what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 26 - 36 of 36 RSS Feed

Files

sut.c
Posted Nov 5, 1999
Authored by shadowpenguin

SU Trojan Ver2.00

tags | trojan
systems | unix
SHA-256 | 8e2561a86b87d67b0c8aaf035c96eb3b514b397b8adcd4f3282ce1769b701c7b
tcpshell.c
Posted Nov 5, 1999
Authored by shadowpenguin

This is a backdoor program which can be accessed remotely as telnetd. TDM can not use telnet, rlogin, and ftp command, but this backdoor can use such command. However, you have to specify the correctry return code in the telnet client. If you can not change the return code, the "CR" code will be added and sent, so you type";" at the tail of your command.

systems | unix
SHA-256 | 64704ae0154649437e7a802c9cf79bf59162f704f6d62c5226fda356a3d9e97e
tdm.c
Posted Nov 5, 1999
Authored by shadowpenguin

This is a backdoor program which can be accessed remotely as telnetd. You can login without username and password to the host which is installed this program. This program also can use as CGI program if you send the compiled binary and change the permittion to 755, you can use the UNIX shell command on the ISP that doesn't accept the shell account.

tags | shell, cgi
systems | unix
SHA-256 | ba8473ce86555572052efc2540c52cbe9ac33dc41a08daf855dc0478fbd66e32
udp_shell.tar.gz
Posted Nov 5, 1999
Authored by shadowpenguin

This is the UDP based backdoor which supports the UNIX shell command. Generally the UDP packet is not checked by the poor firewalls and packet screening programs, this program is useful in such environment.

tags | shell, udp
systems | unix
SHA-256 | 2e10df96931abc5c45deec213530080deb25ba1067ab8ff8c1fb756156fc9803
udpscan.c
Posted Nov 5, 1999
Authored by shadowpenguin

This is the simple UDP port scanner based on the ICMP.

tags | udp
systems | unix
SHA-256 | 314c414c2bd72da0ebbe9cdc1fb71e743021f8b7b697f033d333a4eaf7e345c0
ulw.c
Posted Nov 5, 1999
Authored by shadowpenguin

The general log wipers write the null entry to the logfiles, so admin can check the wiped traces such as the wiped. This log wiper wipes the log entry of wtmp, wtmpx, utmp, utmpx, lastlog without such wiped traces. This utility can also reconstruct the zapped logs, and remove the null entry. The usage is same as zap.

systems | unix
SHA-256 | 0e94ee8b379096446305b29244172ec0210e88ab446a46592575545865b7a9fe
unyunz.tar.gz
Posted Nov 5, 1999
Authored by shadowpenguin

This utility replace the entry of the unix logfile of /var/adm/utmp,utmpx

systems | unix, irix
SHA-256 | 34abd14218f3e491e5f0bb6ab18982b639e88982bf671b1a9d6440021dc99c36
uzapper.c
Posted Nov 5, 1999
Authored by shadowpenguin

This is the general log wiper for Solaris, SunOS, IRIX, Linux, FreeBSD.

systems | linux, unix, solaris, freebsd, irix
SHA-256 | 005023c66ef99e3f03ac1e3670464cdaa9c46893d30f92fcb7f5605e2eb682fa
xifconfig.c
Posted Nov 5, 1999
Authored by shadowpenguin

If you install the sniffer on the SunOS, admin can know that the sniffer is installed by the ifconfig command. This program fakes the ifconfig command, the PROMISC message will not be shown.

systems | unix, solaris
SHA-256 | 6f65796d9af8de0a7ceea28433d088ca97aec05d98810909a7e7ff4413e4b79c
xps.c
Posted Nov 5, 1999
Authored by shadowpenguin

If you want to hide your daemon or background process, this program is useful. This program fakes the ps and your processes will not be listed.

systems | unix
SHA-256 | 0f22a4f0215b2acee5751eae0fabf85a9782f73bd6822fbfac29f7ad66c0add1
yoko125.tar.gz
Posted Nov 5, 1999
Authored by shadowpenguin

This utility searchs the joe-accounts for specified host using ftp bluteforce attack based on the userlist file. This utility also can attack by using the fixed password and username+string.

systems | unix
SHA-256 | b2bc7232d668da7f031b743e43b1a3306b82e093491da278ac4d5195ae0b42d8
Page 2 of 2
Back12Next

Top Authors In Last 30 Days

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close