what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 76 - 100 of 100 RSS Feed

Files

Hi5 Brute Forcer
Posted Jun 4, 2009
Authored by P47r1ck | Site darkc0de.com

Hi5 brute forcing utility that takes in a wordlist and is written in Python.

tags | cracker, python
SHA-256 | 20cf2a5a5f41c4cfd2d4f019909b942f71a216d787588a10944ce5e0148869dd

Related Files

hiredteam.txt
Posted Nov 20, 2004
Authored by Luigi Auriemma | Site aluigi.altervista.org

Hired Team: Trial versions 2.0/2.200 and below suffer from format string, malformed packet, and status/kick remote vulnerability flaws.

tags | advisory, remote
SHA-256 | 48d0de0d8b027316b2b64bb516c71819b83ddb7fbf4b158332b44601757163cf
hijackclick3.txt
Posted Jul 11, 2004
Authored by Paul From Greyhats | Site greyhats.cjb.net

A flaw in Microsoft Internet Explorer allows malicious remote users the ability to manipulate access controls in popup.show() resulting in executable mouse click actions.

tags | advisory, remote
SHA-256 | 478d2ec0688e6a3727f322bebdb3a65d2f80c8b71d4207953847cde3ef686b65
hijack2.txt
Posted Nov 26, 2003
Authored by Liu Die Yu

After applying the patch for MS03-048, Windows is still susceptible to the Hijack Click attack when performed in conjunction with the method caching attack which can make the window.move accessible again. Link to a demonstration included.

tags | advisory
systems | windows
SHA-256 | a06ff9d109e90948b1621c8cc5f4399cd3f2acd4266b9a925067a1f7cac1a306
hindu-names.gz
Posted Oct 22, 2003

Word list created form Hindu names. (750 words)

tags | cracker
SHA-256 | afe8b15de9ca58ee1a22a8ff3cbad82ba6cf1697000419bf349d6150a1b1bb46
hideseek.zip
Posted Aug 26, 2002

Playing Hide and Seek on Computer Systems

tags | bbs
SHA-256 | 8db1da39bd9882f606f19b3644c6b2ef5c8a01d7c9e7d18b1196d379cc4806cb
hide.zip
Posted Aug 26, 2002

C source for a program that lets you hide in

tags | bbs
SHA-256 | c2e92a71ee8699fb3eb61611989e2f6ec790a358ad111dc0743c39000b268be7
hightime.gif
Posted Aug 26, 2002

The High Times Logo

tags | bbs
SHA-256 | 6806677ec674df9ab7ca6cb409a0e2e1c9105b2575379471d1692269becb0498
Hijetter_exe.zip
Posted Aug 18, 2002
Authored by FX | Site phenoelit.de

Hijetter is a tool to directly communicate with network printers via the Printer Job Language (PJL) using port 9100. Features include full file system access (if installed on printer), environment variable "tuning" and setting of display messages. Platform: Windows

systems | windows
SHA-256 | 3870af38a82823a2f1b72b6532bf696db9adafcf89ddb164ecf54c2ac08bfe60
hisecure-SurfProtector-3.0.855_english_linux.tgz
Posted Feb 11, 2000
Authored by HiSolutions Software GmbH

HiSecure provides secure encrypted communication betwenn hosts over an insecure network. You can redirect any TCP/IP ports over this secure encrypted channel. It works with Citrix and SAP R/3, and only the powerful web SSL-proxy is included. Solaris and NT versions available on the homepage, here.

tags | web, encryption, tcp
systems | solaris
SHA-256 | b628069f4705c76db0a6bf4308de62e0a60c087bd5caf29b85d2b731d34defa9
hill.gz
Posted Dec 21, 1999

hill.gz

tags | encryption, cryptography
SHA-256 | 5014e16b31671af8fe3cc8fa34502310df4c4275ace8f74699e391d5c5bf3701
hideseek-4.0.zip
Posted Dec 21, 1999

hideseek-4.0.zip

tags | encryption, steganography
SHA-256 | e6ef7e908b96caf5dd8e93d0d77d73c85319848f32d2f151bc9b068b8ab6d489
hideseek.zip
Posted Dec 21, 1999

hideseek.zip

tags | encryption, steganography
SHA-256 | dcd356ad9d8d340f8df305e0f9db6b8e7d6c15bddf50353a101a7d4682556601
hir10.zip
Posted Dec 15, 1999
Authored by Axon, hir | Site hir.chewies.net

Hackers Information Report #10. Contains Defcon 7 in a nutshell, Flying Below The Radar: Avoiding IDS Systems, BeOS Revealed, RISC, CISC and The concept of the Power-PC, and Hacker News.

tags | risc, magazine
systems | beos
SHA-256 | 459b158b9f77b46da2f7d1e38a0f4641acadf6ff0ec6b6c27e325bdc8828808f
hip11.tar.gz
Posted Dec 14, 1999
Site shocking.com

hip sits on a port and when it gets a telnet connection, it asks for a key. If that key is correct, your ip address is added to /etc/hosts.allow. If it is incorrect, you are disconnected. hip logs all connections, succesful connections, and failed connections via syslogd.

tags | tool
systems | unix
SHA-256 | e70f36d15ea73362f6ea128ffd0179a27f2ba47ecbd2924a8fbd9ecf1a07a204
hideme.c
Posted Sep 23, 1999
Authored by s0ftpj

Log editor that cleans Utmp, Wtmp, LastLog, Messages, XferLog, Secure and MailLog. Linux - c source Courtesy of soft project digital security for y2k

systems | linux
SHA-256 | 53330974c17923ab0e9ffe80cb6194db9f47475505178ebb727a990cff50e197
hiperbomb2.c
Posted Sep 22, 1999

Exploit to send a large volume of IACs which eventually leads to a reboot of 3COM's HiperARC

tags | exploit
SHA-256 | dbbcf212057df1232edc1ee2a26005a071ab2569f332337a2f2664387ef59609
hir10.tgz
Posted Aug 17, 1999
Authored by Axon, hir | Site hir.chewies.net

Hackers Information Report #10. Contains Defcon 7 in a nutshell, Flying Below The Radar: Avoiding IDS Systems, BeOS Revealed, RISC, CISC and The concept of the Power-PC, and Hacker News.

tags | risc, magazine
systems | beos
SHA-256 | 82e2232aea00b6db09eb21714806ec8804a2be1aeeaa293e66c5aaafe8b23cc0
hijack.zip
Posted Aug 17, 1999

No information is available for this file.

tags | spoof
systems | unix
SHA-256 | 6bdedc8395326ad9441f97baeee44c58a9781f85a1f138aaccbd429ce537d679
hire.a.hacker.html
Posted Aug 17, 1999

"Hire A Hacker FAQ" - An excellent, and quite humorous, list of the issues that will invariably come up when people without previous experience in the hacker community try to hire a hacker. Excellent FAQ by Peter Seebach

tags | paper
SHA-256 | c75cd4ac15bb256bc320c74150c127cfb09c48e30e68a4200f1cc8066e8f8a03
hiew.zip
Posted Aug 17, 1999

No information is available for this file.

SHA-256 | a728dac930f23ea01c624e4969e5c61db2c7c5043b027391f2c18bae742ae97c
hiew565.zip
Posted Aug 17, 1999

No information is available for this file.

SHA-256 | aa315dff820e33b8569ff538bf578ba335a17545035c807adb84f07bfe3f6dce
hiew566.zip
Posted Aug 17, 1999

No information is available for this file.

SHA-256 | d02fd222126c81b24917cd108840ba806f76a4cdecf1656d1120fd77841538b4
hiew584.zip
Posted Aug 17, 1999

HIEW v5.84 hex editor/disassembler/decompiler.

SHA-256 | eab750e4ba829e62642fc209676bd1fc0c56f8aa463c359ad615f89b573ea1a3
hintcrack.zip
Posted Aug 17, 1999
Authored by magic

HintCrack is a tool to crack hotmail 'hints' using a dictionary attack. HintCrack takes a user's login, retrieves their hint from hotmail and attempts to crack the hint using words from a wordlist file. It can check around 80 hints a minute on a 56K modem connection. For MSDOS.

tags | cracker
SHA-256 | 01e14886bcc4fd02f6148e367763caf273c04826ae7b173f5026ab430d777cc5
hideit11.zip
Posted Aug 17, 1999

A small applet that allows you to hide windows.

systems | windows
SHA-256 | c28a018f1f9c1e799a673bdd92fe7c1fd1c0f88a1b52eabdc13e7d5677eb03e6
Page 4 of 4
Back1234Next

File Archive:

May 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    May 1st
    44 Files
  • 2
    May 2nd
    5 Files
  • 3
    May 3rd
    11 Files
  • 4
    May 4th
    0 Files
  • 5
    May 5th
    0 Files
  • 6
    May 6th
    28 Files
  • 7
    May 7th
    3 Files
  • 8
    May 8th
    4 Files
  • 9
    May 9th
    54 Files
  • 10
    May 10th
    12 Files
  • 11
    May 11th
    0 Files
  • 12
    May 12th
    0 Files
  • 13
    May 13th
    17 Files
  • 14
    May 14th
    11 Files
  • 15
    May 15th
    17 Files
  • 16
    May 16th
    13 Files
  • 17
    May 17th
    22 Files
  • 18
    May 18th
    0 Files
  • 19
    May 19th
    0 Files
  • 20
    May 20th
    17 Files
  • 21
    May 21st
    18 Files
  • 22
    May 22nd
    7 Files
  • 23
    May 23rd
    111 Files
  • 24
    May 24th
    27 Files
  • 25
    May 25th
    0 Files
  • 26
    May 26th
    0 Files
  • 27
    May 27th
    0 Files
  • 28
    May 28th
    0 Files
  • 29
    May 29th
    0 Files
  • 30
    May 30th
    0 Files
  • 31
    May 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close