exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 14 of 14 RSS Feed

Files Date: 2001-01-04

obsd4-sock.tar.gz
Posted Jan 4, 2001
Authored by s0ftpj, Pigpen | Site s0ftpj.org

SRaw for OpenBSD is a kld which makes all users able to open raw sockets. Supported protocols are IPPROTO_RAW, IPPROTO_ICMP, IPPROTO_IPIP, IPPROTO_IPV4, IPPROTO_IGMP.

tags | protocol
systems | openbsd
SHA-256 | 300627a1e608cd638ff2fafcf814d528749f49e60213764e8e75763181c9f58e
fbsd4-sock.tar.gz
Posted Jan 4, 2001
Authored by s0ftpj, Pigpen | Site s0ftpj.org

SRaw is a kld for FreeBSD which disables EPERM in socket() and permits to allocate inpcb even if the socket is raw and users haven't root permissions bypassing suser() in pru_attach() functions.

tags | root
systems | freebsd
SHA-256 | 1d9e7f1c99f8c59d6f38efccb713756d713efba1264fdc59cc1c0e336e75b6b1
piove.tar.gz
Posted Jan 4, 2001
Authored by s0ftpj, vecna | Site s0ftpj.org

This FreeBSD module shows how to intercept getpass(3) function and print anything that is typed without terminal echo.

systems | freebsd
SHA-256 | 231f569e4f8c8dfa8c9421da154803e5c86e7b176b954311ca32ed72fd9e91b5
spf.c
Posted Jan 4, 2001
Authored by s0ftpj, vecna | Site s0ftpj.org

Simple Packet Forwarder for Linux on the datalink level. Uses Libvsk.

systems | linux
SHA-256 | c2ecda53d1964843248b9ebc23e2bc7249f516f195cae8a84c10f8ea0c299168
libvsk-1.0.tar.gz
Posted Jan 4, 2001
Authored by s0ftpj, vecna | Site s0ftpj.org

Libvsk is a set of libraries for network traffic manipulation from userlevel, with some functions of filtering/sniffing.

SHA-256 | 8bcc1a1790c4aa4e03c23b681e4033744bc8888256fc13f3662c29c20970762f
smonitor.tar.gz
Posted Jan 4, 2001
Authored by s0ftpj, Pigpen | Site s0ftpj.org

Syscall Monitor for FreeBSD - Using this tool you are allowed to monitor the use of the syscalls on your system and to prevent their execution for the specified users/groups.

systems | freebsd
SHA-256 | d9917c7e535881afb784448565f8b5f170a26741c2baafcd4b532524c70a54d5
securelvl.tgz
Posted Jan 4, 2001
Authored by s0ftpj, Pigpen | Site s0ftpj.org

Securelevel Bypass - This kld gives you permission to load/unload a kld and modify a sysctl value even if you aren't root and securelevel is higher than 0.

tags | root
SHA-256 | 2a0b20d98a3ea5ceca6c235d0dcd59e29d5642d989f65b4e5095adf6f65c0485
aasniff.tar.gz
Posted Jan 4, 2001
Authored by s0ftpj, vecna | Site s0ftpj.org

Anti Anti Sniffer Patch - Linux kernel patches to hide a sniffer from the most known anti-sniffers.

tags | kernel
systems | linux
SHA-256 | 7898d92bbea3bdade89593e2f3ef566f7eaca0acda46611ec918606a1e054c0f
kstat.tar.gz
Posted Jan 4, 2001
Authored by s0ftpj, FuSyS | Site s0ftpj.org

Kstat is a tool for Linux which can find an attacker in your system by a direct analysis of the kernel via /dev/kmem, bypassing the hiding techniques of the intruder (kernel static recompilation/use of LKMs). Kstat can find the syscalls which were modified by a LKM, list the linked LKMs, query one or all the network interfaces of the system, list all the processes and much more.

tags | kernel
systems | linux
SHA-256 | 88b0b99c154e47fea38908d1d46542850be4215cd28ce2024ba4ade238b560a1
ksec.tar.gz
Posted Jan 4, 2001
Authored by s0ftpj, Pigpen | Site s0ftpj.org

Ksec (Kernel Security Checker) is a tool for FreeBSD and OpenBSD which can find an attacker by direct analysis of the kernel via /dev/mem, bypassing the hiding techniques of the intruder (kernel static recompilation/use of LKMs). KSec can find the modified syscalls from userspace, detect the promisc interfaces, find the modifications applied to a protocol and much more.

tags | kernel, protocol
systems | freebsd, openbsd
SHA-256 | 1a4530115327bcbd02ef7104acaefc72ddfea1d0db0e12252f7b0ee3fdfa0a1f
eshell.c
Posted Jan 4, 2001
Authored by Luki Rustianto | Site karet.org

Eshell.c is a encrypted bindshell type backdoor which has a server daemon and client with AES encryption via libmix.

tags | tool, rootkit
systems | unix
SHA-256 | c32ad105680ad262b5dca88fcaaaf43d24a5994d3d79f9243bfc0001ca76c38b
2000-exploits.tgz
Posted Jan 4, 2001
Authored by Todd J. | Site packetstormsecurity.com

Packet Storm exploits for the year 2000!

tags | exploit
SHA-256 | 4ae50131fa96b7884e5a06211b6fd3aa3bd9cddb32775d54716fe237e1df0a77
iplog-2.2.3.tar.gz
Posted Jan 4, 2001
Authored by Odin | Site ojnk.sourceforge.net

iplog is a TCP/IP traffic logger capable of logging TCP port scans, TCP null scans, FIN scans, UDP and ICMP "smurf" attacks, bogus TCP flags, TCP SYN scans, TCP "Xmas" scans, ICMP ping floods, UDP scans, and IP fragment attacks. It currently runs on Linux, FreeBSD, OpenBSD, BSDI and Solaris.

Changes: Bugfixes and the addition of a "--pid-file" command-line argument.
tags | udp, tcp, system logging
systems | linux, unix, solaris, freebsd, openbsd
SHA-256 | cc3da7b6f360ff25455e5ae7c95d7377de332deb23f6dcb5c1ea11e563702fff
guninski31.txt
Posted Jan 4, 2001
Authored by Georgi Guninski | Site guninski.com

Georgi Guninski security advisory #31 - There is a security vulnerability in Windows Media Player 7 exploitable thru IE which allows reading local files and executing arbitrary programs. The problem is the WMP ActiveX Control which allows launching javascript URLs in arbitrary already open frames. This allows taking over the frame's DOM. Includes exploit code. Demonstration available here.

tags | exploit, arbitrary, local, javascript, activex
systems | windows
SHA-256 | 11004b7cb48703aa71daec5f42163b6badbcc9bd0443de3f14cd799110e779d8
Page 1 of 1
Back1Next

File Archive:

May 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    May 1st
    44 Files
  • 2
    May 2nd
    5 Files
  • 3
    May 3rd
    11 Files
  • 4
    May 4th
    0 Files
  • 5
    May 5th
    0 Files
  • 6
    May 6th
    28 Files
  • 7
    May 7th
    0 Files
  • 8
    May 8th
    0 Files
  • 9
    May 9th
    0 Files
  • 10
    May 10th
    0 Files
  • 11
    May 11th
    0 Files
  • 12
    May 12th
    0 Files
  • 13
    May 13th
    0 Files
  • 14
    May 14th
    0 Files
  • 15
    May 15th
    0 Files
  • 16
    May 16th
    0 Files
  • 17
    May 17th
    0 Files
  • 18
    May 18th
    0 Files
  • 19
    May 19th
    0 Files
  • 20
    May 20th
    0 Files
  • 21
    May 21st
    0 Files
  • 22
    May 22nd
    0 Files
  • 23
    May 23rd
    0 Files
  • 24
    May 24th
    0 Files
  • 25
    May 25th
    0 Files
  • 26
    May 26th
    0 Files
  • 27
    May 27th
    0 Files
  • 28
    May 28th
    0 Files
  • 29
    May 29th
    0 Files
  • 30
    May 30th
    0 Files
  • 31
    May 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close