seeing is believing
Showing 1 - 25 of 39 RSS Feed

Mixter's Exploits and Tools

neatdocs.tgz
Posted May 24, 2002
Authored by Mixter | Site 1337.tsx.org

NEAT is a script language driven exploit/vulnerability management tool that does active penetration testing. This is a pre-release with documentation and code snippets. NEAT is similar to raccess but is more sophisticated.

MD5 | 700ecd7f8e5a6ef94ed88f525857f928
neolock.tgz
Posted May 14, 2002
Authored by Mixter | Site 1337.tsx.org

Neolock is a tool that is a combination of console security locking tool (vlock) matrix console screensaver (cmatrix). Provides more discreet and nicer console locking.

MD5 | 41964d2908f09178a3236451c69b8434
ileech.tgz
Posted May 14, 2002
Authored by Mixter | Site 1337.tsx.org

Illeech is a collection of search engine harvesting scripts (google/altavista).

MD5 | 65f6de1a09696cba6259da19b86de59e
libmix-122.tgz
Posted Apr 15, 2001
Authored by Mixter | Site mixter.void.ru

LibMix is a library that provides an API for various useful functions, including an AES encryption interface, various network front-ends and low level datagram functions, as well as functions for string manipulations and other miscellaneous utility functions. It also includes functions to transmit encrypted data via stateless spoofed datagrams (tfntransmit/tfnread).

Changes: Added lm_scan_run (callback function to easily build scanners and similar tools), and faster conversion functions, lm_addr and lm_ntoa.
tags | spoof
MD5 | 66413546a6bb32d9a2542a33408e3ee8
Q-2.4.tar.gz
Posted Apr 15, 2001
Authored by Mixter | Site mixter.void.ru

Q v2.4 is a client / server backdoor which features remote shell access with strong encryption for root and normal users, and a encrypted on-demand tcp relay/bouncer that supports encrypted sessions with normal clients using the included tunneling daemon. Also has stealth features like activation via raw packets, syslog spoofing, and single on-demand sessions with variable ports.

Changes: Now uses strong RSA/libiSSL encryption for sessions; compatibility with libmix1.2; many bugfixes.
tags | remote, shell, root, spoof, tcp
MD5 | 45a5b2c2b2612f6d6703cd984cc1d8e1
issl.tgz
Posted Jan 26, 2001
Authored by Mixter | Site mixter.void.ru

iSSL is a library offering a minimal cryptographical API that uses the ciphers RSA and AES to establish SSL-alike, secure encrypted communications between two peers communicating through a network socket, including session key generation and public key exchange.

MD5 | f33f0a92dece3a0bd3133e8388206549
libmix-120.tgz
Posted Dec 2, 2000
Authored by Mixter | Site mixter.void.ru

LibMix is a library that provides an API for various useful functions, including an AES encryption interface, various network front-ends and low level datagram functions, as well as functions for string manipulations and other miscellaneous utility functions. It also includes functions to transmit encrypted data via stateless spoofed datagrams (tfntransmit/tfnread).

Changes: Added exclude database function, to add and match classless ranges of IP addresses (for network scanners, access control, etc.), added new packet headers, updated manpages.
tags | spoof
MD5 | 5215dbbb8a81284514fc464abb1297d3
C-intro.tar.gz
Posted Aug 2, 2000
Authored by Mixter | Site 1337.tsx.org

Introduction to programming in C - Written with the goal of letting people get the most knowledge as fast as possible from it.

MD5 | 0dfb6b88c529649f6bd66cbaac844772
md5bd.c
Posted Jul 15, 2000
Authored by Mixter | Site 1337.tsx.org

md5bd.c is a shell server/backdoor that uses a md5 encrypted password to authenticate, therefore the password cannot be retrieved from the server.

tags | shell
MD5 | 2fa9b94368cf2d9b511d009aece38bce
pat2.tgz
Posted May 24, 2000
Authored by Mixter | Site mixter.void.ru

Ping Analysis Tool II (PAT) performs icmp echo scans on a range of ip addresses as fast as physically possible. Features a dual-threaded scanning process and allows you to scan from a list of IP's.

MD5 | fe66341a62796622fb1ac3ae3058cbfc
libmix-108.tgz
Posted Apr 14, 2000
Authored by Mixter | Site mixter.void.ru

LibMix v1.08 is a library that provides an API for various useful functions, including an AES encryption interface, various network front-ends and low level datagram functions, as well as functions for string manipulations and other miscellaneous utility functions. It also includes functions to transmit encrypted data via stateless spoofed datagrams (tfntransmit/tfnread).

Changes: It now compiles as a shared object file (.so) by default, which makes it easier to link it with programs, and the whole library sources were cleaned up and rewritten in ANSI C++.
tags | spoof
MD5 | 5e50da4e8dd8833151f69c583357848e
nbnbs.c
Posted Apr 14, 2000
Authored by Mixter | Site 1337.tsx.org

nbnbs.c is a NetBIOS name bulk security scanner for unix. It does long-range network scans for NetBIOS names (Windows and UNIX Samba servers) and logs positives. Based off of nbname.c by mynock and ADM.

systems | windows, unix
MD5 | 95369af2293ee9272ded0f4b579790b7
Q-2.0.tgz
Posted Apr 7, 2000
Authored by Mixter | Site members.tripod.com

Q v2.0 is a client / server backdoor which features remote shell access with strong encryption for root and normal users, and a encrypted on-demand tcp relay/bouncer that supports encrypted sessions with normal clients using the included tunneling daemon. Also has stealth features like activation via raw packets, syslog spoofing, and single on-demand sessions with variable ports.

Changes: Security enhancments, easier usage, and better encryption.
tags | remote, shell, root, spoof, tcp
MD5 | 1496eb28b5caf5fa795763c70e646c77
libmix-107.tgz
Posted Apr 7, 2000
Authored by Mixter | Site mixter.void.ru

LibMix v1.07 is a library that provides an API for various useful functions, including an AES encryption interface, various network front-ends and low level datagram functions, as well as functions for string manipulations and other miscellaneous utility functions. It also includes functions to transmit encrypted data via stateless spoofed datagrams (tfntransmit/tfnread).

Changes: Important bug fixes.
tags | spoof
MD5 | d608f9a95c75ddc25f532bf2aea596ff
libmix-105.tgz
Posted Mar 7, 2000
Authored by Mixter | Site mixter.void.ru

LibMix v1.05 is a library that provides an API for various useful functions, including an AES encryption interface, various network front-ends and low level datagram functions, as well as functions for string manipulations and other miscellaneous utility functions. It also includes functions to transmit encrypted data via stateless spoofed datagrams (tfntransmit/tfnread).

tags | spoof
MD5 | a5f25a51844c2d2458fcb8b29e82a539
coding.txt
Posted Feb 25, 2000
Authored by Mixter | Site mixter.void.ru

Coding in C - a summary of some popular mistakes. Most of them are not detected at compile time with all warnings enabled, which makes them very nasty and hard to detect.

MD5 | 9889337cf26f2aa2a05d599e8dc01111
shlog.c
Posted Feb 25, 2000
Authored by Mixter | Site mixter.void.ru

shlog.c is a small program that will do getpeername on its input descriptor, and log a remote host, if it is invoked via a remote session, along with uid/gid to syslog. can be used as additional logging tool for login shells (by putting it into the system profile).

Changes: This version works.
tags | remote, shell
MD5 | b17d771cbd59596955397a3bab80a2ce
pcfs.c
Posted Feb 11, 2000
Authored by Mixter | Site mixter.void.ru

pcfs.c is a tool that creates a fake CFS (cryptographic file system) encrypted directory tree, which is reasonable indistinguishable from a real CFS directory. It proves that just having a CFS styled directory doesn't prove it actually contains real encrypted data.

MD5 | fcbe9499588006cf5d254790ba212460
webscan.c
Posted Feb 8, 2000
Authored by Mixter | Site mixter.void.ru

webscan.c is a fast multithreaded CGI and HTTP version scanner that is based off cgichk and can easily be updated. the cgi scanning y2k problem has been fixed in this version.

tags | web, cgi
MD5 | c6e38c01c1fabe5224ff911b945ee1bd
virii.tgz
Posted Feb 8, 2000
Authored by Mixter | Site mixter.void.ru

virii.tgz is a collection of files that are supposedly infected by a linux/elf virus that could be out and spreading in the wild. it also contains a detailed description of the suspicious actions the virus performs and the patterns that can be found in the files.

tags | virus
systems | linux
MD5 | 7d5f0cf3425f20c6c069786e6ab8797d
trojans.txt
Posted Feb 8, 2000
Authored by Mixter | Site mixter.void.ru

trojans.txt is a paper that deals with methods of analyzing, debugging and disassembling unix binaries, looking for viruses, trojans and other malicious code.

tags | trojan
systems | unix
MD5 | 991a7c392ee5d69e6f0a774c7d90c7a6
rawpowr.c
Posted Feb 8, 2000
Authored by Mixter | Site mixter.void.ru

rawpowr.c can access a block device containing an EXT2 file system in raw mode, changing all executables into suid executables. this demonstrates that security can easily be breached as soon as block devices are directly writable by the attacker.

MD5 | dafe38921ef1b67bdf99fddf6a4d3873
stasis.c
Posted Jan 28, 2000
Authored by Mixter | Site mixter.void.ru

Stasis is a tool to fool atime/mtime timestamp checking. It records the timestamp of files, then periodically finds atime/mtime changes and restores the old timestamps, as if the files were never accessed / changed.

MD5 | 3e89aa06fa1548680d0d602628d0d46e
ides.c
Posted Jan 24, 2000
Authored by Mixter | Site members.tripod.com

Intrusion Detection Evasion System is a daemon that monitors connections, and forges additional packets to hide from and disturb network monitoring processes of IDS and sniffers. It does this by inserting rst/fin and ack packets with bogus payloads and invalid sequence numbers that only affect network monitors. It also sends a custom amount of SYN requests from arbitrary sources on every real connection attempt it sees, which can for example be used to simulate coordinated scans.

tags | arbitrary
MD5 | 3c1e3c3539b845434d8444f5ab36993b
Q-1.0.tgz
Posted Jan 18, 2000
Authored by Mixter | Site members.tripod.com

Q 1.0 is a client / server backdoor which features remote shell access with strong encryption for root and normal users, and a encrypted on-demand tcp relay/bouncer that supports encrypted sessions with normal clients using the included tunneling daemon. Also has stealth features like activation via raw packets, syslog spoofing, and single on-demand sessions with variable ports. This version is downward compatible and includes a few bugfixes that make the remote access daemon work reliably.

tags | remote, shell, root, spoof, tcp
MD5 | f07dcb0f5e25fb3d735c483431436308
Page 1 of 2
Back12Next

Top Authors In Last 30 Days

Recent News

News RSS Feed
Microsoft Mocks Google For Failed Security Fix Deployment Methodology
Posted Oct 19, 2017

tags | headline, microsoft, flaw, google, chrome
Malicious Mineraft Apps In Google Play Enslave Your Device To A Botnet
Posted Oct 19, 2017

tags | headline, malware, microsoft, phone, botnet, google
OAIC Received 114 Voluntary Data Breach Notifications In Two Years
Posted Oct 19, 2017

tags | headline, hacker, privacy, australia, data loss
US-CERT Predicts Machine Learning To Become Security Risk
Posted Oct 19, 2017

tags | headline, flaw
ATM Malware Available Online For Online $5,000
Posted Oct 18, 2017

tags | headline, malware, bank, cybercrime, fraud
Oracle Swats 252 Bugs In Patch Update
Posted Oct 18, 2017

tags | headline, flaw, patch, oracle
Child Safety Smartwatches Easy To Hack, Watchdog Says
Posted Oct 18, 2017

tags | headline, privacy, flaw
Domino's Pizza Delivers User Details To Spammers
Posted Oct 18, 2017

tags | headline, privacy, email, spam, fraud
Microsoft Never Disclosed 2013 Hack Of Secret Vulnerability Database
Posted Oct 18, 2017

tags | headline, hacker, microsoft, data loss, flaw
Adobe Patches Zero-Day Used To Plant Gov't Spying Software
Posted Oct 17, 2017

tags | headline, hacker, government, usa, flaw, cyberwar, adobe, zero day, nsa
View More News →
packet storm

© 2016 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close