exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 5 of 5 RSS Feed

Files from Samy

Email addresssamy at samy.pl
First Active2004-09-09
Last Active2016-11-17
PoisonTap Backdoor Network Sniffer
Posted Nov 17, 2016
Authored by Samy | Site github.com

PoisonTap exploits locked/password protected computers over USB, drops a persistent WebSocket-based backdoor, exposes an internal router, and siphons cookies using Raspberry Pi Zero and Node.js.

tags | tool
systems | unix
SHA-256 | 5bc22f24e99b99bf272fbc910a2bc89f6ab53e64b129185daa574df9df645c7f
KeySweeper Stealth Logger
Posted Jan 14, 2015
Authored by Samy | Site github.com

KeySweeper is a stealthy Arduino-based device, camouflaged as a functioning USB wall charger, that wirelessly and passively sniffs, decrypts, logs and reports back (over GSM) all keystrokes from any Microsoft wireless keyboard in the vicinity.

tags | tool, sniffer
SHA-256 | 7d3cce0ee36f29266235b182ba2142ade64c886109aa061d0884fbcfb4375461
SkyJack Drone Hijacker
Posted Dec 4, 2013
Authored by Samy | Site samy.pl

Skyjack takes over Parrot drones, deauthenticating their true owner and taking over control, turning them into zombie drones under your own control.

tags | tool, wireless
SHA-256 | 1b98f29ef25d025fd339b29c2523e4f447d2b77b9ad899161c58fff2e9465639
Pwanat NAT To NAT Tool 0.2
Posted Apr 6, 2010
Authored by Samy | Site samy.pl

pwnat, pronounced "poe-nat", is a tool that allows any number of clients behind NATs to communicate with a server behind a separate NAT with no port forwarding and no DMZ setup on any routers in order to directly communicate with each other. The server does not need to know anything about the clients trying to connect.

systems | unix
SHA-256 | 709e1288e05bcae5f1221f2904de2ef64b9d8b81d5fbee6c3b69ef49a807aa1f
elf-0.5.4p1.tar.gz
Posted Sep 9, 2004
Authored by Samy | Site kerneled.org

elf is a command-line tool that allows a user, be it a script or a human, to analyze the contents of an ELF object file header. This header contains various integral values such as the virtual entry point of the object file, the machine architecture it was compiled for and more.

systems | linux
SHA-256 | ba504141b5e785fc1d7f12e8239b05346b36be25671c0ad626f1baa248ad8791
Page 1 of 1
Back1Next

File Archive:

November 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Nov 1st
    30 Files
  • 2
    Nov 2nd
    0 Files
  • 3
    Nov 3rd
    0 Files
  • 4
    Nov 4th
    12 Files
  • 5
    Nov 5th
    44 Files
  • 6
    Nov 6th
    18 Files
  • 7
    Nov 7th
    9 Files
  • 8
    Nov 8th
    8 Files
  • 9
    Nov 9th
    3 Files
  • 10
    Nov 10th
    0 Files
  • 11
    Nov 11th
    0 Files
  • 12
    Nov 12th
    0 Files
  • 13
    Nov 13th
    0 Files
  • 14
    Nov 14th
    0 Files
  • 15
    Nov 15th
    0 Files
  • 16
    Nov 16th
    0 Files
  • 17
    Nov 17th
    0 Files
  • 18
    Nov 18th
    0 Files
  • 19
    Nov 19th
    0 Files
  • 20
    Nov 20th
    0 Files
  • 21
    Nov 21st
    0 Files
  • 22
    Nov 22nd
    0 Files
  • 23
    Nov 23rd
    0 Files
  • 24
    Nov 24th
    0 Files
  • 25
    Nov 25th
    0 Files
  • 26
    Nov 26th
    0 Files
  • 27
    Nov 27th
    0 Files
  • 28
    Nov 28th
    0 Files
  • 29
    Nov 29th
    0 Files
  • 30
    Nov 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close