This tool is a wrapper for the reaver WPS attack toolkit. As there is no automatic way to prescan, decide, and then start the attack, this wrapper takes care of it. Written in perl.
77f6680aaa3369a21bf84af444e0c5a958ed4d7faae9912a95ebde099266e156
This tool is a 3DES shellcode crypter.
9e6475d7e02bb5bcc0b7670b1ca005b4e4ecb987abc3fd2dcd7a5d44af829d04
A Network Time Protocol (NTP) Amplification attack is an emerging form of Distributed Denial of Service (DDoS) that relies on the use of publicly accessible NTP servers to overwhelm a victim system with UDP traffic. The NTP service supports a monitoring service that allows administrators to query the server for traffic counts of connected clients. This information is provided via the "monlist" command. The basic attack technique consists of an attacker sending a "get monlist" request to a vulnerable NTP server, with the source address spoofed to be the victim's address. This tool is a proof of concept that demonstrates this attack.
48b0f0fb221c6a092ee7210ff8b830e0b5ba18fd3294e65cf266ee2f4b6a19f1
This tool is a proof-of-concept packer for .NET executables designed to provide a starting point to explain the basic principles of runtime packing.
00edbbabaeeafd89302340cee6a316b6a2882f9c7f305be53f952d2c234eaf60
This tool is a php script that assists in finding vulnerable components in multiple CMS systems.
4d2492d8c0103eb62eed2ed37137e6e97badf00162448c9f8015bfeea67e820e
This tool is a proof of concept utility that demonstrates how CleanerSoft's Free Hide Folder is insecure. It uncovers the master password, shows what folders are hidden and can unhide them.
b57fab33a5d38439456d68699ade172233b85c0a1e62fe7cde6dc3117397f4a5
This tool is a simple WordPress brute forcing utility written in PHP.
826118e911fad728ccfeda726fcedec979d776f67274fb216b25defd0c3b5541
This tool is a polymorphic shellcode editor.
80e7547fd684fb6a3e2aacc65fbc85005ed50a4d36805f404985dafe4ebfec7b
PWDumpX version 1.1 allows a user with administrative privileges to retrieve the domain password cache, password hashes and LSA secrets from a Windows system. This tool can be used on the local system or on one or more remote systems. If an input list of remote systems is supplied, PWDumpX will attempt to obtain the domain password cache, the password hashes and the LSA secrets from each remote Windows system in a multi-threaded fashion (up to 64 systems simultaneously). The domain password cache, password hashes and LSA secrets from remote Windows systems are encrypted as they are transfered over the network. No data is sent over the network in clear text. This tool is a completely re-written version of CacheDump, PWDump3e and LSADump2 which integrates suggestions/bug fixes for PWDump3e and LSADump2 found on various web sites, etc. Source code included.
21b007f246e12a73e716385390d30923a19d359c42aec9b012653ebcd27303f1
PWDumpX allows a user with administrative privileges to retrieve the domain password cache, password hashes and LSA secrets from a Windows system. This tool can be used on the local system or on one or more remote systems. If an input list of remote systems is supplied, PWDumpX will attempt to obtain the domain password cache, the password hashes and the LSA secrets from each remote Windows system in a multi-threaded fashion (up to 64 systems simultaneously). The domain password cache, password hashes and LSA secrets from remote Windows systems are encrypted as they are transfered over the network. No data is sent over the network in clear text. This tool is a completely re-written version of CacheDump, PWDump3e and LSADump2 which integrates suggestions/bug fixes for PWDump3e and LSADump2 found on various web sites, etc. Source code included.
38d449a11af56e57d1ca2b8bd6d718ffb60c28e19d2f99481dbeb583c28a1e0d
This tool is a utility for attacking HID servers.
8387fbfcc57a9ee8b2b18d7490fcace034b6a0a507b218f4b2a69cd0fd173e81
This tool is a log file monitoring and centralization tool. You can use it to monitor the Event Viewer logs, and ASCII log files from just about any application, including, but not limited to, antivirus, personal firewalls, ComLog, Snort, etc. LogAgent 4.0 also comes with 2 companion tools that are ADSScan and the combo HashGen and IntegCheck. ADSScan is an alternate data streams scanner, and HashGen/IntegCheck is a MD5-SHA1 file system integrity checker, or also known as a host-based intrusion detection system.
d2cf59adf7aa0cd3186bf9ff062ee27043fd5b8d2286aed46d27b96a616c008a
This tool is a command prompt (cmd.exe) logger, useful for generating intrusion evidence that was previously unavailable. With this tool, you can log command prompt sessions be it from the console, a compromised IIS system or through a netcat tunnel. Working a bit like a wrapper, ComLog takes the place of cmd.exe and passes the commands to be executed to the real cmd.exe which is renamed cm_.exe. Version 1.05 changes include MS-DOS icon added to the executable, and better camouflage to avoid detection by the monitored.
ace19f02d040949d4cffa6040cf70cc0e5f3a1f3b3e71d7dfd20cba25e0cecf8