Amap is a scanning tool that allows you to identify the applications that are running on a specific port. It does this by connecting to the port(s) and sending trigger packets. These trigger packets will typically be an application protocol handshake (i.e. SSL). Amap then looks up the response in a list and prints out any match it finds. Adding new response identifications can be done just by adding them to an easy-to-read text file. With amap, you will be able to identify that SSL server running on port 3445 and some oracle listener on port 233!
94fab83628b9447bc141df6b16c39f31750777f88ee84a8d1eb31ceb8b387221
Amap is a scanning tool that allows you to identify the applications that are running on a specific port. It does this by connecting to the port(s) and sending trigger packets. These trigger packets will typically be an application protocol handshake (i.e. SSL). Amap then looks up the response in a list and prints out any match it finds. Adding new response identifications can be done just by adding them to an easy-to-read text file. With amap, you will be able to identify that SSL server running on port 3445 and some oracle listener on port 233!
6df1e33d4c0dea8aae82e949aa3198c14cb677bce90ca0f5998b50a39229a476
THC-RUT (aRe yoU There) is a local network discovery tool developed to brute force its way into wvlan access points. It offers arp-request on ip-ranges and identifies the vendor of the NIC, spoofed DHCP, BOOTP and RARP requests, icmp-address mask request and router discovery techniques. This tool should be 'your first knife' on a foreign network.
f41eda1909b90b1e54ab9977d800ab9eacb0016df82f2180d5a8da02b160d2b1
Amap V2.1 is a scanning tool that allows you to identify the applications that are running on a specific port. It does this by connecting to the port(s) and sending trigger packets. These trigger packets will typically be an application protocol handshake (i.e. SSL). Amap then looks up the response in a list and prints out any match it finds. Adding new response identifications can be done just by adding them to an easy-to-read text file. With amap, you will be able to identify that SSL server running on port 3445 and some oracle listener on port 233!
a2fcff73f3df3c1bcf73d1501e95403b8c981c8c823a2d9d6763f52252bbb3ad
Amap is a scanning tool that allows you to identify the applications that are running on a specific port. It does this by connecting to the port(s) and sending trigger packets. These trigger packets will typically be an application protocol handshake (i.e. SSL). Amap then looks up the response in a list and prints out any match it finds. Adding new response identifications can be done just by adding them to an easy-to-read text file. With amap, you will be able to identify that SSL server running on port 3445 and some oracle listener on port 233!
81509d637b18008571d20a69abeb7186061b19f044b882b42974720a61efebdf
THC-Hydra is a parallel login hacker. With this tool you are able to attack several services at once (Samba, FTP, POP3, IMAP, Telnet, HTTP Auth, LDAP, NNTP, VNC, ICQ, Socks5, PCNFS, Cisco and more). Includes SSL support and can be used with Nessus. Bugfix release.
b67fed5cd977e8ba18900852cae0931684c3d2fdabbd6cb40da704c831693658
THC Flood Connect is a connection flooding tool which supports SSL, sending + dumping data, closing or keeping sessions etc. Just a small release.
26c6c3b52ddb9dd1279693d998faae8c9e6d4d005e4e421a1e423898ee4a5eb7
THC-Parasite v1.2 allows you to sniff on switched networks by using either ARP Spoofing or MAC Flooding. THC-Parasite is intelligent and its algorithms are designed to bypass the basic switch security. Works on Linux, OpenBSD, and Solaris.
88ed01c5809275069ed28ab27da53c28745abe567a2e31a9d02b41c7f4067e83
THC-Hydra is a parallized login hacker which understands FTP, POP3, IMAP, Telnet, HTTP Auth, NNTP, VNC, ICQ, Socks5, PCNFS, samba, cisco enable, LDAP, and more. Includes SSL support. Hydra is now included in Nessus.
18cf489547d06c85e5e7d6050ff0246134c609950137697f81a4716bd421c97a
THC-Shagg is a modular application to bruteforce check digit algorithms. It is able to analyze the used algorithm, its weights and its partitions of a set of serial numbers, e.g. credit card numbers, social id numbers, and calling card numbers. After analysis new serial numbers can be generated from the saved results.
bfd76ef8ac462ae19d1f7c9bc217599c41e7e1c5e79ab40188774f683a901e4c
The NetUserChangePassword function in Windows NT 4 enables an attacker to change the password of any user under special/default circumstances.
94faf138aef331f98dc6f9d7d0bc78b7ff08fa0c2127791fe549ae03bb16ef2c
Reverse-WWW-Tunnel-Backdoor v2.0 - This backdoor should work through any firewall which has got the security policy to allow users to surf the WWW. Verified to work on Linux, Solaris, AIX and OpenBSD.
012239d21cbf76e09bca91cb3f7c23c5960360129f2f512bc096f55b74fb111a
THC-Secure Deletion v2.3 for UNIX is the latest release of van Hauser's suite of secure deletion and overwriting utilities. Included are 'srm' - secure deletion of files
1d5629b0f83a0352b0d2654208ad38a2aee6ce78c9f94f8d2b044b5316b164b7
THC-Parasite v1.1 allows you to sniff on switched networks by using either ARP Spoofing or MAC Flooding. THC-Parasite is intelligent and its algorithms are designed to bypass the basic switch security.
b610d3a1f5525d3b5f3fa41e2d3efb3cfcea5af963e3f4aee759732839b7bf90
THC-WarDrive v2.3 is a linux based tool for mapping your city for wavelan networks with a GPS device while you are driving a car or walking through the streets. It is effective and flexible, supporting NMEA GPS devices.
9810f45f7b163d85d8aaf5092726d2e26ba29ee6171d07999e36a2d771651a0f
THC-Hydra is a parallel login hacker. With this tool you are able to attack several services at once (FTP, POP3, IMAP, Telnet, HTTP Auth, NNTP, VNC, ICQ, PCNFS, and more). Also included Socks5 and SSL support.
5fb2a998138aac2a9286b5f1f4bd416ed6dbd511b5f8992250ee75aaeb99cef4
Amap is a scanning tool that allows you to identify the applications that are running on (a) specific port(s). It does this by connecting to the port(s) and sending trigger packets. These trigger packets will typically be an application protocol handshake (i.e. SSL). Amap then looks up the response in a list and prints out any match it finds. Adding new response identifications can be done just by adding them to an easy-to-read text file. With amap, you will be able to identify that SSL server running on port 3445 and some oracle listener on port 233!
1c3ecd0a4363f4c64267e66bacdc383383ad7bbb4691f4d438aaece8d92ae73d
Hydra v1.4 is the world's first parallel login hacker. With this tool you are able to attack several services at once (FTP, POP3, IMAP, Telnet, HTTP Auth, etc).
1e7c26a3b9c5840830cbfe4b20c5f8dc16d52e1db7dc42711e493c8035da5d70
Probe 4.1 is a host scanner compilation for Linux, featuring nmap, snmpscan, netbios auditing tool and super-cool vh shell script.
51f22f1c5671755c21d60b142762034033196be1d958c0d72af178d101a42b15
THC-Hydra is the world's first parallel login hacker. With this tool you are able to attack several services at once.
d82493f90f1d1ffec70a5b561e9a21ada59a172ad0beb2e619f29d931c7434fb
Placing Backdoors Through Firewalls version 1.5 - Hackers often want to retain access to systems they have penetrated even in the face of obstacles such as new firewalls and patched vulnerabilities. To accomplish this the attackers must install a backdoor which does its job is not easily detectable. The kind of backdoor needed depends on the firewall architecture used. As a gimmick and proof-of-concept, a nice backdoor for any kind of intrusion is included.
8ef7f3e0278b056d10da9fd260d41e5f483cc869ba0c8728679ae31bf89e3ad2
thc-hb09.zip is a Windows-based tool - A security-scanner included in a web browser for scanning webservers/NT-Servers.
8ea2383c8fb90f66a26b7dc0a51aa16adf136b6dec9e85b36db0fa4bdf2c1b77
Article from THC explaining the techniques behind the ksolaris kernel module, and helps you to develop your own solaris kernel modules.
523a74adb51f1f49d8003ba66d604653ea04038a4bbaff3610402554557bde7d
slkm-1.0.tar.gz is the first public solaris loadable kernel module backdoor from THC. Features File hiding, File content and directory hiding, Switch to toggle file content and directory hiding, Process hiding (structured proc), Promiscous flag hiding, Converting magic uid to root uid, and Execution redirecting.
17ee6bad714538c7e2f84e0c24b4520aec71d93c1ad872d769c659a16755d851
"Anonymizing UNIX Tools v0.9" - Tools for securing your UNIX systems(s), keeping your data and actions as private as possible, as described in Anonymizing UNIX Systems v0.9 Whitepaper.
9a9cb9fff4b40791ac3df85ebeab0f860cc0aa06678868412878fda29e08ace9