Fast httpd scanner that scans a block of IPs using a half open scan.
2defbdb4ab4e646551e3f5483833a3029ed3bac341a8d20e07d7d3da00941bc1
Tool to manipulate /dev/kmem (kernel memory) to completely hide LKMs. Tested on 2.4.x.
afad67bd1962d78e3fc466bb2136fbfb5d512592976a66548ebc68a60de238b3
List of the most known backdoors and the ports they use. It has 130 different trojans and more than 150 ports listed.
c0ca6e5af2ea2bc12bb290309372e81c364d8109c1d25218f4e4c52443f89292
White paper discussing Windows trojans. Written for newbie home PC users.
33f7db9373b30ae302e7ee598301369005f836114516b5f2ed62e23b3a46a86a
An analysis of the Klez worm listing all the steps that it takes.
f2c65ec510c5523d748d5d277a63219df67263954663d1d20fdfc5ad9b1abcfc
This paper explains a technique of cracking any kind of raw encryption using word patterns, without the conventional key combination trying.
dce740abf0c17e037fbd17ff6fb1e118ffc53ede465268b5bbfa137c109d6cc4
White paper explaining how to try and bypass detection from antivirus software by recompiling the same code with a few minor changes.
ed996b12d0f2df8baf46b0eb9266cbde4f7134bafe3dd50cd775fe7dd5ff08c9
skl0g is a simple and compact keylogger for Windows. It runs invisibly and effectively. It logs everything that is typed at the computer and saves them in log files according to the date.
17c563fff95bddddea1a4b94071044a54181dfeb472a96552590df349f6134ad