SMS Spoofing Tool - Spoof your SMS by using this code with smsclient.
a7a3711d77b652fedd02778c8ac4d72e71b429baf3fe53b63871119f2eef3eb7
L.L.H.M. - Low Level Header Manipulation is a tool hides pieces of information in your files. Works on Win32.
eccdb1985f2a974e1aacf87cf7ef8144192301a191b8349e4c103473dac78563
THC Backdoor for Linux - This is a simple but useful backdoor for Linux based on a FreeBSD lkm by pragmatic/THC.
734681babd24cd7bc455259f89ac4b384ee909a5df908ba0169dabc078d2cb69
THC Backdoor ported to OpenBSD - This is a simple but useful backdoor for OpenBSD based on a FreeBSD lkm by pragmatic/THC.
05fcfdd8024ff5dbbf471ea66e27a53a4139f2377df3255c490eb5dd6a1f349a
SRaw for OpenBSD is a kld which makes all users able to open raw sockets. Supported protocols are IPPROTO_RAW, IPPROTO_ICMP, IPPROTO_IPIP, IPPROTO_IPV4, IPPROTO_IGMP.
300627a1e608cd638ff2fafcf814d528749f49e60213764e8e75763181c9f58e
SRaw is a kld for FreeBSD which disables EPERM in socket() and permits to allocate inpcb even if the socket is raw and users haven't root permissions bypassing suser() in pru_attach() functions.
1d9e7f1c99f8c59d6f38efccb713756d713efba1264fdc59cc1c0e336e75b6b1
This FreeBSD module shows how to intercept getpass(3) function and print anything that is typed without terminal echo.
231f569e4f8c8dfa8c9421da154803e5c86e7b176b954311ca32ed72fd9e91b5
Simple Packet Forwarder for Linux on the datalink level. Uses Libvsk.
c2ecda53d1964843248b9ebc23e2bc7249f516f195cae8a84c10f8ea0c299168
Libvsk is a set of libraries for network traffic manipulation from userlevel, with some functions of filtering/sniffing.
8bcc1a1790c4aa4e03c23b681e4033744bc8888256fc13f3662c29c20970762f
Syscall Monitor for FreeBSD - Using this tool you are allowed to monitor the use of the syscalls on your system and to prevent their execution for the specified users/groups.
d9917c7e535881afb784448565f8b5f170a26741c2baafcd4b532524c70a54d5
Securelevel Bypass - This kld gives you permission to load/unload a kld and modify a sysctl value even if you aren't root and securelevel is higher than 0.
2a0b20d98a3ea5ceca6c235d0dcd59e29d5642d989f65b4e5095adf6f65c0485
Anti Anti Sniffer Patch - Linux kernel patches to hide a sniffer from the most known anti-sniffers.
7898d92bbea3bdade89593e2f3ef566f7eaca0acda46611ec918606a1e054c0f
Kstat is a tool for Linux which can find an attacker in your system by a direct analysis of the kernel via /dev/kmem, bypassing the hiding techniques of the intruder (kernel static recompilation/use of LKMs). Kstat can find the syscalls which were modified by a LKM, list the linked LKMs, query one or all the network interfaces of the system, list all the processes and much more.
88b0b99c154e47fea38908d1d46542850be4215cd28ce2024ba4ade238b560a1
Ksec (Kernel Security Checker) is a tool for FreeBSD and OpenBSD which can find an attacker by direct analysis of the kernel via /dev/mem, bypassing the hiding techniques of the intruder (kernel static recompilation/use of LKMs). KSec can find the modified syscalls from userspace, detect the promisc interfaces, find the modifications applied to a protocol and much more.
1a4530115327bcbd02ef7104acaefc72ddfea1d0db0e12252f7b0ee3fdfa0a1f
Eshell.c is a encrypted bindshell type backdoor which has a server daemon and client with AES encryption via libmix.
c32ad105680ad262b5dca88fcaaaf43d24a5994d3d79f9243bfc0001ca76c38b
Packet Storm exploits for the year 2000!
4ae50131fa96b7884e5a06211b6fd3aa3bd9cddb32775d54716fe237e1df0a77
iplog is a TCP/IP traffic logger capable of logging TCP port scans, TCP null scans, FIN scans, UDP and ICMP "smurf" attacks, bogus TCP flags, TCP SYN scans, TCP "Xmas" scans, ICMP ping floods, UDP scans, and IP fragment attacks. It currently runs on Linux, FreeBSD, OpenBSD, BSDI and Solaris.
cc3da7b6f360ff25455e5ae7c95d7377de332deb23f6dcb5c1ea11e563702fff
Georgi Guninski security advisory #31 - There is a security vulnerability in Windows Media Player 7 exploitable thru IE which allows reading local files and executing arbitrary programs. The problem is the WMP ActiveX Control which allows launching javascript URLs in arbitrary already open frames. This allows taking over the frame's DOM. Includes exploit code. Demonstration available here.
11004b7cb48703aa71daec5f42163b6badbcc9bd0443de3f14cd799110e779d8
SSH (Secure Shell) Windows Port is a program to log into another computer over a network, to execute commands in a remote machine, and to move files from one machine to another, providing strong authentication and a secure communications over insecure channels.
7ddba53dcf1a1a9503ca06a93b44c863b34e487daf6d252e8f0abf69940b8f27
SSH (Secure Shell) is a program to log into another computer over a network, to execute commands in a remote machine, and to move files from one machine to another, providing strong authentication and a secure communications over insecure channels.
95cece99986eec8f550ae0ba78457254e725b88282fe2f3337b5308db23a84d5
SSH v2.4.0 server for Windows.
a374fb7c91cbb9beb34130128b5a55da475b161d224643043e1a4c2479654856
hypersrc is a GUI program for browsing source code, which uses GTK+. It provides a list widget containing sorted source code tags. A programmer can click a tag to hyperlink to a particular tagged line in a source code file. Screenshot here.
e207046f65bd61093049aee58e950c824eef84f69463e5a7db0db8d22e977399
Zorp is a new-generation modular proxy firewall suite to fine tune proxy decisions with its built in script language, fully analyze complex protocols (like SSH with several forwarded TCP connections), and utilize outband authentication techniques (unlike common practices where proxy authentication had to be hacked into the protocol).
b6d5141db75b7f9d6917a814374ff4b2765e6e1a37d694d1faef0c8720bc0705
IDS/A is an experimental interface between applications and a daemon which functions as system logger, reference monitor, and soon intrusion detection system. IDS/A is not yet complete, but can already be used as system log replacement with extra neat features such as automatic log rotation. It also ships with two example applications which demonstrate how the system can be used to block basic banner grabbing port or CGI scanners.
366dd2570a9d7e58748d70377398edff1a1da47522e07fbfa4b80dc6e628c3c2
Firewall Log Daemon provides two programs, chaindaemon and tabledaemon, that you can choose between, depending on your firewall type (ipchains or iptables-netfilter). The program will start a small daemon process that parses and resolves firewall logs in real-time by reading a FIFO that syslog writes to. It will queue a batch of alerts and mail them to you. It features hostname, port, protocol, and ICMP type/code lookup, with formatted output for easy reading.
bde28ec499125eba35e9b5e2c151d4ad6f002ba0e1fb00eb4abc47dd73cbd088