No information is available for this file.
7b5020a1c7b11432fd1cbe770c0957b73540e15ad8fa75ec2c2f318f05abe044
This kld gives you an example of how you can modify the output function of an Ethernet Interface.
b8193a4ce9a200bd034f7b9a59a6e301442838672141666df6e87261c2ba01be
s0ftpr0ject Security Advisory 003-000: Remotely Exploitable Buffer Overflow in Sniffit. Possibly all systems running Sniffit (0.3.7beta and all versions logging mail headers). Successful attacks depend on being able to craft shellcodes so they can bypass input filter.
a304b30bb689966880a997812a854919d1e4be60e485e7b36713ff31343e60ac
IPFW-FILTER-REVISION#2 - FreeBSD kernel module that allows a certain IP to bypass ipfilter firewall rules. Tested on FreeBSD 4.0-19990705-CURRENT.
027a95d705dc634b8a0987584bce303b00eba6c0f378350baaac7c490b888686
FreeBSD kernel module which can change options at every layer in a connection.
9d8903cacecd3861b6cda58fe802e06cd717ab2e2925d204ecf4ee06745f5440
BSD kernel module which prevents ipfw from blocking a specified IP address.
eda8204dc0dd9bee437dbd4ef6006b28fdcf118846aa7c66f58d74c79494e86b
This src grabs documents printed on a network printer installed with lpd by sniffing it from the network.
fdd3a4da4b6c7e5bdabff5d056a2cdc6624bc2137b16ee1f75f434459fc2b500
Gork is a tcp/udp/icmp/ip dumper with options to log only packets from/to specific machine/s in a file. This version supports pcap library. Tested on Redhat, Debian, and FreeBSD.
5888b46530d4848b2f9113d552f2992a3955bbb3340fd1f234250f1690ffc7f1
Gcc 2.7.2.x Exploit - C version.
867a0fdc26a013485e3d1f9f158a953de2b5612c8ef8f16856d92774668eb453
LKMs to forge and detect spoofed packets on your host.
63eeed4aae44fadc07265a1c0556b5a934b034ff55fa486354a70e0a716427c9
Reverse Engineering Winamp - How to modify windows binaries to do anything you want. Uses reverse engineering winamp to read encrypted mp3's as an example.
b205c7aa737490b5282634163d7d5c96864e4fc24cac7d39c30de010ec9c410e
Gork is a tcp/udp/icmp/ip dumper with options to log only packets from/to specific machine/s in a file. This version supports pcap library. Tested on Redhat, Debian, and FreeBSD.
5f42d2b7857572a97c6398d346dcc866791575200bd9ce53c32cb679bd10c295
Spjy2ksniff.c Network sniffer to operate passive attacks and find weaknesses in the protection of the traffic on your LAN. It uses the pcap(3) library to access to datalink level. Newbie (limited) version.
f92ff5362d4b2ff3a27899cba95cba754e336710159c7446b80329d721ae113b
Modified version of Todd Vierling's datapipe, where you can specify a name that will be displayed instead of the process' name. Linux - c source. Courtesy of soft project digital security for y2k
d23b53bdf0ea1b506dff4e2c80c97ab54f38030dedca8bb1aad3509be2f43820
Phf - test-cgi - htmlscript - view-source - wrap - campas - pfdisplay - webdist - aglimpse - php - nph-test-cgi scanner. Linux - c source. Courtesy of soft project digital security for y2k
dfcf5bca361e966d45696564142eb1ef582869eb7125b7e08b2a334e90c89eec
Network datapipe. Linux - perl source. Courtesy of soft project digital security for y2k
9f34e070f8fde69e2243a38d517d94a0b2bc5c4e428f5e851096d9eca76a9cf1
Cryptographic utility using private key (4096 bytes), random salting. DOS - binary. Courtesy of soft project digital security for y2k
45661fb44f86e0a6eb8f4540a72487cc87027263d194c393469e0131568a989a
Simple socket shell. Linux - c source. Courtesy of soft project digital security for y2k
74808fb4a85ba8f28e76373d228771acebdce18a467f7358fdf7453271429fa5
Log editor that cleans Utmp, Wtmp, LastLog, Messages, XferLog, Secure and MailLog. Linux - c source Courtesy of soft project digital security for y2k
53330974c17923ab0e9ffe80cb6194db9f47475505178ebb727a990cff50e197
Utmp editor that permits to change id, tty and host of a user logged in the system. BFi3 8). Linux - c source. Courtesy of soft project digital security for y2k
25b88edefcc2babc93951bbaaede6fa44e7e1739c20d5085efb86d3e54354192
Network datapipe with interactive mode, support for proxy server socks (v4 or v5), logging facility and option to concatenate more pipes. Documentation: 'PiPPA v2', BFi4 (December 98). Linux/WinNT - perl source. Courtesy of soft project digital security for y2k
3cf8f7d9b648939a354658af5b6ebd82e9e4ccf594c21661d07872318d10198a
Loadable Kernel Module to hide in a system. It substitutes in 4kbytes a full rootkit. Only for 2.0.x kernels. Documentation: 'PR0GETT0 CAR0NTE - PARTE I' , BFi3 (Luglio 98); 'PR0GETT0 CAR0NTE - PARTE II' , BFi4 (December 98). Linux - LKM c source. Courtesy of soft project digital security for y2k
8d359b0bc902e70a6892c3f7627024d37781658ad8a1645786fa0e45e1dc4dfc
Trojan that enables file and printer sharing, and then enables sharing on all drives with full access. Documentation: 'WiND0WS E PASSW0RD' , BFi4 (December 98). Win9x - binary. Courtesy of soft project digital security for y2k
7a6bc9282ef21fc92fb45bda834017b89f6b8c67b37c27d8806be058ffaae86c
Shell hidden into ICMP tunneling that uses 0x00 ECHO REPLY messages to carry data. Includes: 007Shell, ICMP Tunneling Library v1. Courtesy of soft project digital security for y2k
f083e35df72f5406144b7351e8d4774b12d4e651f613cb4f5bc6174cb5ccb427
Kit including two tools that scan for exploitable versions of IMAP4; the scan can be accomplished by specifying a single host or using a file containing all the ip's. Includes: Imap4 scanner, Imap4 checker. Linux - c source. Courtesy of soft project digital security for y2k
7564e2d776360b4679f088a324c2b88136600a6078f5a0b16e6ea93c39c3f97b