exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 14 of 14 RSS Feed

Files Date: 2000-12-13

NTOMax20.zip
Posted Dec 13, 2000
Authored by JD Glaser | Site foundstone.com

NTOMax v2.0 - A scriptable, server stress testing tool.This tool takes a text file as input and runs a server through a series of tests based on the input. The purpose of this tool is to find buffer overflows and DOS points in a server.

tags | overflow
SHA-256 | ef34377a85529f26bafd7fc023eda8fc64b8470ac6e53c53e19d8e7325857bf9
trout.zip
Posted Dec 13, 2000
Authored by Robin Keir | Site foundstone.com

Trout v2.0 is a visual (i.e. GUI as opposed to command-line) traceroute and Whois program. Pinging can be set at a controllable rate as can the frequency of repeatedly scanning the selected host. The built-in simple Whois lookup can be used to identify hosts discovered along the route to the destination computer. Parallel pinging and hostname lookup techniques make this traceroute program perhaps the fastest currently available.

SHA-256 | a9a707eed5f6c64b0c4510a6c2acc3c72c62491acd8823b26b64bbf1a8a50df9
superscan.exe
Posted Dec 13, 2000
Authored by Robin Keir | Site foundstone.com

SuperScan v3.0 - SuperScan is a powerful connect-based TCP port scanner, pinger and hostname resolver. Multithreaded and asynchronous techniques make this program extremely fast and versatile.

tags | tcp
SHA-256 | a4df0e59a28d75e143117051a04d52f4a61a9ea7b23c41ad51a3a829cad62b58
ddosping.zip
Posted Dec 13, 2000
Authored by Robin Keir | Site foundstone.com

DDoSPing v2.0 is a Win 9x/NT GUI scanner for the DDoS agents Wintrinoo, Trinoo, Stacheldraht and TFN.

tags | denial of service
SHA-256 | 57e4cd81c86b8688f78c15c437701b1ad27ae8e1d7f7f442aaa71aca2ec3d421
boping.zip
Posted Dec 13, 2000
Authored by Robin Keir | Site foundstone.com

BOPing is a network scanner for the infamous Back Orifice trojan. It is many times faster than the ping sweeper built in to the original client program. This is intended as a vigilante tool to notify victims who unknowingly have the trojan on their system. It includes the ability to notify detected victims by sending them a BO message box message directly from within the program.

tags | trojan
SHA-256 | 1e5f64dd410ef6765183eaf15f87fed4f26d1952d8389f363cf6f9479d1b4274
patchit.zip
Posted Dec 13, 2000
Authored by Robin Keir | Site foundstone.com

Patchit v2.0 is a file byte-patching utility. This is driven by a simple scripting language. It can patch sequences of bytes in any file, search for byte patterns (with wildcards) and also extract and utilize DLL exported function addresses as source positions in files to be patched.

SHA-256 | 519813ce0cd53d0202964737cc201c22426b6813ed26d46a1e07e85708c1a151
bintext.zip
Posted Dec 13, 2000
Authored by Robin Keir | Site foundstone.com

BinText v3.0 is a small and fast text extractor that will be of particular interest to programmers. It can extract text from any kind of file and includes the ability to find plain ASCII text, Unicode (double byte ANSI) text and Resource strings, providing useful information for each item in the optional "advanced" view mode. It's comprehensive filtering helps prevent unwanted text being listed. The gathered list can be searched and saved to a separate file as either a plain text file or in informative tabular format.

SHA-256 | 7842378df02ffb07486a2858620214aac559627bdbbe6fd9b1016c79c3263fad
showin.zip
Posted Dec 13, 2000
Authored by Robin Keir | Site foundstone.com

Showin is a utility which can display hidden password editbox fields (text behind the asterisks *****). This will work in many programs although Microsoft have changed the way things work in some of their applications, most notably MS Office products and Windows 2000. ShoWin will not work in these cases. Neither will it work for password entry boxes on web pages, at least with most web browsers.

tags | web
systems | windows
SHA-256 | ab0aa66b96b80e917509ca0e95fd64b18e178eaa2829969b1c68d1d643ed2275
filewatch.zip
Posted Dec 13, 2000
Authored by Robin Keir | Site foundstone.com

FileWatch v1.0 is a file change monitor. FileWatch (originally called ICEWatch 1.x) is a small utility that can monitor a given file for changes. Monitoring can detect file size changes or simply file writes, both with minimal impact on system resources (no polling is performed). The primary use of this utility is for monitoring changes in the log file of a personal firewall program and being able to spawn a separate application when changes are detected, but the tool can be applied to any number of other uses.

SHA-256 | 36d4ecbff2288777330ce9694cc1b2c2eaeb922eab01c891f24c721eb3376c29
ForensicToolkit20.zip
Posted Dec 13, 2000
Authored by JD Glaser | Site foundstone.com

Forensic Toolkit v2.0 is a file properties analyzer designed to examine the files on a disk drive for unauthorized activity. Lists files by their last access time, search for access times between certain time frames, and scan the disk for hidden files and data streams.

SHA-256 | 4d29428f9ff309f7b8d1dae8cf523a7dcbcace17b6b2fa9a7708117299dc0fa4
NTLast30.zip
Posted Dec 13, 2000
Authored by JD Glaser | Site foundstone.com

NTLast v3.0 is a security audit tool for Windows NT. It can help identify and track who has gained access to your system, and document the details. Includes raw time output for Excel analysis and additional features for Webmasters.

systems | windows
SHA-256 | 8ec05251c3081e25c2859714a5a176605e31ea2408b766257b565cc544361ff6
angst-0.2b.tar.gz
Posted Dec 13, 2000
Authored by Invisibl | Site angst.sourceforge.net

Angst is a simple active packet sniffer, based on libpcap and libnet. Dumps into a file the payload of all the TCP packets received on the specified ports. Also, it floods the local network with random MAC addresses (like macof v1.1 by Ian Vitek), causing switches to send packets to all ports. Only compiled and tested on OpenBSD.

tags | tool, local, sniffer, tcp
systems | openbsd
SHA-256 | 8c267384d8c5f8aa5c4284a685de789c0d5a1e14d018f76a5d9fc7a427f2a72f
stealth-2.2.18.diff
Posted Dec 13, 2000
Authored by Robert Salizar | Site energymech.net

Stealth IP Stack is a kernel patch for Linux 2.2.18 which makes your machine almost invisible on the network without impeding normal network operation. Many denial of service attacks, such as stream, are much less effective with this patch installed, and port scanners slow to a crawl. It works by restricting TCP RST packets (no "Connection Refused"), restricting ICMP_UNREACH on udp (Prevents UDP portscans), restricting all ICMP and IGMP requests. A sysctl interface is used so these features can be turned on and off on the fly.

Changes: Ported to Linux 2.2.18.
tags | denial of service, kernel, udp, tcp
systems | linux
SHA-256 | d3d43af4614d1caa85252fe1ecfcb6817e25b936340bf2188ccbb135862d12fc
dtors.txt
Posted Dec 13, 2000
Authored by synnergy, Juan M. Bello Rivas | Site synnergy.net

Overwriting the .dtors section - This paper presents a concise explanation of a technique to gain control of a C program's flow of execution given that it has been compiled with gcc. This exploit technique has several advantages over changing the stack pointer, including ease of determining the exact position where we want to write and point to our shellcode, and is simpler than a GOT patch.

tags | shellcode
SHA-256 | e41270ceb93cee7dbf4b00c6af429beb80d569a4a5e3c5ffab8c69206da8a0f0
Page 1 of 1
Back1Next

File Archive:

May 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    May 1st
    44 Files
  • 2
    May 2nd
    5 Files
  • 3
    May 3rd
    11 Files
  • 4
    May 4th
    0 Files
  • 5
    May 5th
    0 Files
  • 6
    May 6th
    0 Files
  • 7
    May 7th
    0 Files
  • 8
    May 8th
    0 Files
  • 9
    May 9th
    0 Files
  • 10
    May 10th
    0 Files
  • 11
    May 11th
    0 Files
  • 12
    May 12th
    0 Files
  • 13
    May 13th
    0 Files
  • 14
    May 14th
    0 Files
  • 15
    May 15th
    0 Files
  • 16
    May 16th
    0 Files
  • 17
    May 17th
    0 Files
  • 18
    May 18th
    0 Files
  • 19
    May 19th
    0 Files
  • 20
    May 20th
    0 Files
  • 21
    May 21st
    0 Files
  • 22
    May 22nd
    0 Files
  • 23
    May 23rd
    0 Files
  • 24
    May 24th
    0 Files
  • 25
    May 25th
    0 Files
  • 26
    May 26th
    0 Files
  • 27
    May 27th
    0 Files
  • 28
    May 28th
    0 Files
  • 29
    May 29th
    0 Files
  • 30
    May 30th
    0 Files
  • 31
    May 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close