exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 8 of 8 RSS Feed

SAC

S-A-C Team

...:::S-A-C Team:::...

Security-Analyzing-Community consists of freaks who are learning and practising network security and more.

nsniff-0.1.2.tar
Posted Jul 29, 2003
Authored by sac, LexLufix | Site sac.cc

Packet capturing and network monitoring tool. Contains all the basics for monitoring network traffic. Tested on NetBSD and Linux. v0.1.2

systems | linux, netbsd
SHA-256 | f728d951a0777e163cc1aedce8b286b17370b9ae1406810579f65d8222bee865
sxor.tar
Posted Jul 29, 2003
Authored by sac, LexLufix | Site sac.cc

A program that XORs the bytes of a given file with a specified key to encrypt the file. With the same file, the file can be decrypted.

SHA-256 | c84a3fd78621e6c95212d285b0b26130d5635439914934859ea3be8a332cb554
56kill.pl
Posted Jul 29, 2003
Authored by sac, Wel | Site sac.cc

A perl script which simulates a ATH+++ against 56k modems.

tags | perl
SHA-256 | efa96a80d2dee541400bf91786d5553ce3eeca8c5bd19f14b8b391d04285ed9e
zappa-0.2.c
Posted Jul 28, 2003
Authored by sac, Soeren Bleikertz | Site sac.cc

A backdoor which waits for an ICMP packet and then connects with a UDP server on the client. v0.2

tags | udp
SHA-256 | f7ee9dcfe3b1e7c2bde267a0510f1210573dc52b3c5ad843f4436f19feec2445
ippcheck-0.1.6.tar
Posted Jul 27, 2003
Authored by sac, LexLufix | Site sac.cc

Scans an IP range and checks is a specified port is open for TCP connections. Can also search for specific parts in strings which the servers return. TCP RAW is not fully implemented.

tags | tcp
SHA-256 | 5f26393e2a0d14d3a912b9f88ea34961da5d1612660ca4e6ef10d46898155e30
nsniff-20021019.tar
Posted Jul 27, 2003
Authored by sac, LexLufix | Site sac.cc

Packet capturing and network monitoring tool. Contains all the basics for monitoring network traffic. Tested on NetBSD and Linux.

systems | linux, netbsd
SHA-256 | b391ac1d3f92a701211db0c0e84bb25f662fa0e6fd9f0c7ae5f66be100ff5cea
zappa.c
Posted Jul 27, 2003
Authored by sac, Soeren Bleikertz | Site sac.cc

An advanced backdoor which waits for a ICMP packet and then connects to a UDP server on the client.

tags | udp
SHA-256 | a82f0882beed30e7c614cc2eabc39c2192750969a622ff0f723746be51b66bb6
logo.jpg
Posted Jan 3, 2003
Authored by sac

SAC logo

SHA-256 | a8039da8400f941aef846844e4711220d1fad96871832aabfd294c0c7caf9a1d
Page 1 of 1
Back1Next

Top Authors In Last 30 Days

Recent News

News RSS Feed
US Senators Propose Law To Require Bare Minimum Security Standards
Posted Nov 27, 2024

tags | headline, government, usa, password
Telco Engineer Who Spied On Employer For Beijing Gets 4 Years
Posted Nov 27, 2024

tags | headline, government, privacy, usa, phone, china, cyberwar, spyware, voip
New York Fines GEICO And Travelers $11.3 Million In Data Breach Cases
Posted Nov 27, 2024

tags | headline, hacker, government, privacy, usa, data loss
ProjectSend Vulnerability Exploited In The Wild
Posted Nov 27, 2024

tags | headline, hacker, flaw
CyberVolk Analysis Explores Ransomware, Hacktivism Connections
Posted Nov 27, 2024

tags | headline, hacker, malware, russia, cybercrime, cryptography
Russian Cyberspies Hacked Building Across Street From Target For W-Fi Attack
Posted Nov 25, 2024

tags | headline, hacker, government, russia, wireless, spyware
Cyberattacks Cost British Businesses $55 Billion In Past 5 Years
Posted Nov 25, 2024

tags | headline, malware, britain, cybercrime, fraud, cryptography
How The ZX Spectrum Became A 1980s Icon
Posted Nov 25, 2024

tags | headline, science
China Has Pwned Thousands And Thousands Of Telco Devices
Posted Nov 25, 2024

tags | headline, government, privacy, usa, china, cyberwar, spyware
Here's What Happens If You Don't Layer Network Security Or Remove Unused Web Shells
Posted Nov 22, 2024

tags | headline, government, privacy, cybercrime, data loss, japan
View More News →
packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close