exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 25 of 25 RSS Feed

Files

pam_shield Null Routing PAM Module 0.9.5
Posted Jan 13, 2011
Site heiho.net

pam_shield is a PAM module that uses null-routing or iptables to lock out script kiddies that probe your computer for open logins or easy guessable passwords. pam_shield is meant as an aid to protect public computers on the Internet.

Changes: shield_purge would delete entries that were still active, causing the delete-rule trigger to never be executed in some cases. This bug has been fixed.
systems | linux, unix
SHA-256 | 30593cbebd37bd26ba4c311caa7743df1fe19e4900f64d0cfe1380424f07d719
pam_shield Null Routing PAM Module 0.9.4
Posted Sep 6, 2010
Site heiho.net

pam_shield is a PAM module that uses null-routing or iptables to lock out script kiddies that probe your computer for open logins or easy guessable passwords. pam_shield is meant as an aid to protect public computers on the Internet.

Changes: A number of bugs were fixed. The configuration parameters for allowing missing DNS entries and reverse DNS entries are now handled properly. When the trigger command fires, a check is now made whether the trigger executed successfully. Syslogging is now done with the AUTHPRIV facility. A possible pointer reference bug was fixed. The trigger command now uses IP blackholing. A lot of explanatory text about configuring the PAM stack was added to the INSTALL file.
systems | linux
SHA-256 | c95daf9320832ac6105404ee8aeb842a90a9329e42bf719ab846810368290969
sptrace LKM ptrace Control
Posted Mar 19, 2009
Authored by Krzysztof Burghardt | Site underground.org.pl

sptrace is a secure ptrace() module for Linux. It limits users' access to the ptrace() call. It can disable ptrace altogether, or if you add a ptrace group to your system, only users in that group will be able to use ptrace().

Changes: This version was adjusted to reflect changes in Linux, and was tested with kernel 2.6.23. Support for the 2.4 line is still there, but it is no longer tested.
systems | linux
SHA-256 | 6930bc9c9ee364d44e11ca82990ed89fcb6f0fbb39d10cfb065b9a069d1253d2
useless-vmsplice.tar.gz
Posted Feb 13, 2008
Authored by toorandom

This is a kernel module for Linux 2.6 to replace vmsplice() function with another that does nothing. The purpose of the module is to evade the attacks to the system call logging to kernel messages the usage attempts of vmsplice() with the arguments.

tags | kernel
systems | linux
SHA-256 | 1126405085dd9c722f1b66ad864cd6e43f1a2622480e44610d778cb191a047d7
sptrace-1.4.1.tar.gz
Posted Dec 29, 2007
Authored by Krzysztof Burghardt | Site underground.org.pl

sptrace is a secure ptrace() module for Linux. It limits users' access to the ptrace() call. It can disable ptrace altogether, or if you add a ptrace group to your system, only users in that group will be able to use ptrace().

systems | linux
SHA-256 | 5b12b0751d6b446ffc9e5227b0c97bbcef5ba151fe0717c374a2e204b1422aa5
uidbind-lsm-0.4.tar.gz
Posted Jun 11, 2007
Authored by Roberto De Ioris

UidBind is a simple LSM module that restricts calls to the bind() function to the UID/GID defined in a configfs tree.

systems | linux
SHA-256 | e5d287f1aa4ef3760b2c7204dc3a3a5bcc53b538f48c31e8062ab09a988b8ae5
digsig-1.3.2.tar.gz
Posted Nov 20, 2005
Site sourceforge.net

DigSig kernel load module checks the signature of a binary before running it. It inserts digital signatures inside the ELF binary and verifies this signature before loading the binary. It is based on the Linux Security Module hooks (standard in main stream Linux kernel 2.5.66 and higher). Therefore, it improves the security of the system by avoiding a wide range of malicious binaries like viruses, worms, Trojan programs, and backdoors from running on the system.

tags | worm, kernel, trojan
systems | linux
SHA-256 | 71a9882698f37ed54e72a04fb21ecad41b68f381a335ddc601301d49c752b135
portknock-sshd_lkm.c
Posted Sep 13, 2004
Authored by Bugghy | Site vaida.bogdan.googlepages.com

Kernel module using portknocking to get sshd spawned after challenging a list of specified daemons. Designed for 2.4 kernels.

tags | kernel
systems | linux
SHA-256 | 2303c404a77a1d6f3f56d085ebc66a8d7c5ec6c8da1d01103b154df38163e80c
sptrace-1.4.0.tar.gz
Posted Aug 13, 2004
Authored by Krzysztof Burghardt | Site underground.org.pl

sptrace is a secure ptrace() module for Linux. It limits users' access to the ptrace() call. It can disable ptrace altogether, or if you add a ptrace group to your system, only users in that group will be able to use ptrace().

systems | linux
SHA-256 | 925d39bcb5258c0d96f619078df465b16b74d54e5578f6050b89569e1a9e3f5f
write-filter_lkm.c
Posted Jul 26, 2004
Authored by Bugghy | Site vaida.bogdan.googlepages.com

Linux kernel module that will filter writes for the 2.4 kernel series.

tags | kernel
systems | linux
SHA-256 | 0ecb743a9551bc4043cfabca5eea5394543c2ad4e7287889998590e34e3126a6
uname_lkm.c
Posted Jul 26, 2004
Authored by Bugghy | Site vaida.bogdan.googlepages.com

Linux kernel module that will fake uname output for the 2.4 kernel series.

tags | kernel
systems | linux
SHA-256 | d20de33de4d5fa22a3db75f01fb41451871e54126d92a933a2f391636e6d7d5a
yinyang-1.0.zip
Posted Jan 6, 2004
Authored by Primac | Site yinyang.sourceforge.net

yinyang is a kernel module used to detect a file opening and passes that information to a daemon for action such as logging file transactions, anti-virus checking, and other file activities. Ideal for real-time on-access file scanning.

tags | kernel, virus
systems | linux
SHA-256 | d203f08bf9f7f8d70175d2752601233678644c81319fd93f6eb776353c2f91d4
mod_icmp.c
Posted Nov 21, 2003
Authored by fryxar | Site geocities.com

This linux kernel module acts like an icmp proxy for echo/echo-reply packets at kernel level, preventing icmp tunnels through firewalls or directly to the server it is installed on.

tags | kernel
systems | linux
SHA-256 | 9fad32f633cbf5845c1c9aa19434551345fd747ac16e91b836ef8dfa81ef6435
sexy-socket.c
Posted Oct 30, 2003
Authored by DownBload | Site ii-labs.org

Sexy-SOCKET v0.1 is a Linux LKM which restricts creation of AF_INET sockets to the root account only. Works on kernels v2.2.x and 2.4.x.

tags | kernel, root
systems | linux
SHA-256 | a3c145dd51bd805728f98d8a91e71034354796aadf906e473ed5780486e2c771
frontkey.tgz
Posted Aug 26, 2003
Authored by ins1der

Remote administration kernel module designed for the 2.4 series. It replaces system calls by inserting a push ret at the beginning of system_call, making the program jump to specified code. It provides a remote terminal backdoor through SYS_read hooking which means you can enter the box through any open tcp port. The connection is XOR encrypted and the module hides ports and pids. It also hides itself from vmalloc structure scanning and lsmod. Tested on Redhat 7.2 and 8.0. Currently lacks SMP support and is not considered stable so please exercise caution when utilizing this.

tags | remote, kernel, tcp
systems | linux, redhat
SHA-256 | 6b9d7bae3d68b1249acacb7222865ed7c41cc99ea8d9bdfa1e45104e265d2741
lkminject.sh
Posted Apr 3, 2003
Authored by truff

lkminject is a script that builds a binary which will allow you to inject a module inside of a kernel module.

tags | kernel
systems | linux
SHA-256 | 20a13dd3a35002ac4722687a293c51b5fe9af4d0bed3092f3e47e75c4ddcc65e
fuckptrace.c
Posted Apr 2, 2003
Authored by truff | Site projet7.org

fuckptrace is a Linux kernel module used for bypassing anti-ptrace protection used against the reverse engineering process.

tags | kernel
systems | linux
SHA-256 | 4ae4703493e86a63a0d13935e9e14568b86026565924f9ba7e6b114fcc7646ee
nfbypass.c
Posted Apr 2, 2003
Authored by truff | Site projet7.org

nfbypass is a Linux kernel module for the 2.4.x series which, when inserted, will bypass netfilter rules.

tags | kernel
systems | linux
SHA-256 | c92278ac9f69f9e3fce669b4bdaf7609692c9cd2074111ab285fc98a64dc7c63
hmod-0.2.tar.gz
Posted Dec 3, 2002
Authored by Amlet0 | Site hackblaze.org

Hmod v0.2 is a linux module which hides and shows other modules.

systems | linux
SHA-256 | 5b08628ff7b72d610c04a0ae1c489b7bb653d22926fe55c2d21cc2c6d2a608b7
stealth.c
Posted Aug 27, 2002
Authored by Sean Trifero | Site innu.org

Stealth.c is a Linux 2.2.x kernel module which discards packets that many OS detection tools use to query the TCP/IP stack. Includes logging of the dropped query packets and packets with bogus flags.

tags | kernel, tcp
systems | linux
SHA-256 | 617372d951b886ece66db028d0d134637d1a62f13ff55eb4e94be19b042ea7a4
khideee.c
Posted Jul 31, 2002
Authored by Michele Dallachiesa aka xenion | Site acidlife.com

This Linux LKM allows you to hide tasks to KSTAT, a tool used to find attackers in your system by a direct analysis of the kernel through /dev/kmem. StMichael_LKM 0.10 (default installation) will not detect this. Tested on Linux 2.4.x kernels.

tags | kernel
systems | linux
SHA-256 | dc49efaef89afbc43c5d83140237d54e06f4f046160e60f98d081ee41e55de3e
krnsniff.c
Posted Dec 7, 1999
Authored by Kossak | Site rnl.ist.utl.pt

krnsniff.c v0.1a - A kernel based sniffer module tested on linux-2.2.5 kernel. Nearly undetectable if a module hider is loaded.

tags | kernel
systems | linux
SHA-256 | 18adb3e3c161671b9451fb3207ef6e8e30b362da78a994aad81922f1208f11ce
cocain.c
Posted Oct 7, 1999
Authored by Pmsac

Module to hide processes and files.

systems | linux
SHA-256 | 1dacfe7599201c72d4a5e36edbdc7611d0047682d8b6c3f2b694862f4e8fb406
krnhide.c
Posted Oct 7, 1999
Authored by Kossak | Site rnl.ist.utl.pt

Generic module hidder, for linux 2.2.x kernels. Hides the last module installed.

tags | kernel
systems | linux
SHA-256 | 6a208911f56caefd20bec7fdb917d6c6e42897a877c76fb78c4b54558227d418
megas.c
Posted Oct 7, 1999
Authored by Pmsac

Module to retrieve privilege to processes.

systems | linux
SHA-256 | 3c1a53d2029af8aaf19ab04983497d4575d25c39406d48c1321172829309cb20
Page 1 of 1
Back1Next

Top Authors In Last 30 Days

Recent News

News RSS Feed
US Senators Propose Law To Require Bare Minimum Security Standards
Posted Nov 27, 2024

tags | headline, government, usa, password
Telco Engineer Who Spied On Employer For Beijing Gets 4 Years
Posted Nov 27, 2024

tags | headline, government, privacy, usa, phone, china, cyberwar, spyware, voip
New York Fines GEICO And Travelers $11.3 Million In Data Breach Cases
Posted Nov 27, 2024

tags | headline, hacker, government, privacy, usa, data loss
ProjectSend Vulnerability Exploited In The Wild
Posted Nov 27, 2024

tags | headline, hacker, flaw
CyberVolk Analysis Explores Ransomware, Hacktivism Connections
Posted Nov 27, 2024

tags | headline, hacker, malware, russia, cybercrime, cryptography
Russian Cyberspies Hacked Building Across Street From Target For W-Fi Attack
Posted Nov 25, 2024

tags | headline, hacker, government, russia, wireless, spyware
Cyberattacks Cost British Businesses $55 Billion In Past 5 Years
Posted Nov 25, 2024

tags | headline, malware, britain, cybercrime, fraud, cryptography
How The ZX Spectrum Became A 1980s Icon
Posted Nov 25, 2024

tags | headline, science
China Has Pwned Thousands And Thousands Of Telco Devices
Posted Nov 25, 2024

tags | headline, government, privacy, usa, china, cyberwar, spyware
Here's What Happens If You Don't Layer Network Security Or Remove Unused Web Shells
Posted Nov 22, 2024

tags | headline, government, privacy, cybercrime, data loss, japan
View More News →
packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close