exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 25 of 50 RSS Feed

Files

tripp-alpha0.2.tar.gz
Posted Jun 26, 2006
Authored by poplix | Site tripp.dynalias.org

TRIPP is a utility to rewrite incoming and outgoing IP packets. Since it can rewrite both headers and payload, it can be used to configure the tcp/ip stack behavior in order to perform various tasks mainly intended for network tests, simulations and development.

Changes: The ip options handler, a virtual clock for TCP timestamp, a packet delayer, a packet marker, the ability to match packets randomly, the ability to limit rewriting to a specific host only, the ability to pass rules directly via command line, the ability to set payload to empty packets were added. Various other enhancements and changes.
tags | spoof, tcp
SHA-256 | 378bab5802d5cce78688708b5c718ebf003e8ea399862c886cc986351efdd9d9
MacGyver.tar.gz
Posted Mar 8, 2006
Authored by init_null

MacGyver - a program to generate a random valid mac address. Written in c++.

tags | spoof
SHA-256 | 854ad3dd246e900aef43252647a2e46a90d132878af96a79ce95e6759b11672f
tripp-alpha0.1.tar.gz
Posted Feb 22, 2006
Authored by poplix | Site tripp.dynalias.org

TRIPP is a utility to rewrite incoming and outgoing IP packets. Since it can rewrite both headers and payload, it can be used to configure the tcp/ip stack behavior in order to perform various tasks mainly intended for network tests, simulations and development.

tags | spoof, tcp
SHA-256 | 41978f67ad0896e10ec10edd525909b6563e02ab70ca5c0e75d659ae9bfd92f0
p0fspoof.txt
Posted Feb 14, 2006
Authored by poplix | Site tripp.dynalias.org

A paper discussing passive OS fingerprinting and spoofing OpenBSD pf "os" rulesets.

tags | spoof
systems | openbsd
SHA-256 | 0d569aa54bb77d9a75c4c38062ec73498e406c7673560bff04cc7b95c7368e3d
authsyn.tgz
Posted Feb 14, 2006
Authored by poplix | Site tripp.dynalias.org

proof-of-concept tool for performing passive OS fingerprint spoofing to bypass OpenBSD pf firewall rules.

tags | spoof
systems | openbsd
SHA-256 | 5a2ede5d7226dfc63dbb8d460f5f043f9f8b45d0fee869848ed3de681903dd28
ssf.zip
Posted Nov 4, 2005
Authored by Tobias Glemser | Site security-scans.de

Sip Send Fun version 0.2 - a tool to exploit the various weakness in VoIP-Phones. Written in php.

tags | spoof, php
SHA-256 | 4caf3015d8abe09a2efcfb6068961af9f04ed3f7fd73754ebd4bd8ca6b17394a
spoof_tcp.c
Posted Mar 15, 2003
Authored by aspinall

The program spoofs TCP packets and allows the end user to change the header to suit their needs.

tags | spoof, tcp
systems | unix
SHA-256 | c89f428b44acf4f44bdfe97172a691e9b178d716ae7994ef1adce8bec3fde9dd
001.txt
Posted Aug 17, 1999

No information is available for this file.

tags | spoof
SHA-256 | ef2030991eb30587a939f0297f34a7c39089dcc21c7666fffdca55cd228ae9b9
any-erect.c
Posted Aug 17, 1999

No information is available for this file.

tags | spoof
systems | unix
SHA-256 | f024906f39ab7e88b9c9ea518a15fc7c0a15c218689b8ff5271279358b366970
avoidtcpsynattack.txt
Posted Aug 17, 1999

No information is available for this file.

tags | spoof
SHA-256 | ba53cb44f4517734f22775f063dcaf1ec2f39e12fab4808ab724f0ab9ac8ddec
certwarn.txt
Posted Aug 17, 1999

No information is available for this file.

tags | spoof
SHA-256 | 29825574b0612f1fbacede8089617c67339de9af81efb3f31b83793acc719b3e
IP-spoof.txt
Posted Aug 17, 1999

No information is available for this file.

tags | spoof
SHA-256 | f74f47dfe5d1332d3086174ad6a95a57303e89dc8e6e5dfad13c5791a22b579b
ipaddressforgery.txt
Posted Aug 17, 1999

No information is available for this file.

tags | spoof
SHA-256 | 2756d99dee30a9e96ab9cc36116af1541ae32acf4657e0db0f0783265f1f46a3
IPSpoofing.txt
Posted Aug 17, 1999

No information is available for this file.

tags | spoof
SHA-256 | ab37308fc9485cd2f0d331124df7cc0fa3555e756890b42368c2651d59afba61
jester.tgz
Posted Aug 17, 1999
Authored by b4b0 #6, verbal of Team QOS

The Jester Project - "cloak" concept program that is used to spoof from and backdoor rooted servers.

tags | root, spoof
systems | unix
SHA-256 | b21fd079b86e392c2cdbb3ea38d0323796621cfb384d43d4cf91933f38fd3659
MoreMitnick.txt
Posted Aug 17, 1999

No information is available for this file.

tags | spoof
SHA-256 | 5a49ef79d6226700132fccb8a40fedea3f8246c700c2027df239ad03acf2acdb
snoof.tar.gz
Posted Aug 17, 1999
Authored by Doc_Chaos [RoC]

A DNS spoofer based on ADM's "ADMsnOOfID" code. This has been almost completely recoded, for better performance, BIND 8 compatibility, and user defined TTL.

tags | spoof
systems | unix
SHA-256 | 72f1945d2a8f8a86ca42087b9ce4476132a39921d52074060b6ca92ff35cee5e
spoof.0.0.tar.gz
Posted Aug 17, 1999
Authored by CyberPsychotic

spoof v0.0 - TCP packet spoofing library (alpha code).

tags | spoof, tcp
systems | unix
SHA-256 | cffdee9f2d9b75adb92e4880fa931b79a40faa9550934b7dd48879a3b1ffb63c
spoof.0.1.tar.gz
Posted Aug 17, 1999
Authored by CyberPsychotic

Latest release of Spoof Library project by Fyodor, now supports IP/UDP/TCP spoofing.

tags | udp, spoof, tcp
systems | unix
SHA-256 | f1f3a29f0eda2905cd25c35c70a998a26677e6a2da4067ce802c8a0ebf7894a5
spoof.c
Posted Aug 17, 1999
Authored by CyberPsychotic

Sample code showing how to send spoofed packets (for Linux with BSd compatibility in mind).

tags | spoof
systems | linux, unix, bsd
SHA-256 | 7917c689b314392cb9c51b77c88b7dbddeed3317767968937b4153045b14196b
spoof.txt
Posted Aug 17, 1999

No information is available for this file.

tags | spoof
SHA-256 | 3fe53eba3655486ac5eae5b4f044dffac91782b87310697107bc8dd48095fdd3
spoof2.txt
Posted Aug 17, 1999

No information is available for this file.

tags | spoof
SHA-256 | 445b190f3b6acf932316f7b396d84c358e767a21db05c5532573e57aa82597e7
spoof3.txt
Posted Aug 17, 1999

No information is available for this file.

tags | spoof
SHA-256 | 6e8114f39177e5a89b462ffbeaa36526445dd4bd41a04bc94d3c766b3a0d1890
spoof4.txt
Posted Aug 17, 1999

No information is available for this file.

tags | spoof
SHA-256 | 34cebd97b2ff2b348a319adaa10dcadf17aa0016c271173735ee4775bd4f48a7
spoof5.txt
Posted Aug 17, 1999

No information is available for this file.

tags | spoof
SHA-256 | 04531e74d75090946e531a9a0349be01c7e3972329c0d222bb2163b9c82ed8e4
Page 1 of 2
Back12Next

Top Authors In Last 30 Days

Recent News

News RSS Feed
Malware Operators Use Copyright Infringement To Lure In Businesses
Posted Nov 1, 2024

tags | headline, malware, cybercrime, fraud
FakeCall Malware Menaces Android Devices
Posted Oct 31, 2024

tags | headline, malware, phone, google
Chinese Attackers Accessed Canadian Government Networks For Five Years
Posted Oct 31, 2024

tags | headline, hacker, government, canada, china, cyberwar, spyware
Windows Themes 0-Day Bug Exposes Users To NTLM Credential Theft
Posted Oct 31, 2024

tags | headline, hacker, microsoft, data loss, flaw, password, zero day
Yahoo Discloses NetIQ iManager Flaws Allowing Remote Code Execution
Posted Oct 31, 2024

tags | headline, flaw, yahoo
North Korean Nation State Threat Actor Using Play Ransomware
Posted Oct 31, 2024

tags | headline, government, malware, cybercrime, cyberwar, cryptography, north korea
Prosecutors Seek A 17-Year Prison Term For Pentagon Secrets Leaker Jack Teixeira
Posted Oct 31, 2024

tags | headline, government, usa, data loss, cyberwar, military
LottieFiles Supply Chain Attack Exposes Users To Wallet Drainer
Posted Oct 31, 2024

tags | headline, hacker, privacy, malware, data loss, cryptography
Intel And AMD Chips Still Vulnerable To Spectre Flaw
Posted Oct 30, 2024

tags | headline, flaw, intel
AI Bug Bounty Program Yields 34 Flaws In Open Source Tools
Posted Oct 30, 2024

tags | headline, botnet, flaw
View More News →
packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close