UNIX
ADM-spoof-NEW.tgz | Size: 10kb | IP Spoofing
script, includes headers. Requires compiling.
|
fakebo-032.tgz | Size: 29kb | Fake Back
Orfice server for unix. |
gammaprog150.tgz | Size: 22kb | Gammaprog is
a bruteforce password cracker for web based e-mail address. Actually was,
cause now it supports pop3 cracking too. Currently hotmail.com, usa.net
and yahoo.com address are supported but you can add your own (See
CgiConfig.txt). The program is written in Java, so it should run on any
computer equiped with a Java virtual machine. It's not an applet however,
it won't run from a web browser. If you don't have a Java virtual machine,
you can get one at http://www.javasoft.com/products/index.html. Get JDK or
JRE. JRE is much smaller and if you have no java coding experience it is
all you'll probably need. See FAQ.txt for more details.
|
cgiscan2.c | Size: 5kb | This asks a
web server (on Unix or NT) if it is running services that are known to be
exploitable. If it finds them it tells you, but it won't exploit them. I
updated this so it looks for some new holes in diffrent types of web
servers, and new web server that are coming out on the market. To complie:
luser$ gcc cgiscan.c -o cgiscan To use: luser$ ./cgiscan somedomain.com
(i.e. ./cgiscan antionline.com) coded by Bronc Buster
|
crontab_backdoor.sh | Size: 3kb | crontab
controlled socket demon backdoor by n0b0dy (n0b0dy@gmx.de)
|
nmap-2_12.tar | Size: 1.3 megs | Nmap is a
utility for port scanning large networks, although it works fine for
single hosts |
spike.sh | Size: 9kb | Spikeman's
DoS Attack Tool - Revision 2; To use this program you will need the
teadrop, nestea,syndrop, #
newtear,bonk,smurf,boink,pepsi,jolt,spring,land,latierra and some and Some
other shit you can check the source if needed....
|
WSD-dns.tgz | Size: 15kb | Packed with
Scripts to have fun with DNS. Spoofing, DoS attacks and other misc stuff.
Includes header files. |
xenon-r1.tar | Size: 50kb | [(xenon!irc)]: bitchX-75+linux 2.2.2 ; Irc Script
for BitchX |
ipspoof_script.zip | Size: 9kb | This is
actual working code for ip spoofing. Umm.. I guess that's it. Run syn and
then rsh immediately afterwards. Run them without any arguments for what
to do. by Shok (Matt Conover) shok@dataforce.net, shok@sekurity.org
|
9x_cgi.zip | Size: 80kb | CGI-BIN Bug
finder by: asm |
boscript-0_2_tar.tar | Size: 78kb | boscript is
a Perl interface to the cDc's Back Orifice Remote Administration Server
|
cheops-0_55_tar.tar | Size: 238kb | Cheops is a
network "swiss army knife". It's a combination of a variety of network
tools to provide system adminstrators and users with a simple interface to
managing and accessing their networks. Cheops aims to do for the network
what the file manager did for the filesystem. Features include: Network
mapping via UDP and/or ICMP packets, port detection using half-open tcp
connections (ala halfscan), OS detection using invalid flags on TCP
packets (ala queso), Domain scans, ICMP pings, much more. Requires GTK
|
hunt-1_0.tgz | Size: 66kb | Hunt is a
tool for exploiting well known weaknesses in TCP/IP protocol. Use
primarily to hijack connections |
traffic-vis-0_22_tar.tar | Size: 47kb | Network
monitoring/auditing tool that can plot communications between hosts on a
TCP/IP network |
cold-1_0_10.tgz | Size: 85kb | A network
sniffer and protocol analyzer with support for lots of devices and
protocols |
nessus-unstable-120198.tgz | Size: 338kb | Nessus
security auditing tool. Changes: the plugins are now able to share their
results, thus making some tests fasters and some other more accurate, this
version features 155 security checks, plugins communicate with each other,
speeding up RPC |
tcptrace_tar.gz | Size: 2 megs | Analyzer for
tcpdump logfiles |
spamshield-1_40_tar.gz | Size: 10k | Route-based
protection against large-scale message floods (spam, mail bombs, etc...).
"The war won't be over until the last spammer's head is stuck onto a spear
at the city limits |
logwatch-1_5_1_tar.tar | Size: 33kb | LogWatch is
a customizable, pluggable log-monitoring system. Easy to use and highly
configurable. Now analyzes samba logs |
libpcap-0_4_tar.tar | Size: 209kb | Packet-capturing library. Tcpdump uses this
|
john-1_6_tar.tar | Size: 500kb | John The
Ripper Unix Password Cracker v1.6 |
ipsend2_1a_tar.tar | Size: 68kb | TCP/IP
packet-generator which uses a scripting language
|
ibnc2_0a.tar | Size: 71kb | IRC proxy
server/bouncer. Configurable, multi-user, passwd capable, vhost
compatible, logs, more |
ethereal-0_5_0_tar.tar | Size: 227kb | A network
protocol analyzer. Examine and capture a wide variety of packet data from
live networks |
dtk-0_7.tar | Size: 481kb | Deception
Toolkit v0.7 - Tools and tactics based on deception to counter
hacking/cracking attacks |
hackkit-2_0b.txt | Size: 537kb | Hacking Kit
v2.0.b March/97 by Invisible Evil |
fbsd_rootkit_1_2_tar.gz | Size: 501kb | Free BSD
Root Kit |
rootkitSunOS.tgz | Size: 70kb | Root Kit for
SunOS |
sol25.zip | Size: 8k | Root Kit for
Sun Solaris 2.5 |
thc-uht1.tgz | Size: 69kb | A
compilation of needfull unix hacking tools including backdoors, tunnels,
cleaners, etc written by THC members, that compile on various unix
platforms. |
secure_delete-1_8_tar.tar | Size: 28kb | This is the
tool for you! Securely wipes files, free space on harddisks and swap
partitions by a special scientific routine (Paper included). Don't miss
this if you want to protect your information
|
ipgrab-0_6_tar.tar | Size: 65kb | A packet
sniffing tool, based on the Berkeley packet capture library, that prints
complete data-link, network and transport layer header information for all
packets it sees |
redir-1_1_tar.tar | Size: 8k | TCP Port
redirector/bouncer |
wgate-bsd_tar.tar | Size: 14kb | Wingate
scanner optimized for BSD platforms |
Unix Bible | Size: 78,408 | Unix Bible,
lots of good commands and great unix stuff
|
Userdump | Size: 12,522 | UserDump
simply lists all users in the Bindery |
RootKit v1 | Size: 80,179 | A kit to
obtain Root Access on unix boxes |
COPS | Size: 409,395 | COPS is a
collection of about a dozen programs that each attempt to tackle a
different problem area of UNIX security |
Crack | Size: 34,346 | CrackLib is
a library containing a C function (well, lots of functions really, but you
only need to use one of them) which may be used in a "passwd"-like
program. The idea is simple: try to prevent users from choosing passwords
that could be guessed by "Crack" by filtering them out, at source
|
Voodoo | Size: 4,545 | VOODOO UNIX
is a mail/flood/bomb program |
Merlin | Size: 129,409 | Merlin is a
tool for managing other tools -- it can take a powerful but cryptic
command-line tool and provide it with an easy-to-use graphical interface.
Merlin comes with support for 5 popular security tool, but it can be
extended to support any command-line oriented tool.
|
Satan (Unix Security Tester) | Size: 48,799 | SATAN in
ZIPPed format (TAR sucks! no compression!)
|
Security Holes | Size: 16,267 | Security
Holes in Unix and other intresting information
|
Unix Emulator | Size: 710,898 | Unix
Emulator for DOS. Good for Learning Unix on your DOS pc.
|
Hacking Unix | Size: 16,011 | Guide to
Hacking Unix |
TTY-Watcher v1.0 | Size: 41,890 | TTY-Watcher
is a utility to monitor and control users on a single system.
|
TTY-Watcher v1.1beta | Size: 52,108 | TTY-Watcher
is a utility to monitor and control users on a single system.
|
Crack v5 | Size: 2,964,507 | System Administrators use this to test for bad (easy) passwords on Unix boxes |