exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 12 of 12 RSS Feed

Files

Net-War Reaver Wrapper
Posted Feb 12, 2013
Authored by Sven Wurth

This tool is a wrapper for the reaver WPS attack toolkit. As there is no automatic way to prescan, decide, and then start the attack, this wrapper takes care of it. Written in perl.

tags | tool, perl, wireless
SHA-256 | 77f6680aaa3369a21bf84af444e0c5a958ed4d7faae9912a95ebde099266e156

Related Files

3DES Shellcode Crypter
Posted Jul 11, 2022
Authored by D7X

This tool is a 3DES shellcode crypter.

tags | shellcode
SHA-256 | 9e6475d7e02bb5bcc0b7670b1ca005b4e4ecb987abc3fd2dcd7a5d44af829d04
NTP MON_GETLIST Query Amplification DDoS
Posted Jul 9, 2015
Authored by Todor Donev

A Network Time Protocol (NTP) Amplification attack is an emerging form of Distributed Denial of Service (DDoS) that relies on the use of publicly accessible NTP servers to overwhelm a victim system with UDP traffic. The NTP service supports a monitoring service that allows administrators to query the server for traffic counts of connected clients. This information is provided via the "monlist" command. The basic attack technique consists of an attacker sending a "get monlist" request to a vulnerable NTP server, with the source address spoofed to be the victim's address. This tool is a proof of concept that demonstrates this attack.

tags | exploit, denial of service, udp, spoof, protocol, proof of concept
SHA-256 | 48b0f0fb221c6a092ee7210ff8b830e0b5ba18fd3294e65cf266ee2f4b6a19f1
NetCrypt .NET Executable Packer
Posted Oct 24, 2013
Authored by Yvan Janssens | Site github.com

This tool is a proof-of-concept packer for .NET executables designed to provide a starting point to explain the basic principles of runtime packing.

tags | tool
SHA-256 | 00edbbabaeeafd89302340cee6a316b6a2882f9c7f305be53f952d2c234eaf60
1337 Multiple CMS Scanner Online
Posted Feb 18, 2012
Authored by KedAns-Dz

This tool is a php script that assists in finding vulnerable components in multiple CMS systems.

tags | tool, scanner, php
systems | unix
SHA-256 | 4d2492d8c0103eb62eed2ed37137e6e97badf00162448c9f8015bfeea67e820e
CleanerSoft's Free Hide Folder Proof Of Concept
Posted Oct 5, 2010
Authored by The Laughing Man

This tool is a proof of concept utility that demonstrates how CleanerSoft's Free Hide Folder is insecure. It uncovers the master password, shows what folders are hidden and can unhide them.

tags | exploit, proof of concept
SHA-256 | b57fab33a5d38439456d68699ade172233b85c0a1e62fe7cde6dc3117397f4a5
WordPress Brute Forcer
Posted Jun 16, 2010
Authored by Burtay

This tool is a simple WordPress brute forcing utility written in PHP.

tags | cracker, php
SHA-256 | 826118e911fad728ccfeda726fcedec979d776f67274fb216b25defd0c3b5541
Polymorphic Shellcode Editor
Posted Jun 16, 2010
Authored by Jonathan Salwan | Site shell-storm.org

This tool is a polymorphic shellcode editor.

tags | shellcode
SHA-256 | 80e7547fd684fb6a3e2aacc65fbc85005ed50a4d36805f404985dafe4ebfec7b
PWDumpX11.zip
Posted Jan 7, 2008
Authored by Reed Arvin | Site reedarvin.thearvins.com

PWDumpX version 1.1 allows a user with administrative privileges to retrieve the domain password cache, password hashes and LSA secrets from a Windows system. This tool can be used on the local system or on one or more remote systems. If an input list of remote systems is supplied, PWDumpX will attempt to obtain the domain password cache, the password hashes and the LSA secrets from each remote Windows system in a multi-threaded fashion (up to 64 systems simultaneously). The domain password cache, password hashes and LSA secrets from remote Windows systems are encrypted as they are transfered over the network. No data is sent over the network in clear text. This tool is a completely re-written version of CacheDump, PWDump3e and LSADump2 which integrates suggestions/bug fixes for PWDump3e and LSADump2 found on various web sites, etc. Source code included.

tags | remote, web, local, cracker
systems | windows
SHA-256 | 21b007f246e12a73e716385390d30923a19d359c42aec9b012653ebcd27303f1
PWDumpX14.zip
Posted Jan 7, 2008
Authored by Reed Arvin | Site reedarvin.thearvins.com

PWDumpX allows a user with administrative privileges to retrieve the domain password cache, password hashes and LSA secrets from a Windows system. This tool can be used on the local system or on one or more remote systems. If an input list of remote systems is supplied, PWDumpX will attempt to obtain the domain password cache, the password hashes and the LSA secrets from each remote Windows system in a multi-threaded fashion (up to 64 systems simultaneously). The domain password cache, password hashes and LSA secrets from remote Windows systems are encrypted as they are transfered over the network. No data is sent over the network in clear text. This tool is a completely re-written version of CacheDump, PWDump3e and LSADump2 which integrates suggestions/bug fixes for PWDump3e and LSADump2 found on various web sites, etc. Source code included.

Changes: Now dumps domain password cache (if available), LSA secrets, password hashes, and password history hashes (if available).
tags | remote, web, local, cracker
systems | windows
SHA-256 | 38d449a11af56e57d1ca2b8bd6d718ffb60c28e19d2f99481dbeb583c28a1e0d
hidattack01.tar.gz
Posted Jan 5, 2007
Authored by Collin R. Mulliner | Site mulliner.org

This tool is a utility for attacking HID servers.

tags | tool, wireless
SHA-256 | 8387fbfcc57a9ee8b2b18d7490fcace034b6a0a507b218f4b2a69cd0fd173e81
log40free.zip
Posted May 29, 2003
Authored by Floydman | Site securit.iquebec.com

This tool is a log file monitoring and centralization tool. You can use it to monitor the Event Viewer logs, and ASCII log files from just about any application, including, but not limited to, antivirus, personal firewalls, ComLog, Snort, etc. LogAgent 4.0 also comes with 2 companion tools that are ADSScan and the combo HashGen and IntegCheck. ADSScan is an alternate data streams scanner, and HashGen/IntegCheck is a MD5-SHA1 file system integrity checker, or also known as a host-based intrusion detection system.

SHA-256 | d2cf59adf7aa0cd3186bf9ff062ee27043fd5b8d2286aed46d27b96a616c008a
comlog105free.zip
Posted May 29, 2003
Authored by Floydman | Site securit.iquebec.com

This tool is a command prompt (cmd.exe) logger, useful for generating intrusion evidence that was previously unavailable. With this tool, you can log command prompt sessions be it from the console, a compromised IIS system or through a netcat tunnel. Working a bit like a wrapper, ComLog takes the place of cmd.exe and passes the commands to be executed to the real cmd.exe which is renamed cm_.exe. Version 1.05 changes include MS-DOS icon added to the executable, and better camouflage to avoid detection by the monitored.

SHA-256 | ace19f02d040949d4cffa6040cf70cc0e5f3a1f3b3e71d7dfd20cba25e0cecf8
Page 1 of 1
Back1Next

File Archive:

August 2022

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Aug 1st
    20 Files
  • 2
    Aug 2nd
    4 Files
  • 3
    Aug 3rd
    6 Files
  • 4
    Aug 4th
    55 Files
  • 5
    Aug 5th
    16 Files
  • 6
    Aug 6th
    0 Files
  • 7
    Aug 7th
    0 Files
  • 8
    Aug 8th
    0 Files
  • 9
    Aug 9th
    0 Files
  • 10
    Aug 10th
    0 Files
  • 11
    Aug 11th
    0 Files
  • 12
    Aug 12th
    0 Files
  • 13
    Aug 13th
    0 Files
  • 14
    Aug 14th
    0 Files
  • 15
    Aug 15th
    0 Files
  • 16
    Aug 16th
    0 Files
  • 17
    Aug 17th
    0 Files
  • 18
    Aug 18th
    0 Files
  • 19
    Aug 19th
    0 Files
  • 20
    Aug 20th
    0 Files
  • 21
    Aug 21st
    0 Files
  • 22
    Aug 22nd
    0 Files
  • 23
    Aug 23rd
    0 Files
  • 24
    Aug 24th
    0 Files
  • 25
    Aug 25th
    0 Files
  • 26
    Aug 26th
    0 Files
  • 27
    Aug 27th
    0 Files
  • 28
    Aug 28th
    0 Files
  • 29
    Aug 29th
    0 Files
  • 30
    Aug 30th
    0 Files
  • 31
    Aug 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Hosting By
Rokasec
close