exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 5 of 5 RSS Feed

Files from Toxic Ocean

Email addressprivate
First Active2000-05-12
Last Active2002-12-29
View User Profile
cst1_4.tar.gz
Posted Dec 29, 2002
Authored by Toxic Ocean | Site blackhat.be

CST is a java based web scanner that scans using a database of scripts (user editable). The sample databases included contains +1600 possibly vulnerable scripts/dirs. You can scan with or without a proxy server. The scanner has 11 different Anti-IDS tactics and sends fake "X-Forwarded-For:", "Referer:" and "User-Agent:" headers to hide your scan even more. You can also specify a wait time between 2 script fetches. The scanner uses HEAD requests instead of GET for faster scanning, and has support for scanning virtual hosts. You can also specify another port to scan instead of the standard port 80. The scanner outputs the scripts/dirs that return a 200, 403 or 401 HTTP code and outputs the webserver software. A full and comprehensive manual is included.

tags | java, web, cgi
systems | unix
SHA-256 | ed1ed005823058fb585949b6d3946ff5897c5e5582d334a7717c3cc986dc9e71
cpt1.tar.gz
Posted Sep 27, 2001
Authored by Toxic Ocean | Site blackhat.be

Proxy Toolkit is coded in Java and checks to see what information a web proxy forwards.

tags | java, web
SHA-256 | 29df10b97dc837a93d9fbf6d310c5ccfc8236ae4560a8bdac470fa265c494422
cst1_3.tar.gz
Posted Apr 25, 2001
Authored by Toxic Ocean | Site blackhat.be

CST contains a script scanner, that scans using a database of scripts (user editable). The sample databases included contains +700 possibly vulnerable scripts/dirs. You can scan with or without a proxy server. The scanner has 11 different Anti-IDS tactics (hex-values, double slashes, self-reference dirs, parameter hiding and session splicing), and sends fake "X-Forwarded-For:", "Referer:" and "User-Agent:" headers to hide your scan even more. You can also specify a wait time between 2 script fetches. The scanner uses HEAD requests instead of GET for faster scanning, and has support for scanning virtual hosts. You can also specify another port to scan instead of the standard port 80. The scanner outputs the scripts/dirs that return a 200, 403 or 401 HTTP code and outputs the webserver software. A full and comprehensive manual is included.

tags | web, cgi
systems | unix
SHA-256 | 856e57db08f283a0a2df8d4ec62c30581e58231f2d536f8fafceed1d15ed67a1
cst.tar.gz
Posted Oct 21, 2000
Authored by Toxic Ocean | Site blackhat.be

The Cum Security Toolkit v1.2 is a cgi/port scanner which checks for over 350 vulnerable CGI scripts and can implement 5 different Anti-IDS tactics. Features support for vhosts, wait times, fake X-forwarded-for: headers, and much more.

tags | cgi
systems | unix
SHA-256 | 65d4e38e08388580ad5f6d1883da40bb1b4454eebda1f187608b30d654e4f7ce
cst1.tgz
Posted May 12, 2000
Authored by Toxic Ocean

Cum Security Toolkit (cst v1.0) - Contains a scriptscanner and a portscanner Coded in Java. The http-script scanner features the ability to use a proxy server, a scripts-to-scan database, anti-IDS url encoding, fake "X-Forwarded-For:" header, and uses fake "Referer: " info. The port scanner is a full TCP connection scanner which can scan port ranges and grab banners.

tags | java, web, tcp
SHA-256 | 4a48a8b8b4f3c855330733200affaf3d5fdca4f02a949b6e0d9a50938eab9560
Page 1 of 1
Back1Next

File Archive:

November 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Nov 1st
    30 Files
  • 2
    Nov 2nd
    0 Files
  • 3
    Nov 3rd
    0 Files
  • 4
    Nov 4th
    12 Files
  • 5
    Nov 5th
    44 Files
  • 6
    Nov 6th
    18 Files
  • 7
    Nov 7th
    9 Files
  • 8
    Nov 8th
    8 Files
  • 9
    Nov 9th
    3 Files
  • 10
    Nov 10th
    0 Files
  • 11
    Nov 11th
    14 Files
  • 12
    Nov 12th
    20 Files
  • 13
    Nov 13th
    63 Files
  • 14
    Nov 14th
    18 Files
  • 15
    Nov 15th
    8 Files
  • 16
    Nov 16th
    0 Files
  • 17
    Nov 17th
    0 Files
  • 18
    Nov 18th
    0 Files
  • 19
    Nov 19th
    0 Files
  • 20
    Nov 20th
    0 Files
  • 21
    Nov 21st
    0 Files
  • 22
    Nov 22nd
    0 Files
  • 23
    Nov 23rd
    0 Files
  • 24
    Nov 24th
    0 Files
  • 25
    Nov 25th
    0 Files
  • 26
    Nov 26th
    0 Files
  • 27
    Nov 27th
    0 Files
  • 28
    Nov 28th
    0 Files
  • 29
    Nov 29th
    0 Files
  • 30
    Nov 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close