what you don't know can hurt you
Showing 1 - 15 of 15 RSS Feed

Files

Richsploit RichFaces Exploitation Toolkit
Posted Mar 9, 2020
Authored by redtimmysec

This tool can be used to exploit vulnerable versions of RichFaces. It has payloads for 4 vulnerabilities that have been identified, which can lead to remote code execution via java deserialization and EL injection.

tags | exploit, tool, java, remote, vulnerability, code execution
advisories | CVE-2013-2165, CVE-2015-0279, CVE-2018-14667
MD5 | dbe44bcd30e854ad24e9361d53b24ebb

Related Files

SpaceHack Satellite Terminal Scanner
Posted Nov 17, 2016
Authored by Nicholas Lemonias

This tool can be used to find insecure satellite terminals and "Telecommand and Control" terminals in a network.

tags | tool, scanner
systems | unix
MD5 | b7d56025d18986f06f0994da75107cfc
SkypeFreak Forensic Tool
Posted Mar 21, 2014
Authored by Osanda Malith

This tool can be used to enumerate Skype users profiles, contacts, messages, and calls from the main.db file. This is automated easy to use application in which to perform forensic spelunking of Skype data.

tags | tool, forensics
MD5 | c2f9ce08e658c838aa56267c0fda951a
PWDumpX11.zip
Posted Jan 7, 2008
Authored by Reed Arvin | Site reedarvin.thearvins.com

PWDumpX version 1.1 allows a user with administrative privileges to retrieve the domain password cache, password hashes and LSA secrets from a Windows system. This tool can be used on the local system or on one or more remote systems. If an input list of remote systems is supplied, PWDumpX will attempt to obtain the domain password cache, the password hashes and the LSA secrets from each remote Windows system in a multi-threaded fashion (up to 64 systems simultaneously). The domain password cache, password hashes and LSA secrets from remote Windows systems are encrypted as they are transfered over the network. No data is sent over the network in clear text. This tool is a completely re-written version of CacheDump, PWDump3e and LSADump2 which integrates suggestions/bug fixes for PWDump3e and LSADump2 found on various web sites, etc. Source code included.

tags | remote, web, local, cracker
systems | windows
MD5 | 140b40e3635fb56a786ab8999da31c41
PWDumpX.zip
Posted Jan 7, 2008
Authored by Reed Arvin | Site reedarvin.thearvins.com

The PWDumpX tool allows a user with administrative privileges to retrieve the encrypted password hashes and LSA secrets from a Windows system. This tool can be used on the local system or on one or more remote systems.

tags | remote, local, cracker
systems | windows
MD5 | 06b38b744b02dac47976b3b5671c1331
PWDumpX14.zip
Posted Jan 7, 2008
Authored by Reed Arvin | Site reedarvin.thearvins.com

PWDumpX allows a user with administrative privileges to retrieve the domain password cache, password hashes and LSA secrets from a Windows system. This tool can be used on the local system or on one or more remote systems. If an input list of remote systems is supplied, PWDumpX will attempt to obtain the domain password cache, the password hashes and the LSA secrets from each remote Windows system in a multi-threaded fashion (up to 64 systems simultaneously). The domain password cache, password hashes and LSA secrets from remote Windows systems are encrypted as they are transfered over the network. No data is sent over the network in clear text. This tool is a completely re-written version of CacheDump, PWDump3e and LSADump2 which integrates suggestions/bug fixes for PWDump3e and LSADump2 found on various web sites, etc. Source code included.

Changes: Now dumps domain password cache (if available), LSA secrets, password hashes, and password history hashes (if available).
tags | remote, web, local, cracker
systems | windows
MD5 | aca17d904f3995dc0953bf435d399be2
faset.tar
Posted Apr 14, 2004
Authored by detach | Site hackaholic.org

FASET stands for File And Stream Encryption Tool. This tool can be used to encrypt a file or to encrypt a stream, for example through a pipe. It uses strong 16 round Blowfish encryption in Cipher Block Chaining mode (CBC) and supports a maximum keysize of 448-bits (56 bytes). Full documentation for possible usage included.

tags | encryption
MD5 | bb157d23397057df41f8818ca1646bd2
htmlbar.msi
Posted Jun 11, 2003
Authored by Richard van den Berg | Site vdberg.org

HTML Source Code Explorer Bar 2.0 is a plug-in for Internet Explorer that allows you to view the form fields for any HTML form being served and easily repopulate the fields (even hidden fields) with the input of your choice and submit the data. This tool can be very useful for penetration testing input validation on CGI scripts, etc.

tags | web, cgi
MD5 | 7abc1851659bb76fb79605c27dd03f17
dumpwin.zip
Posted Nov 12, 2002
Authored by Arjun Pednekar | Site nii.co.in

DumpWin v2.0 is a tool that can be used to gather an extensive amount of information about Windows NT/2000 machines, including software, users, ACLs, account lockout policies, running processes, services, etc. More information about this tool can be found here.

systems | windows, nt
MD5 | 0998c8929aa84fe126d1544cb6139ce5
lodowep-src-1_2_1.zip
Posted Oct 30, 2002
Site cqure.net

Lodowep 1.2.1 is a tool for analyzing password strength of user accounts on a Lotus Domino webserver system by using dictionary attacks. Lodowep is multi-threading and supports both session- and basic-authentication. The binary version of this tool can be found here.

tags | cracker
MD5 | dca73cca85c27f720d9cd8e9ccb2270e
netstatx.c
Posted Sep 28, 2002
Authored by Guile Cool, eXedes

This tool can be used to replace netstat in order to hide network sockets on a system.

tags | tool, rootkit
systems | unix
MD5 | 906dafcb2634d5b7dae47def6bf3a1d4
iss.c
Posted Sep 25, 2002
Authored by Rammstein

This tool can be used to scan IIS servers for the unicode directory traversal vulnerability.

tags | cgi
systems | unix
MD5 | 9992afec563d973be3af36bcfa97c9f1
ComLog.pl
Posted Aug 16, 2002
Authored by Floydman | Site securit.iquebec.com

ComLog.pl, a WIN32 command prompt logger - The goal of this paper is to present a new Perl tool made to monitor DOS sessions on Windows NT/2K (should also work on XP). This tool can be used by administrators to keep a history of commands typed in the DOS command prompt and the associated output, for example on an IIS server. This can help admins to figure out what an attacker has done after compromising the machine via one of the numerous vulnerabilities available.

tags | perl, vulnerability
systems | windows, 2k, nt, 32
MD5 | 8cd836c9e931f3e30fdfcb6512faae37
sharefuzz1.0.tar.gz
Posted Oct 18, 2001
Site atstake.com

Sharefuzz is a shared library which automatically detects environment variable overflows in Unix systems. This tool can be used to ensure all necessary patches have been applied, or as a reverse engineering tool.

tags | overflow
systems | unix
MD5 | ce7844699a210522286b4480149b9935
FPipe_2.04.zip
Posted Sep 11, 2000
Authored by Foundstone Labs | Site foundstone.com

FPipe version 2.4 is a TCP source port forwarder/redirector that can be used to force a TCP stream to always connect using a specific source port. This tool can be used to get around firewalls that only accept traffic originating from common source ports.

tags | tcp
MD5 | 85f2777e8258ac18b0cd1ba5d24f14e7
FPipe_2.01
Posted Aug 22, 2000
Authored by Foundstone Labs | Site foundstone.com

FPipe is a TCP source port forwarder/redirector that can be used to force a TCP stream to always connect using a specific source port. This tool can be used to get around firewalls that only accept traffic originating from common source ports.

tags | tcp
MD5 | b5c77897d256fcead84f898462dccf06
Page 1 of 1
Back1Next

File Archive:

November 2020

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Nov 1st
    2 Files
  • 2
    Nov 2nd
    9 Files
  • 3
    Nov 3rd
    15 Files
  • 4
    Nov 4th
    90 Files
  • 5
    Nov 5th
    22 Files
  • 6
    Nov 6th
    16 Files
  • 7
    Nov 7th
    1 Files
  • 8
    Nov 8th
    1 Files
  • 9
    Nov 9th
    40 Files
  • 10
    Nov 10th
    27 Files
  • 11
    Nov 11th
    28 Files
  • 12
    Nov 12th
    13 Files
  • 13
    Nov 13th
    18 Files
  • 14
    Nov 14th
    2 Files
  • 15
    Nov 15th
    2 Files
  • 16
    Nov 16th
    29 Files
  • 17
    Nov 17th
    15 Files
  • 18
    Nov 18th
    15 Files
  • 19
    Nov 19th
    21 Files
  • 20
    Nov 20th
    16 Files
  • 21
    Nov 21st
    1 Files
  • 22
    Nov 22nd
    0 Files
  • 23
    Nov 23rd
    19 Files
  • 24
    Nov 24th
    32 Files
  • 25
    Nov 25th
    7 Files
  • 26
    Nov 26th
    0 Files
  • 27
    Nov 27th
    0 Files
  • 28
    Nov 28th
    0 Files
  • 29
    Nov 29th
    0 Files
  • 30
    Nov 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2020 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close