exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 51 - 75 of 94 RSS Feed

s0ftpr0ject 99 releases

s0ftpr0ject 99 is a security team founded in the summer of 1997. Its research team is fully dedicated to study, describe and resolve security problems related to the network and digital worlds. Tools and documentation available on this site are meant to be used only in order to improve your security and privacy, and not as a way to harm anybody. Any use of the available material that goes against the laws of any state is not condoned by s0ftpr0ject 99, which also cannot be held responsible for any misuse. s0ftpr0ject 99 absolutely dissociates itself from any cracking/hacking/phreaking group that may claim to be in any way collaborating with us. If YOU are going against the law, WE will never have any relation with you. Any remark should be addressed to staff@s0ftpj.org, and abuses reported immediately, with all the necessary informations, to abuse@s0ftpj.org. Also, due to recent facts happened in our country, we point out that we strictly dissociate from any terroristic or eversive groups and their destabilizing and highly deprecable actions. If you, the visitor, are somehow offended by the contents of the site, we ask you to leave this site immediately, and don't go on accessing, reading or downloading anything here. On the other hand, by accessing the main page, you agree with this disclaimer and must consider yourself responsible for any use you make of the informations contained inside. Also, who is currently hosting our page and our mirrors cannot be legally sued for its content.
crypto_lib_01b.zip
Posted May 4, 2000
Authored by s0ftpj | Site s0ftpj.org

No information is available for this file.

SHA-256 | 7b5020a1c7b11432fd1cbe770c0957b73540e15ad8fa75ec2c2f318f05abe044
eth_out_ex.c
Posted May 4, 2000
Authored by s0ftpj, Pigpen | Site s0ftpj.org

This kld gives you an example of how you can modify the output function of an Ethernet Interface.

SHA-256 | b8193a4ce9a200bd034f7b9a59a6e301442838672141666df6e87261c2ba01be
SPJ-003-000.txt
Posted May 3, 2000
Authored by s0ftpj, FuSyS | Site s0ftpj.org

s0ftpr0ject Security Advisory 003-000: Remotely Exploitable Buffer Overflow in Sniffit. Possibly all systems running Sniffit (0.3.7beta and all versions logging mail headers). Successful attacks depend on being able to craft shellcodes so they can bypass input filter.

tags | overflow, shellcode
SHA-256 | a304b30bb689966880a997812a854919d1e4be60e485e7b36713ff31343e60ac
fw.c
Posted Feb 8, 2000
Authored by s0ftpj, Pigpen | Site s0ftpj.org

IPFW-FILTER-REVISION#2 - FreeBSD kernel module that allows a certain IP to bypass ipfilter firewall rules. Tested on FreeBSD 4.0-19990705-CURRENT.

tags | kernel
systems | freebsd
SHA-256 | 027a95d705dc634b8a0987584bce303b00eba6c0f378350baaac7c490b888686
bsdnethack.c
Posted Jan 25, 2000
Authored by s0ftpj, Pigpen

FreeBSD kernel module which can change options at every layer in a connection.

tags | kernel
systems | freebsd
SHA-256 | 9d8903cacecd3861b6cda58fe802e06cd717ab2e2925d204ecf4ee06745f5440
ipfwfilter.c
Posted Jan 25, 2000
Authored by s0ftpj, Pigpen

BSD kernel module which prevents ipfw from blocking a specified IP address.

tags | kernel
systems | bsd
SHA-256 | eda8204dc0dd9bee437dbd4ef6006b28fdcf118846aa7c66f58d74c79494e86b
printsux.c
Posted Jan 12, 2000
Authored by s0ftpj, Pigpen

This src grabs documents printed on a network printer installed with lpd by sniffing it from the network.

SHA-256 | fdd3a4da4b6c7e5bdabff5d056a2cdc6624bc2137b16ee1f75f434459fc2b500
gork-2.0b.c
Posted Jan 12, 2000
Authored by s0ftpj, Pigpen

Gork is a tcp/udp/icmp/ip dumper with options to log only packets from/to specific machine/s in a file. This version supports pcap library. Tested on Redhat, Debian, and FreeBSD.

Changes: Bug fixes.
tags | udp, tcp
systems | linux, redhat, freebsd, debian
SHA-256 | 5888b46530d4848b2f9113d552f2992a3955bbb3340fd1f234250f1690ffc7f1
gccsploit.c
Posted Jan 10, 2000
Authored by s0ftpj, Pigpen

Gcc 2.7.2.x Exploit - C version.

SHA-256 | 867a0fdc26a013485e3d1f9f158a953de2b5612c8ef8f16856d92774668eb453
spooflkm.tgz
Posted Jan 10, 2000
Authored by s0ftpj, Pigpen

LKMs to forge and detect spoofed packets on your host.

tags | spoof
SHA-256 | 63eeed4aae44fadc07265a1c0556b5a934b034ff55fa486354a70e0a716427c9
winamprev.txt
Posted Jan 10, 2000
Authored by s0ftpj, Ma

Reverse Engineering Winamp - How to modify windows binaries to do anything you want. Uses reverse engineering winamp to read encrypted mp3's as an example.

systems | windows
SHA-256 | b205c7aa737490b5282634163d7d5c96864e4fc24cac7d39c30de010ec9c410e
gork.c
Posted Jan 10, 2000
Authored by s0ftpj, Pigpen

Gork is a tcp/udp/icmp/ip dumper with options to log only packets from/to specific machine/s in a file. This version supports pcap library. Tested on Redhat, Debian, and FreeBSD.

tags | udp, tcp
systems | linux, redhat, freebsd, debian
SHA-256 | 5f42d2b7857572a97c6398d346dcc866791575200bd9ce53c32cb679bd10c295
SPJY2Ksniff.c
Posted Dec 31, 1999
Authored by s0ftpj, FuSyS | Site s0ftpj.org

Spjy2ksniff.c Network sniffer to operate passive attacks and find weaknesses in the protection of the traffic on your LAN. It uses the pcap(3) library to access to datalink level. Newbie (limited) version.

SHA-256 | f92ff5362d4b2ff3a27899cba95cba754e336710159c7446b80329d721ae113b
pipefakeps.c
Posted Sep 23, 1999
Authored by s0ftpj

Modified version of Todd Vierling's datapipe, where you can specify a name that will be displayed instead of the process' name. Linux - c source. Courtesy of soft project digital security for y2k

systems | linux
SHA-256 | d23b53bdf0ea1b506dff4e2c80c97ab54f38030dedca8bb1aad3509be2f43820
cgiscan.c
Posted Sep 23, 1999
Authored by s0ftpj

Phf - test-cgi - htmlscript - view-source - wrap - campas - pfdisplay - webdist - aglimpse - php - nph-test-cgi scanner. Linux - c source. Courtesy of soft project digital security for y2k

tags | cgi, php
systems | linux
SHA-256 | dfcf5bca361e966d45696564142eb1ef582869eb7125b7e08b2a334e90c89eec
pippa_v1.txt
Posted Sep 23, 1999
Authored by s0ftpj

Network datapipe. Linux - perl source. Courtesy of soft project digital security for y2k

tags | perl
systems | linux
SHA-256 | 9f34e070f8fde69e2243a38d517d94a0b2bc5c4e428f5e851096d9eca76a9cf1
crypt7.zip
Posted Sep 23, 1999
Authored by s0ftpj

Cryptographic utility using private key (4096 bytes), random salting. DOS - binary. Courtesy of soft project digital security for y2k

SHA-256 | 45661fb44f86e0a6eb8f4540a72487cc87027263d194c393469e0131568a989a
tcpshell.c
Posted Sep 23, 1999
Authored by s0ftpj

Simple socket shell. Linux - c source. Courtesy of soft project digital security for y2k

tags | shell
systems | linux
SHA-256 | 74808fb4a85ba8f28e76373d228771acebdce18a467f7358fdf7453271429fa5
hideme.c
Posted Sep 23, 1999
Authored by s0ftpj

Log editor that cleans Utmp, Wtmp, LastLog, Messages, XferLog, Secure and MailLog. Linux - c source Courtesy of soft project digital security for y2k

systems | linux
SHA-256 | 53330974c17923ab0e9ffe80cb6194db9f47475505178ebb727a990cff50e197
shapechange.c
Posted Sep 23, 1999
Authored by s0ftpj

Utmp editor that permits to change id, tty and host of a user logged in the system. BFi3 8). Linux - c source. Courtesy of soft project digital security for y2k

systems | linux
SHA-256 | 25b88edefcc2babc93951bbaaede6fa44e7e1739c20d5085efb86d3e54354192
pippa_v2.txt
Posted Sep 23, 1999
Authored by s0ftpj

Network datapipe with interactive mode, support for proxy server socks (v4 or v5), logging facility and option to concatenate more pipes. Documentation: 'PiPPA v2', BFi4 (December 98). Linux/WinNT - perl source. Courtesy of soft project digital security for y2k

tags | perl
systems | linux, windows
SHA-256 | 3cf8f7d9b648939a354658af5b6ebd82e9e4ccf594c21661d07872318d10198a
carogna.c
Posted Sep 23, 1999
Authored by s0ftpj

Loadable Kernel Module to hide in a system. It substitutes in 4kbytes a full rootkit. Only for 2.0.x kernels. Documentation: 'PR0GETT0 CAR0NTE - PARTE I' , BFi3 (Luglio 98); 'PR0GETT0 CAR0NTE - PARTE II' , BFi4 (December 98). Linux - LKM c source. Courtesy of soft project digital security for y2k

tags | kernel
systems | linux
SHA-256 | 8d359b0bc902e70a6892c3f7627024d37781658ad8a1645786fa0e45e1dc4dfc
shareall.zip
Posted Sep 23, 1999
Authored by s0ftpj

Trojan that enables file and printer sharing, and then enables sharing on all drives with full access. Documentation: 'WiND0WS E PASSW0RD' , BFi4 (December 98). Win9x - binary. Courtesy of soft project digital security for y2k

tags | trojan
systems | windows
SHA-256 | 7a6bc9282ef21fc92fb45bda834017b89f6b8c67b37c27d8806be058ffaae86c
007shell.tgz
Posted Sep 23, 1999
Authored by s0ftpj

Shell hidden into ICMP tunneling that uses 0x00 ECHO REPLY messages to carry data. Includes: 007Shell, ICMP Tunneling Library v1. Courtesy of soft project digital security for y2k

tags | shell
SHA-256 | f083e35df72f5406144b7351e8d4774b12d4e651f613cb4f5bc6174cb5ccb427
imap4.tgz
Posted Sep 23, 1999
Authored by s0ftpj

Kit including two tools that scan for exploitable versions of IMAP4; the scan can be accomplished by specifying a single host or using a file containing all the ip's. Includes: Imap4 scanner, Imap4 checker. Linux - c source. Courtesy of soft project digital security for y2k

systems | linux
SHA-256 | 7564e2d776360b4679f088a324c2b88136600a6078f5a0b16e6ea93c39c3f97b
Page 3 of 4
Back1234Next

Top Authors In Last 30 Days

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close