exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 25 of 94 RSS Feed

s0ftpr0ject 99 releases

s0ftpr0ject 99 is a security team founded in the summer of 1997. Its research team is fully dedicated to study, describe and resolve security problems related to the network and digital worlds. Tools and documentation available on this site are meant to be used only in order to improve your security and privacy, and not as a way to harm anybody. Any use of the available material that goes against the laws of any state is not condoned by s0ftpr0ject 99, which also cannot be held responsible for any misuse. s0ftpr0ject 99 absolutely dissociates itself from any cracking/hacking/phreaking group that may claim to be in any way collaborating with us. If YOU are going against the law, WE will never have any relation with you. Any remark should be addressed to staff@s0ftpj.org, and abuses reported immediately, with all the necessary informations, to abuse@s0ftpj.org. Also, due to recent facts happened in our country, we point out that we strictly dissociate from any terroristic or eversive groups and their destabilizing and highly deprecable actions. If you, the visitor, are somehow offended by the contents of the site, we ask you to leave this site immediately, and don't go on accessing, reading or downloading anything here. On the other hand, by accessing the main page, you agree with this disclaimer and must consider yourself responsible for any use you make of the informations contained inside. Also, who is currently hosting our page and our mirrors cannot be legally sued for its content.
SniffJoke IDS Evasion Tool 0.4
Posted May 17, 2011
Authored by s0ftpj, vecna | Site delirandom.net

SniffJoke is middleware software for Linux that is managed by a web interface and enables connection scrambling technology, also known as sniffer evasion techniques.

Changes: Implementation of sniffjoke-iptcpopt. Added manpage and docs update. Various other additions and fixes.
tags | web
systems | linux, unix
SHA-256 | 3ddbc8756a222412a41f8e31495b0a877901d1129de1745d59798a8f482a99d4
SniffJoke IDS Evasion Tool
Posted Apr 15, 2009
Authored by s0ftpj, vecna | Site delirandom.net

SniffJoke is middleware software for Linux that is managed by a web interface and enables connection scrambling technology, also known as sniffer evasion techniques.

tags | web
systems | linux
SHA-256 | 5ddc5fffbed7e6ff9f0d22260acc4ad37ef5df2df0d55152510d368444648800
CVE-2007-3896.txt
Posted Oct 15, 2007
Authored by s0ftpj, KJK | Site spacebunny.xepher.net

ShellExecuteFisaco - This is a temporary, third-party patch to help mitigate the URL handling issue discovered in Windows XP and Windows Server 2003.

systems | windows
advisories | CVE-2007-3896
SHA-256 | 0ff695c1b0c5d9e7f8c0aa50738be627a3c4f7d8d77fd0b2c0b6be7970eab8f2
sniffjoke-0.2.tar.gz
Posted May 23, 2007
Authored by s0ftpj, vecna | Site s0ftpj.org

SniffJoke implements sniffer/IDS evasion techniques. SniffJoke runs on a network connected box by selectively applying evasion techniques to sessions involving it. Evasion application is governed by user rules and implemented with a netfilter/ulogd module.

SHA-256 | fa26b5c1f7404da6b5ac31e14a7fe20607c48b583e5075bb8539ff76fdf04493
sniffjoke-0.1.tar.gz
Posted Mar 6, 2007
Authored by s0ftpj, vecna | Site s0ftpj.org

SniffJoke implements sniffer/IDS evasion techniques. SniffJoke runs on a network connected box by selectively applying evasion techniques to sessions involving it. Evasion application is governed by user rules and implemented with a netfilter/ulogd module.

SHA-256 | 235306c2ac3afe63439af4c38b56c6ce848e7c2f06a9113a6c7e7975c14779a1
iam-1.0.2.1.zip
Posted Mar 6, 2007
Authored by s0ftpj, KJK | Site s0ftpj.org

Sandboxing tool for Windows.

systems | windows
SHA-256 | 377947465e7e61277e2c6eaff1e63082f0c4dc92ae72150346049bef6c993b79
apmislay-0.0.1.tar.gz
Posted Mar 6, 2007
Authored by s0ftpj, vecna | Site s0ftpj.org

Apmislay (avoid+privacy+mislay) is a library to make anonymous connections without performance loss. It implements a simple technique based on IP spoofing and suits well for file sharing systems or anonymous transfers of large amount of data.

tags | spoof
SHA-256 | 1361d415c01016679dab321c68085b3417b894004a9cb77ea39617715a4fa9db
bigboo.tar.gz
Posted Mar 6, 2007
Authored by s0ftpj, FuSyS | Site s0ftpj.org

BigBoo is a YABASST, Yet Another Block And Superblock Subversion Tool. It swallows, encrypts and hides your files in a ext2/ext3 or swap partition.

SHA-256 | 8dc8de2c28d02a5a800080fda7db637c17cc5b80323a6992cb451a25b9745367
SABBIAex-0.0.1.tar.gz
Posted Mar 6, 2007
Authored by s0ftpj, vecna | Site s0ftpj.org

SABBIA protocol anonymizes low latency connections by making a continuous and constant padding over the net. This is an example of implementation on a trusted core.

tags | protocol
SHA-256 | 5e527cac19b060ebb445c3a811d23707127e64c157a48427dbddc3de91179817
innova-0.0.1.tar.gz
Posted Mar 6, 2007
Authored by s0ftpj, vecna | Site s0ftpj.org

Innova is a framework that permits to manipulate network sessions starting at layer 3 and is transparent to the application. It runs entirely in userspace on Linux and supports plugins.

systems | linux
SHA-256 | 76a6b396d0382cb1e3ce80a6fdabd05fd9b1230c10e350f7bde29acae52e3420
blastersteg.tar.gz
Posted Mar 6, 2007
Authored by s0ftpj, vecna | Site s0ftpj.org

This code shows how to send hidden data steganographed into a simulation of common (worm) traffic.

tags | worm
SHA-256 | 72789619c48df1f96f8be7684eaa9420f1b13be1f7734eed11122fd57144ff76
sud-1.3.tar.gz
Posted Mar 6, 2007
Authored by s0ftpj, mm_ | Site s0ftpj.org

sud (superuser daemon) permits a user to switch to root privileges and to use a suid program in a nosuid environment. It is based on a client/server model and on the ability to pass file descriptors between processes. sud permits you to choose your authentication method, and your effective credentials will be checked by using a Unix domain socket.

tags | root
systems | unix
SHA-256 | c4fdf9dfc7a58daf75cb37d2bc4d10d3767216e2b8e4861a87c2d274bac252a0
gtpa-0.12c.tar.gz
Posted Mar 6, 2007
Authored by s0ftpj, vecna | Site s0ftpj.org

Generic time path analysis via ttysnoop-0.12c patching.

SHA-256 | 13016e6b61ab15b5890f728bf71f7270d8fdfbbb5dc4099f6534aa603a989044
kstat24_v1.1-2.tgz
Posted Dec 1, 2003
Authored by s0ftpj, FuSyS | Site s0ftpj.org

Kernel Security Therapy Anti-Trolls (KSTAT) is a very powerful security tool to detect many kinds of rogue kernel rootkits. It analyzes the kernel through /dev/kmem and detects modified syscalls as well as various other problems. This version runs on 2.4.x only, and can assist in finding and removing trojan LKMs. It supports network socket dumps, sys_call fingerprinting, stealth module scanning, and more.

tags | kernel, trojan
SHA-256 | 812c5cc62aa476aea9387d2843ecea645455345d2f9415eacffea7e0beea1515
kstat24.tgz
Posted Jun 5, 2002
Authored by s0ftpj, FuSyS | Site s0ftpj.org

Kstat is a powerful tool for Linux v2.4.x which displays information taken directly from kernel structures taken from /dev/kmem. This is especially useful when we can't trust output from usual sources and applications, for example after an unauthorized access to our systems. Effective if something like ps, ifconfig, lsmod, or system calls are patched.

Changes: This is a major update of kstat, since its release for the 2.2.x kernels. This runs on 2.4.x only, and can better assist in finding and removing trojan LKMs. It sports network socket dumps, sys_call fingerprinting, stealth modules scanning and more.
tags | kernel
systems | linux
SHA-256 | 8ee897a12c159a2bc0dc9c6babaec6df62f6271169fe30d9b5a432b2792ee52a
tcc.tar.gz
Posted Jun 5, 2002
Authored by s0ftpj, vecna | Site s0ftpj.org

TCP Congestion paper and proof of concept code - A vulnerability in the TCP protocol affects several OS's, allowing remote denial of service attacks. Includes a netfilter module which implements a new method of blocking the attack. More information on TCP congestion vulnerabilities available here

tags | remote, denial of service, tcp, vulnerability, protocol, proof of concept
SHA-256 | 0edb50b6b224df0e09b02f95c53904eddb7d8941511032d777f824bc13c0fd20
umpf.tar.gz
Posted Jun 3, 2002
Authored by s0ftpj, vecna | Site s0ftpj.org

Umpf is a system for managing encrypted files without using encrypted filesystems such as cfs/tcfs loop-aes/kerneli. Does not require root to run, is lightweight, and transparent.

tags | root
SHA-256 | 3aad55bb1c34d97b342fdc0a9b37279257a60a4cbdf3c450c433f6d11856d3c9
spapem.tar.gz
Posted Apr 17, 2001
Authored by s0ftpj, vecna | Site s0ftpj.org

The Spapem project aims to how how to elude securelevel under *BSD systems by hiding the fact that the system has been rebooted. Includes code to restore the PID, a LKM to change the uptime, a generic rootkit example, a module to remove startup messages, and instructions for patching init(8).

systems | bsd
SHA-256 | 82b43738fe9aaba0129a0e6210d475fb733357a302d34ecc0480bd867274d1d5
ucp.c
Posted Jan 5, 2001
Authored by s0ftpj, Jack McKrak | Site s0ftpj.org

SMS Spoofing Tool - Spoof your SMS by using this code with smsclient.

tags | spoof
SHA-256 | a7a3711d77b652fedd02778c8ac4d72e71b429baf3fe53b63871119f2eef3eb7
seekh_01a3.zip
Posted Jan 5, 2001
Authored by s0ftpj, Valvo | Site s0ftpj.org

L.L.H.M. - Low Level Header Manipulation is a tool hides pieces of information in your files. Works on Win32.

systems | windows
SHA-256 | eccdb1985f2a974e1aacf87cf7ef8144192301a191b8349e4c103473dac78563
thclinbd.tar.gz
Posted Jan 5, 2001
Authored by s0ftpj, bELFaghor | Site s0ftpj.org

THC Backdoor for Linux - This is a simple but useful backdoor for Linux based on a FreeBSD lkm by pragmatic/THC.

systems | linux, freebsd
SHA-256 | 734681babd24cd7bc455259f89ac4b384ee909a5df908ba0169dabc078d2cb69
thcobsdbd.tar.gz
Posted Jan 5, 2001
Authored by s0ftpj, Pigpen | Site s0ftpj.org

THC Backdoor ported to OpenBSD - This is a simple but useful backdoor for OpenBSD based on a FreeBSD lkm by pragmatic/THC.

systems | freebsd, openbsd
SHA-256 | 05fcfdd8024ff5dbbf471ea66e27a53a4139f2377df3255c490eb5dd6a1f349a
obsd4-sock.tar.gz
Posted Jan 4, 2001
Authored by s0ftpj, Pigpen | Site s0ftpj.org

SRaw for OpenBSD is a kld which makes all users able to open raw sockets. Supported protocols are IPPROTO_RAW, IPPROTO_ICMP, IPPROTO_IPIP, IPPROTO_IPV4, IPPROTO_IGMP.

tags | protocol
systems | openbsd
SHA-256 | 300627a1e608cd638ff2fafcf814d528749f49e60213764e8e75763181c9f58e
fbsd4-sock.tar.gz
Posted Jan 4, 2001
Authored by s0ftpj, Pigpen | Site s0ftpj.org

SRaw is a kld for FreeBSD which disables EPERM in socket() and permits to allocate inpcb even if the socket is raw and users haven't root permissions bypassing suser() in pru_attach() functions.

tags | root
systems | freebsd
SHA-256 | 1d9e7f1c99f8c59d6f38efccb713756d713efba1264fdc59cc1c0e336e75b6b1
piove.tar.gz
Posted Jan 4, 2001
Authored by s0ftpj, vecna | Site s0ftpj.org

This FreeBSD module shows how to intercept getpass(3) function and print anything that is typed without terminal echo.

systems | freebsd
SHA-256 | 231f569e4f8c8dfa8c9421da154803e5c86e7b176b954311ca32ed72fd9e91b5
Page 1 of 4
Back1234Next

Top Authors In Last 30 Days

Recent News

News RSS Feed
US Senators Propose Law To Require Bare Minimum Security Standards
Posted Nov 27, 2024

tags | headline, government, usa, password
Telco Engineer Who Spied On Employer For Beijing Gets 4 Years
Posted Nov 27, 2024

tags | headline, government, privacy, usa, phone, china, cyberwar, spyware, voip
New York Fines GEICO And Travelers $11.3 Million In Data Breach Cases
Posted Nov 27, 2024

tags | headline, hacker, government, privacy, usa, data loss
ProjectSend Vulnerability Exploited In The Wild
Posted Nov 27, 2024

tags | headline, hacker, flaw
CyberVolk Analysis Explores Ransomware, Hacktivism Connections
Posted Nov 27, 2024

tags | headline, hacker, malware, russia, cybercrime, cryptography
Russian Cyberspies Hacked Building Across Street From Target For W-Fi Attack
Posted Nov 25, 2024

tags | headline, hacker, government, russia, wireless, spyware
Cyberattacks Cost British Businesses $55 Billion In Past 5 Years
Posted Nov 25, 2024

tags | headline, malware, britain, cybercrime, fraud, cryptography
How The ZX Spectrum Became A 1980s Icon
Posted Nov 25, 2024

tags | headline, science
China Has Pwned Thousands And Thousands Of Telco Devices
Posted Nov 25, 2024

tags | headline, government, privacy, usa, china, cyberwar, spyware
Here's What Happens If You Don't Layer Network Security Or Remove Unused Web Shells
Posted Nov 22, 2024

tags | headline, government, privacy, cybercrime, data loss, japan
View More News →
packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close