what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 25 of 30 RSS Feed

Files

spoof_tcp.c
Posted Mar 15, 2003
Authored by aspinall

The program spoofs TCP packets and allows the end user to change the header to suit their needs.

tags | spoof, tcp
systems | unix
SHA-256 | c89f428b44acf4f44bdfe97172a691e9b178d716ae7994ef1adce8bec3fde9dd
any-erect.c
Posted Aug 17, 1999

No information is available for this file.

tags | spoof
systems | unix
SHA-256 | f024906f39ab7e88b9c9ea518a15fc7c0a15c218689b8ff5271279358b366970
jester.tgz
Posted Aug 17, 1999
Authored by b4b0 #6, verbal of Team QOS

The Jester Project - "cloak" concept program that is used to spoof from and backdoor rooted servers.

tags | root, spoof
systems | unix
SHA-256 | b21fd079b86e392c2cdbb3ea38d0323796621cfb384d43d4cf91933f38fd3659
snoof.tar.gz
Posted Aug 17, 1999
Authored by Doc_Chaos [RoC]

A DNS spoofer based on ADM's "ADMsnOOfID" code. This has been almost completely recoded, for better performance, BIND 8 compatibility, and user defined TTL.

tags | spoof
systems | unix
SHA-256 | 72f1945d2a8f8a86ca42087b9ce4476132a39921d52074060b6ca92ff35cee5e
spoof.0.0.tar.gz
Posted Aug 17, 1999
Authored by CyberPsychotic

spoof v0.0 - TCP packet spoofing library (alpha code).

tags | spoof, tcp
systems | unix
SHA-256 | cffdee9f2d9b75adb92e4880fa931b79a40faa9550934b7dd48879a3b1ffb63c
spoof.0.1.tar.gz
Posted Aug 17, 1999
Authored by CyberPsychotic

Latest release of Spoof Library project by Fyodor, now supports IP/UDP/TCP spoofing.

tags | udp, spoof, tcp
systems | unix
SHA-256 | f1f3a29f0eda2905cd25c35c70a998a26677e6a2da4067ce802c8a0ebf7894a5
spoof.c
Posted Aug 17, 1999
Authored by CyberPsychotic

Sample code showing how to send spoofed packets (for Linux with BSd compatibility in mind).

tags | spoof
systems | linux, unix, bsd
SHA-256 | 7917c689b314392cb9c51b77c88b7dbddeed3317767968937b4153045b14196b
arnudp001.c
Posted Aug 17, 1999

No information is available for this file.

tags | spoof
systems | unix
SHA-256 | 21317c5a0109275f6dfe12e902ad3b7f0bbe5cd33d7d7998d043b087ff1e0a5b
bewm2.c
Posted Aug 17, 1999

No information is available for this file.

tags | spoof
systems | unix
SHA-256 | d2ea2bde4781cade204275a9db2b8c75cc2de3bfb844e7e044dcd5375cd0878a
changemac.c
Posted Aug 17, 1999

Change the MAC address of your ethernet card to trick smart / switching hubs.

tags | spoof
systems | unix
SHA-256 | 6a55aef30fdac9e6419ef57627cb02560ef38be662e36bf5cda6cde20e3cb0de
djizz
Posted Aug 17, 1999
Authored by b4b0

djizz executable.

tags | spoof
systems | unix
SHA-256 | 2940eb8914abb678dbe4cb1c31b16f51a98bb1ba8cfdcfaaad0e8f850316eff2
echok.c
Posted Aug 17, 1999

No information is available for this file.

tags | spoof
systems | unix
SHA-256 | 32d0326512cc3d74781d1f81e1dd74a99050d49777a7472dd5e748cd98381242
eprobe.c
Posted Aug 17, 1999

No information is available for this file.

tags | spoof
systems | unix
SHA-256 | 8fd85c7bbdaac2d725df44b2d9d092bd8b6c5ed6a23b891a7a3573c7df476e35
eprobe2.c
Posted Aug 17, 1999

No information is available for this file.

tags | spoof
systems | unix
SHA-256 | 2e578b8bc3a554e7ebb5badda2ee8fd66797805c4e4a2cffcc8a23d50da7a339
erect.c
Posted Aug 17, 1999

No information is available for this file.

tags | spoof
systems | unix
SHA-256 | c25af0cc3ab10922396699b5eff8454e719954e8a73408b2f03ada386d818c18
feprobe.c
Posted Aug 17, 1999

No information is available for this file.

tags | spoof
systems | unix
SHA-256 | 41f2c762526b8602548041c64d91f80b18a549ed4cdeee99fcf664263673d8e8
hijack.zip
Posted Aug 17, 1999

No information is available for this file.

tags | spoof
systems | unix
SHA-256 | 6bdedc8395326ad9441f97baeee44c58a9781f85a1f138aaccbd429ce537d679
ipspoof.c
Posted Aug 17, 1999

No information is available for this file.

tags | spoof
systems | unix
SHA-256 | b97d1c146081f4cf1462e8e315b3330cf3e47f9288dfe9351f10f55e798d4f62
ircseq28.c
Posted Aug 17, 1999

No information is available for this file.

tags | spoof
systems | unix
SHA-256 | 3f9cf22012c6cb166ecbed1e7da106879a9e674cc569601ce39d017707279716
jizz.c
Posted Aug 17, 1999

No information is available for this file.

tags | spoof
systems | unix
SHA-256 | b8b364867b12538b056c52fdfe5b683ac916d08779f1706a45834685ad41c03e
jizz.sh
Posted Aug 17, 1999

No information is available for this file.

tags | spoof
systems | unix
SHA-256 | 899905bf1a4e6f483898eed9ace582f04af690415ee298286c9f85c57a43b365
jizz.zip
Posted Aug 17, 1999

No information is available for this file.

tags | spoof
systems | unix
SHA-256 | 36f909a2af2ff6222c5ada14f35c6895377817f7f77bbf78f190bd431f05b7b6
legion.c
Posted Aug 17, 1999

No information is available for this file.

tags | spoof
systems | unix
SHA-256 | 522d7280485341ceaa8aa9b512c6bbf3271e540f6b9cdc37c52197e85cf868fd
pepsi.c
Posted Aug 17, 1999

No information is available for this file.

tags | spoof
systems | unix
SHA-256 | 0576e8213e3b6862d7763d8bfc3aac54b8650914354ded5581d1865ebfff9d15
quench.c
Posted Aug 17, 1999

No information is available for this file.

tags | spoof
systems | unix
SHA-256 | 0fc03a6904e3e78cf360672a18ced73d8ed1fb044f5017f7f3266a5fdd750abb
Page 1 of 2
Back12Next

Top Authors In Last 30 Days

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close