Fast httpd scanner that scans a block of IPs using a half open scan.
2defbdb4ab4e646551e3f5483833a3029ed3bac341a8d20e07d7d3da00941bc1
Tool to manipulate /dev/kmem (kernel memory) to completely hide LKMs. Tested on 2.4.x.
afad67bd1962d78e3fc466bb2136fbfb5d512592976a66548ebc68a60de238b3
List of the most known backdoors and the ports they use. It has 130 different trojans and more than 150 ports listed.
c0ca6e5af2ea2bc12bb290309372e81c364d8109c1d25218f4e4c52443f89292
White paper discussing Windows trojans. Written for newbie home PC users.
33f7db9373b30ae302e7ee598301369005f836114516b5f2ed62e23b3a46a86a
An analysis of the Klez worm listing all the steps that it takes.
f2c65ec510c5523d748d5d277a63219df67263954663d1d20fdfc5ad9b1abcfc
This paper explains a technique of cracking any kind of raw encryption using word patterns, without the conventional key combination trying.
dce740abf0c17e037fbd17ff6fb1e118ffc53ede465268b5bbfa137c109d6cc4
White paper explaining how to try and bypass detection from antivirus software by recompiling the same code with a few minor changes.
ed996b12d0f2df8baf46b0eb9266cbde4f7134bafe3dd50cd775fe7dd5ff08c9