rpc.ttdbserver scanner (adapted from statd scanner by BiT), it uses a file containing the list of ip's to scan. BFiSN98 (December 98). Linux - c source. Courtesy of soft project digital security for y2k
05145d5b163d2e69ed1cfd957250b9a0f75515bc8b529e83c010a091cee75de9
ValV-N.e.T. v2.0b2: (Not Earthy Trojan) Remake of NETbus 1.7, with some more options, and a polymorphic engine to make the patch invisible to any antivirus. Courtesy of soft project digital security for y2k
37e9f9e53ab9b9568df86b60856ded9740dd3cfd759f5ea8d3a2284367414394
Highly customizable patcher. Courtesy of soft project digital security for y2k
e0ac1169a49a20b7b98add83b8191fc82ec0166a8c4c283e00794edc51090928
Aces High v2.8: TCP/UDP/RPC/finger/NFS/samba/web/phone scanner with string comparing option. Courtesy of soft project digital security for y2k
8c9909d7f012b5bfdd0dfd8e5bb0910c6137e5568622a8ca16f35363f6795d97
RST: RST Storm: destroys TCP links. For linux. Courtesy of soft project digital security for y2k
024f435c8f2f9f12c704f017860fc2888db533f9a57c78237f722d7a40618c4a
Orodruin: TCP forger. Courtesy of soft project digital security for y2k
1ad47cd4cd119825a6b5d4998cbb0604e02ed3c3bdff77735f1824d2bf9fcdac
ProScan: Tool to scan a LAN in order to find interfaces in PROMISC mode. It's accomplished by using non-standard queries. For linux. Courtesy of soft project digital security for y2k
da41fafe76cbfd71270b97f8eb8f558b84be249d10b7088a88653ff8435013ad
Syslogd kit v0.1: Kit including various tools for generating fake logs and read/redirect logs generated by SYSKLOGD. Includes: Shub-Niggurath, vru vru vruk, WALLA WALLA v0.1, WALLA WALLA v0.2. For linux. Courtesy of soft project digital security for y2k
3e9112e23ba7e88cb1d4b938d368fa7b8afb514c1430573f772ee241dcc52970
Kit including various tools to hide from logs generated by ACCT. Includes: ACCT Knocker, hydra v0.1, Leipzig v0.1, LocalFuck v0.1, Obscura Mens v0.1, Xytaxehedron v0.1, Xytaxehedron v0.1i (Marzo 99). Linux/*BSD - c sources. Courtesy of soft project digital security for y2k
7d714e3ad1b9373a9dc6912217f454124591be3e8da35d7daae5344b3386a15e
Vulnerable Wu-FTPD versions scanner (adapted from statd scanner by BiT). Linux - c source. Courtesy of soft project digital security for y2k
4f3d30ac928157295b1fd55c20dfc4a31ec3789458d59a07a592306b805653cc
Simple war dialer. Documentation: 'WAR DIALER X LINUX'. Linux - c source. Courtesy of soft project digital security for y2k
4c4a090711c1216ad7884e2bb97e3feb761e1787562ac6f14f4f062b9176e199
Shared resource scanner. Win9x - c source. Courtesy of soft project digital security for y2k
b567f42098680053af6d0b6accae7871abcf2d24522d50b8e71ade7edc82d9ac
Finds an rpc program by its number scanning a range of ip's. Linux - c source. Courtesy of soft project digital security for y2k
347d130d35e513b0e4aaed2fb52cfc2747a8d4a3fa897ab1bb05a794b8c7f5d1
A Backdoor that uses an rpc program to introduce in the host a remote access facility. Courtesy of soft project digital security for y2k
bc7341e1ad62a1a8fed6b0da8b98b90841aff4a96b370a3c91cb8892c82afec2
xACES: TCP/UDP/RPC/finger/NFS/samba/web/phone scanner with string comparing option. XWindows version. Courtesy of soft project digital security for y2k
60d03f1b22d585477ee9de739e3143dcd82befa895b1151957cb91be6691dc9c
0N0S3NDAi: (blind ip spoofing) Support tools for 0N0S3NDAi project. Includes: SEQprobe (displays remote host's ISN generation), SMail v2 (the DEFINITIVE fake mail). Courtesy of soft project digital security for y2k
793ae1476df80ce1b6a36545b474edbb2d175a40d5c57be0611ded26ea5f46b2
xTHOT v1.0: Tcp/ip Hacking Ominous Tool. Courtesy of soft project digital security for y2k
ab1d9d1e47a3784b663688d899e6235ab057958559ebfe89996cc33be5887cc9
syslogd trojan: These patches applied to syslogd 1.3-31 sources add a new priority, and using it it's possible to execute locally new commands without be logged. For linux. Courtesy of soft project digital security for y2k
962c72fe300a194fc044db28301b4e082e996d9092ddaa656fa426d5a7ac63f4
Tcprelay v1.0.1 - Tcpreplay is aimed at testing the performance of a NIDS by replaying real background network traffic in which to hide attacks. Tcpreplay allows you to control the speed at which the traffic is replayed, and can replay arbitrary tcpdump traces. Unlike programmatically-generated artificial traffic which doesn't exercise the application/protocol inspection that a NIDS performs, and doesn't reproduce the real-world anomalies that appear on production networks (asymmetric routes, traffic bursts/lulls, fragmentation, retransmissions, etc.), tcpreplay allows for exact replication of real traffic seen on real networks.
406ba86835be13f285736bfac9780708a0537ea26d50fe6a211628d0fdafb6ec
Fragrouter v1.6 - Fragrouter is aimed at testing the correctness of a NIDS, according to the specific TCP/IP attacks listed in the Secure Networks NIDS evasion paper. Other NIDS evasion toolkits which implement these attacks are in circulation among hackers or publically available, and it is assumed that they are currently being used to bypass NIDSs.
db066e3e55a97f5623e5bfbd742d5eb934037b4f3b467e1e1535c40778bdcbe8
asb99-01.expression_evaluator
ca6018ad1790f79ad7ac3c9d99ae04577fe614ac5bf49bc8d222b8d203351d96
asb99-02.coldfusion_example_apps
6dc85f5e6735909fad69b69c3d1e23a59edc883a5135260c057dce50792ec6ee
asb99-03.miis_DATA
7bfb40d64d5880629df367901eeb17f4b2ebb55e99bde64f01246b0290374db4
asb99-04.mult_sql_statements
6cce80316a8e293634d03ad433a3633bb79a240f5cb143ae3e8085484c66d8eb
asb99-05.forums_204
e85924bc2924fd3747c174bb1abf8040027be896e94ae578c5679c32e6eb8c02