seeing is believing
Showing 1 - 25 of 36 RSS Feed

Files

amloger.c
Posted Nov 5, 1999
Authored by shadowpenguin

This is a auto logger for Amuser-net BBS which is used in the many Japanese underground sites

systems | unix
MD5 | 3c6e56c55f2e9063aaf349c9872da680
cgiexp.c
Posted Nov 5, 1999
Authored by shadowpenguin

This utility lists the servers which have the security vulnerabilities of CGI program. This utility supports the pht, test-cgi, nph-test-cgi, campas, htmlscritp, servce, pwd. The addition of new vulnerabilities is very easy.

tags | cgi, vulnerability
systems | unix
MD5 | 3b0def202f08648fc9881d638df01085
easyscan.c
Posted Nov 5, 1999
Authored by shadowpenguin

The simple full-connection TCP port scanner. This utility lists the servers that open the specified port.

tags | tcp
systems | unix
MD5 | 1434dbaba3484bca0063b32ae1df9b67
ftpt.c
Posted Nov 5, 1999
Authored by shadowpenguin

ftp trojan logs the hostname, username, and password when the local users use the ftp.

tags | local, trojan
systems | unix
MD5 | 70bcffc5049b48f4415c054831017ed5
gdd13.c
Posted Nov 5, 1999
Authored by shadowpenguin

This program is one of the ethernet packet sniffer for LINUX, FreeBSD, SunOS4.1, Solaris2, and IRIX that can log the all packets in each session of telnet, rlogin, pop3, ftp. If you install this program in the cracked server, you can also know the cracking process and the location of rootshell by the crackers. The logs of this tool is the evidence of the cracking, this tool is also useful for admin.

systems | linux, unix, freebsd, irix
MD5 | 4cb4d20c3304601c747194722ab256df
gscan.c
Posted Nov 5, 1999
Authored by shadowpenguin

A generic banner scanner. eg scan for qpop 110, wuftpd 21, wingates 23, telnet banners 23, etc etc

systems | unix
MD5 | ce09b86504ce12e42f80a4627d2abfc3
hrs100.c
Posted Nov 5, 1999
Authored by shadowpenguin

This is one of the rootshell program. This program will be rootshell if you specify the special argment. If the special argment is not specified, this program calls a specified program. So, you name this program as well known suid program, it's very difficult for admins to find.

systems | unix
MD5 | 972284fa40fbd79e74121a98ef5f226d
hrs110.sh
Posted Nov 5, 1999
Authored by shadowpenguin

Improved version of hrs. You can easy install hrs by this shell script.

tags | shell
systems | unix
MD5 | a0569055929d84836e4601c5a454d01e
irixaa.tar.gz
Posted Nov 5, 1999
Authored by shadowpenguin

This program checks many IRIX security holes automatically. If you are admin, can check easily the security vulnerabilities of each IRIX. Don't use for the auto attack. This scanner contains the ttdbserver attack, this function is based on the script which is developped by the rootshell. thanks.

tags | vulnerability
systems | unix, irix
MD5 | 6ed72c2b003024ef4818b460371143d3
logchk.c
Posted Nov 5, 1999
Authored by shadowpenguin

If the access log is wiped by using the log wiper, the logs are not displayed by the last command. However, the general log wipers such as "zap" write the null on the specified entry of logfile, so you can check the log files whether the logs are wiped. This utility shows the all entries, you can analyze the logfile.

systems | unix
MD5 | a85be3f58485ed34d9b3f9c71463f0b8
ltelnet.tar.gz
Posted Nov 5, 1999
Authored by shadowpenguin

This is the telnet trojan based on GNU telnet. The all operation which is included the server name, username, and password can be logged. This trojan can be installed with non-root user, if the user account is used by many crackers, you can also know the cracking process and the location of rootshell.

tags | root, trojan
systems | unix
MD5 | 305307abab5a2c82e3093c7c8c9f5251
passwd_freebsd.c
Posted Nov 5, 1999
Authored by shadowpenguin

Passwd trojan for freeBSD.

tags | trojan
systems | unix, freebsd
MD5 | 1088d2457aaef2a963eda828221d98d6
passwd_irix.c
Posted Nov 5, 1999
Authored by shadowpenguin

Passwd trojan for IRIX. This trojan logs the username and password, and mails such information to you.

tags | trojan
systems | unix, irix
MD5 | b05539d77005385a59715659f34968e1
passwd_linux.c
Posted Nov 5, 1999
Authored by shadowpenguin

Passwd trojan for LINUX.

tags | trojan
systems | linux, unix
MD5 | e1bb4a2e20e5323d14cff07b9a10ef20
passwd_solaris.c
Posted Nov 5, 1999
Authored by shadowpenguin

Passwd trojan for Solaris.

tags | trojan
systems | unix, solaris
MD5 | 2a6ff083ab921fb71aa1a1f50f52babd
passwd_sunos4.c
Posted Nov 5, 1999
Authored by shadowpenguin

Passwd trojan for SunOS4.

tags | trojan
systems | unix
MD5 | d4c7492e1ac5f0ad9c6ceb71e3ffef6f
rbackdoor.c
Posted Nov 5, 1999
Authored by shadowpenguin

This is the "/.rhosts" backdoor creation daemon. This is the faked telnetd, if you connect to the telnet port of the target host which is installed this daemon from the specified host, the "/.rhosts" is rewrited to "+ +", you can login to the target host by the "rlogin target -l root". Of course, the telnetd can be used normally.

tags | root
systems | unix
MD5 | ada51ed685b7e6fefb3f851412c97226
sendexp.c
Posted Nov 5, 1999
Authored by shadowpenguin

In the Penguin Toolbox, I published the exploit code that can send and execute a trojan program which is prepared in the attacker host, this is server program which is used by such exploits. This program sends the "*.exe" program to the victim host, and the exploit code executes it.

tags | trojan
systems | unix
MD5 | 7e1e90081114f7b0dc7b85adc49b2840
simplestealth.c
Posted Nov 5, 1999
Authored by shadowpenguin

This is the simple half-open and stealth TCP port scanner. In the half-open mode, this program can recognize the OS type of target host.

tags | tcp
systems | unix
MD5 | eb38415f021553359c7c167e66cad2cd
sizer.c
Posted Nov 5, 1999
Authored by shadowpenguin

If you install the ps faker, ifconfig faker, and HRS, the size of such programs will be smaller than original commands. This program adjusts the size of executable program, avoids the size check.

systems | unix
MD5 | 02538901268fd7ff4247fc92bb051163
sut_digital.c
Posted Nov 5, 1999
Authored by shadowpenguin

SU trojan for Digital.

tags | trojan
systems | unix
MD5 | 3e74452aa0e80456e7e2ee22b3bc25f3
sut_irix.c
Posted Nov 5, 1999
Authored by shadowpenguin

SU trojan for IRIX. This trojan logs the passwords. If you install the su trojan correctry, local users or admin fails the first "su", and the password which is inputed to su trojan has been logged to the specified file.

tags | local, trojan
systems | unix, irix
MD5 | eed0677f1799609c5205e1dd1d4a0a5d
sut_sol24.c
Posted Nov 5, 1999
Authored by shadowpenguin

SU trojan for Solaris2.4

tags | trojan
systems | unix
MD5 | 625af8c325b186764a35a61de6972d1a
sut_sol25j.c
Posted Nov 5, 1999
Authored by shadowpenguin

SU trojan for Solaris2.5

tags | trojan
systems | unix
MD5 | 26d22bee6c19251f19d19444e22da58b
sut_sun41.c
Posted Nov 5, 1999
Authored by shadowpenguin

SU trojan for SunOS4

tags | trojan
systems | unix
MD5 | d73b61254500cf0c87e4239802338064
Page 1 of 2
Back12Next

Top Authors In Last 30 Days

Recent News

News RSS Feed
Microsoft Mocks Google For Failed Security Fix Deployment Methodology
Posted Oct 19, 2017

tags | headline, microsoft, flaw, google, chrome
Malicious Mineraft Apps In Google Play Enslave Your Device To A Botnet
Posted Oct 19, 2017

tags | headline, malware, microsoft, phone, botnet, google
OAIC Received 114 Voluntary Data Breach Notifications In Two Years
Posted Oct 19, 2017

tags | headline, hacker, privacy, australia, data loss
US-CERT Predicts Machine Learning To Become Security Risk
Posted Oct 19, 2017

tags | headline, flaw
ATM Malware Available Online For Online $5,000
Posted Oct 18, 2017

tags | headline, malware, bank, cybercrime, fraud
Oracle Swats 252 Bugs In Patch Update
Posted Oct 18, 2017

tags | headline, flaw, patch, oracle
Child Safety Smartwatches Easy To Hack, Watchdog Says
Posted Oct 18, 2017

tags | headline, privacy, flaw
Domino's Pizza Delivers User Details To Spammers
Posted Oct 18, 2017

tags | headline, privacy, email, spam, fraud
Microsoft Never Disclosed 2013 Hack Of Secret Vulnerability Database
Posted Oct 18, 2017

tags | headline, hacker, microsoft, data loss, flaw
Adobe Patches Zero-Day Used To Plant Gov't Spying Software
Posted Oct 17, 2017

tags | headline, hacker, government, usa, flaw, cyberwar, adobe, zero day, nsa
View More News →
packet storm

© 2016 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close