exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 7 of 7 RSS Feed

Files from phish

First Active2002-11-02
Last Active2004-07-24
lyceum-2.46.tar.gz
Posted Jul 24, 2004
Authored by phish

Lyceum is an advance stealthed client/server backdoor that uses encrypted spoofed UDP packets to administer the server and the two built-in ICMP backdoors. Each ICMP backdoor exploits a different feature of the protocol, the first creating a bi-directionally spoofed ICMP tunnel and the second uses passive nodes as zombies to relay ICMP backdoor traffic.

tags | tool, udp, spoof, protocol, rootkit
systems | unix
SHA-256 | 860ca6295d4f0a55057e5b9280edffa1b18da5925a54817cf734ab2fb853bf9a
sneaky-sneaky-1.48.tar.gz
Posted Dec 24, 2002
Authored by phish

Sneaky-sneaky is a bidirectional spoofed ICMP tunnel backdoor that has built-in encryption and logging capabilities. It communicates via echo replies keeping the true source IP address encrypted inside of the payload.

Changes: Now with delays, decoys, timeouts and spoofing options.
tags | tool, spoof, rootkit
systems | unix
SHA-256 | 68642e29c750a07324bbd4b41c47ada6295fab5d3d2fd03cca555ec48dd88322
banshee-3.3.tar.gz
Posted Dec 8, 2002
Authored by phish | Site blakhat.co.uk

Banshee is a fast lightweight mass scanner. Banshee can integrate with other tools like queso or xprobe to extend functionality. Features include port/rpc scanning, easily search-able logging, banner grabbing and more.

Changes: Many code improvements.
tags | tool, scanner
systems | unix
SHA-256 | 6615ccdb02fb1771bc0de830c3d08ed040754774c3a84c84bd5383ecf3940bc8
banshee-3.0.tar.gz
Posted Nov 30, 2002
Authored by phish | Site blakhat.co.uk

Banshee is a fast lightweight mass scanner. Banshee can integrate with other tools like queso or xprobe to extend functionality. Features include port/rpc scanning, easily search-able logging, banner grabbing and more.

tags | tool, scanner
systems | unix
SHA-256 | 805d0c4f2530695475ce13b9b5e04da1454dcab03e719333d9f41935e082e188
mapper-2.19.tar.gz
Posted Nov 17, 2002
Authored by phish

Mapper is a network connectivity tester that employs a number of techniques to try and guess if a host is alive or not. Since many machines have ICMP firewalled off, it uses 7 different TCP and ICMP tests in attempting to gain some sort of response. Mapper can send spoofed decoys and use random delays for added stealth.

tags | tool, spoof, tcp
systems | unix
SHA-256 | 8e6ed6fd200d9037a5a4ceeac6f7a9e3a958b867e1b25983b6da7715b9c81c01
shroud-1.30.tgz
Posted Nov 2, 2002
Authored by phish

Shroud is a log wiper that wipes and edits utmp, wtmp, lastlog and plaintext logs. It ensures that it keeps proper permissions and access, creation, and modify file times on the log files. It also makes use of Van Hauser's srm to delete old log files.

tags | tool, rootkit
systems | unix
SHA-256 | 80ca2636b174e0841277e9bfeea1edf0077ad7f6d1065ed534d63b87ccc206ee
sneaky-sneaky-1.12.tar.gz
Posted Nov 2, 2002
Authored by phish

Sneaky-sneaky is a bidirectional spoofed ICMP tunnel backdoor that has built-in encryption and logging capabilities. It communicates via echo replies keeping the true source IP address encrypted inside of the payload.

tags | tool, spoof, rootkit
systems | unix
SHA-256 | 7995080d8ef82352cec03420727e8d2eb5a74d0dc5ada7ad5b48d89fcf6aa397
Page 1 of 1
Back1Next

File Archive:

November 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Nov 1st
    30 Files
  • 2
    Nov 2nd
    0 Files
  • 3
    Nov 3rd
    0 Files
  • 4
    Nov 4th
    12 Files
  • 5
    Nov 5th
    44 Files
  • 6
    Nov 6th
    18 Files
  • 7
    Nov 7th
    9 Files
  • 8
    Nov 8th
    8 Files
  • 9
    Nov 9th
    3 Files
  • 10
    Nov 10th
    0 Files
  • 11
    Nov 11th
    0 Files
  • 12
    Nov 12th
    0 Files
  • 13
    Nov 13th
    0 Files
  • 14
    Nov 14th
    0 Files
  • 15
    Nov 15th
    0 Files
  • 16
    Nov 16th
    0 Files
  • 17
    Nov 17th
    0 Files
  • 18
    Nov 18th
    0 Files
  • 19
    Nov 19th
    0 Files
  • 20
    Nov 20th
    0 Files
  • 21
    Nov 21st
    0 Files
  • 22
    Nov 22nd
    0 Files
  • 23
    Nov 23rd
    0 Files
  • 24
    Nov 24th
    0 Files
  • 25
    Nov 25th
    0 Files
  • 26
    Nov 26th
    0 Files
  • 27
    Nov 27th
    0 Files
  • 28
    Nov 28th
    0 Files
  • 29
    Nov 29th
    0 Files
  • 30
    Nov 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close