exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 7 of 7 RSS Feed

IndiaSec

IndiaSec
raw.c
Posted Jun 24, 2005
Authored by indiasec, Pratap P V | Site indiasec.com

Fast httpd scanner that scans a block of IPs using a half open scan.

SHA-256 | 2defbdb4ab4e646551e3f5483833a3029ed3bac341a8d20e07d7d3da00941bc1
hide_lkm.tgz
Posted Jun 24, 2005
Authored by indiasec, Pratap P V | Site indiasec.com

Tool to manipulate /dev/kmem (kernel memory) to completely hide LKMs. Tested on 2.4.x.

tags | kernel
SHA-256 | afad67bd1962d78e3fc466bb2136fbfb5d512592976a66548ebc68a60de238b3
backdoor-list.txt
Posted Aug 31, 2004
Authored by Klemster, indiasec | Site indiasec.com

List of the most known backdoors and the ports they use. It has 130 different trojans and more than 150 ports listed.

tags | trojan
SHA-256 | c0ca6e5af2ea2bc12bb290309372e81c364d8109c1d25218f4e4c52443f89292
abouttrojans.txt
Posted Aug 31, 2004
Authored by Klemster, indiasec | Site indiasec.com

White paper discussing Windows trojans. Written for newbie home PC users.

tags | trojan
systems | windows
SHA-256 | 33f7db9373b30ae302e7ee598301369005f836114516b5f2ed62e23b3a46a86a
klezanalysis.txt
Posted Aug 31, 2004
Authored by Klemster, indiasec | Site indiasec.com

An analysis of the Klez worm listing all the steps that it takes.

tags | worm
SHA-256 | f2c65ec510c5523d748d5d277a63219df67263954663d1d20fdfc5ad9b1abcfc
crackingpatterns.txt
Posted Aug 31, 2004
Authored by Klemster, indiasec | Site indiasec.com

This paper explains a technique of cracking any kind of raw encryption using word patterns, without the conventional key combination trying.

SHA-256 | dce740abf0c17e037fbd17ff6fb1e118ffc53ede465268b5bbfa137c109d6cc4
bypassav.txt
Posted Aug 31, 2004
Authored by Klemster, indiasec | Site indiasec.com

White paper explaining how to try and bypass detection from antivirus software by recompiling the same code with a few minor changes.

SHA-256 | ed996b12d0f2df8baf46b0eb9266cbde4f7134bafe3dd50cd775fe7dd5ff08c9
Page 1 of 1
Back1Next

Top Authors In Last 30 Days

Recent News

News RSS Feed
Apple Suddenly Drops NSO Group Spyware Lawsuit
Posted Sep 18, 2024

tags | headline, privacy, phone, flaw, israel, spyware, apple
11 Dead, Thousands Injured In Explosive Supply Chain Attack On Hezbollah Pagers
Posted Sep 18, 2024

tags | headline, wireless, cyberwar, israel, terror, backdoor
Cops Across The World Arrest 51 In Orchestrated Takedown Of Ghost Crime Platform
Posted Sep 18, 2024

tags | headline, hacker, government, australia, cybercrime, fraud
Wait... Did Pagers Get Hacked To Blow People Up?
Posted Sep 17, 2024

tags | headline, cyberwar, israel, terror
Predator Spyware Kingpins Added To US Sanctions List
Posted Sep 17, 2024

tags | headline, hacker, government, privacy, spyware
D-Link Patches Critical Router Vulnerabilities
Posted Sep 17, 2024

tags | headline, flaw, patch
France Uses Tough, Untested Cybercrime Law To Target Durov
Posted Sep 17, 2024

tags | headline, government, cybercrime, france, social
Malware Attack Targets US-Taiwan Defense Conference
Posted Sep 17, 2024

tags | headline, government, malware, usa, china, cyberwar, taiwan, military
TikTok Is Getting Its Day In Court
Posted Sep 16, 2024

tags | headline, government, privacy, usa, phone, china, cyberwar, spyware
Ransomware Group Leaks Data Stolen From Kawasaki Motors
Posted Sep 16, 2024

tags | headline, hacker, privacy, cybercrime, data loss, cryptography
View More News →
packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close