seeing is believing
Showing 26 - 50 of 551 RSS Feed

Trojan Files

Simple Perl Keylogger For Windows
Posted Jul 2, 2010
Authored by MDH3LL

This is a simple perl keylogger for Windows. Archive password is set to p4ssw0rd. Use at your own risk.

tags | trojan, perl
systems | windows
MD5 | d8d830130536b844781a2472157e1e47
Weevely PHP Trojan
Posted Jun 17, 2010

Weevely is a PHP trojan that hides a backdoor for communication using a fake HTTP_REFERER header. Archive password is set to p4ssw0rd. Use at your own risk.

tags | trojan, php
MD5 | d6fb5aa4f2522877a1778b6fd784534e
Unreal IRCD 3.2.8.1 Remote Download / Execute Trojan
Posted Jun 15, 2010

Unreal IRCD version 3.2.8.1 remote downloader / execute trojan.

tags | exploit, remote, trojan
MD5 | bb62715a6cb0bc09af04403b5f5c847f
Mandriva Linux Security Advisory 2010-091
Posted May 5, 2010
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Advisory 2010-091 - This update provides a new OpenOffice.org version 3.1.1. An integer underflow might allow remote attackers to execute arbitrary code via crafted records in the document table of a Word document, leading to a heap-based buffer overflow. A heap-based buffer overflow might allow remote attackers to execute arbitrary code via unspecified records in a crafted Word document, related to table parsing. A heap-based buffer overflow allows remote attackers to execute arbitrary code via a crafted EMF file. Multiple heap-based buffer overflows allow remote attackers to execute arbitrary code via a crafted EMF+ file. OpenOffice's xmlsec uses a bundled Libtool which might load.la file in the current working directory allowing local users to gain privileges via a Trojan horse file. For enabling such vulnerability xmlsec has to use --enable-crypto_dl building flag however it does not, although the fix keeps protected against this threat whenever that flag had been enabled.

tags | advisory, remote, overflow, arbitrary, local, trojan
systems | linux, mandriva
advisories | CVE-2009-0200, CVE-2009-0201, CVE-2009-2139, CVE-2009-2140, CVE-2009-3736
MD5 | bfbffa42ccc8de8ca867526115f1eca4
Mandriva Linux Security Advisory 2010-078
Posted Apr 28, 2010
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Advisory 2010-078 - The command matching functionality in sudo 1.6.8 through 1.7.2p5 does not properly handle when a file in the current working directory has the same name as a pseudo-command in the sudoers file and the PATH contains an entry for ., which allows local users to execute arbitrary commands via a Trojan horse executable, as demonstrated using sudoedit, a different vulnerability than CVE-2010-0426. Packages for 2008.0 are provided for Corporate Desktop 2008.0 customers. The updated packages have been patched to correct this issue. Packages for 2009.0 are provided due to the Extended Maintenance Program.

tags | advisory, arbitrary, local, trojan
systems | linux, mandriva
advisories | CVE-2010-1163
MD5 | 2344824ca6cfa27865431ec8d854428a
Mandriva Linux Security Advisory 2010-078
Posted Apr 19, 2010
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Advisory 2010-078 - The command matching functionality in sudo 1.6.8 through 1.7.2p5 does not properly handle when a file in the current working directory has the same name as a pseudo-command in the sudoers file and the PATH contains an entry for., which allows local users to execute arbitrary commands via a Trojan horse executable, as demonstrated using sudoedit, a different vulnerability than CVE-2010-0426. Packages for 2008.0 are provided for Corporate Desktop 2008.0 customers. The updated packages have been patched to correct this issue.

tags | advisory, arbitrary, local, trojan
systems | linux, mandriva
advisories | CVE-2010-1163
MD5 | f4d40abdd936ea4b09edc11985ec3f49
Mandriva Linux Security Advisory 2010-075
Posted Apr 16, 2010
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Advisory 2010-075 - OpenOffice's xmlsec uses a bundled Libtool which might load .la file in the current working directory allowing local users to gain privileges via a Trojan horse file. For enabling such vulnerability xmlsec has to use --enable-crypto_dl building flag however it does not, although the fix keeps protected against this threat whenever that flag had been enabled.

tags | advisory, local, trojan
systems | linux, mandriva
advisories | CVE-2009-3736
MD5 | 0e3f600a4ca615694af37cccfd23a33a
Introduction To PHP Trojans
Posted Apr 1, 2010
Authored by seth

Whitepaper called Introduction to PHP Trojans. Written in Spanish.

tags | paper, trojan, php
MD5 | c2c9f83077d7d7b99e5c90edb0376a70
Energizer DUO Trojan Code Execution
Posted Mar 9, 2010
Authored by H D Moore | Site metasploit.com

This Metasploit module will execute an arbitrary payload against any system infected with the Arugizer trojan horse. This backdoor was shipped with the software package accompanying the Energizer Duo USB battery charger.

tags | exploit, arbitrary, trojan
advisories | CVE-2010-0103
MD5 | d6d4fbfd8adf2bc89ff2a66c568d2df7
Whitepaper About PHP Trojans
Posted Jan 30, 2010
Authored by shad0w_crash

Small whitepaper detailing simple methodologies surrounding PHP trojans.

tags | paper, trojan, php
MD5 | 668176f8cdeb5c3183faa7183ab35971
Mandriva Linux Security Advisory 2009-341
Posted Dec 30, 2009
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Advisory 2009-341 - Multiple untrusted search path vulnerabilities in dstat before 0.7.0 allow local users to gain privileges via a Trojan horse Python module in (1) the current working directory or (2) a certain subdirectory of the current working directory. This update provides a solution to these vulnerabilities.

tags | advisory, local, trojan, vulnerability, python
systems | linux, mandriva
advisories | CVE-2009-3894, CVE-2009-4081
MD5 | f33fe6665c2da2672b7b8c46dd34fe5d
Mandriva Linux Security Advisory 2009-157
Posted Dec 4, 2009
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Advisory 2009-157 - Off-by-one error in the inflate function in Zlib.xs in Compress::Raw::Zlib Perl module before 2.017, as used in AMaViS, SpamAssassin, and possibly other products, allows context-dependent attackers to cause a denial of service (hang or crash) via a crafted zlib compressed stream that triggers a heap-based buffer overflow, as exploited in the wild by Trojan.Downloader-71014 in June 2009. This update provides fixes for this vulnerability. Packages for 2008.0 are being provided due to extended support for Corporate products.

tags | advisory, denial of service, overflow, trojan, perl
systems | linux, mandriva
advisories | CVE-2009-1391
MD5 | ef1fa428aaa189a28c6770e3bd62dcd0
Megapanzer Skype Trojan Source
Posted Aug 26, 2009
Authored by Ruben Unteregger

This is the source code for the Skype Superintendent Trojan. It injects function calls into the Skype process to intercept all audio data coming and going to the Skype process. It extracts the PCM audio data, converts it to MP3 and sends it to the attacker after encrypting it.

tags | exploit, trojan
MD5 | 5a88db1f25467a8769dfd2fedca356da
Check Rootkit 0.49
Posted Jul 30, 2009
Authored by Nelson Murilo | Site chkrootkit.org

Chkrootkit checks locally for signs of a rootkit. Chkrootkit includes ifpromisc.c to check and see if the interface is in promisc mode, chklastlog.c to check lastlog for deletions, and chkwtmp.c to check wtmp for deletions, strings.c for quick and dirty strings replacement, check_wtmpx.c to check for wtmpx deletions and the files chkproc.c and chkdirs.c to check for LKM trojans. Tested on Linux 2.0.x, 2.2.x and 2.4.x, FreeBSD 2.2.x, 3.x, 4.x, and 5.x, BSDI, OpenBSD 2.6, 2.7, 2.8, 2.9, 3.0 and 3.1, NetBSD 1.5.2 and Solaris 2.5.1, 2.6 and 8.0, and HP-UX 11.

Changes: New and enhanced tests, minor bug fixes.
tags | tool, trojan, integrity, rootkit
systems | linux, netbsd, unix, solaris, freebsd, openbsd, hpux
MD5 | 304d840d52840689e0ab0af56d6d3a18
Mandriva Linux Security Advisory 2009-174
Posted Jul 29, 2009
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Advisory 2009-174 - Off-by-one error in the inflate function in Zlib.xs in Compress::Raw::Zlib Perl module before 2.017, as used in AMaViS, SpamAssassin, and possibly other products, allows context-dependent attackers to cause a denial of service (hang or crash) via a crafted zlib compressed stream that triggers a heap-based buffer overflow, as exploited in the wild by Trojan.Downloader-71014 in June 2009. This update provides fixes for this vulnerability.

tags | advisory, denial of service, overflow, trojan, perl
systems | linux, mandriva
advisories | CVE-2009-1391
MD5 | a3f8a2c1a2af0c601512ce4edfdd4065
Mandriva Linux Security Advisory 2009-157
Posted Jul 21, 2009
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Advisory 2009-157 - Off-by-one error in the inflate function in Zlib.xs in Compress::Raw::Zlib Perl module before 2.017, as used in AMaViS, SpamAssassin, and possibly other products, allows context-dependent attackers to cause a denial of service (hang or crash) via a crafted zlib compressed stream that triggers a heap-based buffer overflow, as exploited in the wild by Trojan.Downloader-71014 in June 2009. This update provides fixes for this vulnerability.

tags | advisory, denial of service, overflow, trojan, perl
systems | linux, mandriva
advisories | CVE-2009-1391
MD5 | f42894b08b9b237be0a3828087c45325
Mandriva Linux Security Advisory 2009-057
Posted Feb 26, 2009
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Advisory 2009-057 - Untrusted search path vulnerability in valgrind before 3.4.0 allows local users to execute arbitrary programs via a Trojan horse .valgrindrc file in the current working directory, as demonstrated using a malicious --db-command options. NOTE: the severity of this issue has been disputed, but CVE is including this issue because execution of a program from an untrusted directory is a common scenario. The updated packages have been patched to prevent this.

tags | advisory, arbitrary, local, trojan
systems | linux, mandriva
advisories | CVE-2008-4865
MD5 | 41bbe4bfb46c166a89d0317589746fc6
Essential02.rar
Posted Dec 31, 2008
Authored by rtm | Site zonartm.org

Road Technological Minds - Essential #2 - This issue covers IPTables, cAd the trojan, visual basic, ssh use, and more. Written in Spanish.

tags | trojan, magazine
MD5 | 3946af63c2f0959159b7e1637abf57ea
Secunia Security Advisory 32669
Posted Nov 11, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - alex has discovered a vulnerability in Anti-Trojan Elite, which can be exploited by malicious, local users to cause a DoS (Denial of Service) or potentially gain escalated privileges.

tags | advisory, denial of service, local, trojan
MD5 | 82892420feff423f06b6feb640c36037
Pardus Linux Security Advisory 2008.66
Posted Nov 8, 2008
Authored by Pardus Linux, Pardus

Pardus Linux Security Advisory 2008-66 - An untrusted search path vulnerability in BPY_interface in Blender 2.46 allows local users to execute arbitrary code via a Trojan horse Python file in the current working directory, related to an erroneous setting of sys.path by the PySys_SetArgv function.Blender versions prior to 2.47-14-3 are affected.

tags | advisory, arbitrary, local, trojan, python
systems | linux
MD5 | cd581dc8862d658954b6cb46ade16189
Mandriva Linux Security Advisory 2008-216
Posted Oct 27, 2008
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Advisory - A vulnerability was found in how Emacs would import python scripts from the current working directory during the editing of a python file. This could allow a local user to execute arbitrary code via a trojan python file.

tags | advisory, arbitrary, local, trojan, python
systems | linux, mandriva
advisories | CVE-2008-3949
MD5 | 97d96cb6e060a9b025754d3f10189634
ezmal-0.2.zip
Posted Jul 31, 2008
Authored by microphone8000

EZMal is a Mac OS X Trojan Kit that will attach a persistent bindshell to applications.

tags | tool, trojan, rootkit
systems | unix, apple, osx
MD5 | 1af27ee2d196b8eccedf3762e3a16c01
pykeylogger-1.0.2_win32.zip
Posted Apr 10, 2008
Authored by nanotube | Site pykeylogger.sourceforge.net

Simple Python Keylogger is a cross-platform keylogger. It is primarily designed for backup purposes, but can be used as a stealth keylogger too. Windows version. Archive password is set to p4ssw0rd. Use at your own risk.

Changes: Added some graphics and icons. Various bug fixes.
tags | trojan, python
systems | windows
MD5 | 89170b909ddcadc92ddbd0d6f1e7a9a0
pykeylogger-1.0.2_src.zip
Posted Apr 10, 2008
Authored by nanotube | Site pykeylogger.sourceforge.net

Simple Python Keylogger is a cross-platform keylogger. It is primarily designed for backup purposes, but can be used as a stealth keylogger too. Source archive that works on Linux. Archive password is set to p4ssw0rd. Use at your own risk.

Changes: Added some graphics and icons. Various bug fixes.
tags | trojan, python
systems | linux
MD5 | 0ab81ee1fb905a584b975a328ec5fcfd
pykeylogger-1.0.1_win32.zip
Posted Mar 20, 2008
Authored by nanotube | Site pykeylogger.sourceforge.net

Simple Python Keylogger is a cross-platform keylogger. It is primarily designed for backup purposes, but can be used as a stealth keylogger too. Windows version. Archive password is set to p4ssw0rd. Use at your own risk.

Changes: Bug fix release where location of the program is now property detected.
tags | trojan, python
systems | windows
MD5 | 4cd3df3d5532441d998cacaf4298c79a
Page 2 of 22
Back12345Next

File Archive:

July 2017

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Jul 1st
    2 Files
  • 2
    Jul 2nd
    3 Files
  • 3
    Jul 3rd
    15 Files
  • 4
    Jul 4th
    4 Files
  • 5
    Jul 5th
    15 Files
  • 6
    Jul 6th
    15 Files
  • 7
    Jul 7th
    10 Files
  • 8
    Jul 8th
    2 Files
  • 9
    Jul 9th
    10 Files
  • 10
    Jul 10th
    15 Files
  • 11
    Jul 11th
    15 Files
  • 12
    Jul 12th
    19 Files
  • 13
    Jul 13th
    16 Files
  • 14
    Jul 14th
    15 Files
  • 15
    Jul 15th
    3 Files
  • 16
    Jul 16th
    2 Files
  • 17
    Jul 17th
    8 Files
  • 18
    Jul 18th
    11 Files
  • 19
    Jul 19th
    15 Files
  • 20
    Jul 20th
    15 Files
  • 21
    Jul 21st
    15 Files
  • 22
    Jul 22nd
    6 Files
  • 23
    Jul 23rd
    0 Files
  • 24
    Jul 24th
    0 Files
  • 25
    Jul 25th
    0 Files
  • 26
    Jul 26th
    0 Files
  • 27
    Jul 27th
    0 Files
  • 28
    Jul 28th
    0 Files
  • 29
    Jul 29th
    0 Files
  • 30
    Jul 30th
    0 Files
  • 31
    Jul 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2016 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close