy of soft project digital security for y2k

systems | linux
SHA-256 | 4c4a090711c1216ad7884e2bb97e3feb761e1787562ac6f14f4f062b9176e199
nbtscan-1_0e.zip
Posted Sep 23, 1999
Authored by s0ftpj

Shared resource scanner. Win9x - c source. Courtesy of soft project digital security for y2k

systems | windows
SHA-256 | b567f42098680053af6d0b6accae7871abcf2d24522d50b8e71ade7edc82d9ac
rpcprogs.c
Posted Sep 23, 1999
Authored by s0ftpj

Finds an rpc program by its number scanning a range of ip's. Linux - c source. Courtesy of soft project digital security for y2k

systems | linux
SHA-256 | 347d130d35e513b0e4aaed2fb52cfc2747a8d4a3fa897ab1bb05a794b8c7f5d1
rpc-date.tgz
Posted Sep 23, 1999
Authored by s0ftpj

A Backdoor that uses an rpc program to introduce in the host a remote access facility. Courtesy of soft project digital security for y2k

tags | remote
SHA-256 | bc7341e1ad62a1a8fed6b0da8b98b90841aff4a96b370a3c91cb8892c82afec2
xaces.tgz
Posted Sep 23, 1999
Authored by s0ftpj

xACES: TCP/UDP/RPC/finger/NFS/samba/web/phone scanner with string comparing option. XWindows version. Courtesy of soft project digital security for y2k

tags | web, udp, tcp
SHA-256 | 60d03f1b22d585477ee9de739e3143dcd82befa895b1151957cb91be6691dc9c
onosendai02.tar.gz
Posted Sep 23, 1999
Authored by s0ftpj

0N0S3NDAi: (blind ip spoofing) Support tools for 0N0S3NDAi project. Includes: SEQprobe (displays remote host's ISN generation), SMail v2 (the DEFINITIVE fake mail). Courtesy of soft project digital security for y2k

tags | remote, spoof
SHA-256 | 793ae1476df80ce1b6a36545b474edbb2d175a40d5c57be0611ded26ea5f46b2
xthot.tgz
Posted Sep 23, 1999
Authored by s0ftpj

xTHOT v1.0: Tcp/ip Hacking Ominous Tool. Courtesy of soft project digital security for y2k

tags | tcp
SHA-256 | ab1d9d1e47a3784b663688d899e6235ab057958559ebfe89996cc33be5887cc9
syslogd-trojan.tgz
Posted Sep 23, 1999
Authored by s0ftpj

syslogd trojan: These patches applied to syslogd 1.3-31 sources add a new priority, and using it it's possible to execute locally new commands without be logged. For linux. Courtesy of soft project digital security for y2k

tags | trojan
systems | linux
SHA-256 | 962c72fe300a194fc044db28301b4e082e996d9092ddaa656fa426d5a7ac63f4
tcpreplay-1.0.1.tar.gz
Posted Sep 23, 1999

Tcprelay v1.0.1 - Tcpreplay is aimed at testing the performance of a NIDS by replaying real background network traffic in which to hide attacks. Tcpreplay allows you to control the speed at which the traffic is replayed, and can replay arbitrary tcpdump traces. Unlike programmatically-generated artificial traffic which doesn't exercise the application/protocol inspection that a NIDS performs, and doesn't reproduce the real-world anomalies that appear on production networks (asymmetric routes, traffic bursts/lulls, fragmentation, retransmissions, etc.), tcpreplay allows for exact replication of real traffic seen on real networks.

tags | tool, arbitrary, protocol, intrusion detection
systems | unix
SHA-256 | 406ba86835be13f285736bfac9780708a0537ea26d50fe6a211628d0fdafb6ec
fragrouter-1.6.tar.gz
Posted Sep 23, 1999

Fragrouter v1.6 - Fragrouter is aimed at testing the correctness of a NIDS, according to the specific TCP/IP attacks listed in the Secure Networks NIDS evasion paper. Other NIDS evasion toolkits which implement these attacks are in circulation among hackers or publically available, and it is assumed that they are currently being used to bypass NIDSs.

tags | tool, tcp, intrusion detection
systems | unix
SHA-256 | db066e3e55a97f5623e5bfbd742d5eb934037b4f3b467e1e1535c40778bdcbe8
asb99-01.expression_evaluator
Posted Sep 23, 1999

asb99-01.expression_evaluator

SHA-256 | ca6018ad1790f79ad7ac3c9d99ae04577fe614ac5bf49bc8d222b8d203351d96
asb99-02.coldfusion_example_apps
Posted Sep 23, 1999

asb99-02.coldfusion_example_apps

SHA-256 | 6dc85f5e6735909fad69b69c3d1e23a59edc883a5135260c057dce50792ec6ee
asb99-03.miis_DATA
Posted Sep 23, 1999

asb99-03.miis_DATA

SHA-256 | 7bfb40d64d5880629df367901eeb17f4b2ebb55e99bde64f01246b0290374db4
asb99-04.mult_sql_statements
Posted Sep 23, 1999

asb99-04.mult_sql_statements

tags | sql injection
SHA-256 | 6cce80316a8e293634d03ad433a3633bb79a240f5cb143ae3e8085484c66d8eb
asb99-05.forums_204
Posted Sep 23, 1999

asb99-05.forums_204

SHA-256 | e85924bc2924fd3747c174bb1abf8040027be896e94ae578c5679c32e6eb8c02
asb99-06.nt_percent_20
Posted Sep 23, 1999

asb99-06.nt_percent_20

SHA-256 | b293ad61f3b01279cb32619dca3bb7f7035df3ca353f181eeac264cab7cbec59
Page 2 of 74
Back12345Next

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    8 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    11 Files
  • 23
    Apr 23rd
    68 Files
  • 24
    Apr 24th
    23 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close