exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 76 - 94 of 94 RSS Feed

s0ftpr0ject 99 releases

s0ftpr0ject 99 is a security team founded in the summer of 1997. Its research team is fully dedicated to study, describe and resolve security problems related to the network and digital worlds. Tools and documentation available on this site are meant to be used only in order to improve your security and privacy, and not as a way to harm anybody. Any use of the available material that goes against the laws of any state is not condoned by s0ftpr0ject 99, which also cannot be held responsible for any misuse. s0ftpr0ject 99 absolutely dissociates itself from any cracking/hacking/phreaking group that may claim to be in any way collaborating with us. If YOU are going against the law, WE will never have any relation with you. Any remark should be addressed to staff@s0ftpj.org, and abuses reported immediately, with all the necessary informations, to abuse@s0ftpj.org. Also, due to recent facts happened in our country, we point out that we strictly dissociate from any terroristic or eversive groups and their destabilizing and highly deprecable actions. If you, the visitor, are somehow offended by the contents of the site, we ask you to leave this site immediately, and don't go on accessing, reading or downloading anything here. On the other hand, by accessing the main page, you agree with this disclaimer and must consider yourself responsible for any use you make of the informations contained inside. Also, who is currently hosting our page and our mirrors cannot be legally sued for its content.
ttdbsscan.c
Posted Sep 23, 1999
Authored by s0ftpj

rpc.ttdbserver scanner (adapted from statd scanner by BiT), it uses a file containing the list of ip's to scan. BFiSN98 (December 98). Linux - c source. Courtesy of soft project digital security for y2k

systems | linux
SHA-256 | 05145d5b163d2e69ed1cfd957250b9a0f75515bc8b529e83c010a091cee75de9
valvnet20b2.zip
Posted Sep 23, 1999
Authored by s0ftpj

ValV-N.e.T. v2.0b2: (Not Earthy Trojan) Remake of NETbus 1.7, with some more options, and a polymorphic engine to make the patch invisible to any antivirus. Courtesy of soft project digital security for y2k

tags | trojan
SHA-256 | 37e9f9e53ab9b9568df86b60856ded9740dd3cfd759f5ea8d3a2284367414394
vlv_patch20b2.zip
Posted Sep 23, 1999
Authored by s0ftpj

Highly customizable patcher. Courtesy of soft project digital security for y2k

SHA-256 | e0ac1169a49a20b7b98add83b8191fc82ec0166a8c4c283e00794edc51090928
aces-2_8.tgz
Posted Sep 23, 1999
Authored by s0ftpj

Aces High v2.8: TCP/UDP/RPC/finger/NFS/samba/web/phone scanner with string comparing option. Courtesy of soft project digital security for y2k

tags | web, udp, tcp
SHA-256 | 8c9909d7f012b5bfdd0dfd8e5bb0910c6137e5568622a8ca16f35363f6795d97
rst.c
Posted Sep 23, 1999
Authored by s0ftpj

RST: RST Storm: destroys TCP links. For linux. Courtesy of soft project digital security for y2k

tags | tcp
systems | linux
SHA-256 | 024f435c8f2f9f12c704f017860fc2888db533f9a57c78237f722d7a40618c4a
orodruin.c
Posted Sep 23, 1999
Authored by s0ftpj

Orodruin: TCP forger. Courtesy of soft project digital security for y2k

tags | tcp
SHA-256 | 1ad47cd4cd119825a6b5d4998cbb0604e02ed3c3bdff77735f1824d2bf9fcdac
proscan.c
Posted Sep 23, 1999
Authored by s0ftpj

ProScan: Tool to scan a LAN in order to find interfaces in PROMISC mode. It's accomplished by using non-standard queries. For linux. Courtesy of soft project digital security for y2k

systems | linux
SHA-256 | da41fafe76cbfd71270b97f8eb8f558b84be249d10b7088a88653ff8435013ad
syslogdk-0_1.tgz
Posted Sep 23, 1999
Authored by s0ftpj

Syslogd kit v0.1: Kit including various tools for generating fake logs and read/redirect logs generated by SYSKLOGD. Includes: Shub-Niggurath, vru vru vruk, WALLA WALLA v0.1, WALLA WALLA v0.2. For linux. Courtesy of soft project digital security for y2k

systems | linux
SHA-256 | 3e9112e23ba7e88cb1d4b938d368fa7b8afb514c1430573f772ee241dcc52970
acctk-0_2.tgz
Posted Sep 23, 1999
Authored by s0ftpj

Kit including various tools to hide from logs generated by ACCT. Includes: ACCT Knocker, hydra v0.1, Leipzig v0.1, LocalFuck v0.1, Obscura Mens v0.1, Xytaxehedron v0.1, Xytaxehedron v0.1i (Marzo 99). Linux/*BSD - c sources. Courtesy of soft project digital security for y2k

systems | linux, bsd
SHA-256 | 7d714e3ad1b9373a9dc6912217f454124591be3e8da35d7daae5344b3386a15e
wu-tang.c
Posted Sep 23, 1999
Authored by s0ftpj

Vulnerable Wu-FTPD versions scanner (adapted from statd scanner by BiT). Linux - c source. Courtesy of soft project digital security for y2k

systems | linux
SHA-256 | 4f3d30ac928157295b1fd55c20dfc4a31ec3789458d59a07a592306b805653cc
dead-1_0.tgz
Posted Sep 23, 1999
Authored by s0ftpj

Simple war dialer. Documentation: 'WAR DIALER X LINUX'. Linux - c source. Courtesy of soft project digital security for y2k

systems | linux
SHA-256 | 4c4a090711c1216ad7884e2bb97e3feb761e1787562ac6f14f4f062b9176e199
nbtscan-1_0e.zip
Posted Sep 23, 1999
Authored by s0ftpj

Shared resource scanner. Win9x - c source. Courtesy of soft project digital security for y2k

systems | windows
SHA-256 | b567f42098680053af6d0b6accae7871abcf2d24522d50b8e71ade7edc82d9ac
rpcprogs.c
Posted Sep 23, 1999
Authored by s0ftpj

Finds an rpc program by its number scanning a range of ip's. Linux - c source. Courtesy of soft project digital security for y2k

systems | linux
SHA-256 | 347d130d35e513b0e4aaed2fb52cfc2747a8d4a3fa897ab1bb05a794b8c7f5d1
rpc-date.tgz
Posted Sep 23, 1999
Authored by s0ftpj

A Backdoor that uses an rpc program to introduce in the host a remote access facility. Courtesy of soft project digital security for y2k

tags | remote
SHA-256 | bc7341e1ad62a1a8fed6b0da8b98b90841aff4a96b370a3c91cb8892c82afec2
xaces.tgz
Posted Sep 23, 1999
Authored by s0ftpj

xACES: TCP/UDP/RPC/finger/NFS/samba/web/phone scanner with string comparing option. XWindows version. Courtesy of soft project digital security for y2k

tags | web, udp, tcp
SHA-256 | 60d03f1b22d585477ee9de739e3143dcd82befa895b1151957cb91be6691dc9c
onosendai02.tar.gz
Posted Sep 23, 1999
Authored by s0ftpj

0N0S3NDAi: (blind ip spoofing) Support tools for 0N0S3NDAi project. Includes: SEQprobe (displays remote host's ISN generation), SMail v2 (the DEFINITIVE fake mail). Courtesy of soft project digital security for y2k

tags | remote, spoof
SHA-256 | 793ae1476df80ce1b6a36545b474edbb2d175a40d5c57be0611ded26ea5f46b2
xthot.tgz
Posted Sep 23, 1999
Authored by s0ftpj

xTHOT v1.0: Tcp/ip Hacking Ominous Tool. Courtesy of soft project digital security for y2k

tags | tcp
SHA-256 | ab1d9d1e47a3784b663688d899e6235ab057958559ebfe89996cc33be5887cc9
syslogd-trojan.tgz
Posted Sep 23, 1999
Authored by s0ftpj

syslogd trojan: These patches applied to syslogd 1.3-31 sources add a new priority, and using it it's possible to execute locally new commands without be logged. For linux. Courtesy of soft project digital security for y2k

tags | trojan
systems | linux
SHA-256 | 962c72fe300a194fc044db28301b4e082e996d9092ddaa656fa426d5a7ac63f4
ppro03te.zip
Posted Jun 5, 1999
Authored by s0ftpj

Technolord Patcher with integrated VM and GUI and with plugins support.

SHA-256 | 40e76605c584825fceb645d86d6ec71d6389e94c2243ffa49c86152d265ae63a
Page 4 of 4
Back1234Next

Top Authors In Last 30 Days

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close