what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 126 - 150 of 928 RSS Feed

Group Releases

issue_23_2005.pdf
Posted Aug 27, 2006
Authored by astalavista | Site astalavista.com

Astalavista Security Newsletter - Issue 23 - Featured articles include - Breaking through security myths Part 1 and Managing the threats posed by stolen laptops - Tips as well as an interview with David Endler, TippingPoint.com.

SHA-256 | e2b3b7d1424c28b027898642d1641da6afd325a7adb28344e2f941be113a7ea5
thc-nokia-rom-images.tar.gz
Posted Jun 5, 2006
Authored by thc | Site thc.org

This archive holds mobile phone ROM images for the Nokia 6630, Nokia n70, Nokia N-GAGE, and the Sony-Ericsson P900. THC has launched the Mobile Phone ROM Image and Reverse Engineering Invitation. Their intention with this release is to motivate other reverse engineers to take a look at the images and to discover other hidden secrets.

SHA-256 | bc4fb590e0a44fadd491f26c30c08691e07b7d46405ffc3de2c0f1f3862b4128
hydra-5.3-src.tar.gz
Posted May 9, 2006
Authored by van Hauser, thc | Site thc.org

THC-Hydra is a high quality parallelized login hacker for Samba, Smbnt, Cisco AAA, FTP, POP3, IMAP, Telnet, HTTP Auth, LDAP, NNTP, MySQL, VNC, ICQ, Socks5, PCNFS, Cisco and more. Includes SSL support, parallel scans, and is part of Nessus.

Changes: Added NTLM support modules for pop3, imap, smtp-auth and http-proxy. Added a http form module. Fixed a bug in the vnc module.
tags | web, cracker, imap
systems | cisco
SHA-256 | cd64dd23e6f5e21fe3cffbbeefeb7f4f6fd5ac8339add63fd102886694e7028a
SWCS.rar
Posted May 2, 2006
Authored by nekd0, unl0ck | Site unl0ck.net

Silent web CGI shell that passes all data between the client and server via cookies.

tags | web, shell, cgi
SHA-256 | a410047e3049f504fb0a4cf57d0b03e0efbaf0c47007216944d2cb36be40092d
phiat.rar
Posted May 2, 2006
Authored by nekd0, unl0ck | Site unl0ck.net

Simple CGI scanner for doing large scans.

tags | cgi
SHA-256 | 6daa6a8d4611c642c1065b8be83dbf13b7d9cbb1c5fa825a76911e1bd4c10ed2
phzine05.zip
Posted Apr 17, 2006
Authored by phearless | Site phearless.org

Phearless Serbian/Croatian Security Magazine Issue #05 - In this issue: Writing Basic Symbian Application, Loader From ring0, PariteB Reversing, Advanced Shellcoding, Elf Series - The Beginning (Code Dump), Uncovering Translated Environments, Symlink Attacks, LamerBuster v1.0, SI2000 Exposed, L00k Inside Registry Base.

tags | registry
SHA-256 | 1c35b76b1800a99433c0896e984352830576df1c3acad698de5042eba2ab4c7b
THC-IPV6 Attack Tool 0.6
Posted Apr 6, 2006
Authored by thc | Site thc.org

THC is proud to be the first who are releasing an comprehensive attack toolkit for the IPv6 protocol suite. It comprises of state-of-the-art tools for alive scanning, man-in-the-middle attacks, denial-of-service etc. which exploits inherent vulnerabilities in IPv6. Included is a fast and easy to use packet crafting library to create your own attack tools.

tags | vulnerability, protocol
SHA-256 | 577fb708c202a62615c74e3fff77c90277801dc6ef131673f0b978d0059a198d
hydra-5.2-src.tar.gz
Posted Jan 29, 2006
Authored by van Hauser, thc | Site thc.org

THC-Hydra is a high quality parallelized login hacker for Samba, Smbnt, Cisco AAA, FTP, POP3, IMAP, Telnet, HTTP Auth, LDAP, NNTP, MySQL, VNC, ICQ, Socks5, PCNFS, Cisco and more. Includes SSL support, parallel scans, and is part of Nessus.

Changes: Fix for the ssh2 module. VMWare-Auth module added.
tags | web, cracker, imap
systems | cisco
SHA-256 | a3793901ab06ebc896a9cb28db9a4da122515151f2227f4e16921d446a5cffe2
tsng-1.1.tar.gz
Posted Jan 26, 2006
Authored by van Hauser, thc | Site thc.org

TSNG is another excellent release from THC. It is just your normal plain text mode wardialer without a GUI, but with the ability to scan with as many modems as you want. The only limits are your bandwidth, RAM and CPU power. So in theory, up to 65000 modems can be used in parallel to scan a large range of numbers. The modems can be in any area of the world, as long as you have network connectivity to the systems to which the modems are connected.

SHA-256 | 507bafc71c2cda7abc5b5ef9e08d09c37dbfcfb1829b0270db30b21988eef784
hydra-5.1-src.tar.gz
Posted Dec 28, 2005
Authored by van Hauser, thc | Site thc.org

THC-Hydra is a high quality parallelized login hacker for Samba, Smbnt, Cisco AAA, FTP, POP3, IMAP, Telnet, HTTP Auth, LDAP, NNTP, MySQL, VNC, ICQ, Socks5, PCNFS, Cisco and more. Includes SSL support, parallel scans, and is part of Nessus.

Changes: mostly bugfixes and little enhancements.
tags | web, cracker, imap
systems | cisco
SHA-256 | d3dc9646807a7074bac799b74b68808f2805d59a216fe04671c418cd476230e0
kryptor-0.1.tar.gz
Posted Nov 20, 2005
Authored by Angelo Rosiello, rosiello | Site rosiello.org

Kryptor is a graphical tool to encrypt files using the algorithm ARCS-256 bits. It is also possible to erase files by overwriting data with a pseudo-random sequence of bytes iterated three times, which will make data recovery a very complex operation.

SHA-256 | a3705619eead095f15725a9ff0cc415932e6aad1a65535e4764adf693624bfa2
phzine04.zip
Posted Nov 9, 2005
Authored by phearless | Site phearless.org

Phearless Serbian/Croatian Security Magazine Issue #04 - In this issue: Symbian C++ Reference - Part 1, Symbian OS - Polymorphic MDL, TINY phile about SQL injections, Developing Network Security Tool(s), The Art of Reversing, Open Your Windows (OS), Malloc Demistified - Part 1, Bypass DEP on Heap, Client/Server Systems, Uncommon Tribute to Practical Switching, and Cisco Routers Exposed.

tags | sql injection
systems | cisco, windows
SHA-256 | b634f2e77c076277b403bb426d794f0d510f0896671f284697e51fbc7662ab26
phzine03.zip
Posted Nov 9, 2005
Authored by phearless | Site phearless.org

Phearless Serbian/Croatian Security Magazine Issue #03 - In this issue: Injecting Malware: Symbian Micro Kernel, Smart EPO Techniques, Debugging Programs On Win32, Nanomites And Misc Stuff, Full Reverse(Target: tElock), Full Reverse(Target: MrStop's Crackme #1), Full Reverse(Target: Inline patching nSPack 2.x), Xtreem Exploiting Steps, Exploiting Non-Exec Stack, Exploiting Stack BOf Over SEH, Security Of Web Pages, How To Stay OUT Of JAIL, Secret Of BSOD, and Recent Computer Networks.

tags | web, kernel
systems | windows
SHA-256 | 0653aa8d59a2f78b768ce89d9d41080d267b31367784382e3afa5cdfa2cd4f1a
phzine02.zip
Posted Nov 9, 2005
Authored by phearless | Site phearless.org

Phearless Serbian/Croatian Security Magazine Issue #02 - In this issue: Symbian OS - Under the Hood, Runtime Decryption and Meta Swap Engine, BlackHand.w32(DeadCode.a/b) Analysys, prc-ko - the 4th Native API virus, NT Startup Methods Exposed, Phearless Challenge #2: Reversme, Full Reverse(Target VCT #1), Full Reverse(Target VCT #2), Full Reverse(Target VCT #3), Writing Linux Shellcode - Basics, Hiding Behind Firewall, Phreaking in Serbia, Cryptology 101, Win Hacks and Tips #2, and Security from iso/osi Reference Model Perspective.

tags | shellcode, virus
systems | linux
SHA-256 | 5b695bbfb1af3f17c951a82f36b8ef214aee01652b0531371fbebff525d4532b
phzine01.zip
Posted Nov 9, 2005
Authored by phearless | Site phearless.org

Phearless Serbian/Croatian Security Magazine Issue #01 - In this issue: The Art of Sniffing, The Art of Footprinting, SQL Injection Techniques, Wireless - Under the hood, Cross Site Scripting with examples, VX Coding - New ideas, Win Hack and Tweak, Samba Lin and Win Dance, Exploiting ShopAdmin, CGI Exploiting, and Mirc Scripting Basics. Note: All articles are in Serbian/Croatian.

tags | cgi, xss, sql injection
SHA-256 | 667c8c8ad2e789a3b6b7c451991dfb87400bbd7db568da9276d836ec71ab233e
ph.jpg
Posted Nov 9, 2005
Authored by phearless

Phearless Group Logo

SHA-256 | 687e4d09dcf869779d098b6768593aa39fa80f365840e6d1a92c87f8709c29d2
issue_22_2005.pdf
Posted Nov 8, 2005
Authored by astalavista | Site astalavista.com

Astalavista Security Newsletter - Issue 22 - Featured articles include - Things to consider when developing your early-stage security policy ; and Antivirus software - so what?! as well as an interview with Daniel Brandt, Google-Watch.org.

SHA-256 | a7278b95685fd44c892a083a6c300a4c6170bdbab6fb8d585444a5fe69bb8287
issue_21_2005.pdf
Posted Nov 8, 2005
Authored by astalavista | Site astalavista.com

Astalavista Security Newsletter - Issue 21 - Featured articles include - What else should I worry about besides the encryption length of our VPN solution? ; and Tips for enhancing your online privacy as well as an interview with Johannes B. Ullrich, CTO of the Sans Internet Storm Center, and the main developer behind the Dshield.org project

SHA-256 | 8ba66c707aa903e96ddabd065c7d527d2729e1ed43e05700bab667e21d239aba
unl0ck_logo.gif
Posted Nov 2, 2005
Authored by unl0ck

Graphic for unl0ck section.

SHA-256 | b8c34b57b3ddd1209783ce0ccb4c8fc2583ca7e6cf898bd979f33c4b39cc1d0c
0day-3cdsmash.c
Posted Nov 2, 2005
Authored by unl0ck, Darkeagle | Site exploiterz.org

3CDaemon remote root exploit.

tags | remote, root
SHA-256 | 658be6711b3c4ab25d876b5aeda1635694af0554b4763b808488c3832356dbd5
0xcue.pl
Posted Nov 2, 2005
Authored by unl0ck, Darkeagle | Site exploiterz.org

Mac OS X.

systems | apple, osx
SHA-256 | c446553f4f3166b6eb2e42c816e8b5f650b517abc11872daf2276db5d0338396
0xletzdance.rar
Posted Nov 2, 2005
Authored by unl0ck, Darkeagle | Site exploiterz.org

Exploits for WinRAR versions 3.4x and below, possibly 3.5x.

SHA-256 | 321977b4c6611a137dee4e707f96acbc2b75443b57c3581fec815f9e2657831e
55k7-snake.c
Posted Nov 2, 2005
Authored by unl0ck, Darkeagle | Site exploiterz.org

Mozilla FireFox remote GIF heap overflow exploit for versions 1.0.1 and below.

tags | remote, overflow
SHA-256 | f6bf1f16b4c69ffd0c96d7def4314b0449714708db73bda0548a476c1dc053fd
ACADMP34.EXE
Posted Nov 2, 2005
Authored by unl0ck, 8RON | Site exploiterz.org

Access Administrator Pro 3.4 crack.

SHA-256 | a5c07367b11fed965aa1ff1c0a0e80de8a106edffa1cd1b6bbc4a9b109d607a7
adseclev53.exe
Posted Nov 2, 2005
Authored by unl0ck, 8RON | Site exploiterz.org

Advanced Security Level 5.3 crack.

SHA-256 | 952f7478a3fb46842af7d8c366d459815b3db633b87c058c4ece4092ec607c69
Page 6 of 38
Back45678Next

Top Authors In Last 30 Days

Recent News

News RSS Feed
Google Patches Critical Chrome Vulnerability
Posted Apr 24, 2024

tags | headline, flaw, google, patch, chrome
Hackers Are Using Developing Countries For Ransomware Practice
Posted Apr 24, 2024

tags | headline, hacker, malware, cybercrime, fraud, cryptography
North Korean Hackers Hijack Antivirus Updates For Malware Delivery
Posted Apr 24, 2024

tags | headline, hacker, government, malware, flaw, cyberwar, military, north korea
CISA Warns Of Windows Print Spooler Flaw After Microsoft Sees Russian Exploitation
Posted Apr 24, 2024

tags | headline, government, microsoft, usa, russia, flaw, cyberwar
US Charges Iranians With Cyber Snooping On Government, Companies
Posted Apr 24, 2024

tags | headline, hacker, government, privacy, usa, cyberwar, spyware, iran
TensorFlow AI Models At Risk Due To Keras API Flaw
Posted Apr 24, 2024

tags | headline, flaw
Authorities Investigate LabHost Users After Phishing Service Shutdown
Posted Apr 23, 2024

tags | headline, cybercrime, fraud, phish
Windows Vulnerability Reported By The NSA Exploited To Install Russian Malware
Posted Apr 23, 2024

tags | headline, government, microsoft, usa, russia, flaw, cyberwar, spyware, nsa
UnitedHealth Admits Breach Could Cover Substantial Proportion Of People In America
Posted Apr 23, 2024

tags | headline, hacker, privacy, data loss
Microsoft DRM Hack Could Allow Movie Downloads From Streaming
Posted Apr 23, 2024

tags | headline, microsoft, flaw, pirate
View More News →
packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close