Exploit the possiblities
Showing 1 - 7 of 7 RSS Feed

IndiaSec

IndiaSec
raw.c
Posted Jun 24, 2005
Authored by indiasec, Pratap P V | Site indiasec.com

Fast httpd scanner that scans a block of IPs using a half open scan.

MD5 | 696e0eb2ff66e49b4d5fcde7be627389
hide_lkm.tgz
Posted Jun 24, 2005
Authored by indiasec, Pratap P V | Site indiasec.com

Tool to manipulate /dev/kmem (kernel memory) to completely hide LKMs. Tested on 2.4.x.

tags | kernel
MD5 | 65cf16859b48ba2b575a48875f9b15fc
backdoor-list.txt
Posted Aug 31, 2004
Authored by Klemster, indiasec | Site indiasec.com

List of the most known backdoors and the ports they use. It has 130 different trojans and more than 150 ports listed.

tags | trojan
MD5 | cd1a49aa433809e5d42843932e23dfbe
abouttrojans.txt
Posted Aug 31, 2004
Authored by Klemster, indiasec | Site indiasec.com

White paper discussing Windows trojans. Written for newbie home PC users.

tags | trojan
systems | windows
MD5 | faa411ac4be1571c679715825909e403
klezanalysis.txt
Posted Aug 31, 2004
Authored by Klemster, indiasec | Site indiasec.com

An analysis of the Klez worm listing all the steps that it takes.

tags | worm
MD5 | 4a53bee02a52b20211a03d80e7722bb6
crackingpatterns.txt
Posted Aug 31, 2004
Authored by Klemster, indiasec | Site indiasec.com

This paper explains a technique of cracking any kind of raw encryption using word patterns, without the conventional key combination trying.

MD5 | cb8732188ac601df6e6bcb45889db1c5
bypassav.txt
Posted Aug 31, 2004
Authored by Klemster, indiasec | Site indiasec.com

White paper explaining how to try and bypass detection from antivirus software by recompiling the same code with a few minor changes.

MD5 | 42776357d229d3bb00ed1e2b6e058a6e
Page 1 of 1
Back1Next

Top Authors In Last 30 Days

Recent News

News RSS Feed
Language Bugs Infest Downstream Software
Posted Dec 11, 2017

tags | headline, flaw
German Spy Agency Warns Of Chinese LinkedIn Espionage
Posted Dec 11, 2017

tags | headline, government, china, cyberwar, germany, spyware, social
Dynamics 365 Sandbox Leaked TLS Certificates
Posted Dec 11, 2017

tags | headline, privacy, microsoft, data loss, flaw, cryptography
Keylogger Uncovered On Hundreds Of HP PCs
Posted Dec 11, 2017

tags | headline, flaw, spyware, backdoor
PlexCoin Scam Founder Sentenced To Jail And Fined $10k
Posted Dec 10, 2017

tags | headline, cybercrime, fraud, scam, cryptography
Google Lifts Lid On FBI Data Requests: Now You Can Read Actual Letters Online
Posted Dec 9, 2017

tags | headline, government, privacy, usa, google, fbi
Android Flaw Lets Attack Code Slip Into Signed Apps
Posted Dec 9, 2017

tags | headline, malware, phone, flaw, google
Millions Stolen In NiceHash Bitcoin Heist
Posted Dec 9, 2017

tags | headline, hacker, cybercrime, fraud, cryptography
Apple HomeKit Flaw Left Smart Gadgets Vulnerable
Posted Dec 9, 2017

tags | headline, flaw, apple
Intel Management Engine Pwned By Buffer Overflow
Posted Dec 7, 2017

tags | headline, hacker, flaw, conference, intel
View More News →
packet storm

© 2016 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close