what you don't know can hurt you
Showing 51 - 69 of 69 RSS Feed

Files

LFI Image Helper 0.8
Posted Jan 9, 2015
Authored by Doddy Hackman

This is a simple script to infect images with PHP Backdoors for local file inclusion attacks.

tags | tool, local, php, rootkit, file inclusion
systems | unix
MD5 | 3998e803e8bda13df22527ffd0db6359

Related Files

File Inclusion Scanning Utility
Posted Jan 6, 2009
Authored by baltazar | Site darkc0de.com

Local / Remote file inclusion scanner that attempts to make use of a c99 shell on a vulnerable host.

tags | tool, remote, shell, local, scanner, code execution, file inclusion
systems | unix
MD5 | a1530ae1679861ae4a4d3387842eac0e
LFI To RCE Exploit With Perl Script
Posted Dec 9, 2008
Authored by CWH Underground | Site citecclub.org

Local File Inclusion to Remote Code Execution with a perl script.

tags | paper, remote, local, perl, code execution, file inclusion
MD5 | b9da8e8f909bfd06754d49a7925b5a8f
procmask.txt
Posted Aug 1, 2008
Authored by despai | Site despai.es

This is a simple piece of code for GNU/Linux that masquerades a process.

systems | linux
MD5 | 71c899862335f75f742149359cd60de6
procmask.c
Posted Mar 4, 2008
Authored by despai | Site despai.es

This is a simple piece of code for GNU/Linux that masquerades a process.

systems | linux
MD5 | 9c066d22076bd04c0e578930839f59a8
proxycheck.pl.txt
Posted Dec 18, 2007
Authored by Tom Van de Wiele

This is a simple proxy tool that checks for the HTTP CONNECT method and grabs verbose output from a webserver. It is primarily useful when verifying false positives from automated vulnerability assessment tools.

tags | tool, web, scanner
systems | unix
MD5 | fb11bbbc4ef1b48fa160f60a2e846ef9
coarseknocking-0.0.5.tar.gz
Posted Feb 13, 2006
Authored by Andre Luiz Rodrigues Ferreira | Site coarseknocking.sourceforge.net

This is a simple implementation of Port Knocking techniques. It sniffs network packets looking for predetermined keys and executes commands to open and close ports on the firewall. In the client mode it injects packets with the key to server.

Changes: Added support to choose network interface. Added configuration tool.
tags | tool, scanner
systems | unix
MD5 | df086dcbcfe43701bff517d726b030cb
coarseknocking-0.0.2.tar.gz
Posted Nov 4, 2005
Authored by Andre Luiz Rodrigues Ferreira | Site coarseknocking.sourceforge.net

This is a simple implementation of Port Knocking techniques. It sniffs network packets looking for predetermined keys and executes commands to open and close ports on the firewall. In the client mode it injects packets with the key to server.

tags | tool, scanner
systems | unix
MD5 | 5c760ecdd6a41fa6e680c8aba14fed1a
getr00t.sh
Posted Mar 25, 2005
Authored by ri0t

This is a simple script automating the equally simple exploitation of a trusted path bug in AIX. The problem lies in the invscout program.

tags | exploit
systems | aix
advisories | CVE-2004-1054
MD5 | 2c24407cabeaf323f2d9de28c288acfc
calicserv_getconfig.pm
Posted Mar 5, 2005
Authored by Thor Doomen

This module exploits an vulnerability in the CA License Server network service. This is a simple stack overflow and just one of many serious problems with this software.

tags | exploit, overflow
advisories | CVE-2005-0581
MD5 | 5d5717adee8004068faf13819201da0d
zipbrk.zip
Posted Nov 20, 2004
Authored by oc.192

This is a simple tool that searches for the central and local headers contained in a zip file and alters the uncompressed data variable to be 0 in an attempt to trick anti-virus software into not scanning the files inside the zip file.

tags | exploit, local, virus
advisories | CVE-2004-0932, CVE-2004-0937
MD5 | 42e2e861784ebb52460984f688aed1ad
bmon.sh
Posted Oct 16, 2004
Authored by Idan Nahoum

This is a simple local exploit for FreeBSD/OpenBSD with bmon < 1.2.1_2 installed. It depends on the fact that bmon doesn't use an absolute path to commands that it calls. This particular exploit uses 'netstat'.

tags | exploit, local
systems | freebsd, openbsd
MD5 | 24051a401b01dcceae1c193312a62e4a
ppp-predialer.tar.gz
Posted Oct 10, 2002
Authored by Subbero | Site mhc.ods.org

This is a simple Script written to predial found connects scanned with Toneloc or THC-Scan in intention to find PPP-Dialups or to get the Hex-Values of the PPPD of the remote system. This tool generates output of chat and pppd in the logs directory.

tags | tool, remote, scanner
systems | unix
MD5 | 2ffbe5e4f01e90e635aa1ffb941e1bad
logentry.zip
Posted Aug 26, 2002

This is a simple C++ program that I created.

tags | bbs
MD5 | 90092019ba286e52c9d521380aa37a52
thclinbd.tar.gz
Posted Jan 5, 2001
Authored by s0ftpj, bELFaghor | Site s0ftpj.org

THC Backdoor for Linux - This is a simple but useful backdoor for Linux based on a FreeBSD lkm by pragmatic/THC.

systems | linux, freebsd
MD5 | 7855b79979217cd5813788e01a0e1b83
thcobsdbd.tar.gz
Posted Jan 5, 2001
Authored by s0ftpj, Pigpen | Site s0ftpj.org

THC Backdoor ported to OpenBSD - This is a simple but useful backdoor for OpenBSD based on a FreeBSD lkm by pragmatic/THC.

systems | freebsd, openbsd
MD5 | 11ada1cc8831dc0a793e5b9c3a2c9b78
service_check.tcl
Posted Jan 11, 2000
Authored by Phil Ehrens

This is a simple script written in tcl which parses the output of the nmap program to determine whether required services are in fact running on a machine. Output is written as an html formatted log file.

tags | tool, scanner
systems | unix
MD5 | 1bff7c5cd7f052304d69dfdf624e2f1f
tcp_server-1.0.tar.gz
Posted Aug 17, 1999

This is a simple, generic tcp based server for allowing access to multiple server processes. It's very simply configurable, and can serve up multiple processes. web site

tags | tool, web, tcp
systems | unix
MD5 | 3b77d66d249f680b9c3f57c13283d5f5
sr-1.02.tar
Posted Aug 17, 1999
Authored by Patrick Lambert

System Recovery v1.02 - This is a simple program that can be used to set a database of important system files, and then compare them to see if any were hacked and changed with trojans binaries.

tags | trojan
systems | unix
MD5 | d537af138187f3797621174eb0931b99
Page 3 of 3
Back123Next

File Archive:

August 2021

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Aug 1st
    1 Files
  • 2
    Aug 2nd
    7 Files
  • 3
    Aug 3rd
    5 Files
  • 4
    Aug 4th
    7 Files
  • 5
    Aug 5th
    0 Files
  • 6
    Aug 6th
    0 Files
  • 7
    Aug 7th
    0 Files
  • 8
    Aug 8th
    0 Files
  • 9
    Aug 9th
    0 Files
  • 10
    Aug 10th
    0 Files
  • 11
    Aug 11th
    0 Files
  • 12
    Aug 12th
    0 Files
  • 13
    Aug 13th
    0 Files
  • 14
    Aug 14th
    0 Files
  • 15
    Aug 15th
    0 Files
  • 16
    Aug 16th
    0 Files
  • 17
    Aug 17th
    0 Files
  • 18
    Aug 18th
    0 Files
  • 19
    Aug 19th
    0 Files
  • 20
    Aug 20th
    0 Files
  • 21
    Aug 21st
    0 Files
  • 22
    Aug 22nd
    0 Files
  • 23
    Aug 23rd
    0 Files
  • 24
    Aug 24th
    0 Files
  • 25
    Aug 25th
    0 Files
  • 26
    Aug 26th
    0 Files
  • 27
    Aug 27th
    0 Files
  • 28
    Aug 28th
    0 Files
  • 29
    Aug 29th
    0 Files
  • 30
    Aug 30th
    0 Files
  • 31
    Aug 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2020 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close