exploit the possibilities
Showing 76 - 100 of 909 RSS Feed

Group Releases

uninformed-vol9.tgz
Posted Jan 28, 2008
Authored by Matt Miller, warlord, I)ruid, Skywing, uninformed | Site uninformed.org

Uninformed is pleased to announce the release of its ninth volume. This volume includes 4 articles on reverse engineering and exploitation technology. These articles include - Engineering in Reverse: An Objective Analysis of the Lockdown Protection System for Battle.net. Exploitation Technology: ActiveX - Active Exploitation. Exploitation Technology: Context-keyed Payload Encoding. Exploitation Technology: Improving Software Security Analysis using Exploitation Properties.

tags | activex
SHA-256 | 23204c2fa4fa808fc62b756a27911c4c41e187e0ee04cf3d9b776e2b1c45f249
w00os.tgz
Posted Jan 3, 2008
Authored by w00w00

w00w00's operating system. Yes, a joke.

SHA-256 | c7c869568d15aee512c973a781e7aacc751b7d434724db343e310154d469a194
phzine07.zip
Posted Dec 18, 2007
Authored by phearless | Site phearless.org

Phearless Serbian/Croatian Security Magazine Issue #07 - In this issue: Symbian OS EXE Applications, Theory of dissasembling, Alex Protector 1 beta2, Symbian OS Crackme 0x01, NULL Pointer bugs in Linux kernel, Windows kernel - keyboard independent - keylogger, Hiding Processes Using Windows Drivers, Exploitation chitchat.

tags | kernel
systems | linux, windows
SHA-256 | e9adfc7c678db387c73b81f31f2559a940c4b996cc5e42b8cffb568c4168f9d9
rfid-angelo-rosiello.pdf
Posted Nov 13, 2007
Authored by Angelo Rosiello, rosiello | Site rosiello.org

RFID: Security Briefings. A set of slides from a talk that discusses how RFID works and security menaces related to RFID.

SHA-256 | 07412007c5d562cfc46e5c3f10554ca1402ee1f8f1a9c0675dc2d12fe5752881
viruses_next_generation-ITUNDERGROUND.ppt
Posted Oct 29, 2007
Authored by Angelo Rosiello, rosiello | Site rosiello.org

Slides from a lecture discussing Next Generation Viruses.

SHA-256 | 6cfbaacb1ce17979d011060139f0ba7bfe18bf60ee51ae17acf2c0723f1c8117
Shadow_Software_Attacks.ppt
Posted Oct 29, 2007
Authored by Angelo Rosiello, rosiello | Site rosiello.org

Slides from a lecture discussing Shadow Software Attacks.

SHA-256 | 9d3f365a840d4fe79ac57428f939eee876ade4b85c65af44212870259fb87bd6
Antiphish-ITUNDERGROUND.pdf
Posted Oct 29, 2007
Authored by Angelo Rosiello, rosiello, Engin Kirda, Christopher Kruegel

Slides from a lecture given by the Technical University of Vienna Politecnico di Milano regarding AntiPhish: An Anti-Phishing Browser Plug-in based Solution.

SHA-256 | 11fdb1fd6cf3504814e13cee83b573ad2c17c0fd9b5ca17d7c6ea7217edc9c3e
writing-behind-a-buffer.pdf
Posted Oct 29, 2007
Authored by Angelo Rosiello, rosiello | Site rosiello.org

Slides from a lecture discussing Writing Behind A Buffer.

SHA-256 | 67417f7ee79d3f522c2a4e3d577097a0fbf2a4fb4b71b2b080564f565d937cd5
CVE-2007-3896.txt
Posted Oct 15, 2007
Authored by s0ftpj, KJK | Site spacebunny.xepher.net

ShellExecuteFisaco - This is a temporary, third-party patch to help mitigate the URL handling issue discovered in Windows XP and Windows Server 2003.

systems | windows
advisories | CVE-2007-3896
SHA-256 | 0ff695c1b0c5d9e7f8c0aa50738be627a3c4f7d8d77fd0b2c0b6be7970eab8f2
thc-orakelcrackert11g.tar.gz
Posted Sep 26, 2007
Authored by thc, vonJeek | Site thc.org

OrakelCrackert is a tool that can crack passwords which are stored using the latest SHA1 based password hashing algorithm. To speed up cracking, the tool exploits a weakness in the Oracle password storage strategy. Therefore, cracking - for most passwords - is still just as fast as it was before the introduction of Oracle 11g.

SHA-256 | 5293c61b9916b0a25af39e553ff393284d2acd51443e7e5e0dd7b3270a0955b4
dma-hydra-5.4-src_plus.txt
Posted Sep 5, 2007
Authored by thc, David Maciejak

Patch for THC's Hydra that adds a dependency checks for openssl needed for the SIP module, modifies checks for libpq.so for Postgresql module, adds a new module for Netware NCP and for Firebird database.

SHA-256 | a644e2e1a9eb85606bd9b9f29ac096834058d72e8ab3dca236b8146d7a98e302
thc-surrender.txt
Posted Sep 5, 2007
Authored by thc | Site freeworld.thc.org

The German fraction of THC stops all activities that have been labeled illegal under the German anti hacker law. The law forbids German citizens to research, discuss or disclose security problems. THC is an independent non-commercial security research organization with over 10 years of experience.

SHA-256 | 4ac519f2436e67eece867b309cf6040907b049cf37943a3bbf2e65ea4bc6881c
sniffjoke-0.2.tar.gz
Posted May 23, 2007
Authored by s0ftpj, vecna | Site s0ftpj.org

SniffJoke implements sniffer/IDS evasion techniques. SniffJoke runs on a network connected box by selectively applying evasion techniques to sessions involving it. Evasion application is governed by user rules and implemented with a netfilter/ulogd module.

SHA-256 | fa26b5c1f7404da6b5ac31e14a7fe20607c48b583e5075bb8539ff76fdf04493
hydra-5.4-src.tar.gz
Posted Mar 24, 2007
Authored by van Hauser, thc | Site thc.org

THC-Hydra is a high quality parallelized login hacker for Samba, Smbnt, Cisco AAA, FTP, POP3, IMAP, Telnet, HTTP Auth, LDAP, NNTP, MySQL, VNC, ICQ, Socks5, PCNFS, Cisco and more. Includes SSL support, parallel scans, and is part of Nessus.

Changes: Fixes to the http modules as some Apache installations are picky. Fixed memory leaks. Performance patch added and more.
tags | web, imap
systems | cisco
SHA-256 | cd2e7e5ea479d50982b08334b1f4477a6620e6b45bc79ab55ddd07b128c64611
sniffjoke-0.1.tar.gz
Posted Mar 6, 2007
Authored by s0ftpj, vecna | Site s0ftpj.org

SniffJoke implements sniffer/IDS evasion techniques. SniffJoke runs on a network connected box by selectively applying evasion techniques to sessions involving it. Evasion application is governed by user rules and implemented with a netfilter/ulogd module.

SHA-256 | 235306c2ac3afe63439af4c38b56c6ce848e7c2f06a9113a6c7e7975c14779a1
iam-1.0.2.1.zip
Posted Mar 6, 2007
Authored by s0ftpj, KJK | Site s0ftpj.org

Sandboxing tool for Windows.

systems | windows
SHA-256 | 377947465e7e61277e2c6eaff1e63082f0c4dc92ae72150346049bef6c993b79
apmislay-0.0.1.tar.gz
Posted Mar 6, 2007
Authored by s0ftpj, vecna | Site s0ftpj.org

Apmislay (avoid+privacy+mislay) is a library to make anonymous connections without performance loss. It implements a simple technique based on IP spoofing and suits well for file sharing systems or anonymous transfers of large amount of data.

tags | spoof
SHA-256 | 1361d415c01016679dab321c68085b3417b894004a9cb77ea39617715a4fa9db
bigboo.tar.gz
Posted Mar 6, 2007
Authored by s0ftpj, FuSyS | Site s0ftpj.org

BigBoo is a YABASST, Yet Another Block And Superblock Subversion Tool. It swallows, encrypts and hides your files in a ext2/ext3 or swap partition.

SHA-256 | 8dc8de2c28d02a5a800080fda7db637c17cc5b80323a6992cb451a25b9745367
SABBIAex-0.0.1.tar.gz
Posted Mar 6, 2007
Authored by s0ftpj, vecna | Site s0ftpj.org

SABBIA protocol anonymizes low latency connections by making a continuous and constant padding over the net. This is an example of implementation on a trusted core.

tags | protocol
SHA-256 | 5e527cac19b060ebb445c3a811d23707127e64c157a48427dbddc3de91179817
innova-0.0.1.tar.gz
Posted Mar 6, 2007
Authored by s0ftpj, vecna | Site s0ftpj.org

Innova is a framework that permits to manipulate network sessions starting at layer 3 and is transparent to the application. It runs entirely in userspace on Linux and supports plugins.

systems | linux
SHA-256 | 76a6b396d0382cb1e3ce80a6fdabd05fd9b1230c10e350f7bde29acae52e3420
blastersteg.tar.gz
Posted Mar 6, 2007
Authored by s0ftpj, vecna | Site s0ftpj.org

This code shows how to send hidden data steganographed into a simulation of common (worm) traffic.

tags | worm
SHA-256 | 72789619c48df1f96f8be7684eaa9420f1b13be1f7734eed11122fd57144ff76
sud-1.3.tar.gz
Posted Mar 6, 2007
Authored by s0ftpj, mm_ | Site s0ftpj.org

sud (superuser daemon) permits a user to switch to root privileges and to use a suid program in a nosuid environment. It is based on a client/server model and on the ability to pass file descriptors between processes. sud permits you to choose your authentication method, and your effective credentials will be checked by using a Unix domain socket.

tags | root
systems | unix
SHA-256 | c4fdf9dfc7a58daf75cb37d2bc4d10d3767216e2b8e4861a87c2d274bac252a0
gtpa-0.12c.tar.gz
Posted Mar 6, 2007
Authored by s0ftpj, vecna | Site s0ftpj.org

Generic time path analysis via ttysnoop-0.12c patching.

SHA-256 | 13016e6b61ab15b5890f728bf71f7270d8fdfbbb5dc4099f6534aa603a989044
uninformed-vol6.tgz
Posted Jan 16, 2007
Authored by Matt Miller, H D Moore, Johnny Cache, Skywing, uninformed | Site uninformed.org

Uninformed is pleased to announce the release of its sixth volume. This volume includes 3 articles on reverse engineering and exploitation technology. These articles include - Engineering in Reverse: Subverting PatchGuard Version 2, Engineering in Reverse: Locreate: An Anagram for Relocate, Exploitation Technology: Exploiting 802.11 Wireless Driver Vulnerabilities on Windows. PDFs of all articles and related code are included in this tarball.

tags | vulnerability
systems | windows
SHA-256 | 77ce1bc8aec65cc4a56356bef955197cab0127a53332ee6046b934865b61016f
phzine06.zip
Posted Oct 9, 2006
Authored by phearless | Site phearless.org

Phearless Serbian/Croatian Security Magazine Issue #06 - In this issue: Symbian Networking, Universal Detection of ring3 Debuggers, PEB Dll Hooking, TheMida and SoftIce Detection, ASProtect 2.2 SKE, PeLock 1.06 Picking, PeSpin 1.304 Unpacking, tELock 0.99 Unpacking, Reversing .NET, Payload parsing/ASN.1 encode & SOAP, Linux Low Level Network Programming, Advanced XSS, Make Windows Secured Via Registry Base.

tags | registry
systems | linux, windows
SHA-256 | 3559f7ae8db274d9867a02719cc26afa12bd30bb7f68b671e2dabd97ff50bbcd
Page 4 of 37
Back23456Next

Top Authors In Last 30 Days

Recent News

News RSS Feed
Some QCT Servers Vulnerable To Pantsdown Flaw
Posted May 26, 2022

tags | headline, flaw
Web App Attacks On The Rise In Healthcare
Posted May 25, 2022

tags | headline, hacker, privacy, data loss
Beijing Needs The Ability To Destroy Starlink, Say Chinese Researchers
Posted May 25, 2022

tags | headline, government, china, space, cyberwar, military
Quad Nations Pledge Deeper Collaboration On Infosec And More
Posted May 25, 2022

tags | headline, government, usa, india, australia, cyberwar, japan
Zoom Patches XMPP Vulnerability Chain That Could Lead To Remote Code Execution
Posted May 25, 2022

tags | headline, flaw, patch
Zuckerberg Sued By DC Attorney General Over Cambridge Analytica Data Scandal
Posted May 24, 2022

tags | headline, government, privacy, usa, britain, data loss, fraud, facebook, social
Fronton IOT Botnet Packs Disinformation Punch
Posted May 24, 2022

tags | headline, botnet, fraud
Cyber Feud Between Anonymous And Killnet Unlikely To Affect Others
Posted May 24, 2022

tags | headline, hacker, russia, cyberwar, anonymous
Hacker Leaks Mountain Of Files From Inside Xinjiang Camps
Posted May 24, 2022

tags | headline, government, china, data loss, cyberwar
These Are The Flaws That Let Hackers Attack Blockchain And DeFi Projects
Posted May 24, 2022

tags | headline, hacker, privacy, data loss, flaw, cryptography
View More News →
packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close