Exploit the possiblities
Showing 51 - 75 of 551 RSS Feed

Trojan Files

pykeylogger-1.0.1_src.zip
Posted Mar 20, 2008
Authored by nanotube | Site pykeylogger.sourceforge.net

Simple Python Keylogger is a cross-platform keylogger. It is primarily designed for backup purposes, but can be used as a stealth keylogger too. Source archive that works on Linux. Archive password is set to p4ssw0rd. Use at your own risk.

Changes: Bug fix release where location of the program is now property detected.
tags | trojan, python
systems | linux
MD5 | 3433bfa47aad8f7e6fecff94f22d8497
pykeylogger-1.0.0_win32.zip
Posted Mar 12, 2008
Authored by nanotube | Site pykeylogger.sourceforge.net

Simple Python Keylogger is a cross-platform keylogger. It is primarily designed for backup purposes, but can be used as a stealth keylogger too. Windows version. Archive password is set to p4ssw0rd. Use at your own risk.

tags | trojan, python
systems | windows
MD5 | 7550ee49201fc103b24ba104d5a2e843
pykeylogger-1.0.0_src.zip
Posted Mar 12, 2008
Authored by nanotube | Site pykeylogger.sourceforge.net

Simple Python Keylogger is a cross-platform keylogger. It is primarily designed for backup purposes, but can be used as a stealth keylogger too. Source archive that works on Linux. Archive password is set to p4ssw0rd. Use at your own risk.

tags | trojan, python
systems | linux
MD5 | 86af54b3e00e8082f97046f7b98de5c6
chkrootkit-0.48.tar.gz
Posted Jan 3, 2008
Authored by Nelson Murilo | Site chkrootkit.org

Chkrootkit checks locally for signs of a rootkit. Chkrootkit includes ifpromisc.c to check and see if the interface is in promisc mode, chklastlog.c to check lastlog for deletions, and chkwtmp.c to check wtmp for deletions, strings.c for quick and dirty strings replacement, check_wtmpx.c to check for wtmpx deletions and the files chkproc.c and chkdirs.c to check for LKM trojans. Tested on Linux 2.0.x, 2.2.x and 2.4.x, FreeBSD 2.2.x, 3.x, 4.x, and 5.x, BSDI, OpenBSD 2.6, 2.7, 2.8, 2.9, 3.0 and 3.1, NetBSD 1.5.2 and Solaris 2.5.1, 2.6 and 8.0, and HP-UX 11.

Changes: New and enhanced tests, minor bug fixes.
tags | tool, trojan, integrity, rootkit
systems | linux, netbsd, unix, solaris, freebsd, openbsd, hpux
MD5 | de8b8b5013e7faa2b66c0e33c59677e8
lomac-v1.1.2.tar.gz
Posted Apr 23, 2007
Authored by Tim Fraser | Site alum.wpi.edu

LOMAC is a dynamically-loadable security module for Free UNIX kernels that uses Low Water-Mark Mandatory Access Control (MAC) to protect the integrity of processes and data from viruses, Trojan horses, malicious remote users, and compromised network server daemons. The LOMAC loadable kernel module can be used to harden Linux systems without any changes to existing kernels, applications, or configuration files. Due to its simplicity, LOMAC itself requires no configuration, regardless of the users and applications present on the system.

Changes: Please see changelog.
tags | remote, kernel, trojan
systems | linux, unix
MD5 | e40c49b94b67238e60dae49f95706557
genie_v17.zip
Posted Jan 4, 2007
Authored by prncipia | Site users.otenet.gr

Genie is a simple Telnet backdoor program that spawns on port 1179. Written for Windows 98/NT/XP. Version 1.7. Archive password is set to p4ssw0rd. Use at your own risk.

tags | trojan
systems | windows, 9x
MD5 | 80244cb8622b0c8053f7467374817e80
wbkdr.zip
Posted Dec 27, 2006
Authored by warl0ck | Site metaeye.org

wbkdr is a proof of concept WinAmp backdoor that makes use of the plugin interface. It spawns cmd.exe on port 24501. Archive password is set to p4ssw0rd. Use at your own risk.

tags | trojan, proof of concept
MD5 | 93dc6ea46bfab8deac1b1dd03ef6ef45
easyscan.tgz
Posted May 17, 2006
Authored by Artizach

Easyscan scans addresses for open tcp ports and displays the results in a list. The list of ports to scan comes from portlist.conf which contains around 707 well-know tcp ports and 462 well-know tcp ports used by trojans.

tags | tool, scanner, trojan, tcp
systems | unix
MD5 | a1ee5579b043d481272c360fe3d628fa
secunia-anti.txt
Posted May 9, 2006
Site secunia.com

Secunia Research has discovered a vulnerability in Anti-Trojan version 5.5.421, which can be exploited by malicious people to compromise a user's system. The vulnerability is caused due to a boundary error in UNACEV2.DLL when extracting an ACE archive containing a file with an overly long filename. This can be exploited to cause a stack-based buffer overflow when a user scans a specially crafted ACE archive.

tags | advisory, overflow, trojan
advisories | CVE-2005-2856
MD5 | e471ac8f968e2580610d05c8842af3b1
Secunia Security Advisory 19975
Posted May 9, 2006
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Secunia Research has discovered a vulnerability in Anti-Trojan, which can be exploited by malicious people to compromise a user's system.

tags | advisory, trojan
MD5 | 432dcf4b45437cbbff99541d6cf82a1d
LiveUpdate-mac.txt
Posted Apr 29, 2006
Site symantec.com

Some components of Symantecs LiveUpdate for Macintosh do not set their execution path environment. A non-privileged user can change their execution path environment. If the user then executes one of these components, it will inherit the changed environment and use it to locate system commands. These components are configured to run with System Administrative privileges (SUID) and are vulnerable to a potential Trojan horse attack.

tags | advisory, trojan
MD5 | 1bffdabb2b2b733a2aa7f350cdcbd684
su.pl.txt
Posted Apr 28, 2006
Authored by obsd staff | Site freeshell.se

su trojan written in perl. It reads the password, logging it to a file and then executes the real su.

tags | tool, trojan, perl, rootkit
systems | unix
MD5 | ab6c7b36c197fd043e989d7911f58a41
genie_v151.zip
Posted Apr 19, 2006
Authored by prncipia | Site users.otenet.gr

Genie is a simple Telnet backdoor program that spawns on port 1179. Written for Windows 98/NT/XP. Version 1.5.1 Archive password is set to p4ssw0rd. Use at your own risk.

tags | trojan
systems | windows, 9x
MD5 | f1f075240de9fa0a88f2854081500349
genie_v14.zip
Posted Mar 8, 2006
Authored by prncipia | Site users.otenet.gr

Genie is a simple Telnet backdoor program that spawns on port 1179. Written for Windows 98/NT/XP. Version 1.4 Archive password is set to p4ssw0rd. Use at your own risk.

tags | trojan
systems | windows, 9x
MD5 | 70a427b3c98cd115acab4ff1e36f6339
genie_v13.zip
Posted Feb 22, 2006
Authored by prncipia | Site users.otenet.gr

Genie is a simple Telnet backdoor program that spawns on port 1179. Written for Windows 98/NT/XP. Version 1.3 Archive password is set to p4ssw0rd. Use at your own risk.

tags | trojan
systems | windows, 9x
MD5 | b9e8a14cd06aa8e40168f9a75d93ac24
genie.zip
Posted Jan 29, 2006
Authored by prncipia

Genie is a simple Telnet backdoor program that spawns on port 1179. Written for Windows 98/NT/XP. Archive password is set to p4ssw0rd. Use at your own risk.

tags | trojan
systems | windows, 9x
MD5 | 6fa7fe6aa04d114dc141d0f34b56d1ab
html-trap.procmail-1.150.gz
Posted Jan 15, 2006
Authored by John Hardin | Site impsec.org

Email Security through Procmail attempts to address the trend towards "enhancing" email clients with support for active content, which exposes end-users to many and varied threats, by "sanitizing" email: removing obvious exploit attempts and disabling the channels through which exploits are delivered. Facilities for detecting and blocking Trojan Horse exploits and worms are also provided.

Changes: Fix the unrar executable check so that it does not test for unrar if RAR scanning is already explicitly disabled by $DISABLE_RAR_SCAN. Fix recipient notification so that it will now work on relays.
tags | worm, trojan
systems | unix
MD5 | 7e6ffe3b86e2e192c212b6cc699d3e67
DMA-2006-0112a.txt
Posted Jan 15, 2006
Authored by Kevin Finisterre | Site digitalmunition.com

Using ussp-push from the Toshiba Bluetooth Stack versions 4.00.23(T) and below, an attacker can place a trojaned file anywhere on the filesystem.

tags | exploit, trojan
MD5 | 13c47dbcf05a5bc3f1fedca80adbb8b8
SA-20051223-0.txt
Posted Dec 29, 2005
Authored by SEC Consult | Site sec-consult.com

SEC Consult Security Advisory 20051223-0 - OracleAS Discussion Forum Portlet suffers from multiple Cross Site Scripting vulnerabilities. E.g. it is possible to create relogin trojans, steal session cookies, alter the content of the site or hide articles which don't show up in the overview page.

tags | advisory, trojan, vulnerability, xss
MD5 | c09f976f74b323a3b69215d45d934089
digsig-1.3.2.tar.gz
Posted Nov 20, 2005
Site sourceforge.net

DigSig kernel load module checks the signature of a binary before running it. It inserts digital signatures inside the ELF binary and verifies this signature before loading the binary. It is based on the Linux Security Module hooks (standard in main stream Linux kernel 2.5.66 and higher). Therefore, it improves the security of the system by avoiding a wide range of malicious binaries like viruses, worms, Trojan programs, and backdoors from running on the system.

tags | worm, kernel, trojan
systems | linux
MD5 | 7636bc6cfe7bf8593a2323034d55f38a
p3scan-2.3.1.tar.gz
Posted Nov 20, 2005
Authored by laitcg | Site p3scan.sourceforge.net

Pop 3 scan is a full transparent proxy server for POP3 clients. It runs on a Linux box with iptables (for port redirection). It can be used to provide POP3 email scanning from the Internet to any internal network, and is ideal for helping to protect your Other OS LAN from harm, especially when used in conjunction with a firewall and other Internet proxy servers. It is designed to enable scanning of incoming email messages for viruses, worms, trojans, spam, and harmful attachments. Because viewing HTML email can enable a spammer to validate an email address (via Web bugs), it can also provide HTML stripping.

Changes: Bug fix release.
tags | worm, web, trojan
systems | linux, unix
MD5 | c1ce98fd1fe2220ef9838eb97ae38300
p3scan-2.2.1.tar.gz
Posted Sep 23, 2005
Authored by laitcg | Site p3scan.sourceforge.net

Pop 3 scan is a full transparent proxy server for POP3 clients. It runs on a Linux box with iptables (for port redirection). It can be used to provide POP3 email scanning from the Internet to any internal network, and is ideal for helping to protect your Other OS LAN from harm, especially when used in conjunction with a firewall and other Internet proxy servers. It is designed to enable scanning of incoming email messages for viruses, worms, trojans, spam, and harmful attachments. Because viewing HTML email can enable a spammer to validate an email address (via Web bugs), it can also provide HTML stripping.

Changes: Made TOP command processing an option. Fixed ability to not use ripmime library. Various other tweaks.
tags | worm, web, trojan
systems | linux, unix
MD5 | f7fcbc39050c193e5a334a61d38b5d49
Xcon2005_CoolQ.pdf
Posted Aug 31, 2005
Authored by CoolQ | Site xcon.xfocus.org

Xcon 2005: Advanced trojans in Grub

tags | trojan
MD5 | 1641a80c8e392fad75dd36a94e3bf62e
rt-sa-2005-014.txt
Posted Aug 26, 2005
Authored by RedTeam Pentesting | Site redteam-pentesting.de

The new iTAN security feature for online banking promoted by german banks does not protect against phishing attacks and trojans as claimed.

tags | advisory, trojan
MD5 | 5682bd253e59cf397473750eb8b43d52
Evil.Shell.Backdoor_1.0.5.c
Posted Aug 26, 2005
Authored by Lympex | Site l-bytes.tk

Password protected windows bind/reverse shell backdoor written in Visual C++ Archive password is set to p4ssw0rd. Use at your own risk.

tags | shell, trojan
systems | windows
MD5 | 0475009407cb1326228f33e0edd9b896
Page 3 of 22
Back12345Next

File Archive:

November 2017

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Nov 1st
    22 Files
  • 2
    Nov 2nd
    28 Files
  • 3
    Nov 3rd
    10 Files
  • 4
    Nov 4th
    1 Files
  • 5
    Nov 5th
    5 Files
  • 6
    Nov 6th
    15 Files
  • 7
    Nov 7th
    15 Files
  • 8
    Nov 8th
    13 Files
  • 9
    Nov 9th
    9 Files
  • 10
    Nov 10th
    9 Files
  • 11
    Nov 11th
    3 Files
  • 12
    Nov 12th
    2 Files
  • 13
    Nov 13th
    15 Files
  • 14
    Nov 14th
    17 Files
  • 15
    Nov 15th
    19 Files
  • 16
    Nov 16th
    15 Files
  • 17
    Nov 17th
    19 Files
  • 18
    Nov 18th
    4 Files
  • 19
    Nov 19th
    2 Files
  • 20
    Nov 20th
    9 Files
  • 21
    Nov 21st
    15 Files
  • 22
    Nov 22nd
    23 Files
  • 23
    Nov 23rd
    0 Files
  • 24
    Nov 24th
    0 Files
  • 25
    Nov 25th
    0 Files
  • 26
    Nov 26th
    0 Files
  • 27
    Nov 27th
    0 Files
  • 28
    Nov 28th
    0 Files
  • 29
    Nov 29th
    0 Files
  • 30
    Nov 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2016 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close