exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 151 - 175 of 376 RSS Feed

Operating System: BSD

tcpreplay-2.3.1.tar.gz
Posted Oct 8, 2004
Site sourceforge.net

tcpreplay is a BSD-style licensed tool to replay saved tcpdump files at arbitrary speeds. It provides a variety of features for replaying traffic for both passive sniffer devices as well as inline devices such as routers, firewalls, and the new class of inline IDS's. Many NIDSs fare poorly when looking for attacks on heavily-loaded networks. tcpreplay allows you to recreate real network traffic from a real network for use in testing.

Changes: bug fixes!!
tags | tool, arbitrary, intrusion detection
systems | unix, bsd
SHA-256 | f79a12ac01ac965eae195915c3ad0a2b2a7b845ec49b36ec551791787cf8b010
arping-2.04.tar.gz
Posted Sep 22, 2004
Authored by Thomas Habets | Site habets.pp.se

Arping is an arp level ping utility which broadcasts a who-has ARP packet on the network and prints answers. Very useful when you are trying to pick an unused IP for a net that you don't yet have routing to, or to ping an ethernet address directly. Tested on Linux, {Free,Net,Open}BSD, MacOS X, and Solaris.

Changes: Fixed a command line parsing bug. A -u switch showing the total number of MAC pings sent has been added. A libnet-not-inited bug has been repaired. It should now compile on Windows!
tags | tool
systems | linux, unix, solaris, bsd, osx
SHA-256 | 96aae379a6c9c3cd6ff2287d6ea2e96b2faaca6a2c93da847153f928f44173f4
tcpreplay-2.3.0.tar.gz
Posted Sep 21, 2004
Site sourceforge.net

tcpreplay is a BSD-style licensed tool to replay saved tcpdump files at arbitrary speeds. It provides a variety of features for replaying traffic for both passive sniffer devices as well as inline devices such as routers, firewalls, and the new class of inline IDS's. Many NIDSs fare poorly when looking for attacks on heavily-loaded networks. tcpreplay allows you to recreate real network traffic from a real network for use in testing.

Changes: Now includes Cisco HDLC support and better reporting of DLT types. A fix for an issue in tcpprep files that broke cache file compatibility between big and little-endian systems was also implemented.
tags | tool, arbitrary, intrusion detection
systems | unix, bsd
SHA-256 | 050dd6a8f0eaa2ee9f14437a20270c67a742c313435bda82190fcd7bde932931
cheetah.c
Posted Aug 26, 2004
Authored by Tal0n

Cheetah version 1.0 is a remote Linux/BSD backdoor that offer low CPU usage, Port/Backlog selection, a remote shell, user/password protection, and process faking.

tags | tool, remote, shell, rootkit
systems | linux, unix, bsd
SHA-256 | 14494a026dcba9f3ddc81a36464f7285e7aa4ab559ded6f69da75edda6346e4a
narc-0.7.tgz
Posted Aug 13, 2004
Authored by Shane Chen | Site knowplace.org

NARC (Netfilter Automatic Rules Configurator) is a free firewalling package for Netfilter/Iptables, released under the BSD license. It attempts to simplify the setup of a firewall (stateful packet filter) via the iptables tools. It is a bash shellscript that generates (hopefully) sensible and secure rules for Netfilter based on a simple configuration file. It features quick setup via a simple configuration file, connection tracking (and fragmentation reassembly), customized logging, probe detection (TCP and UDP), and much more.

tags | tool, udp, tcp, firewall, bash
systems | linux, bsd
SHA-256 | 60f94c7b982da63800a7f82ac756c2d00ee154997acb4cf0f1fa0a49d0296c21
libShellCode-0.3.1.tar.gz
Posted Jul 11, 2004
Authored by ORK | Site orkspace.net

libShellCode is a library that can be included when writing Linux and BSD i386 based exploits by providing functions that generate shellcode with user given parameters during runtime.

Changes: Added support for shellcodes that reuse an opened socket.
tags | shellcode
systems | linux, bsd
SHA-256 | 9cb1a35f89b332cb250424e8142cec4aee85928e62984a1e02c251161dc7f584
oinkmaster-1.0.tar.gz
Posted May 18, 2004
Authored by Andreas Oestling | Site nitzer.dhs.org

Oinkmaster is simple Perl script released under the BSD license to help update and manage Snort 2.0+ rules and to comment out the unwanted ones after each update. It will report what has changed since the last update, offering good change control.

Changes: Feature enhancements, bug fixes, and many other improvements.
tags | tool, perl, sniffer
systems | bsd
SHA-256 | acd85eeb4b35eecc6aace83f16e870501f129c00ce925eb81da5576ff45a6827
tcpreplay-2.2.1.tar.gz
Posted May 17, 2004
Site sourceforge.net

tcpreplay is a BSD-style licensed tool to replay saved tcpdump files at arbitrary speeds. It provides a variety of features for replaying traffic for both passive sniffer devices as well as inline devices such as routers, firewalls, and the new class of inline IDS's. Many NIDSs fare poorly when looking for attacks on heavily-loaded networks. tcpreplay allows you to recreate real network traffic from a real network for use in testing.

Changes: Fixed some bugs and compile issues.
tags | tool, arbitrary, intrusion detection
systems | unix, bsd
SHA-256 | 9d8239023b75dd6c0b9e911839f95de8c525490ec95b4e149405ac24a212f5b2
libShellCode-0.3.0.tar.gz
Posted May 14, 2004
Authored by ORK | Site orkspace.net

libShellCode is a library that can be included when writing Linux and BSD i386 based exploits by providing functions that generate shellcode with user given parameters during runtime.

Changes: Multiplatform support. Support for chroot evasion and various other functionality.
tags | shellcode
systems | linux, bsd
SHA-256 | 006c6f21ee8c651042ebe887dc08fd248181cac69739071d143146cf6639a355
042004.txt
Posted May 12, 2004
Authored by Stefan Esser | Site e-matters.de

Privilege escalation is possible for users with access to the systrace device on Net-BSD and Free-BSD.

tags | advisory
systems | bsd
SHA-256 | 5055b81404726430cf6bf4f0924753685d120e9b3cabd9c41fc131e5cd09cfb0
lboeg.pl.txt
Posted May 1, 2004
Authored by BlackAngels | Site blackAngels.it

Local buffer overflow exploit generator for Linux, BSD, BSDi, HP-UX, UnixWare, IRIX and SCO.

tags | overflow, local
systems | linux, irix, bsd, hpux, unixware
SHA-256 | 465a904f656b98cb00d6dfdb5da54526aa940319ba0406a0fa7caa938bc9a2a9
THCsmbgetOS.c
Posted Apr 20, 2004
Authored by thc, Johnny Cyberpunk | Site thc.org

A small, but very useful SMB OS-detection tool which gets workgroup, smbserver and operating system. It works for all tested samba versions on different platforms like Mac OSX, AIX, Solaris, Linux, BSD, and all Microsoft Windows platforms.

systems | linux, windows, solaris, bsd, aix, apple
SHA-256 | 15e66dd0f9ffc8a4ba1ade94a6b6fa5ed858378503b48dd688db6c38623db32a
Encoder.zip
Posted Jan 3, 2004
Authored by Jarkko Turkulainen | Site klake.org

Encoder v0.3 is a small program written for MS Visual C which encodes shellcode to not include certain characters using an XOR encoder / decoder. Works with x86 Windows, Linux, and BSD. Includes source and Win32 binary.

tags | x86, shellcode
systems | linux, windows, bsd
SHA-256 | e6e2b8e495ece9acb90a54954545413324facd621c80286401004aec4538ed90
m00-apache-w00t.tar.gz
Posted Dec 16, 2003
Authored by D4rkGr3y | Site m00.ru

Apache 1.3.*-2.0.48 remote users disclosure exploit - Checks Apache webservers for a wrong default configuration of mod_userdir which allows account name guessing and then attempts to login to the found accounts with ftp. Effective against Linux and *BSD boxes.

tags | exploit, remote
systems | linux, bsd
SHA-256 | 9ebf9d02a9390c8ff2fee63f5a4681199fc9a1055bff1cbd68bce1199fcc32d8
thttpd-sontot.c
Posted Dec 15, 2003
Authored by decka_trash

Thttpd v2.21 through 2.23b1 remote denial of service buffer overflow exploit. Tested against FreeBSD, SunOS 4, Solaris 2, BSD/OS, Linux, and OSF.

tags | exploit, remote, denial of service, overflow
systems | linux, solaris, freebsd, bsd
SHA-256 | 38d094daad04305c09883e203114d57290f80d0373787893a50500e94e4263e9
rec16lx.zip
Posted Dec 14, 2003
Site backerstreet.com

REC is a portable reverse engineering decompiler which reads an executable file and attempts to produce a C-like representation of the code and data used to build it. It can decompile 386, 68k, PowerPC, and MIPS R3000 programs and recognizes the following file formats: ELF (System V Rel. 4, e.g. Linux, Solaris, etc.), COFF (System V Rel. 3.x, e.g. SCO), PE (Win32 .EXE and .DLL for Microsoft Windows 95 and NT), AOUT (BSD derivatives, e.g. SunOS 4.x), Playstation PS-X (MIPS target only), and raw binary data (via .cmd files).

systems | linux, windows, solaris, bsd
SHA-256 | 3f8f4c802b33352fe0114bbf7758d4f5510b3e435824539cf8b5a73eb0162a87
oinkmaster-0.9.tar.gz
Posted Dec 3, 2003
Authored by Andreas Oestling | Site nitzer.dhs.org

Oinkmaster is simple Perl script released under the BSD license to help update and manage Snort 2.0+ rules and to comment out the unwanted ones after each update. It will report what has changed since the last update, offering good change control.

Changes: Bug fixes.
tags | tool, perl, sniffer
systems | bsd
SHA-256 | d9d006ffdb368ee6a413eee32caca7b7ee7d284108b1ec37da8cf1b7fb9bd40c
arping-2.02.tar.gz
Posted Nov 16, 2003
Authored by Thomas Habets | Site habets.pp.se

Arping is an arp level ping utility which broadcasts a who-has ARP packet on the network and prints answers. Very useful when you are trying to pick an unused IP for a net that you don't yet have routing to, or to ping an ethernet address directly. Tested on Linux, {Free,Net,Open}BSD, MacOS X, and Solaris.

Changes: Updated to work with Libnet 1.1.x.
tags | tool
systems | linux, unix, solaris, bsd, osx
SHA-256 | 0e5dbf5e869c1139029b8bddb195e1f07112372d3fc6a8cd531dd8f298bfd15a
DMit-v1.0beta.tgz
Posted Nov 8, 2003
Authored by Kernel-- | Site deep-magic.org

Dmitry (Deepmagic Information Gathering Tool) is a a UNIX/(GNU)Linux Command Line program coded purely in C with the ability to gather as much information as possible about a host. Gets netcraft information, whois lookup, tcp port scan, looks for subdomains, and grabs banners. Tested on *BSD and some Linux variations.

tags | tool, scanner, tcp
systems | linux, unix, bsd
SHA-256 | ec840c07c82826aa9cf8717d60d4b2c6b25ab34cd23e482f25b0e4ed26db50a6
wilco-recvbof-adv.txt
Posted Sep 11, 2003
Authored by Luigi Auriemma | Site aluigi.altervista.org

A vulnerability lies in the Roger Wilco client where it trusts the data length specified in a packet without validation and can allow the program to allocate an insufficiently sized buffer. Versions affected: Graphical server 1.4.1.6 and below, Dedicated server for Win32 0.30a and below and Linux/BSD 0.27 and below.

tags | advisory, overflow
systems | linux, windows, bsd
SHA-256 | deff21d4849d1e9951b10fb183f5b0b9f242bf1b7a7c77fa8c3f4dae20339197
oinkmaster-0.8.tar.gz
Posted Sep 4, 2003
Authored by Andreas Oestling | Site nitzer.dhs.org

Oinkmaster is simple Perl script released under the BSD license to help update and manage Snort 2.0+ rules and to comment out the unwanted ones after each update. It will report what has changed since the last update, offering good change control.

tags | tool, perl, sniffer
systems | bsd
SHA-256 | 493788e7014c2411f59303da651df64e9f1ada3b98bd567a9f8b3129aa61996e
Wellenreiter-v1.9.tar.gz
Posted Aug 29, 2003
Authored by Team Remote-exploit.org | Site wellenreiter.net

Wellenreiter is a GTK/Perl wireless network discovery and auditing tool. Its scanner window can be used to discover access-points, networks, and ad-hoc cards. It detects essid broadcasting or non-broadcasting networks and detects WEP capabilities and the manufacturer automatically. Dhcp and arp traffic will be decoded and displayed to give you further informations about the networks. A flexible sound event configuration lets it work in unattended. An ethereal / tcpdump-compatible dumpfile can be created. GPS is used to track the location of the discovered networks immediately. Automatic associating is possible with randomly generated MAC address. Wellenreiter runs also on low-resolution devices that can run GTK/Perl and Linux/BSD (such as iPaqs). An unique Essod-bruteforcer is now included too. prism2, Lucent, and Cisco based cards are supported.

Changes: Added the User guide in the docs directory, Raised the packet capture length from 400 to 65535, Added a patch for better detection of prism2 based PCI and usb cards.
tags | tool, perl, wireless
systems | cisco, linux, bsd
SHA-256 | b6e11e7142d8e615e21c96edf48ca439a7d5cb0d30804df676be298377ebe0b6
xtokkax.c
Posted Aug 5, 2003
Authored by Gunzip

Linux and BSD x86 local exploit for xtokkaetama that gives egid of games.

tags | exploit, x86, local
systems | linux, bsd
SHA-256 | b520af024cb9003b4e1a42a73b3409332209fffab5a67095c1e394f14a9b173b
wnet.tgz
Posted May 23, 2003
Authored by h1kari | Site dachb0den.com

libwnet is a packet creation and injection framework for building raw 802.11b frames and injecting them on BSD based systems. Included in this base package are dinject v0.1, a command line 802.11b packet injection package based on nemesis, and reinj v0.1, a proof-of-concept utility for the tcp/arp re-injection attack to generate traffic on a weped network. This tool will allow an end-user to crack WEP on a low-traffic network in less than 60 minutes. It is for OPENBSD 3.2 only.

tags | tool, tcp, wireless
systems | bsd, openbsd
SHA-256 | 83fb5b9c48098c69a352cefb9f8a20f97622260a6f71dc8183a388e8c594acc5
bsd-airtools-v0.2.tgz
Posted May 23, 2003
Authored by h1kari | Site dachb0den.com

bsd-airtools is a package that provides a complete tool set for wireless 802.11b auditing. Namely, it currently contains a bsd-based wep cracking application, called dweputils (as well as kernel patches for NetBSD, OpenBSD, and FreeBSD). It also contains a curses based ap detection application similar to netstumbler (dstumbler) that can be used to detect wireless access points and connected nodes, view signal to noise graphs, and interactively scroll through scanned ap's and view statistics for each. It also includes a couple other tools to provide a complete tool set for making use of all 14 of the prism2 debug modes as well as do basic analysis of the hardware-based link-layer protocols provided by prism2's monitor debug mode.

tags | tool, kernel, protocol, wireless
systems | netbsd, freebsd, bsd, openbsd
SHA-256 | f61db60cd3fcb1273e22d688348fa72cdcc0f5b1a3efef5afb3e941dfa242a23
Page 7 of 15
Back56789Next

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    0 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    0 Files
  • 23
    Apr 23rd
    0 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close