exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 151 - 175 of 192 RSS Feed

Files Date: 2001-01-01 to 2001-01-31

ucp.c
Posted Jan 5, 2001
Authored by s0ftpj, Jack McKrak | Site s0ftpj.org

SMS Spoofing Tool - Spoof your SMS by using this code with smsclient.

tags | spoof
SHA-256 | a7a3711d77b652fedd02778c8ac4d72e71b429baf3fe53b63871119f2eef3eb7
seekh_01a3.zip
Posted Jan 5, 2001
Authored by s0ftpj, Valvo | Site s0ftpj.org

L.L.H.M. - Low Level Header Manipulation is a tool hides pieces of information in your files. Works on Win32.

systems | windows
SHA-256 | eccdb1985f2a974e1aacf87cf7ef8144192301a191b8349e4c103473dac78563
thclinbd.tar.gz
Posted Jan 5, 2001
Authored by s0ftpj, bELFaghor | Site s0ftpj.org

THC Backdoor for Linux - This is a simple but useful backdoor for Linux based on a FreeBSD lkm by pragmatic/THC.

systems | linux, freebsd
SHA-256 | 734681babd24cd7bc455259f89ac4b384ee909a5df908ba0169dabc078d2cb69
thcobsdbd.tar.gz
Posted Jan 5, 2001
Authored by s0ftpj, Pigpen | Site s0ftpj.org

THC Backdoor ported to OpenBSD - This is a simple but useful backdoor for OpenBSD based on a FreeBSD lkm by pragmatic/THC.

systems | freebsd, openbsd
SHA-256 | 05fcfdd8024ff5dbbf471ea66e27a53a4139f2377df3255c490eb5dd6a1f349a
obsd4-sock.tar.gz
Posted Jan 4, 2001
Authored by s0ftpj, Pigpen | Site s0ftpj.org

SRaw for OpenBSD is a kld which makes all users able to open raw sockets. Supported protocols are IPPROTO_RAW, IPPROTO_ICMP, IPPROTO_IPIP, IPPROTO_IPV4, IPPROTO_IGMP.

tags | protocol
systems | openbsd
SHA-256 | 300627a1e608cd638ff2fafcf814d528749f49e60213764e8e75763181c9f58e
fbsd4-sock.tar.gz
Posted Jan 4, 2001
Authored by s0ftpj, Pigpen | Site s0ftpj.org

SRaw is a kld for FreeBSD which disables EPERM in socket() and permits to allocate inpcb even if the socket is raw and users haven't root permissions bypassing suser() in pru_attach() functions.

tags | root
systems | freebsd
SHA-256 | 1d9e7f1c99f8c59d6f38efccb713756d713efba1264fdc59cc1c0e336e75b6b1
piove.tar.gz
Posted Jan 4, 2001
Authored by s0ftpj, vecna | Site s0ftpj.org

This FreeBSD module shows how to intercept getpass(3) function and print anything that is typed without terminal echo.

systems | freebsd
SHA-256 | 231f569e4f8c8dfa8c9421da154803e5c86e7b176b954311ca32ed72fd9e91b5
spf.c
Posted Jan 4, 2001
Authored by s0ftpj, vecna | Site s0ftpj.org

Simple Packet Forwarder for Linux on the datalink level. Uses Libvsk.

systems | linux
SHA-256 | c2ecda53d1964843248b9ebc23e2bc7249f516f195cae8a84c10f8ea0c299168
libvsk-1.0.tar.gz
Posted Jan 4, 2001
Authored by s0ftpj, vecna | Site s0ftpj.org

Libvsk is a set of libraries for network traffic manipulation from userlevel, with some functions of filtering/sniffing.

SHA-256 | 8bcc1a1790c4aa4e03c23b681e4033744bc8888256fc13f3662c29c20970762f
smonitor.tar.gz
Posted Jan 4, 2001
Authored by s0ftpj, Pigpen | Site s0ftpj.org

Syscall Monitor for FreeBSD - Using this tool you are allowed to monitor the use of the syscalls on your system and to prevent their execution for the specified users/groups.

systems | freebsd
SHA-256 | d9917c7e535881afb784448565f8b5f170a26741c2baafcd4b532524c70a54d5
securelvl.tgz
Posted Jan 4, 2001
Authored by s0ftpj, Pigpen | Site s0ftpj.org

Securelevel Bypass - This kld gives you permission to load/unload a kld and modify a sysctl value even if you aren't root and securelevel is higher than 0.

tags | root
SHA-256 | 2a0b20d98a3ea5ceca6c235d0dcd59e29d5642d989f65b4e5095adf6f65c0485
aasniff.tar.gz
Posted Jan 4, 2001
Authored by s0ftpj, vecna | Site s0ftpj.org

Anti Anti Sniffer Patch - Linux kernel patches to hide a sniffer from the most known anti-sniffers.

tags | kernel
systems | linux
SHA-256 | 7898d92bbea3bdade89593e2f3ef566f7eaca0acda46611ec918606a1e054c0f
kstat.tar.gz
Posted Jan 4, 2001
Authored by s0ftpj, FuSyS | Site s0ftpj.org

Kstat is a tool for Linux which can find an attacker in your system by a direct analysis of the kernel via /dev/kmem, bypassing the hiding techniques of the intruder (kernel static recompilation/use of LKMs). Kstat can find the syscalls which were modified by a LKM, list the linked LKMs, query one or all the network interfaces of the system, list all the processes and much more.

tags | kernel
systems | linux
SHA-256 | 88b0b99c154e47fea38908d1d46542850be4215cd28ce2024ba4ade238b560a1
ksec.tar.gz
Posted Jan 4, 2001
Authored by s0ftpj, Pigpen | Site s0ftpj.org

Ksec (Kernel Security Checker) is a tool for FreeBSD and OpenBSD which can find an attacker by direct analysis of the kernel via /dev/mem, bypassing the hiding techniques of the intruder (kernel static recompilation/use of LKMs). KSec can find the modified syscalls from userspace, detect the promisc interfaces, find the modifications applied to a protocol and much more.

tags | kernel, protocol
systems | freebsd, openbsd
SHA-256 | 1a4530115327bcbd02ef7104acaefc72ddfea1d0db0e12252f7b0ee3fdfa0a1f
eshell.c
Posted Jan 4, 2001
Authored by Luki Rustianto | Site karet.org

Eshell.c is a encrypted bindshell type backdoor which has a server daemon and client with AES encryption via libmix.

tags | tool, rootkit
systems | unix
SHA-256 | c32ad105680ad262b5dca88fcaaaf43d24a5994d3d79f9243bfc0001ca76c38b
2000-exploits.tgz
Posted Jan 4, 2001
Authored by Todd J. | Site packetstormsecurity.com

Packet Storm exploits for the year 2000!

tags | exploit
SHA-256 | 4ae50131fa96b7884e5a06211b6fd3aa3bd9cddb32775d54716fe237e1df0a77
iplog-2.2.3.tar.gz
Posted Jan 4, 2001
Authored by Odin | Site ojnk.sourceforge.net

iplog is a TCP/IP traffic logger capable of logging TCP port scans, TCP null scans, FIN scans, UDP and ICMP "smurf" attacks, bogus TCP flags, TCP SYN scans, TCP "Xmas" scans, ICMP ping floods, UDP scans, and IP fragment attacks. It currently runs on Linux, FreeBSD, OpenBSD, BSDI and Solaris.

Changes: Bugfixes and the addition of a "--pid-file" command-line argument.
tags | udp, tcp, system logging
systems | linux, unix, solaris, freebsd, openbsd
SHA-256 | cc3da7b6f360ff25455e5ae7c95d7377de332deb23f6dcb5c1ea11e563702fff
guninski31.txt
Posted Jan 4, 2001
Authored by Georgi Guninski | Site guninski.com

Georgi Guninski security advisory #31 - There is a security vulnerability in Windows Media Player 7 exploitable thru IE which allows reading local files and executing arbitrary programs. The problem is the WMP ActiveX Control which allows launching javascript URLs in arbitrary already open frames. This allows taking over the frame's DOM. Includes exploit code. Demonstration available here.

tags | exploit, arbitrary, local, javascript, activex
systems | windows
SHA-256 | 11004b7cb48703aa71daec5f42163b6badbcc9bd0443de3f14cd799110e779d8
SSHWin-2.4.0.exe
Posted Jan 3, 2001
Site ssh.org

SSH (Secure Shell) Windows Port is a program to log into another computer over a network, to execute commands in a remote machine, and to move files from one machine to another, providing strong authentication and a secure communications over insecure channels.

Changes: Bug fixes and improvements.
tags | remote, shell, encryption
systems | windows
SHA-256 | 7ddba53dcf1a1a9503ca06a93b44c863b34e487daf6d252e8f0abf69940b8f27
ssh-2.4.0.tar.gz
Posted Jan 3, 2001
Site ssh.org

SSH (Secure Shell) is a program to log into another computer over a network, to execute commands in a remote machine, and to move files from one machine to another, providing strong authentication and a secure communications over insecure channels.

Changes: Added Cast-128 cipher, implemented FTP forwarding (secure tunnels are created on the fly for data connections and port numbers are spoofed), implemented RSA SecurID authentication, implemented PAM authentication, and bug fixes.
tags | remote, shell, encryption
SHA-256 | 95cece99986eec8f550ae0ba78457254e725b88282fe2f3337b5308db23a84d5
SSHWinServer.exe
Posted Jan 3, 2001
Site ssh.com

SSH v2.4.0 server for Windows.

tags | encryption
systems | windows
SHA-256 | a374fb7c91cbb9beb34130128b5a55da475b161d224643043e1a4c2479654856
hypersrc-2.1.6.tar.gz
Posted Jan 3, 2001
Authored by Jim Brooks | Site jimbrooks.org

hypersrc is a GUI program for browsing source code, which uses GTK+. It provides a list widget containing sorted source code tags. A programmer can click a tag to hyperlink to a particular tagged line in a source code file. Screenshot here.

Changes: Fixed all known segfaults.
systems | linux
SHA-256 | e207046f65bd61093049aee58e950c824eef84f69463e5a7db0db8d22e977399
zorp-0.7.10.tar.gz
Posted Jan 3, 2001
Authored by Balazs Scheidler | Site balabit.hu

Zorp is a new-generation modular proxy firewall suite to fine tune proxy decisions with its built in script language, fully analyze complex protocols (like SSH with several forwarded TCP connections), and utilize outband authentication techniques (unlike common practices where proxy authentication had to be hacked into the protocol).

Changes: Ipchains support to add and remove rules at runtime was added, and bugfixes were included.
tags | tool, tcp, firewall, protocol
systems | unix
SHA-256 | b6d5141db75b7f9d6917a814374ff4b2765e6e1a37d694d1faef0c8720bc0705
idsa-0.88.tar.gz
Posted Jan 3, 2001
Site cs.uct.ac.za

IDS/A is an experimental interface between applications and a daemon which functions as system logger, reference monitor, and soon intrusion detection system. IDS/A is not yet complete, but can already be used as system log replacement with extra neat features such as automatic log rotation. It also ships with two example applications which demonstrate how the system can be used to block basic banner grabbing port or CGI scanners.

Changes: This release adds a pam module and a guile interface. It is now possible to write scheme programs to process, correlate and block events. A number of bugs have also been squashed and some internals have been rewritten, probably introducing new bugs.
tags | cgi, system logging
systems | unix
SHA-256 | 366dd2570a9d7e58748d70377398edff1a1da47522e07fbfa4b80dc6e628c3c2
firelogd-1.3.tgz
Posted Jan 3, 2001
Site speakeasy.org

Firewall Log Daemon provides two programs, chaindaemon and tabledaemon, that you can choose between, depending on your firewall type (ipchains or iptables-netfilter). The program will start a small daemon process that parses and resolves firewall logs in real-time by reading a FIFO that syslog writes to. It will queue a batch of alerts and mail them to you. It features hostname, port, protocol, and ICMP type/code lookup, with formatted output for easy reading.

Changes: All fields in packet log are now captured and decoded, turning all hex values into their corresponding ascii bit strings. The included "decode.php" and corresponding template provides for a web-based log entry decoder. Various bugfixes.
tags | tool, firewall, protocol
systems | linux
SHA-256 | bde28ec499125eba35e9b5e2c151d4ad6f002ba0e1fb00eb4abc47dd73cbd088
Page 7 of 8
Back45678Next

File Archive:

September 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Sep 1st
    261 Files
  • 2
    Sep 2nd
    17 Files
  • 3
    Sep 3rd
    38 Files
  • 4
    Sep 4th
    52 Files
  • 5
    Sep 5th
    23 Files
  • 6
    Sep 6th
    27 Files
  • 7
    Sep 7th
    0 Files
  • 8
    Sep 8th
    1 Files
  • 9
    Sep 9th
    16 Files
  • 10
    Sep 10th
    38 Files
  • 11
    Sep 11th
    21 Files
  • 12
    Sep 12th
    40 Files
  • 13
    Sep 13th
    18 Files
  • 14
    Sep 14th
    0 Files
  • 15
    Sep 15th
    0 Files
  • 16
    Sep 16th
    21 Files
  • 17
    Sep 17th
    51 Files
  • 18
    Sep 18th
    23 Files
  • 19
    Sep 19th
    48 Files
  • 20
    Sep 20th
    36 Files
  • 21
    Sep 21st
    0 Files
  • 22
    Sep 22nd
    0 Files
  • 23
    Sep 23rd
    38 Files
  • 24
    Sep 24th
    65 Files
  • 25
    Sep 25th
    24 Files
  • 26
    Sep 26th
    0 Files
  • 27
    Sep 27th
    0 Files
  • 28
    Sep 28th
    0 Files
  • 29
    Sep 29th
    0 Files
  • 30
    Sep 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close