UNIX/Win remote vulnerability exploit scanner with Fixes for Vulnerabilities. based on ben-z fts-rvscan scanner. Includes: WINSCAN (scans win/nt systems for latest trojans/remote exploits), VETE (single vuln/host scanner) VETES (single vuln/host w/o host checking), VETEMASS (mass vuln/host scanner), CMSD mass/get (a b c scanner and getter), AMD/get (mass a b c scanner and getter), MOUNTD/get ( mass a b c scanners/getter), many exploits, Fixes, and utils included. Courtesy of VetesGirl
2306f8780f31748ead0ffe10e582608ecf9b2166d79b2055271422ea30f66f9d
FAQ and Guide to Cracking.
f96b59615054e2674105c72445e687034b98cca3d5630214722d9f85197f3153
Password protected remote shell daemon that integrates a syn flooder, bouncer/gateway, port scanner, and remote root exploits. Courtesy of Mixter
dc5c81225eb8af686fdafb3208906dd1a0e8283143bb5124545d1b007cf3224f
Scans for the default logins on IRIX boxes. Courtesy of Mixter
24bb4b2576c66fa3a627292e52438a6d2321f903c3b4f9c6b6d8b7f9aeebb68e
Multithreaded high speed scanner that scans for 6 different daemons, and records the version of every daemon for analysis. Courtesy of Mixter
079ae01a2da00d9398b7999c8fff4885d92b021fc74a2421ed49ce1ef25c600f
Unix internet worm; for a description see Mixter
609bcede019adb5abc05b16b1cf64384830158b88fb3af77f0d16db3fbc013bc
Performance/speed optimized bind scanner that finds dns servers vulnerable to the iquery exploit scanning from a list of IPS. Courtesy of Mixter
abce6d0312c99f271671bb9f91432a13b67c3880124fa055ffb2cc2641edeb07
A unix virus (ELF infector). Courtesy of Mixter
1cfbeeb3430678b41dd9255215bef1ee3e155ddf77d15af99abc986d849d2f70
Linux promiscous ethernet sniffer that sends sniffer traffic to a remote logging daemon. this sniffer comes with optional strong (96byte 3way) encryption. Courtesy of Mixter
f5eb31166302e8ec42560988c71ab267bd3ddafde6e5fcafe3c0afbca1ae0fce
Ping observation tool is a highspeed tool to sweep for smurf broadcast amplifiers, it compiles a broadcast amplifier list of the complete IPv4 address range in about 5 days (with enough bandwidth). Courtesy of Mixter
b611b8c768e543ad2206b1866ac7fbe88a3f3808c88ab2a1e6d42c17cfcbd957
Remote DoS against 11 different IP stack holes on various OS's, supports attacking a c-class ip range. Courtesy of Mixter
01e05ac0dc003e26d6bdb5a7891945f9baf3f326dc0689def72651df0083064a
Distributed flood network client/server that can be installed on a large number of hosts and used to hit a target with high bandwidth simultaneously. communicates over icmp and supports udp, syn, icmp/8, smurf flood and more. Courtesy of Mixter
920026602cef824add5790e0ec01ac5d2241801552dbd49fb0516dfa99946b78
Modified version of Todd Vierling's datapipe, where you can specify a name that will be displayed instead of the process' name. Linux - c source. Courtesy of soft project digital security for y2k
d23b53bdf0ea1b506dff4e2c80c97ab54f38030dedca8bb1aad3509be2f43820
Phf - test-cgi - htmlscript - view-source - wrap - campas - pfdisplay - webdist - aglimpse - php - nph-test-cgi scanner. Linux - c source. Courtesy of soft project digital security for y2k
dfcf5bca361e966d45696564142eb1ef582869eb7125b7e08b2a334e90c89eec
Network datapipe. Linux - perl source. Courtesy of soft project digital security for y2k
9f34e070f8fde69e2243a38d517d94a0b2bc5c4e428f5e851096d9eca76a9cf1
Cryptographic utility using private key (4096 bytes), random salting. DOS - binary. Courtesy of soft project digital security for y2k
45661fb44f86e0a6eb8f4540a72487cc87027263d194c393469e0131568a989a
Simple socket shell. Linux - c source. Courtesy of soft project digital security for y2k
74808fb4a85ba8f28e76373d228771acebdce18a467f7358fdf7453271429fa5
Log editor that cleans Utmp, Wtmp, LastLog, Messages, XferLog, Secure and MailLog. Linux - c source Courtesy of soft project digital security for y2k
53330974c17923ab0e9ffe80cb6194db9f47475505178ebb727a990cff50e197
Utmp editor that permits to change id, tty and host of a user logged in the system. BFi3 8). Linux - c source. Courtesy of soft project digital security for y2k
25b88edefcc2babc93951bbaaede6fa44e7e1739c20d5085efb86d3e54354192
Network datapipe with interactive mode, support for proxy server socks (v4 or v5), logging facility and option to concatenate more pipes. Documentation: 'PiPPA v2', BFi4 (December 98). Linux/WinNT - perl source. Courtesy of soft project digital security for y2k
3cf8f7d9b648939a354658af5b6ebd82e9e4ccf594c21661d07872318d10198a
Loadable Kernel Module to hide in a system. It substitutes in 4kbytes a full rootkit. Only for 2.0.x kernels. Documentation: 'PR0GETT0 CAR0NTE - PARTE I' , BFi3 (Luglio 98); 'PR0GETT0 CAR0NTE - PARTE II' , BFi4 (December 98). Linux - LKM c source. Courtesy of soft project digital security for y2k
8d359b0bc902e70a6892c3f7627024d37781658ad8a1645786fa0e45e1dc4dfc
Trojan that enables file and printer sharing, and then enables sharing on all drives with full access. Documentation: 'WiND0WS E PASSW0RD' , BFi4 (December 98). Win9x - binary. Courtesy of soft project digital security for y2k
7a6bc9282ef21fc92fb45bda834017b89f6b8c67b37c27d8806be058ffaae86c
Shell hidden into ICMP tunneling that uses 0x00 ECHO REPLY messages to carry data. Includes: 007Shell, ICMP Tunneling Library v1. Courtesy of soft project digital security for y2k
f083e35df72f5406144b7351e8d4774b12d4e651f613cb4f5bc6174cb5ccb427
Kit including two tools that scan for exploitable versions of IMAP4; the scan can be accomplished by specifying a single host or using a file containing all the ip's. Includes: Imap4 scanner, Imap4 checker. Linux - c source. Courtesy of soft project digital security for y2k
7564e2d776360b4679f088a324c2b88136600a6078f5a0b16e6ea93c39c3f97b
rpc.ttdbserver scanner (adapted from statd scanner by BiT), it uses a file containing the list of ip's to scan. BFiSN98 (December 98). Linux - c source. Courtesy of soft project digital security for y2k
05145d5b163d2e69ed1cfd957250b9a0f75515bc8b529e83c010a091cee75de9