exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 76 - 100 of 928 RSS Feed

Group Releases

THC-IPV6 Attack Tool 1.6
Posted May 12, 2011
Authored by van Hauser, thc | Site thc.org

THC-IPV6 is a toolkit that attacks the inherent protocol weaknesses of IPv6 and ICMP6 and it includes an easy to use packet factory library.

Changes: Various feature additions and bug fixes. Some tools added.
tags | protocol
systems | unix
SHA-256 | 2d4cb9c591f6ce6a632ad970b13a13972e5bf18edd489ae631363e9e4824980c
Hydra Network Logon Cracker 6.3
Posted Apr 30, 2011
Authored by van Hauser, thc | Site thc.org

THC-Hydra is a high quality parallelized login hacker for Samba, Smbnt, Cisco AAA, FTP, POP3, IMAP, Telnet, HTTP Auth, LDAP, NNTP, MySQL, VNC, ICQ, Socks5, PCNFS, Cisco and more. Includes SSL support, parallel scans, and is part of Nessus.

Changes: Multiple patches added. New Oracle and SMTP user enum modules. Multiple bug fixes.
tags | web, cracker, imap
systems | cisco, unix
SHA-256 | bd5bc70b70640984fb2f18a9742c10b9a0edf1ebaf0f8dd32da589d34defd424
Application Mapper 5.4
Posted Apr 22, 2011
Authored by van Hauser, thc, DJ Revmoon | Site thc.org

Application Mapper is a next-generation scanning tool that allows you to identify the applications that are running on a specific port. It does this by connecting to the port(s) and sending trigger packets. These trigger packets will typically be an application protocol handshake (i.e. SSL). Amap then looks up the response in a list and prints out any match it finds. Adding new response identifications can be done just by adding them to an easy-to-read text file. With amap, you will be able to identify that SSL server running on port 3445 and some oracle listener on port 233!

Changes: Various updates.
tags | tool, protocol
systems | unix
SHA-256 | a75ea58de75034de6b10b0de0065ec88e32f9e9af11c7d69edbffc4da9a5b059
Hydra Network Logon Cracker 6.2
Posted Apr 7, 2011
Authored by van Hauser, thc | Site thc.org

THC-Hydra is a high quality parallelized login hacker for Samba, Smbnt, Cisco AAA, FTP, POP3, IMAP, Telnet, HTTP Auth, LDAP, NNTP, MySQL, VNC, ICQ, Socks5, PCNFS, Cisco and more. Includes SSL support, parallel scans, and is part of Nessus.

Changes: Password bruteforcing mode, new XMPP and IRC modules, and more.
tags | web, cracker, imap
systems | cisco, unix
SHA-256 | 0b340632db9d429eb3c32a592a51f7333feda0fe682229c2027ae445a1e3f54e
Hydra Network Logon Cracker 6.1
Posted Feb 3, 2011
Authored by van Hauser, thc | Site thc.org

THC-Hydra is a high quality parallelized login hacker for Samba, Smbnt, Cisco AAA, FTP, POP3, IMAP, Telnet, HTTP Auth, LDAP, NNTP, MySQL, VNC, ICQ, Socks5, PCNFS, Cisco and more. Includes SSL support, parallel scans, and is part of Nessus.

Changes: More license updates, a fix for the configure script, checks added for libssh 0.4 and sshv1 support, merged all the latest crypto code in sasl files, and fixed SVN compilation issue on openSUSE.
tags | tool, web, cracker, imap
systems | cisco, unix
SHA-256 | 85fbcf53bc7d8ae99a8bd31dd09810abd9cf9397679a94aea52cd1b1c8e06ac0
Hydra Network Logon Cracker 6.0
Posted Jan 26, 2011
Authored by van Hauser, thc | Site thc.org

THC-Hydra is a high quality parallelized login hacker for Samba, Smbnt, Cisco AAA, FTP, POP3, IMAP, Telnet, HTTP Auth, LDAP, NNTP, MySQL, VNC, ICQ, Socks5, PCNFS, Cisco and more. Includes SSL support, parallel scans, and is part of Nessus.

Changes: Added GPL exception clause to license to allow linking to OpenSSL, IPv6 support finally added, Bugfix for SIP module, Added LOGIN, PLAIN, CRAM-(MD5,SHA1,SHA256) and DIGEST-MD5 auth mechanisms to the imap and pop3 modules. Various other fixes, additions and improvements.
tags | web, cracker, imap
systems | cisco, unix
SHA-256 | c0d473c29d57fe44c5dd301b3161fdf853b3bbac57c099acf47cffb4d2707e64
Hydra Network Logon Cracker 5.9
Posted Dec 28, 2010
Authored by van Hauser, thc | Site thc.org

THC-Hydra is a high quality parallelized login hacker for Samba, Smbnt, Cisco AAA, FTP, POP3, IMAP, Telnet, HTTP Auth, LDAP, NNTP, MySQL, VNC, ICQ, Socks5, PCNFS, Cisco and more. Includes SSL support, parallel scans, and is part of Nessus.

Changes: Update for the subversion module for newer SNV versions. Mysql module now has two implementations and uses a library when found. Better FTP 530 error code detection and more.
tags | web, cracker, imap
systems | cisco, unix
SHA-256 | 66023f94460abe76e76c1c6b187d44e82bafafb4c517314261bbd34429f913a7
THC-IPV6 Attack Tool 1.4
Posted Dec 28, 2010
Authored by van Hauser, thc | Site thc.org

THC-IPV6 is a toolkit that attacks the inherent protocol weaknesses of IPv6 and ICMP6 and it includes an easy to use packet factory library.

Changes: Added thcping6, fake_mld26, fake_mldrouter6, exploit6, and denial6. Various other changes and improvements.
tags | protocol
systems | unix
SHA-256 | 4e6e5e55c27373dccafb631f98662d47edc81720ae40e8017a40697a3fbf6a13
THC-IPV6 Attack Tool 1.2
Posted Jun 26, 2010
Authored by van Hauser, thc | Site thc.org

THC-IPV6 is a toolkit that attacks the inherent protocol weaknesses of IPv6 and ICMP6 and it includes an easy to use packet factory library.

Changes: Test case added to implementation6.
tags | protocol
SHA-256 | 1feae3b40bec40fb79876c35a511b5cb596fdef9ebe443b049104963156dde91
Hydra Network Logon Cracker 5.7
Posted Jun 16, 2010
Authored by van Hauser, thc | Site thc.org

THC-Hydra is a high quality parallelized login hacker for Samba, Smbnt, Cisco AAA, FTP, POP3, IMAP, Telnet, HTTP Auth, LDAP, NNTP, MySQL, VNC, ICQ, Socks5, PCNFS, Cisco and more. Includes SSL support, parallel scans, and is part of Nessus.

Changes: Lots of fixes and hydra is now under GPLv3.
tags | web, cracker, imap
systems | cisco
SHA-256 | 595e4cc2f186ef7f616e31448f1caf9df51d2d7b8d2bec92738ed1fb58e41e81
THC-IPV6 Attack Tool 1.1
Posted Jun 16, 2010
Authored by van Hauser, thc | Site thc.org

THC-IPV6 is a toolkit that attacks the inherent protocol weaknesses of IPv6 and ICMP6 and it includes an easy to use packet factory library.

tags | protocol
SHA-256 | 839a42e5e31965bd3ffdd6b0c223c1a0087eb78fa6f58e6f3df03ab5facbf2f3
Astalavista.com Has Been Pwned
Posted Jun 5, 2009
Authored by astalavista, anti-sec

The Astalavista.com web site has been completely compromised and all user details have been exposed.

tags | web
SHA-256 | 042ad806ede31b6d52fde0490bd83514a4f1e0c9cc4f26c44ba94d33ba099e61
SniffJoke IDS Evasion Tool
Posted Apr 15, 2009
Authored by s0ftpj, vecna | Site delirandom.net

SniffJoke is middleware software for Linux that is managed by a web interface and enables connection scrambling technology, also known as sniffer evasion techniques.

tags | web
systems | linux
SHA-256 | 5ddc5fffbed7e6ff9f0d22260acc4ad37ef5df2df0d55152510d368444648800
uninformed-10.tgz
Posted Oct 13, 2008
Authored by Matt Miller, H D Moore, Skywing, uninformed, mxatone | Site uninformed.org

Uninformed is pleased to announce the release of its tenth volume which is composed of 4 articles: Can you find me now? Unlocking the Verizon Wireless xv6800 (HTC Titan), Using dual-mappings to evade automated unpacker, Analyzing local privilege escalations in win32k, and Exploiting Tomorrow's Internet Today: Penetration testing with IPv6.

tags | local
SHA-256 | e88f63b59cd99b5222f1427aefd7f83c0b9a99bc49ee4a80852eb736c8296ba6
thc-rfidiot.zip
Posted Sep 29, 2008
Authored by thc, Adam Laurie, vonJeek | Site freeworld.thc.org

This is a customized THC version of RFIDIOt that allows you to read a chip's content and write it to an emulator. RFIDIOt is a python library for exploring RFID devices. It currently drives a couple of RFID readers made by ACG, called the HF Dual ISO and the LFX. Includes sample programs to read/write tags and the beginnings of library routines to handle the data structures of specific tags like MIFARE(r).

tags | code execution, python, file inclusion
SHA-256 | da339f53ed6a65340b652f7b47b4bde29a7566c52e8e355acd2e636f2d24a8ad
blog-scan.txt
Posted Aug 13, 2008
Authored by thc | Site blog.thc.org

An anonymous blog regarding the scanning of the Internet by someone that is part of THC.

SHA-256 | 00d345ba8c50d26a5aa63c52b879e8dffd47fae9e6ccff652138b1cadc99969c
AntiPhishing.pdf
Posted Jul 17, 2008
Authored by Angelo Rosiello, rosiello | Site rosiello.org

Anti-Phishing Security Strategy - A lecture presented at BlackHat 2008.

SHA-256 | 8f1e3d61a767523a1c71c153736d8ce06f404313b5babf7871ef36575d630b2e
hydra-http-form.patch
Posted Feb 6, 2008
Authored by thc, deanx

The http-form module for hydra 5.4 has a problem which causes incorrect pieces of memory to be free'd. This is as a result of the memory leak plugs which have been applied to this module for this release. This patch removes the unneeded free's and allows the module to work correctly.

tags | web, memory leak
SHA-256 | ac64cac7e7334da4ed8ee10f88a7303460bc4c1f7cbb5b5a81f01e6c8938d0b4
hydra-patch.txt
Posted Feb 6, 2008
Authored by thc, Juan Galiana Lara

This is a patch for THC Hydra that fixes a status code parsing error for the HTTP protocol.

tags | web, protocol
SHA-256 | 9f8bbdd611cf293292e197b96cc9bc52d77927cf395d6b5e00bc56cdf3233cc4
uninformed-vol9.tgz
Posted Jan 28, 2008
Authored by Matt Miller, warlord, I)ruid, Skywing, uninformed | Site uninformed.org

Uninformed is pleased to announce the release of its ninth volume. This volume includes 4 articles on reverse engineering and exploitation technology. These articles include - Engineering in Reverse: An Objective Analysis of the Lockdown Protection System for Battle.net. Exploitation Technology: ActiveX - Active Exploitation. Exploitation Technology: Context-keyed Payload Encoding. Exploitation Technology: Improving Software Security Analysis using Exploitation Properties.

tags | activex
SHA-256 | 23204c2fa4fa808fc62b756a27911c4c41e187e0ee04cf3d9b776e2b1c45f249
w00os.tgz
Posted Jan 3, 2008
Authored by w00w00

w00w00's operating system. Yes, a joke.

SHA-256 | c7c869568d15aee512c973a781e7aacc751b7d434724db343e310154d469a194
phzine07.zip
Posted Dec 18, 2007
Authored by phearless | Site phearless.org

Phearless Serbian/Croatian Security Magazine Issue #07 - In this issue: Symbian OS EXE Applications, Theory of dissasembling, Alex Protector 1 beta2, Symbian OS Crackme 0x01, NULL Pointer bugs in Linux kernel, Windows kernel - keyboard independent - keylogger, Hiding Processes Using Windows Drivers, Exploitation chitchat.

tags | kernel
systems | linux, windows
SHA-256 | e9adfc7c678db387c73b81f31f2559a940c4b996cc5e42b8cffb568c4168f9d9
rfid-angelo-rosiello.pdf
Posted Nov 13, 2007
Authored by Angelo Rosiello, rosiello | Site rosiello.org

RFID: Security Briefings. A set of slides from a talk that discusses how RFID works and security menaces related to RFID.

SHA-256 | 07412007c5d562cfc46e5c3f10554ca1402ee1f8f1a9c0675dc2d12fe5752881
viruses_next_generation-ITUNDERGROUND.ppt
Posted Oct 29, 2007
Authored by Angelo Rosiello, rosiello | Site rosiello.org

Slides from a lecture discussing Next Generation Viruses.

SHA-256 | 6cfbaacb1ce17979d011060139f0ba7bfe18bf60ee51ae17acf2c0723f1c8117
Shadow_Software_Attacks.ppt
Posted Oct 29, 2007
Authored by Angelo Rosiello, rosiello | Site rosiello.org

Slides from a lecture discussing Shadow Software Attacks.

SHA-256 | 9d3f365a840d4fe79ac57428f939eee876ade4b85c65af44212870259fb87bd6
Page 4 of 38
Back23456Next

Top Authors In Last 30 Days

Recent News

News RSS Feed
Nation-State Hackers Exploit Cisco Firewall Zero Days To Backdoor Government Networks
Posted Apr 25, 2024

tags | headline, hacker, government, cyberwar, cisco, backdoor
FTC Sending $5.6 Million To Ring Customers Over Security Failures
Posted Apr 25, 2024

tags | headline, government, privacy, usa, amazon, flaw
Palo Alto Networks Shares Remediation Advice
Posted Apr 25, 2024

tags | headline, flaw
Russia, Iran Pose Most Aggressive Threat To 2024 Election
Posted Apr 25, 2024

tags | headline, government, usa, russia, fraud, cyberwar, iran
Google Patches Critical Chrome Vulnerability
Posted Apr 24, 2024

tags | headline, flaw, google, patch, chrome
Hackers Are Using Developing Countries For Ransomware Practice
Posted Apr 24, 2024

tags | headline, hacker, malware, cybercrime, fraud, cryptography
North Korean Hackers Hijack Antivirus Updates For Malware Delivery
Posted Apr 24, 2024

tags | headline, hacker, government, malware, flaw, cyberwar, military, north korea
CISA Warns Of Windows Print Spooler Flaw After Microsoft Sees Russian Exploitation
Posted Apr 24, 2024

tags | headline, government, microsoft, usa, russia, flaw, cyberwar
US Charges Iranians With Cyber Snooping On Government, Companies
Posted Apr 24, 2024

tags | headline, hacker, government, privacy, usa, cyberwar, spyware, iran
TensorFlow AI Models At Risk Due To Keras API Flaw
Posted Apr 24, 2024

tags | headline, flaw
View More News →
packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close