what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 51 - 75 of 86 RSS Feed

Files from shadowpenguin

First Active1999-11-05
Last Active2002-07-08
jsy.zip
Posted Nov 5, 1999
Authored by shadowpenguin, DP

Blute force attacker ShirakiYoko for Java.

tags | java
SHA-256 | e2fe49cb5a968a483f7b3eb0adf2c265af332c4317f58d4ab26b5473dd972a51
kakarityo.lzh
Posted Nov 5, 1999
Authored by shadowpenguin

ICQ tool for Win32 that can retrive IP address and port by UIN. Posted by DENPA, Oct.07,1999. http://denpa.lovely.to/

tags | web
systems | windows
SHA-256 | 61eaa07186503231cb8fa8d922f891af833de0b4c5b3e45ae79096cd1d8fc551
logchk.c
Posted Nov 5, 1999
Authored by shadowpenguin

If the access log is wiped by using the log wiper, the logs are not displayed by the last command. However, the general log wipers such as "zap" write the null on the specified entry of logfile, so you can check the log files whether the logs are wiped. This utility shows the all entries, you can analyze the logfile.

systems | unix
SHA-256 | 3d85c540b4466b4f0046f37f7823bf8d909d2cfc7cca3cca4fd844009d00ddb0
ltelnet.tar.gz
Posted Nov 5, 1999
Authored by shadowpenguin

This is the telnet trojan based on GNU telnet. The all operation which is included the server name, username, and password can be logged. This trojan can be installed with non-root user, if the user account is used by many crackers, you can also know the cracking process and the location of rootshell.

tags | root, trojan
systems | unix
SHA-256 | 772aa87aaaff02ac2c8e2fbdb7bac4c795c3cfc7038c374d173d70662003a04c
minatomirai101.lzh
Posted Nov 5, 1999
Authored by shadowpenguin

This is GUI based full connect port scanner for Win95/98/NT.

systems | windows
SHA-256 | b5baa6d469f75c334a6e2f77686ffa588a58410b55241b92d97f3c52d35c4a24
oshare1.c
Posted Nov 5, 1999
Authored by shadowpenguin, R00t Zer0

Exploit code to crash (BSOD) Windows98 machines with malformed packets.

SHA-256 | c18592cd0ddecd34eaa2f74ed2587c3765cbbe4944d27a4857d87fef795ef294
passwd_freebsd.c
Posted Nov 5, 1999
Authored by shadowpenguin

Passwd trojan for freeBSD.

tags | trojan
systems | unix, freebsd
SHA-256 | cdd23a2c21d690c20992f80c2ec62f9026e95849ee543c69944edba7a913e4b0
passwd_irix.c
Posted Nov 5, 1999
Authored by shadowpenguin

Passwd trojan for IRIX. This trojan logs the username and password, and mails such information to you.

tags | trojan
systems | unix, irix
SHA-256 | 09d660e6270d32cdfff43d868a72322ba1e8dab294bc930609334181ca2f9b3c
passwd_linux.c
Posted Nov 5, 1999
Authored by shadowpenguin

Passwd trojan for LINUX.

tags | trojan
systems | linux, unix
SHA-256 | 4db56a2c0f204a8959f80a1ffcf2bf945efa79d4229a6248ed56a139d073c0ab
passwd_solaris.c
Posted Nov 5, 1999
Authored by shadowpenguin

Passwd trojan for Solaris.

tags | trojan
systems | unix, solaris
SHA-256 | ef068708f03fa03d4e1212a40a9379fe4e30c77bae2c0e73b6d1a7b8abed5ae9
passwd_sunos4.c
Posted Nov 5, 1999
Authored by shadowpenguin

Passwd trojan for SunOS4.

tags | trojan
systems | unix
SHA-256 | 6705d48e71bcd62325368a30a22a9fea3ac169cb5d6df54b833142a483c59486
rbackdoor.c
Posted Nov 5, 1999
Authored by shadowpenguin

This is the "/.rhosts" backdoor creation daemon. This is the faked telnetd, if you connect to the telnet port of the target host which is installed this daemon from the specified host, the "/.rhosts" is rewrited to "+ +", you can login to the target host by the "rlogin target -l root". Of course, the telnetd can be used normally.

tags | root
systems | unix
SHA-256 | c32ec321ca871c53d08c5f8fb36a055972ee9910a8d122593a2f2f31efa11dcf
rch.zip
Posted Nov 5, 1999
Authored by shadowpenguin

Very small and useful trojan for Win32. It can be controled by general browser.Posted by DP, Nov.02,1999. http://members.xoom.com/taisaku/

tags | web, trojan
systems | windows
SHA-256 | f6cf31da399b2b0f9dbc5e2e41b1cfa367eaf816fd9fcc243731819dbbf42ef7
sendexp.c
Posted Nov 5, 1999
Authored by shadowpenguin

In the Penguin Toolbox, I published the exploit code that can send and execute a trojan program which is prepared in the attacker host, this is server program which is used by such exploits. This program sends the "*.exe" program to the victim host, and the exploit code executes it.

tags | trojan
systems | unix
SHA-256 | 3785acd89b0627bb0ef8d5130be987022c5b53f167ba149a946ecd9ecf90d7f0
simplestealth.c
Posted Nov 5, 1999
Authored by shadowpenguin

This is the simple half-open and stealth TCP port scanner. In the half-open mode, this program can recognize the OS type of target host.

tags | tcp
systems | unix
SHA-256 | 32e709a661e220b738d8af8a04858a9eada7064b9ef38ccedab2e39d546a9dac
sizer.c
Posted Nov 5, 1999
Authored by shadowpenguin

If you install the ps faker, ifconfig faker, and HRS, the size of such programs will be smaller than original commands. This program adjusts the size of executable program, avoids the size check.

systems | unix
SHA-256 | 2413610b36dcae7b4fba1e18c2f42262d83be3f8ecfc23618f09a66ace891e30
sut_digital.c
Posted Nov 5, 1999
Authored by shadowpenguin

SU trojan for Digital.

tags | trojan
systems | unix
SHA-256 | f864eead797fb8ef81bfa7a1ebcd0e0493d4376e36a4cf31aff05b0607f7977e
sut_irix.c
Posted Nov 5, 1999
Authored by shadowpenguin

SU trojan for IRIX. This trojan logs the passwords. If you install the su trojan correctry, local users or admin fails the first "su", and the password which is inputed to su trojan has been logged to the specified file.

tags | local, trojan
systems | unix, irix
SHA-256 | b9a61aed270653dede216eaf5ac1c259c5ea5419f9ee880e78b1b886f82ed8d5
sut_sol24.c
Posted Nov 5, 1999
Authored by shadowpenguin

SU trojan for Solaris2.4

tags | trojan
systems | unix
SHA-256 | 7d451e5c81e8a9f61f40a23f691d0dbec1c4886050391aaf2366daa9bfa85f92
sut_sol25j.c
Posted Nov 5, 1999
Authored by shadowpenguin

SU trojan for Solaris2.5

tags | trojan
systems | unix
SHA-256 | 55fb124bfca319c507f664170de672439a7c1d8d4cca67cebf1f05fef5b415dd
sut_sun41.c
Posted Nov 5, 1999
Authored by shadowpenguin

SU trojan for SunOS4

tags | trojan
systems | unix
SHA-256 | 4938fe0ec4e5d98391a438fef24aaf9aa7237fd94200a3cdf7746374df1a81cd
sut.c
Posted Nov 5, 1999
Authored by shadowpenguin

SU Trojan Ver2.00

tags | trojan
systems | unix
SHA-256 | 8e2561a86b87d67b0c8aaf035c96eb3b514b397b8adcd4f3282ce1769b701c7b
tcpdump-3.4-ascii.diff.txt
Posted Nov 5, 1999
Authored by shadowpenguin

Patch for tcpdump 3.4 to dump the packet as ascii character. Posted by TIP(webmaster@filez.org), Sep.20,1999. http://filez.org/

tags | web
SHA-256 | 567208256813ad7ca4e9a37ad83d103c956ff7351eeb18934c1e686490012493
tcpshell.c
Posted Nov 5, 1999
Authored by shadowpenguin

This is a backdoor program which can be accessed remotely as telnetd. TDM can not use telnet, rlogin, and ftp command, but this backdoor can use such command. However, you have to specify the correctry return code in the telnet client. If you can not change the return code, the "CR" code will be added and sent, so you type";" at the tail of your command.

systems | unix
SHA-256 | 64704ae0154649437e7a802c9cf79bf59162f704f6d62c5226fda356a3d9e97e
tdm.c
Posted Nov 5, 1999
Authored by shadowpenguin

This is a backdoor program which can be accessed remotely as telnetd. You can login without username and password to the host which is installed this program. This program also can use as CGI program if you send the compiled binary and change the permittion to 755, you can use the UNIX shell command on the ISP that doesn't accept the shell account.

tags | shell, cgi
systems | unix
SHA-256 | ba8473ce86555572052efc2540c52cbe9ac33dc41a08daf855dc0478fbd66e32
Page 3 of 4
Back1234Next

File Archive:

December 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Dec 1st
    0 Files
  • 2
    Dec 2nd
    41 Files
  • 3
    Dec 3rd
    25 Files
  • 4
    Dec 4th
    0 Files
  • 5
    Dec 5th
    0 Files
  • 6
    Dec 6th
    0 Files
  • 7
    Dec 7th
    0 Files
  • 8
    Dec 8th
    0 Files
  • 9
    Dec 9th
    0 Files
  • 10
    Dec 10th
    0 Files
  • 11
    Dec 11th
    0 Files
  • 12
    Dec 12th
    0 Files
  • 13
    Dec 13th
    0 Files
  • 14
    Dec 14th
    0 Files
  • 15
    Dec 15th
    0 Files
  • 16
    Dec 16th
    0 Files
  • 17
    Dec 17th
    0 Files
  • 18
    Dec 18th
    0 Files
  • 19
    Dec 19th
    0 Files
  • 20
    Dec 20th
    0 Files
  • 21
    Dec 21st
    0 Files
  • 22
    Dec 22nd
    0 Files
  • 23
    Dec 23rd
    0 Files
  • 24
    Dec 24th
    0 Files
  • 25
    Dec 25th
    0 Files
  • 26
    Dec 26th
    0 Files
  • 27
    Dec 27th
    0 Files
  • 28
    Dec 28th
    0 Files
  • 29
    Dec 29th
    0 Files
  • 30
    Dec 30th
    0 Files
  • 31
    Dec 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close