what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 11 of 11 RSS Feed

Files

Config Push snmpset Utility
Posted May 14, 2014
Authored by Michael Killebrew

This is a tool to span /8-sized networks quickly sending snmpset requests with default or otherwise specified community string to Cisco devices.

tags | tool
systems | cisco, unix
SHA-256 | b86a2a908433c19de36ea1175325ee36464ca7207db1d895a2e453787e1e203d

Related Files

Android Data Exfiltration
Posted Jun 28, 2021
Authored by Roman Fiedler | Site unparalleled.eu

This is a tool that was developed to run as alternative "/init". The program will make an Android phone show up as mass storage device during boot. The complete internal storage is available for reading including the partition table and all 42 partitions of the Android system.

tags | exploit
SHA-256 | 26d0ccdaf2d09a37294e6090603335263cb221373194e10a191870af77f5fe23
HiddenWall Linux Firewall
Posted Jun 11, 2019
Authored by coolervoid

This is a tool that generates a Linux kernel module for custom rules with Netfilter hooking to block ports, run in hidden mode, perform rootkit functions, etc.

tags | tool, kernel, firewall
systems | linux, unix
SHA-256 | d0dc6f8136db21f01228d49ad0aaf1fb756fbd13cbc46d39483563c187f9fd7c
Disable Intel AMT
Posted May 8, 2017
Authored by Bart Blaze

This is a tool written to disable Intel AMT on Windows.

tags | tool
systems | windows
SHA-256 | 43d281d3af482c3a29092988f5f489c291d5212710372376d4c2e150a542d75b
Fortinet Firewall EGREGIOUSBLUNDER Checker
Posted Sep 5, 2016
Authored by Fabio Natalucci

This is a tool to check if a Fortinet Firewall is susceptible to the EGREGIOUSBLUNDER exploit.

tags | exploit
SHA-256 | 7f86864dac30cfa3acb3b9ae7ec707c3dbb9128893344888de449a97df30c3b4
Windows Null-Free WinExec Shellcode
Posted Dec 11, 2015
Authored by B3mB4m

This is a tool written in python to generate shellcode to use on Microsoft Windows.

tags | shellcode, python
systems | windows
SHA-256 | 9d065a62ed93f7dd05b3cec4122bdafed6c4c329cba2f1483ffa7f10c8ed93d2
Smart PCAP Replay 1.0
Posted May 29, 2015
Authored by Srinivas Naik

This is a tool to replay packet captures and simulate client/server models when doing analysis. Written in Python.

tags | tool, sniffer, python
systems | unix
SHA-256 | bbc82f1d4197ab39b95472137a8ac96adbcfc361152b02976825089cc906d144
ExploitRemotingService .NET Tool
Posted Nov 19, 2014
Authored by James Forshaw

This is a tool to exploit .NET Remoting Services vulnerable to CVE-2014-1806 or CVE-2014-4149. It only works on Windows although some aspects might work in Mono on *nix.

tags | exploit
systems | windows
advisories | CVE-2014-1806, CVE-2014-4149
SHA-256 | 74ce7c60139cd6b2a713355e1eaa5162b32c8741cbee7e9e2d418a32d899e82e
PLC Device Scanner
Posted Jan 21, 2013
Authored by Dmitry Efanov | Site ptsecurity.com

This is a tool written in Python that will scan for PLC devices over s7comm or modbus protocols.

tags | tool, protocol, python
systems | linux, unix
SHA-256 | 0e1237d54b50e53df44840fb5a1c59f2b1e9d796ffe3149af9d4be819555e677
Skype Hash Dumper 1.0
Posted Dec 29, 2012
Authored by Kevin Devine

This is a tool that demonstrates dumping MD5 password hashes from the configuration file in Skype.

tags | tool
SHA-256 | 1c5bf93ebc41bc95553af5a1fa8a89d8ada7ff8cb06b4f21db26e8a540ca2921
IP Checking Tool
Posted Oct 26, 2009
Authored by Alejandro Ramos

This is a tool to check if a range of IPs are interfaces on the same box.

tags | tool
systems | unix
SHA-256 | ca7b5e84c5cef835590accf0142fb0b997ed187eb613afeb73547abb5d91e685
sqlbf.zip
Posted Jan 28, 2000
Authored by Xaphan

sqlbf - MSSQL server brute force tool. This is a tool for auditing the strength of your SQL login passwords. c++ source.

tags | cracker
SHA-256 | d7b1190ae29de2cf687286b0e0a8b529e95c5db6b35921cb0109ab2a258a4cbe
Page 1 of 1
Back1Next

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    0 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    0 Files
  • 23
    Apr 23rd
    0 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close