exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 25 of 100 RSS Feed

Files

Trojans213.zip
Posted Apr 5, 2000
Authored by Evil_dead

Trojans213.zip is a list of 213 remote access windows trojans, with the default port numbers they use. Also contains a list formatted for use with superscan 2.0*. Archive password is set to p4ssw0rd. Use at your own risk.

tags | remote, trojan
systems | windows
SHA-256 | 1fd6a10a326570d7abd24f5219207d57e1f5f40291a26545d6029aed0e99d4b4

Related Files

SCADA Trojans: Attacking The Grid
Posted Mar 23, 2011
Authored by Ruben Santamarta | Site reversemode.com

Presentation slides from "SCADA Trojans: Attacking the Grid" as it was presented at RootedCon'11 in Madrid.

tags | paper, trojan
SHA-256 | b859f48eb76310750d6445553c321c3c561679e19c67b8bde7dec9455c01c929
Introduction To PHP Trojans
Posted Apr 1, 2010
Authored by seth

Whitepaper called Introduction to PHP Trojans. Written in Spanish.

tags | paper, trojan, php
SHA-256 | 8fcdc63bcd4fb561d922607d7923a7e2ab2bb726e95df7dc775a0befac9ff31d
Whitepaper About PHP Trojans
Posted Jan 30, 2010
Authored by shad0w_crash

Small whitepaper detailing simple methodologies surrounding PHP trojans.

tags | paper, trojan, php
SHA-256 | 6af6687dfb6f63aecb232c3f8a37be1090352507eda4e8000e630ee071dcc16c
Check Rootkit 0.49
Posted Jul 30, 2009
Authored by Nelson Murilo | Site chkrootkit.org

Chkrootkit checks locally for signs of a rootkit. Chkrootkit includes ifpromisc.c to check and see if the interface is in promisc mode, chklastlog.c to check lastlog for deletions, and chkwtmp.c to check wtmp for deletions, strings.c for quick and dirty strings replacement, check_wtmpx.c to check for wtmpx deletions and the files chkproc.c and chkdirs.c to check for LKM trojans. Tested on Linux 2.0.x, 2.2.x and 2.4.x, FreeBSD 2.2.x, 3.x, 4.x, and 5.x, BSDI, OpenBSD 2.6, 2.7, 2.8, 2.9, 3.0 and 3.1, NetBSD 1.5.2 and Solaris 2.5.1, 2.6 and 8.0, and HP-UX 11.

Changes: New and enhanced tests, minor bug fixes.
tags | tool, trojan, integrity, rootkit
systems | linux, netbsd, unix, solaris, freebsd, openbsd, hpux
SHA-256 | ccb87be09e8923d51f450a167f484414f70c36c942f8ef5b9e5e4a69b7baa17f
chkrootkit-0.48.tar.gz
Posted Jan 3, 2008
Authored by Nelson Murilo | Site chkrootkit.org

Chkrootkit checks locally for signs of a rootkit. Chkrootkit includes ifpromisc.c to check and see if the interface is in promisc mode, chklastlog.c to check lastlog for deletions, and chkwtmp.c to check wtmp for deletions, strings.c for quick and dirty strings replacement, check_wtmpx.c to check for wtmpx deletions and the files chkproc.c and chkdirs.c to check for LKM trojans. Tested on Linux 2.0.x, 2.2.x and 2.4.x, FreeBSD 2.2.x, 3.x, 4.x, and 5.x, BSDI, OpenBSD 2.6, 2.7, 2.8, 2.9, 3.0 and 3.1, NetBSD 1.5.2 and Solaris 2.5.1, 2.6 and 8.0, and HP-UX 11.

Changes: New and enhanced tests, minor bug fixes.
tags | tool, trojan, integrity, rootkit
systems | linux, netbsd, unix, solaris, freebsd, openbsd, hpux
SHA-256 | b4b3d3540a7022aa7a81cae93f28c8475bc2660a21f88126725624c09769f1fb
easyscan.tgz
Posted May 17, 2006
Authored by Artizach

Easyscan scans addresses for open tcp ports and displays the results in a list. The list of ports to scan comes from portlist.conf which contains around 707 well-know tcp ports and 462 well-know tcp ports used by trojans.

tags | tool, scanner, trojan, tcp
systems | unix
SHA-256 | 7b020607525cddd9dbb3842fedfb49281310b67e76e66a97a0f151bcbe9d2514
SA-20051223-0.txt
Posted Dec 29, 2005
Authored by SEC Consult | Site sec-consult.com

SEC Consult Security Advisory 20051223-0 - OracleAS Discussion Forum Portlet suffers from multiple Cross Site Scripting vulnerabilities. E.g. it is possible to create relogin trojans, steal session cookies, alter the content of the site or hide articles which don't show up in the overview page.

tags | advisory, trojan, vulnerability, xss
SHA-256 | d04346051912499b9c28f07d881f6390328e316d05d29a873a9d1b5b4f88b1a6
p3scan-2.3.1.tar.gz
Posted Nov 20, 2005
Authored by laitcg | Site p3scan.sourceforge.net

Pop 3 scan is a full transparent proxy server for POP3 clients. It runs on a Linux box with iptables (for port redirection). It can be used to provide POP3 email scanning from the Internet to any internal network, and is ideal for helping to protect your Other OS LAN from harm, especially when used in conjunction with a firewall and other Internet proxy servers. It is designed to enable scanning of incoming email messages for viruses, worms, trojans, spam, and harmful attachments. Because viewing HTML email can enable a spammer to validate an email address (via Web bugs), it can also provide HTML stripping.

Changes: Bug fix release.
tags | worm, web, trojan
systems | linux, unix
SHA-256 | 2c51185caddde414de13f7de9b94986145a6519deac1de655f38538113122329
p3scan-2.2.1.tar.gz
Posted Sep 23, 2005
Authored by laitcg | Site p3scan.sourceforge.net

Pop 3 scan is a full transparent proxy server for POP3 clients. It runs on a Linux box with iptables (for port redirection). It can be used to provide POP3 email scanning from the Internet to any internal network, and is ideal for helping to protect your Other OS LAN from harm, especially when used in conjunction with a firewall and other Internet proxy servers. It is designed to enable scanning of incoming email messages for viruses, worms, trojans, spam, and harmful attachments. Because viewing HTML email can enable a spammer to validate an email address (via Web bugs), it can also provide HTML stripping.

Changes: Made TOP command processing an option. Fixed ability to not use ripmime library. Various other tweaks.
tags | worm, web, trojan
systems | linux, unix
SHA-256 | f2542177fa45fe9ad6bb30fd647614d25ee68588559f91895f366bef1983cb98
Xcon2005_CoolQ.pdf
Posted Aug 31, 2005
Authored by CoolQ | Site xcon.xfocus.org

Xcon 2005: Advanced trojans in Grub

tags | trojan
SHA-256 | 9d66bf700c197ee8747ecbb8dfaa34a5442d6818524958c82f1113b916ec28ba
rt-sa-2005-014.txt
Posted Aug 26, 2005
Authored by RedTeam Pentesting | Site redteam-pentesting.de

The new iTAN security feature for online banking promoted by german banks does not protect against phishing attacks and trojans as claimed.

tags | advisory, trojan
SHA-256 | cb1adf92269713fa4bf2b3ab42a898b4be796883e01115470b2291968fd231e9
Technical Cyber Security Alert 2005-189A
Posted Jul 9, 2005
Authored by US-CERT | Site us-cert.gov

Technical Cyber Security Alert TA05-189A - Apparently there is a heightened amount of direct email attacks where trojans are being passed to unsuspecting users. The emails being sent are very well crafted and are directed specifically to the users they are being sent to.

tags | advisory, trojan
SHA-256 | 836585bd90e04dee73d8be98884a13bc27ea47ffe992c8550080bc41fb4ea92c
chkrootkit-0.45.tar.gz
Posted Apr 18, 2005
Authored by Nelson Murilo | Site chkrootkit.org

Chkrootkit checks locally for signs of a rootkit. Chkrootkit includes ifpromisc.c to check and see if the interface is in promisc mode, chklastlog.c to check lastlog for deletions, and chkwtmp.c to check wtmp for deletions, strings.c for quick and dirty strings replacement, check_wtmpx.c to check for wtmpx deletions and the files chkproc.c and chkdirs.c to check for LKM trojans. Tested on Linux 2.0.x, 2.2.x and 2.4.x, FreeBSD 2.2.x, 3.x, 4.x, and 5.x, BSDI, OpenBSD 2.6, 2.7, 2.8, 2.9, 3.0 and 3.1, NetBSD 1.5.2 and Solaris 2.5.1, 2.6 and 8.0, and HP-UX 11.

Changes: Various improvements, minor bug fixes.
tags | tool, trojan, integrity, rootkit
systems | linux, netbsd, unix, solaris, freebsd, openbsd, hpux
SHA-256 | 67ce369dee026bd488baa977483c0d9784bc6763c815f6018ce19227669ec926
p3scan-2.0.tar.gz
Posted Jan 22, 2005
Authored by laitcg | Site p3scan.sourceforge.net

Pop 3 scan is a full transparent proxy server for POP3 clients. It runs on a Linux box with iptables (for port redirection). It can be used to provide POP3 email scanning from the Internet to any internal network, and is ideal for helping to protect your Other OS LAN from harm, especially when used in conjunction with a firewall and other Internet proxy servers. It is designed to enable scanning of incoming email messages for viruses, worms, trojans, spam, and harmful attachments. Because viewing HTML email can enable a spammer to validate an email address (via Web bugs), it can also provide HTML stripping.

tags | worm, web, trojan
systems | linux, unix
SHA-256 | 0a56b7a930ae363d78d47f70b15740255348708cec1693277c1456897490b0be
grams.html
Posted Nov 13, 2004
Authored by Joe Stewart | Site lurhq.com

Full analysis of the Win32.Grams trojan. It differs from previous E-Gold phishing trojans in that it does not steal credentials instead uses the victim's own browser to siphon all the E-Gold directly from their account to another E-Gold account, using OLE automation. This would completely bypass all the new authentication methods financial institutions are using to thwart keystroke loggers/password stealers, because the trojan simply lets the user do the authentication, then takes over from there.

tags | paper, trojan, virus
systems | windows
SHA-256 | a7c9529c4a026a4b4e4bdc5504bca409a177465b073217315de3f57e6b4fec18
chkrootkit-0.44.tar.gz
Posted Nov 10, 2004
Authored by Nelson Murilo | Site chkrootkit.org

Chkrootkit checks locally for signs of a rootkit. Chkrootkit includes ifpromisc.c to check and see if the interface is in promisc mode, chklastlog.c to check lastlog for deletions, and chkwtmp.c to check wtmp for deletions, strings.c for quick and dirty strings replacement, check_wtmpx.c to check for wtmpx deletions and the files chkproc.c and chkdirs.c to check for LKM trojans. Tested on Linux 2.0.x, 2.2.x and 2.4.x, FreeBSD 2.2.x, 3.x, 4.x, and 5.x, BSDI, OpenBSD 2.6, 2.7, 2.8, 2.9, 3.0 and 3.1, NetBSD 1.5.2 and Solaris 2.5.1, 2.6 and 8.0, and HP-UX 11.

Changes: del counter fixed, better support for Linux threads, Madalin now detected, lots of minor bug fixes.
tags | tool, trojan, integrity, rootkit
systems | linux, netbsd, unix, solaris, freebsd, openbsd, hpux
SHA-256 | a6d2f67e1ec0e015cc4054c00654d076ede9156b89ed9bb360dbd47c8dd0d208
hitb04-captain-crunch-02.pdf
Posted Oct 23, 2004
Site conference.hackinthebox.org

HITB (Hack In The Box) 2004 Presentation by John Draper (Captain Crunch): "Secur ity Threats from Spamming" (part 2). Discusses security issues related to the sp ybots and trojans typically used by spammers, when the same spybots and trojans are used by more malicious / underground hackers.

tags | trojan
SHA-256 | aca1096dc4fccf4d8973aaf976e380756aa0a2e7f2ebaa23730161e224a9e225
hitb04-captain-crunch-01.pdf
Posted Oct 23, 2004
Site conference.hackinthebox.org

HITB (Hack In The Box) 2004 Presentation by John Draper (Captain Crunch): "Security Threats from Spamming" (part 1). Discusses security issues related to the spybots and trojans typically used by spammers, when the same spybots and trojans are used by more malicious / underground hackers.

tags | trojan
SHA-256 | 597e56afa74e0ff57f9965f2d81818ecfa112545bd023456275790457cc19a63
p3scan-1.0.tar.gz
Posted Sep 21, 2004
Authored by laitcg | Site p3scan.sourceforge.net

Pop 3 scan is a full transparent proxy server for POP3 clients. It runs on a Linux box with iptables (for port redirection). It can be used to provide POP3 email scanning from the Internet to any internal network, and is ideal for helping to protect your Other OS LAN from harm, especially when used in conjunction with a firewall and other Internet proxy servers. It is designed to enable scanning of incoming email messages for viruses, worms, trojans, spam, and harmful attachments. Because viewing HTML email can enable a spammer to validate an email address (via Web bugs), it can also provide HTML stripping.

tags | worm, web, trojan
systems | linux, unix
SHA-256 | 0a48ed875b165c0e893fa7082fc50f2adaf79df54dd4623c4a8e398ebb08da0f
backdoor-list.txt
Posted Aug 31, 2004
Authored by Klemster, indiasec | Site indiasec.com

List of the most known backdoors and the ports they use. It has 130 different trojans and more than 150 ports listed.

tags | trojan
SHA-256 | c0ca6e5af2ea2bc12bb290309372e81c364d8109c1d25218f4e4c52443f89292
abouttrojans.txt
Posted Aug 31, 2004
Authored by Klemster, indiasec | Site indiasec.com

White paper discussing Windows trojans. Written for newbie home PC users.

tags | trojan
systems | windows
SHA-256 | 33f7db9373b30ae302e7ee598301369005f836114516b5f2ed62e23b3a46a86a
syscheck-0.6.3.tgz
Posted Jun 25, 2004
Authored by steveg | Site stevegcentral.com

Syscheck version 0.6.3 is a utility for performing sanity checking on system files, services, and ports. It attempts to identify any trojans or rootkits that may be getting used and also looks for vulnerable software installed. ELF binary included.

tags | trojan
systems | unix
SHA-256 | acd45abdf8d192ac0196d7584cbc89736c1a1b3ef25c4a5899f2b0dd9277f2c9
SecureServ-1.2.tar.gz
Posted Feb 21, 2004
Authored by Justin | Site neostats.net

SecureServ is an IRC trojan detector. It is much like a virus scanner, but aimed at IRC networks. Using several methods, including version checks, behavior analysis, and general pattern matching, it aims to detect trojans, viruses, and floodbots which connect to your IRC network.

Changes: Various bug fixes and enhancements for current functionality.
tags | trojan, virus
SHA-256 | 1651d02022accbafb036b39dab841ffdf0f8bfdbf2b6574b4394034808c370e6
SecureServ-1.1.tar.gz
Posted Feb 8, 2004
Authored by Justin | Site neostats.net

SecureServ is an IRC trojan detector. It is much like a virus scanner, but aimed at IRC networks. Using several methods, including version checks, behavior analysis, and general pattern matching, it aims to detect trojans, viruses, and floodbots which connect to your IRC network.

tags | trojan, virus
SHA-256 | 9f888bbad251be9bf5521d086bff96166156274cecb9cfa108823ab3e44c97ad
chkrootkit-043.tar.gz
Posted Jan 6, 2004
Authored by Nelson Murilo | Site chkrootkit.org

Chkrootkit v0.43 locally checks for signs of a rootkit. Chkrootkit includes ifpromisc.c to check and see if the interface is in promisc mode, chklastlog.c to check lastlog for deletions, and chkwtmp.c to check wtmp for deletions, strings.c for quick and dirty strings replacement, check_wtmpx.c to check for wtmpx deletions and the files chkproc.c and chkdirs.c to check for LKM trojans. Tested on Linux 2.0.x, 2.2.x and 2.4.x, FreeBSD 2.2.x, 3.x, 4.x, and 5.x, BSDI, OpenBSD 2.6, 2.7, 2.8, 2.9, 3.0 and 3.1, NetBSD 1.5.2 and Solaris 2.5.1, 2.6 and 8.0, and HP-UX 11.

Changes: Better PROMISC mode detection on newer Linux kernels, new CGI backdoors detected, new rootkits added, and minor bug fixes.
tags | tool, trojan, integrity, rootkit
systems | linux, netbsd, unix, solaris, freebsd, openbsd, hpux
SHA-256 | 116242ca080fe3b4d62772e05c8a42ee4bd5a826ccb49a7b5aa0ed05b58e5758
Page 1 of 4
Back1234Next

File Archive:

May 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    May 1st
    44 Files
  • 2
    May 2nd
    5 Files
  • 3
    May 3rd
    11 Files
  • 4
    May 4th
    0 Files
  • 5
    May 5th
    0 Files
  • 6
    May 6th
    28 Files
  • 7
    May 7th
    3 Files
  • 8
    May 8th
    4 Files
  • 9
    May 9th
    54 Files
  • 10
    May 10th
    12 Files
  • 11
    May 11th
    0 Files
  • 12
    May 12th
    0 Files
  • 13
    May 13th
    17 Files
  • 14
    May 14th
    11 Files
  • 15
    May 15th
    17 Files
  • 16
    May 16th
    13 Files
  • 17
    May 17th
    22 Files
  • 18
    May 18th
    0 Files
  • 19
    May 19th
    0 Files
  • 20
    May 20th
    17 Files
  • 21
    May 21st
    18 Files
  • 22
    May 22nd
    7 Files
  • 23
    May 23rd
    111 Files
  • 24
    May 24th
    27 Files
  • 25
    May 25th
    0 Files
  • 26
    May 26th
    0 Files
  • 27
    May 27th
    0 Files
  • 28
    May 28th
    0 Files
  • 29
    May 29th
    0 Files
  • 30
    May 30th
    0 Files
  • 31
    May 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close