ssharp is a tool for man in the middle attacks against SSH.
8e8771914abfa95f80ea1fd9a7539c45
Adore is a Linux LKM based rootkit for Linux v2.[246]. Features smart PROMISC flag hiding, persistent file and directory hiding (still hidden after reboot), process-hiding, netstat hiding, rootshell-backdoor, and an uninstall routine. Includes a userspace program to control everything.
3295d45f24060914c411d1d75343660a
Adore is a Linux LKM based rootkit for Linux v2.[24]. Features smart PROMISC flag hiding, persistent file and directory hiding (still hidden after reboot), process-hiding, netstat hiding, rootshell-backdoor, and an uninstall routine. Includes a userspace program to control everything.
4a925181db7030c1e9b67225a88abbe0
objobf is an obfuscater for x86/Linux ELF relocatable object files (.o files) that can produce fancy graphs to visualize function structures. Released at CCCAMP 2k3.
ba6b6f098f2c1e48c6946c6b13f568bb
loaded version 0.21 is an IPv4 load balancer for Linux. It requires netfilter and the QUEUE target enabled in the kernel.
d467ee59815b3f7befd3c46911940c80
guess-who version 0.44 is a password brute force utility for SSH2.
a40161347c970fe627631a1354f7d35d
This utility converts a dynamically link Linux IA32 ELF binary to a static binary.
51bd11bc0ce5e38a9cb6933d910de716
Remote root exploit for Solaris Napalm heap overflow - SPARC version. Tested against SunOS 5.6, 5.7, 5.8, and 5.9. Attempts to add a root shell to inetd.conf.
34c08bb66b18e41b75d2c0287149d5ad
Burneye ELF encryption program 1.0.1 with full source and docs.
848ae0d696d2438a01753a0fad665270
Execution Path Timing Analysis of Unix Daemons - White paper on how to determine if a username is valid remotely by timing remote responses of login programs. OpenSSH diff against v2.99p2 which determines if a username exists even on the newest versions of OpenSSH included.
3652eb952d213483c1e22f10b941883d
Suidperl v5.00503 and others tmp race local root exploit.
8041a1da62bd891ae9e65c3a2871a6c2
7350pippi is a x86/Linux ipppd local root exploit.
0c635de06e7fd0738cf3c235e1b74c8c
7350lapsus is a lpr-3.0.48 Local root exploit. Requires root on a host counted in hosts.lpd and local account on lpd box. This is proof of concept, chown()ing /etc/passwd to a user named 'stealth'.
85d373c856befc7da5b6d2727b6291af
Adore is a linux LKM based rootkit for Linux v2.[24]. Features smart PROMISC flag hiding, persistent file and directory hiding (still hidden after reboot), process-hiding, netstat hiding, rootshell-backdoor, and an uninstall routine. Includes a userspace program to control everything.
156ded13d5e16b84a9e31193bc9bc417
Burneye ELF encryption program, x86-linux binary, version 1.0 - new year release!
13bd499f3695bb087c7742a82471c565
Stripped burneye sources, for educational purposes (beside the speech + article).
14f3aeb7cab6ab215e6c6a3997561408
TESO at CCC.
38dcfc807b4384b2828156c0f51b981d
Weaknesses in the CHAP protocol as used within PPP and PPTP. Allows authentication in PPTP networks without knowing valid login/password combinations. This authentication scheme is widely used at universities (WLAN networks). A link to a special pppd which is able to authenticate without valid /etc/ppp/chap-secrets is included.
6b4b918f410d855855fdaab340232b39
TESO Security Advisory - LIDS Linux Intrusion Detection System vulnerability. The "Linux Intrusion Detection System" security patch for the Linux kernel creates a security vulnerability. Exploitation is easy and local users may be able to gain unrestricted root privileges.
798dd3ba6b7227152566567c49b9423c
IOB stands for I/O bridge, a simple tty chaining program. It can be used to log almost any session, including ssh, gpg, pgp, cfsattach, losetup, etc.
e5014222fec4c7375e3f66dbb8edb43a
TESO Security Advisory #11 - Multiple vendor Telnet Daemon vulnerability. Most current telnet daemons in use today contain a buffer overflow in the telnet option handling. Under certain circumstances it may be possible to exploit it to gain root privileges remotely. Affected systems include BSDI 4.x, FreeBSD, IRIX, Linux with netkit-telnetd < 0.14, NetBSD, OpenBSD 2.x, and Solaris.
56fb4e5983fdf5c58663113d30bc8c33
Adore is a linux LKM based rootkit for Linux v2.[24]. Features smart PROMISC flag hiding, persistent file and directory hiding (still hidden after reboot), process-hiding, netstat hiding, rootshell-backdoor, and an uninstall routine. Includes a userspace program to control everything.
777cbd2a59268b394b79da2bda910a40
AdoreBSD 0.34 - Based off Linux Adore by Stealth. Features hiding files and directories from view, makes processes invisible, hides promiscuous flag and syslog messages, execute as root, hides sysctl mib entries, netstat service hiding, authentication, and module hiding. Developed on FreeBSD 4.3-STABLE.
f98864a4f927e04d6f66a010934a08a0
Adore is a linux LKM based rootkit for Linux v2.[24]. Features smart PROMISC flag hiding, persistent file and directory hiding (still hidden after reboot), process-hiding, netstat hiding, rootshell-backdoor, and an uninstall routine. Includes a userspace program to control everything.
72e80f9fa6ebe9358f7fd0358c8e959f
Arpmim v0.2 implements an ARP man in the middle attack. Includes single or multiple host support, asymmetric MiM, arpop_request, and macoff.
09271a5d4aa3e7652dd10d2a16b6a511