SRaw for OpenBSD is a kld which makes all users able to open raw sockets. Supported protocols are IPPROTO_RAW, IPPROTO_ICMP, IPPROTO_IPIP, IPPROTO_IPV4, IPPROTO_IGMP.
300627a1e608cd638ff2fafcf814d528749f49e60213764e8e75763181c9f58e
SRaw is a kld for FreeBSD which disables EPERM in socket() and permits to allocate inpcb even if the socket is raw and users haven't root permissions bypassing suser() in pru_attach() functions.
1d9e7f1c99f8c59d6f38efccb713756d713efba1264fdc59cc1c0e336e75b6b1
This FreeBSD module shows how to intercept getpass(3) function and print anything that is typed without terminal echo.
231f569e4f8c8dfa8c9421da154803e5c86e7b176b954311ca32ed72fd9e91b5
Simple Packet Forwarder for Linux on the datalink level. Uses Libvsk.
c2ecda53d1964843248b9ebc23e2bc7249f516f195cae8a84c10f8ea0c299168
Libvsk is a set of libraries for network traffic manipulation from userlevel, with some functions of filtering/sniffing.
8bcc1a1790c4aa4e03c23b681e4033744bc8888256fc13f3662c29c20970762f
Syscall Monitor for FreeBSD - Using this tool you are allowed to monitor the use of the syscalls on your system and to prevent their execution for the specified users/groups.
d9917c7e535881afb784448565f8b5f170a26741c2baafcd4b532524c70a54d5
Securelevel Bypass - This kld gives you permission to load/unload a kld and modify a sysctl value even if you aren't root and securelevel is higher than 0.
2a0b20d98a3ea5ceca6c235d0dcd59e29d5642d989f65b4e5095adf6f65c0485
Anti Anti Sniffer Patch - Linux kernel patches to hide a sniffer from the most known anti-sniffers.
7898d92bbea3bdade89593e2f3ef566f7eaca0acda46611ec918606a1e054c0f
Kstat is a tool for Linux which can find an attacker in your system by a direct analysis of the kernel via /dev/kmem, bypassing the hiding techniques of the intruder (kernel static recompilation/use of LKMs). Kstat can find the syscalls which were modified by a LKM, list the linked LKMs, query one or all the network interfaces of the system, list all the processes and much more.
88b0b99c154e47fea38908d1d46542850be4215cd28ce2024ba4ade238b560a1
Ksec (Kernel Security Checker) is a tool for FreeBSD and OpenBSD which can find an attacker by direct analysis of the kernel via /dev/mem, bypassing the hiding techniques of the intruder (kernel static recompilation/use of LKMs). KSec can find the modified syscalls from userspace, detect the promisc interfaces, find the modifications applied to a protocol and much more.
1a4530115327bcbd02ef7104acaefc72ddfea1d0db0e12252f7b0ee3fdfa0a1f
Eshell.c is a encrypted bindshell type backdoor which has a server daemon and client with AES encryption via libmix.
c32ad105680ad262b5dca88fcaaaf43d24a5994d3d79f9243bfc0001ca76c38b
Packet Storm exploits for the year 2000!
4ae50131fa96b7884e5a06211b6fd3aa3bd9cddb32775d54716fe237e1df0a77
iplog is a TCP/IP traffic logger capable of logging TCP port scans, TCP null scans, FIN scans, UDP and ICMP "smurf" attacks, bogus TCP flags, TCP SYN scans, TCP "Xmas" scans, ICMP ping floods, UDP scans, and IP fragment attacks. It currently runs on Linux, FreeBSD, OpenBSD, BSDI and Solaris.
cc3da7b6f360ff25455e5ae7c95d7377de332deb23f6dcb5c1ea11e563702fff
Georgi Guninski security advisory #31 - There is a security vulnerability in Windows Media Player 7 exploitable thru IE which allows reading local files and executing arbitrary programs. The problem is the WMP ActiveX Control which allows launching javascript URLs in arbitrary already open frames. This allows taking over the frame's DOM. Includes exploit code. Demonstration available here.
11004b7cb48703aa71daec5f42163b6badbcc9bd0443de3f14cd799110e779d8