Computer Crime Research Resources
TEMPEST Monitoring in the Real World
TEMPEST Monitoring - How it's Done
Rise of the TEMPEST
Electronic Eavesdropping Machines for Christmas?
The Moller Paper on TEMPEST
Seline Paper on TEMPEST
EMP & TEMPEST Protection for Facilities
The ORIGINAL Wim Van Eck Paper on TEMPEST
Reception of Electromagnetic Radiation from RS232 Cables
Complete TEMPEST Solutions
TEMPEST in a Teapot
The FAA and HERF
HERF - High Energy Radio Frequency
Hardening your Computing Assets against HERF
Killing your Enemies Computer for Fun & Profit
Rumors about HERF Guns
HERF & EMP
Electromagnetic Effects
Police Prepare Stunning End for High-Speed Car Chases
Electromagnetic Methods
Destructive Energy Devices
Magnetic Manipulation of the Mains
MIT Distribution Site for PGP - Pretty Good Privacy
PGP Phone
Nautilus Secure Phone Software
Shredder95
Garbage Can
ICQ Internet Pager
Misc Security Programs
KeyLogger95 V. 2.0
BCWipe for Windows 95/Windows NT 4.0 .
Password Cracking Programs
Computer Security Tools
More Security Tools
MS-DOS System Security Tools
UNIX General Security Tools
MacIntosh General Security Tools
Security Tools Collection
Security Tools for Internet Administrators
Wall's List of Computer Security Tools
Computer Security Tools & Resources
Security Administration Tools
Encryption & Security Tools
Dave Central - Encryption Tools Archive
FreeWare Encryption Tools
Anti-Virus Tools Shareware & Freeware
Anti-Virus Tools for 1997
Anti-Virus Tools
Anti-Virus Tools and Techniques
Virus and Anti-virus Information
Anti-Virus Scanners for Windows
Anti-Virus Scanners for Windows 95
Yahoo List of Encryption Products
There Be Dragons - Another Bellovin paper discussing the various attacks made on att.research.com. This paper is also the source for this page's title.
An Advanced 4.3BSD IPC Tutorial -This paper describes the IPC facilities new to
4.3BSD. It was written by the CSRG as a supplement to the
manpages.
Network (In)Security Through IP Packet Filtering - Why packet filtering is a difficult to use
and not always a very secure method of securing a network
Linux Stack OverFlows
- An HTML page with sample utilities describing stack
overruns on Linux
Thinking About Firewalls - A general overview of firewalls, with tips on
how to select one to meet your needs.
COPS and Robbers -
This paper discusses a bit of general security and then
goes into detail reguarding Unix system
misconfigurations, specifically ones that COPS checks for
Sequence Number Attacks
- A brief article that gives an overview of TCP sequence
number attacks. (Includes rfc1948 which shows how to
protecte against TCP sequence no. attacks.
Newbie Files |
Un!x: A Hacking Tutorial- read this if you haven't read it.
The Ultimate Guide to Hacking and Phreaking- this is good for the newbie's thing is he
doesn't go to deep into Phreaking
Newbie Help on Virii-
just to get people started off on how virri works and
stuph
A Beginners Guide to Hacking Un*x- a txt file designed for the newbie's, if your
not a newbie don't read it you'll be wasting time.
Unix Tutorial: Part 1-
this is good if your a newbie or a novice, helps out
either way
Unix Tutorial: Part 2-
same as the one above.
Hacking: The State of Mind- tells what you do to become a hacker.
The Basics of Hacking 1: Intro- just an intro to hacking
The Basics of Hacking 2: DECs- about how to hack DEC systems.
The Basics of Hacking 3: Data- its a txt about basic ways to hack data
computers.
The Ethics of Hacking-
The basic ethics of hacker the feeling, goals, etc.
Mentors Last Words- I
consider this the hackers anthem, its on every hacker
sight, and everyone knows what it is if you don't READ
IT!
Social Engineering-
another approach to hack, without the computer.
#hack FAQ- similar to
the 2600 FAQ, its still helpful though
Are you a Hacker?-
well are you?
Unix Hacking Commands-
a list of commands that might come in handy while hacking
The Neophyte's Guide to Hacking - Another guide for beginning hackers that
talks about a wide range of topics
Novice |
Security Holes List-Its
a pretty big list of holes in different types of systems
Administration Hacking-
this is helpful if you haven't read it, read it
Hacking Servers- A
quick approach to hacking servers but its not indepth.
Security Holes- is
about how Security holes manifest themselves in (broadly)
four ways
Basic Networking-
useful gives you an idea of how everything is hooked up
and more.
Security and the Un!x Operating System- This is a useful file that gives you new
approaches to hack
Cracking 101 (the full set)- A pretty long set of lessons on cracking
+ORC's Cracking Guides (the full set)- Read this one! if your intrested in cracking
its better than the others
Excerpts from Various 2600 Articles- its bout 6 different excerpts, the best ones
about hacker A and hacker B, if your bored read it.
Miscellaneous Hacking Text- just some more hacking files
LOD/H's Novice's Guide to Hacking- a good file for anyone.
Watching the Watcher Watching You- a txt file telling you to watch your back.
Concerning Hackers Who Break into Computer
Systems- its a pretty big file
never took the time to read it.
Cryptography FAQ- a
FAQ segmented into 10 different parts.
Darkstorm's 160 pg. Archive of Illicit Philes- a list of files Darkstorm thought were good.
Hacking Techniques-
gives you different styles or approaches to hack.
Unix for the Moderate
Hacking the IRC - The Definate Guide
Why Cryptography is Harder Than it Looks - an essay by Bruce Schneier describing the
many problems unique to developing cryptosystems. It
really is more interesting than it sounds.
Foiling the Cracker -
A Survey of, and Improvements to, Password Security.
Basically a treatise on how to select proper passwords
Advanced |
Internet Worm Source Code- it tells you exactly how it works and what it
did and more
NFS Tracing - read it
is another way to get it
NFS Tricks |
An Introduction to TCP/IP- helpful
Improving the Security of You Site by Hacking
into it- this is helpful, give
actual approaches into hacking.
Technical Hacking: Part One- a file going more indept in the hacking
process.
How to gain super-user access via crontab- made for Unix machienes its a hole in the
crontab
Unix Security Measures-
it about improving security of your Unix system
A Unix Backboor Triggered my a Mail msg- well i have nothing to say.
Government Security Techniques- just some ways that the government secures
there systems and how there techniques to penetrate
systems.
Hacking TRW-this is
definately not written for beginners anyways its how to
hack TRW computers.
Professor Falken's Guide to Code Hacking- ya might want to get this if your intrested in
learning Codes
Security Problems in the TCP/IP Protocol Suite
How to Setup a Secure Anonymous FTP Site
Packets Found on an Internet - A very interesting paper describing the
various attacks, probes, and miscellaneous packets
floating past AT&T Bell Labs' net connection.
IP Hijacking - This
paper discuesses the art of IP hijacking.
The Risks of Key Recovery, Key Escrow, and
Trusted Third-Party Encryption
- A great paper release 27 May 1997 by several of the
biggest names in encryption and computer security,
including Steven Bellovin, Matt Blaze, Whitfield Diffie,
and John Gilmore.
Sockets Frequently Asked Questions - Socket Frequently Asked Questions includes
many examples and source code.
Getting a Handle on Internet Secuity
How to
Hack..... |
How to hack Telenet-
another text file about hacking Telenet
How to get a free account on CompuServe
Misc info on Hacking a System/75- well that sums it up.
Hacking McDonald's Computers- it tells you how to login through telenet and
other good stuph
How to hack VAXes- a
useful file but its not a usual thing to run into a VAX
Hacking Wal-Mart-
tells you how to get passed that phuck Wal-Mart
Armorguard
Hacking Cosmos- a file
to start you off on hacking Cosmos
Telenet: The Secret Exposed- txt file about hacking Telenet
How to hack into Telegard- self explainatory
Misc. |
What to Look for in a Code Hacking Program- I haven't read this one
International Hacking Groups- a list of hacker cliques nationwide
How Mitnick Hacked Tsutomu- exactly what it says.
Text about the Legions of Doom bust- nothing more to say.
Anonymity on the Net-
is a lengthy excerpt from arecent issue of FIDONEWS
concerning individual privacy and the use of aliases or
handles in computer-based communications
Some Interesting text files about a
"hacking" case
Info on researching computer crimes- didn't read this one
Info about InterNet dialouts- a list of internet dialouts
Everything you wanted to know about loops- exactly what it says
Hacking Directories #1-
a huge list of 800 numbers with modems on the other end.
Hacking Directories #2-
a huge list of 800 numbers with modems on the other end.
Hacking Directories #3-
a huge list of 800 numbers with modems on the other end.
Hacking Directories #4-
a huge list of 800 numbers with modems on the other end.
Loops explained- a txt
files explained what loops are and what they do
US LATA Numbers- a
list of US telephone LATA Numbers
About government involvement on the net- nothing more to say
The Constitution in CyberSpace- this is pretty good its kind of like the
Mentor's Last Words, this thing is hanging on my wall in
my room.
Introduction to ANI-
is about Automatic Number Indentification this should be
under phreaking
Computer Crimes--Laws-
Laws that pertain to computer crimes and etc.
Free Speech in CyberSpace- its about how people got in trouble for stupid
stuph on the net.
Computer Crime: Practices, Problems, and
Solutions- self explainatory
An Introduction to the Computer Underground- explains what underground is and explains the
undergrounds forms of media
Computer Privacy vs. 1st and 4th amendment
rights- a little debate between
the two.
Diary Of A Hacker Part 2- this is good you feel like you wrote this.
Diary of A Hacker-
these are really good read them.
Volume One |
gtmhh1-1: Introduction
to hacking, description of telnet, and introduction to
port surfing
gtmhh1-2: Forging
Email 101, and how to spot and track forgeries
gtmhh1-3: Elaboration
on finger, and lesson on fingering through telnet |
gtmhh1-4: How to fight
Usenet spammers
gtmhh1-5: How to fight
Email spammers
gtmhh1-6: How to get
offensive web pages taken off the Web
Volume Two |
gtmhh2-1: Introduction
to the Internet and how it works
gtmhh2-2: Introduction
to Linux
gtmhh2-3: Explanation
of Win95 ping exploit, AKA "killer ping attack"
and also just a basic introduction to ping
gtmhh2-4: Elaboration
on port surfing, and definition of daemons
Volume Three |
gtmhh3-1: How to keep
from being Email bombed, and how to recover if you get
bombed
gtmhh3-2: How to map
the Internet
gtmhh3-3: How to
protect yourself on IRC
Law Editions |
Number One: Intro
Beginners Series |
Issue 1-1: Intro
Issue 2-1: Hacking
into Windows 95
Issue 2-2: Hacking
into Windows 95 pt. 2
Issue 2-3: Hacking
from Windows 3.x, 95 and NT |
Coloring Books |
Yellow Book- A Guide
to Understanding Trusted Recovery
Red Book- Trusted
Network Interpretation [Version 1 7/31/87]
Purple Book-
Guidelines for Formal Verification Systems [4/1/89]
Luscious Orange- DOD
Trusted Computer System Evaluation Criteria [DOD 5200.28]
Green Book- DoD
Password Management Guidelines
Dark Lavender- A Guide
to Understanding Trusted Distribution in Trusted Systems
Brown Book- A Guide to
Understanding Trusted Facility Management [6/89]
Blue Book- Trusted
Product Evaluation Questionnaire
Tan Book- A Guide to
Understanding Audit in Trusted Systems
Light Blue- A Guide to
Understanding Identification and Authentication in
Trusted Systems
Peach Book- A Guide to
Writing the Security Features User's Guide for Trusted
Systems
Pink Book- Rating
Maintenance Phase Program Document
Another Red Book-
Trusted Network Interpretation Environments Guideline
Another Orange Book- A
Guide to Understanding Configuration management in
Trusted Systems
Burgendy Book- A Guide
to Understanding Design Documentation in Trusted Systems
Grey Book-Trusted UNIX
Working Group (TRUSIX) Rationale for Selecting Access
Control List Features for the UNIX System
Lavender Book- A Guide
to Understanding Trusted Distribution in Trusted Systems
Venice Blue-Computer
Security Subsystem Interpretation of the Trusted Computer
System Evaluation Criteria
Aqua Book- Glossary of
Computer Security Terms
Bright Blue- Trusted
Product Evaluation - A Guide for Vendors
Dark Lavender- Trusted
Database Management System Interpretation
Yes Another Orange Book-
A Guide to Understanding Discretionary Access Control in
Trusted Systems
Book (yes its got no color)- Writing Trusted Facility Manuals |
More Stuff |
quake.c - remote
exploit that sends a couple of spoofed udp packets
causing the system to crash.
xtacacs.c - exploit to
trick XTACACS servers to believe that you've disconnected.
vsyslog.txt - Linux
exploit for libc 5.4.38's vsyslog().
hanson.c - This lil
program exploits mIRC's bound sockets, making the client
crash.
ntpptp.c - NT 4.0 SP3
PPTP denial of service attack exploit
ntpwgrabber.txt - A
false FPNWCLNT.DLL can be stored in the
%systemroot%\system32 directory under Windows NT 3, 3.51,
4 which collects passwords in plain text.
latierra.c - An
enhanced version of land.c which works better against NT
SP3 among other things.
rip.c - RIP (Routing
Information Protocol) Version 1 Spoofer
lownoise.txt - Exploit
for Digital Unix v4.0 that let's you create a writeable
/.rhosts file.
Other Sources |
php_exploit.c -
mlog.html and mylog.html w/ PHP dist. can be used to read
arbitrary files.
wwwcount.c - Exploits
Count.cgi, allowing remote exececution of arbitray
commands.
medax_linux.tgz - A
TCP sequence number predictor that also lets you execute
commands.
wm_exploit.c -
Overwrites a buffer in 'wm' from Ideafix package for
Linux, giving root.
udpscan.c - Identifys
open UDP ports by sending a bogus UDP packet and wait for
a response
lizards.txt - Explains
how to get root on Slakware 3.4 from the suid lizards
game
ciscocrack.c - This
contains script and source for decrypting cisco encrypted
passwords.
imaps.tar.gz -
Serveral different versions of the remote imapd buffer
overflow exploit.
evil-term.c - This is
the remote buffer overflow termcap exploit for BSDI
BSD/OS 2.1.
portd.c - A daemon
that listens on a port and provides passworded shell
access.
pingexploit.c - This
lets you send oversized ICMP packets from a unix box just
like Win95.
checksyslog.tgz -
Analyze your system logs for security problems while
ignoring normal behavior
dosemu.txt - On Debian
v1.1, /usr/sbin/dos can be used to read any file on the
system
yaping.0.1.tgz - Yet
another ping for Linux. Packets of size > 65535 octets
are supported
messages.sh - Parses
through /var/adm/messages to see if user typed password
at login prompt.
FreeBSDmail.txt - This
exploit will overwrite a buffer on sendmail 8.6.12
running on FreeBSD 2.1.0.
securelib.tar.Z -
Shared library for SunOS 4.1 and later that will help
protect your RPC daemons
ypsnarf.c - This handy
little program will get you yp domain names, yp maps, and
yp maplists.
YPX - YPX guesses NIS
domain names.YPX will extract the maps directly from
domains.
ftp-scan.c - This
program exploits the ftp protocol to let you scan
services on firewalls.
rdist-ex.c - This will
write past a buffer, straight onto the stack, giving a
root shell on FreeBSD.
ttywatcher-1.1b.tgz -
ttywatcher lets a user monitor and interact with every
tty on the system.
splitvt.c - An older
exploit for Linux that overwrites a buffer in
/usr/bin/splitvt, giving root.
mount-ex.c - All Linux
versions are vulnerable to this buffer overflow attack on
suid mount.
perl-ex.sh -
perl-ex.sh is a simple little sperl script that gives you
a root shell via suidperl.
sndmail8.8.4.txt -
This will explain how to exploit sendmail version 8.8.4
to get root access
irix-xhost.txt - In
default setup for irix, xhost is set to global acess when
someone logs into console
mod_ldt.c - Gives
access to all of Linux's linear memory to user processes
at will, and thus root.
dipExploit.c - Linux
dip Exploit. Overwrite a buffer in do_chatkey(), thus
giving you a root shell.
rexecscan.txt - The
rexecd can be used easily to scan the client host from
the server host.
rpcs.01b.tar.gz - This
is program that is designed to scan subnets for rpc
services.
rxvtExploit.txt -
Exploits a popen() call issued by rxvt on Linux machines,
thus giving a root shell.
nfsbug.c - Demonstates
a security problem in unfsd guessing the file handle of
the root FS.
abuse.txt - A Linux
exploit for Red Hat 2.1. This gives a root shell by
exploitng abuse.console.
xtermOverflo.c - A
program that overwrites a buffer in libXt.so while xterm
is suid to root.
resolv+.exp - Quick
and Simple way to read the /etc/shadow file as well as
many other things
resizeExp.txt -
Another Red Hat 2.1 exploit for resizecons due to lack of
absolute pathnames.
X webcomber - A cool
little tool that lets you search for things (like
hacking) on the web.
gpm-exploit.txt - This
will get root on Linux systems using
/usr/games/doom/killmouse
pingflood.c - This
pings floods a host, thus wasting bandwidth and denying
service.
telnetd exploit - This
will create a shared library that gives a root shell
remotely or locally.
pop3d exploit - Read
the contents of the mail spool of a user when they
connect to in.popd.
popper.txt - Some
versions of (q)popper from qualcomm allow you to read
other user's mail.
vif.tar.gz - This code
lets you have multiple IP addresses for a single
interface.
amod.tar.gz - Amodload
is a tool which allows the loading of arbitrary code into
SunOS kernels.
getethers1.6.tgz -
getthers scans all address on an ethernet and producing a
hostname/ethernet list.
rootkitSunOS.tgz -
Here is another root kit designed for SunOS operating
systems. Lots of cool stuff.
demonKit-1.0.tar.gz -
A suite of trojan programs opening back doors to root on
a Linux system.
eviltelnetd -
telnet-hacked.tgz is a hacked telnet daemon that gives a
root shell w/o password.
cfexec.sh - This let's
you issue arbitrary commands as root on GNU cfingerd
1.0.1.
NFS Problems - Shows
some potential problems with Linux in.nfsd concerning
read-only exports.
cdromvuln.txt - If
Linux CD is mounted w/ suid flag, older suid exploits
will work on live filesystem
vixie.c - On Redhat
Linux systems this will overwrite a buffer in crontab,
thus giving root.
rshd_problem.txt - You
can figure out valid usernames on hosts by examining the
response from in.rshd.
Sol2.4Core.txt -
Solaris 2.4 exploit that allows you to overwrite files
when a suid prog. core dumps.
SolAdmtool.txt - On
Solaris 2.5, the Admintool can be used to create a
writeable /.rhosts file.
irix-netprint.txt - On
IRIX, /usr/lib/print/netprint calls 'disable' without
specifying absolute path.
SYNpacket.tgz - Floods
a port with TCP packets with the SYN bit turned on
causing inetd to segment
login_trojan.c - A
login trojan program to be run at the console to get
other user's passwords.
phf.c - A quick and
easy to scan for hosts that still have the phf bug which
gives /etc/passwd.
phfprobe.pl - This
tries to find out as much information about the person
calling phf as possible.
SYNWatch.tar.gz - This
program watches for TCP packets with the SYN bit turned
on.
pinglogger.tar.gz -
Logs all ICMP packets to a log file so you can see who is
ping flooding you.
screen.txt - On BSDi
systems, you can use /usr/contrbi/bin/screen to read
/etc/master.passwd.
ftpBounceAttack -
Implementation of the ftp Bounce Attack allowing you to
anonymously do things.
grabem.c - A very
stupid/simple program to get passwords from users logging
in on the consol.
pcnfsd.c - Exploit
that allows local users to chmod arbitrary directories on
hosts running pcnfsd.
netcraft.tgz -
Contains various (and older) web security issues and
exploits from Netcraft.
superforker.c - This
is a supercharged version of the classic fork() denial of
service attack
tripwire-1.2.tgz -
Creates a signature of binary files, and then checks to
see if these file were modified.
tcpr-1.3.tar.gz - A
set of perl scripts that enable you to run ftp and telnet
commands across a firewall
syslogFogger.c - This
allows you to write to system logging facilites via UDP
packets to port 514.
ypbreak.c - Lets you
change your username, password, gecos, or shell via
yppasswd daemon.
hdtraq.c - This runs
as a daemon and purportedly creates bad sectors on a hard
drive.
finger_attack.txt - By
recursively fingering a host, you can cause a possible
crash of in.fingerd.
logdaemon.tar.gz -
Version 5.6 of a suite of tcp/ip programs that enhance
network system logging.
suTrojan.c - This is a
replacement program for su that mails you when an attempt
to su is made.
sigurg.c - This code
allows up to kill any process on Linux boxes running
older kernels.
sushiPing.c - On Sun 4
platforms, this trojan ping gives you a root shell when
you make a triggerfile.
webgais.txt - This
will explain how to issue shell commands remotely using
/cgi-bin/webgais.
sushiQuota.c - Another
trojan for Sun 4 machines that is trigger with a
triggerfile.
pcs.tgz - A libpcap
based sniffer that supports multiple interfaces and PPP
(with no filtering).
sfingerd-1.8.tgz - A
replacement for the standard unix finger daemon designed
for security.
gnmp.tar.gz - Generic
Network Message Passing is a simple client server
messaging system
irixmail.sh - Exploit
shell script that gives a root shell on IRIX systems.
lpr Exploit - This
small program exploit the suid root lpr program giving
root.
Xfree86 Exploit -
There is a problem with XFree86 3.1.2 that lets you
overwrite files.
wipehd.asm - Assembly
Language program that will remove the first 10 sectors of
a hardrive
minicom.c - This is an
exploit for minicom on Linux systems that will overwrite
a buffer.
sam.txt - On HP-UX,
the System Administration Manager (sam) can be used to
truncate files.
DenialofService - zip
file illustrating five simple denial of service attacks
on a unix.
xspy.tar.gz - xspy is
a program that makes logins appear on your display.
scan.sh - This is a
perl script that scans subnets and reports if rexd or
ypserv is running.
xscan.tar.gz - scans
subnets for unsecured X clients and automatically logs
results
BSDcron-ex.c - BSD
cron exploit. This program overruns a buffer, giving root
access.
OSF1_dxchpwd - On
OSF1, /usr/tcb/bin/dxchpwd can be used to overwrite any
file on the system.
bindExploit.txt -
Setting SO_REUSEADDR options and calling bind allows user
to steal udp packets.
cloak.c - This program
wipes all traces of a user from a UNIX system.
convfontExploit.sh -
Script that exploits /usr/bin/convfont on Linux systems
to get root access.
marry.c - This program
is a log editor with lots of interesting features.
portscan.c - A Linux
port scanner program that reports the services running on
another host.
dumpExploit.txt - On
Linux systems /sbin/dump can be used to read arbitrary
files.
fingerd.c - This
program is another finger daemon trojan program.
ttysurf.c - This
program listens on ttys and tries to get login and
passwords.
generic_buffer.tgz -
Generic buffer overrun program for Linux, SunOS, and
Solaris.
linux_lpr.c - This
program overwrites a buffer in the suid program lpr, thus
giving a root shell.
SunOS_user.txt - On
SunOS, chsh and chfn use getenv("USER") to
validate the userid of the caller.
kill_inetd.c - This
program causes denial of service by attacking inetd. Runs
on Linux systems.
grabBag.tgz - Tons of
old and miscellaneous exploits from different versions of
unix.
wu-ftpd.sh - This
shell script lets you create a file anywhere on the
system.
sol_mailx.txt - An old
security hole in /usr/bin/mailx still exists in the mailx
on Solaris 2.5
oracle.txt - Discusses
a denial of service attack against older versions of
Oracle Webserver
hp_stuff.tgz - Lots of
exploits for HP/UX from the Scriptors of Doom.
hpjetadmin.txt -
hpjetadmin can be tricked giving away root by a writeable
.rhosts file.
irix-buffer.txt - IRIX
buffer overruns for df, eject, /sbin/pset,
/usr/bsd/ordist, and xlock.
irix-xterm.c - This
will overwrite a buffer in xterm on IRIX systems, giving
a root shell.
irix-iwsh.c - This
will overwrite a buffer in /usr/sbin/iwsh on IRIX 5.3,
giving root access.
irix-printers.c - This
will overwrite a buffer in /usr/sbin/printers on IRIX
systems giving root.
modstat.c - This
program will overrun a buffer in /usr/bin/modstat on
FreeBSD systems.
pine_exploit.sh - This
script is an exploit for pine. It can be used to create
.rhosts files
view_source.txt - On
some httpd distributions, you can use cgi-bin/view-source
to read arbitray files.
sendmail-ex.sh - This
is an exploit script for sendmail 8.7-8.8.2 for FreeBSD
and Linux. Gives root.
smh.c - smh.c is an
exploit for sendmail 8.6.9. It gives a bin owned setuid
shell.
rlogin_exploit.c -
This overwrites a buffer in gethostbyame() on Solaris
2.5.1, giving a root shell.
expect_bug.txt -
Expect does not make handles to pseudo tty's inaccessable
to other processes.
html.txt - Shows
interesting links to put in your HTML pages causing
denial of service.
autoreply.txt -
autoreply(1) can be used to create root owned files with
a mode of 666.
bdexp.c - On older
versions of Linux, this will overwrite a buffer in suid
bdash, giving root.
irix-csetup.txt - Get
root on IRIX via /usr/Cadmin/bin/csetup in conjunction
with /usr/sbin/sgihelp
solsocket.txt - On
Solaris-x86 2.5, any normal user can connect to unix
domain sockets.
lemon25.c - Exploit
for Solaris 2.5.(1) that overwrites a buffer in passwd,
giving root access
reflscan.c - Another
TCP port scanner that escapes logging by using half open
connections.
yp.txt - On YP
systems, when a password expires, the old password is not
required.
bsd_core.txt - On BSDi
3.x, users arbitrarly write files with binary data, but
not overwrite them.
ffbconfig-ex.c - This
program overwrites a buffer in /usr/sbin/ffbconfig on
Solaris 2.5.1 giving root.
FreeBSD-ppp.c - This
will overwrite a buffer in pppd on FreeBSD systems,
giving a root shell.
sol-license.txt - On
Solaris 2.4, if the license manager is running, root can
be obtained.
lin-pkgtool.txt - This
file explains how to get root on Linux system with the
pkgtool program.
startmidi.txt - On
IRIX systems, startmidi can be exploited to obtain root
privileges.
linux_rcp.txt - On
Linux, if you have access to uid 65535 (nobody), then
root can be obtained.
doomsnd.txt - This
will get root on Linux systems by exploiting the doom
sndserver.
solaris_ps.txt - This
will exploit /usr/bin/ps and /usr/ucb/ps on Solaris
systems, giving root access.
dec_osf1.sh - This
script exploits /usr/sbin/dop on DEC unix 4.0, 4.0A, and
4.0B, giving a root shell.
tcp_wrapper.tgz -
Version 7.5 (the latest) of the tcp/ip wrapper for inetd.
(Does logging and monitoring)
rpcbind_1.1.tgz - This
is an rpcbind replacement that includes tcp wrapper style
access control.
breaksk.txt -
Netscape's server key format is susceptible to dictionary
attacks.
irix-dataman.txt -
This file show how to exploit dataman on irix system to
obtain root access.
irix-fsdump.txt - This
is an exploit for /var/rfindd/fsdump that gives root on
irix systems.
qmail.tar.gz - This is
a replacement sendmail-binmail system providing security
and efficiency.
h_rpcinfo.tar.gz -
Allows you to sneak past port filters on port 111 and get
dumps of RPC services.
synlog-0.1.tar.gz -
Synlog monitors half open TCP connections such as
synfloods or synscans.
wrapper-v2.tgz - This
is a generic wrapper to prevent the exploitation of
suid/sgid programs.
solaris_ifreq.c - On
Solaris, users can do control requests on a root created
socket descriptor.
longpath.sh - Shell
script that implements a long path attack causing various
problems on Linux.
logarp.tar.gz - Useful
for seeing if users on your subnet are
"stealing" IP addresses.
aix_dtterm.c - This
will overwrite a buffer in /usr/dt/bin/dtterm on AIX 4.2
PPC, giving root.
irix-wrapper.c - Wraps
programs on IRIX to prevent command line argument buffer
overruns.
irix-df.c - This will
overwrite a buffer in /bin/df on IRIX systems, thus
giving a root shell.
irix-dp.c - This
overwrites a buffer in /usr/lib/desktop/permissions,
giving egid of sys on IRIX.
irix-login.c - This
will overwrite a buffer in /bin/login on IRIX systems,
giving root.
irix-xlock.c - This
will give root by overwriting a buffer in
/usr/bin/X11/xlock on IRIX.
synsniff.tar.gz -
Script in perl which watches for inbound connections
(SYN's) and logs them.
SunOS_crash.txt -
Reading /dev/tcx0 on a SunOS 4.1.4 Sparc 20 causes a
system panic.
imapd_exploit.c - Get
remote root access on Redhat Linux systems by overwriting
a buffer in impad.
xlock.c - On Linux
systems, this will overwrite a buffer in setuid xlock,
giving root access.
elm_exploit.c -
Overwrites a buffer in Elm and Elm-ME+ on Linux via TERM
environ. variable.
daynotify.sh - This
script will exploit a bug in SGI's Registration Software
under IRIX 6.2.
tcpdump.tar.Z - A tool
for network monitoring and data acquisition. (needs
library packet capture.)
sperl.tgz - Overwrites a buffer in the sperl5.001 and sperl5.003, thus giving
root access.
dip-prob.txt - Dip
will allow an ordinary user to gain control of arbitrary
devices in /dev.
nlspath.txt - Exploits
for ping, minicom, su and others on Linux via NLSPATH
env. variable.
solaris_lp.sh - Script
for Solaris that breaks lp, then use lp priv to break
root (or bin, etc...).
AIX_mount.c -
Overwrites a buffer in /usr/sbin/mount on AIX 4.x systems
via LC_MESSAGES.
fdformat-ex.c - This
will overwrite a buffer in /usr/bin/fdformat on Solaris
2.x systems giving root.
<sunos-ovf.tar.gz -
This program is designed to test buffer overflows on
SunOS 4.1.x boxes.
cxterm.c - This
overwrites a buffer in Chinese xterm Linux systems, thus
giving root access.
color_xterm.c - This
will overwrite a buffer in /usr/X11/bin/color_xterm,
giving root on Linux.
tlnthide.c - Allocates
a port and sets up a telnet gateway making it difficult
to trace telnets.
LPRng.tgz - A light
weight printing system especially designed with security
in mind.
utclean.c - This will
remove your presence from wtmp, wtmpx, utmp, utmpx, and
lastlog.
eject.c - Overwrites a
buffer on Solaris 2.x systems in /usr/bin/eject, giving a
root shell.
bind-8.1.1.tgz -
Version 8.1.1 of bind with many improvements - (includes
documentation)
webs099.tgz - A
minimalist web server designed primarily for security and
handles redirects.
talkd.txt - This
explains how to get root remotely by overwriting a buffer
in in.talkd.
udpstorm.tgz - This is
an implenmentation of the udpstorm attack. Works with
Linux.
jakal.c - A
portscanner that avoids tcp-logging by not completing the
3-way TCP handshake.
lin_probe.c - This
overwrites a buffer in /usr/X11/bin/SuperProbe on Linux,
thus giving root.
AIX_host.c -
Overwrites a buffer in gethostbyname() on AIX 4.2 Power
PC, giving a root shell.
connect.c - Lets a
normal user crash AIX 4.1.4, AIX 4.1.5, HP-UX 10.01, and
HP-UX 9.05
sol2.5_nis.txt - This
show how to exploit /usr/lib/nis/nispopulate on Solaris
2.5 systems.
xdm_bugs.txt - It is
possible to deny service from xdm and xdm does not close
file handles correctly.
lilo-exploit.txt - Get
root on the lastest versions of Linux (at the console)
using LD_PRELOAD.
rsucker.pl - Perl
script that acts as a fake r* daemon and logs the
usernames sent from clients.
portmap_5b.tar.gz - A
portmapper that supports access control in the style of
the tcp wrapper package.
irix-login.txt - On
Irix systems /var/adm/badlogin contains failed logins and
passwords in clear text.
iebugs.tar.gz -
Microsoft Internet Explorer bugs one through six in text
and html format.
arnudp.c -
Demonstrates how to send single UDP packets from an
arbitray souce/destination.
cgiwrap-3.22.tgz -
This is a gateway that allows a more secure user access
to CGI programs.
pma.tar.gz - Poor
Man's Access - A daemon that lets you issue shell
commands remotely.
makedir.txt - Programs
to create thousands of directories and to delete these
directories.
tcpprobe.c - This is a
tcp portscanner that shows accepted connections on a
remote host.
locktcp.c - This
program will freeze a Solaris/x86 2.5.1 systems, causing
denial of service.
irix-wrap.txt - This
shows how to get a listing of directories (755) from
cgi-bin/wrap on Irix 6.2.
block.c - Prevents
users from logging in by monitoring utmp and closing down
user's tty ports
tin_problem.txt -
rtin/tin will create /tmp/.tin_log with mode of 0666 in
/tmp and follows symbolic links.
sun_patch.sh - If you
have a sun SPARC, this script will stop all forms of
buffer overrun attacks.
riputils.tgz - This is
a set of routing internet protocol utilities designed for
Linux systems.
test-cgi.txt - Using
the CGI program test-cgi, you can inventory files on
remote systems.
fakerwall.c -This
program lets you send an rwall message from an arbitrary
host of your choice.
bind.txt - This
describes a potenital denial of service problem with
BIND-4.9.5-P1.
X Watch Window - If
you have access permission to a host's X server,
XWatchWin will connect via a network socket and display
the window on your X server.
hide.c - Exploits a
world-writeable /etc/utmp and allow the user to modify it
interactively.
hsh002.c - This is a
neat little shell for experimentation with lots of
interesting features.
nfswatch4.1.tar.Z -
This lets you monitor NFS requests to any given machine
or the entire network.
nfstrace.tgz - The
rpcspy/nfstrace package lets you to perform NFS tracing
by network monitoring.
wuftpd-owrite.sh -
Exploits a bug in wu-ftpd to create or overwrite a file
anywhere on the filesystem
wuftpd-sdump.sh -
Exploit a bug in wu-ftpd to assemble and view the shadow
password file.
shadowyank.c - This
will reconstruct shadow entries from the core file from
ftp daemon segmenting.
ident-scan.c - TCP
scanner that gets the username of the daemon running on
the specified port
ascend.txt - Program
for Linux designed to attack Ascend routers with zero
length tcp offsets.
gzip.txt - While a
file is being compressed with gzip it is world readable.
libc.so.5 - This is a
hacked libc.so.5 for Linux that spawns a shell when a
call is made to crypt().
sdtcm_convert.txt -
This explains to how exploit sdtcm_convert on Solaris
machines to get root access.
mnt.tar.gz - Exploits
a hole in HP-UX 9 rpc.mountd program and lets you steal
NFS file handles.
nfsshell.c - This
should be very useful if you have located an insecure NFS
server.
pmcrash.c - This
allows you to crash ANY Livingston PortMaster by
overflowing buffers.
psrace.c - This code
exploits a race condition in Solaris, thus allowing you
to make a root shell.
rpc_chk.sh - Shell
Script to get a list of running hosts from a DNS
nameserver for a given domain.
seq_number.c - This is
a program that exploits the TCP Sequence Number Generator
bug.
asppp.txt - On Solaris
2.5x86, /tmp/.asppp.fifo can be used to make a world
writeable .rhosts file
kcms.txt - Explains
how to get root on solaris 2.5 by exploiting
/usr/openwin/bin/kcms_calibrate.
remove.c - A universal
utmp, wtmp, and lastlog editor that also compiles under
AIX & SCO.
kmemthief.c - If
/dev/kmem is writeable by normal users, then this program
will get you root.
slammer.tar.gz -
Slammer lets you issue arbitray commands on hosts by
exploting yp daemons.
socket_demon13.zip -
Daemon that sits on a specified IP port and provides
passworded shell access.
solsniffer.c - This is
a version of ESniff.c that has been modified for Solaris
2.X.
xpusher.c - This is a
neat way to send keyboard events to another user's X
window.
Traceroute -
Traceroute is an indispensable tool for troubleshooting
and mapping your network.
sneakin.tgz - A way to
'reverse telnet' from a box behind a firewall that allows
ICMP packets.
qmail_exploit.c - Runs
a qmail system out of memory by feeding an infinite
amount of recipients
telnet_core.txt - On
Linux systems, it is possible to get part of the shadow
file w/ cores
glimpse_http.txt -
Glimpse HTTP (Interface to Glimpse Search Tool) can issue
remote commands.
wuftpd_umask.txt - The
umask for wuftpd 2.4.2-b13 is 002 making files group
writeable by anyone
sgi_cgihandler.txt -
On IRIX systems, /cgi-bin/handler can be used to issue
arbitrary commands.
linux_httpd.c -
Overwrites a buffer in NSCA httpd v1.3 on linux systems,
giving a remote shell.
datapipe.c - Makes a
pipe between a listen port on localhost and a port on a
remote machine.
aixdtaction.c -
Overwrites a buffer in /usr/dt/bin/dtaction via HOME env.
variable, giving root.
seyon_exploit.sh -
Exploit for seyon, giving you the euid or egid of
whatever seyon is suid to.
solaris_ping.txt - On
Solaris 2.x systems, any user can crash or reboot the
system using ping.
ld.so.c - Overwrites a
buffer via LD_PRELOAD env. variable, giving root on
Linux.
innd_exploit.c -
Overwrites a buffer in innd on Linux x86 systems thus
giving a remote shell.
smb_mount.c - This
overwrites a buffer on Linux systems in smbmount from
smbfs-2.0.1.
dgux_fingerd.txt - The
fingerd that ships w/ dgux allows remote execution of
arbitrary commands.
bind_nuke.txt -
Bind8.1.(1) can't update the same RR more than once in
the same DNS packet.
Sendmail.c - Sendmail
exploit.
bsd_procfs.c - In
/proc under FreeBSD 2.2.1, you can modify a setuid
executable's memory.
secure_shell.txt -
Using SSH, a non-root user can open privleged ports and
redirect them.
Brute_web.c - This
program will brute force it's way into a web server
giving a user and passwd
identd_attack.txt - A
massive amount of authorization requests can render a
system unusable.
solaris_telnet.c - A
program designed to attack a Solaris 2.5 box, making it
totally unresponsive.
xf86_ports.txt - A
normal user can run X on a reserved port thus blocking
legitmate daemons.
Xkey.c - Attach
to any X server you have perms to and watch the user's
keyboard
aix_xlock.c - This
will overwrite a buffer in /usr/bin/X11/xlock on AIX 4.x
PPC, giving root.
aix_ping.c - Another
buffer overrun exploit that gives root on AIX 4.x PPC
from lchangelv.
Tcpmon.c - TCP Monitor
v1.0
Strobe (V1.03) - Scans
TCP ports on a target host and reveals which daemons are
running.
Xsnoop.c - This
program allows you to spy on another user's keyboard
events like xkey.c
sgi_systour.txt -
Exploit for /usr/lib/tour/bin/RemoveSystemTour on IRIX
5.3 & 6.2 that gives root.
Pop3.c - Attemps
mulitple username/password guesses on machines running
POP3.
ircd_kill.c -
Overwrites a buffer in ircII daemons, causing a
segmentation fault in the server
aix_lchangelv.c
Another buffer overrun exploit that gives root on AIX 4.x
PPC from lchangelv
zgv_exploit.c - This
will overwrite a buffer in /usr/bin/zgv on Redhat Linux
systems, giving root.
sgi_html.txt - It is
possible to execute remote commands on IRIX 6.3 and 6.4
via /usr/sysadm.
Linux rootkit A
rootkit designed for Linux systems. Comes with ps,
netstat, and login.
Smlogic.c - This is a
fully functional logic bomb designed render Linux systems
unuseable.
Setpwd.c - Sets a
user's password
Portscan.c - A Linux
port scanner program that reports the services running on
another host
Boot.zip - A shell
script to get root access.
Clean.tgz - Clears
your presence off the system logs
Zap.c - Will Fill the
Wtmp and Utmp Entries corresponding to the entered
Username. It also Zeros out the last login data for the
specific user, fingering that user will show 'Never
Logged In'
Ttysurf.C - Spy's on
other TTY's
Hide.c- Code to
exploit a world-writeable /etc/utmp and allow the user to
modify it interactively
Octopus.c - This
little program opens as many sockets with a remote host
as can be supported by both. It catches ^C and kill
commands to shut down cleanly by closing all open
connections before exiting. A remote workstation can be
brought to its knees by saturating its process table via
multiple invocations of sendmail.
Linux_~1.c - Monitors
ip packets for Linux.
Xcrowbar.c -
Source code demonstrates how to get a pointer to an X
Display Screen, allowing access to a display even after
"xhost -" has disabled acess. Note that access
must be present to read the pointer in the first place!
(Originally posted to USENET's comp.unix.security.)
Mount.c - Mount
Exploit for Linux
Pop3hack.c - Hacks
POP3 accounts w/ dictionary file
Readshad.c - Outputs
the shadowed /etc/passwd file on some systems by doing
successive getpwent's.
automount.c - The
automountd exploit for SunOS 5.5.1 let's you issue remote
commands.
Spoofing |
any-erect.c - Another
DNS spoofing type program much like jizz.c. Compiles on
Linux.
smurf.c - Spoofs IMCP
packets resulting in multiple replies to a host from a
single packet.
Jizz.c - A DNS spoofer
that exploits the cache vulnerability in most BIND
daemons
ipspoof.c - The
classic IP spoofer.
sirc4.gz - IRC spoofer
Sniffers |
web_sniff.c - A Linux
sniffer that is designed to retrieve web usernames and
passwords.
Linsniff.c - This is a
simple Linux Sniffer that shows you incoming TCP packets
on most ports.
Esniff.c- Source for a
basic ethernet sniffer
Linux_sniffer.c -
Monitors ip packets for Linux.
Solsniff.c - This is
sunsniffer.c modified to run on dlpi systems
Sunsniff.c - A sniffer
for SUN machines.
Secsniff.c - Another
sniffer.
sniffit.0.3.5.tar.gz -
A very flexible network sniffer that has many interesting
features (like curses)
tcpview.c - Another
sniffer type program designed for Sun OS 4.1
architectures using /dev/nit.
IPInvestigator.tgz -
IPIvestigator is another sniffer that lets you watch
traffic between machines.
snifftest.c -
snifftest.c will try to tell you if a sniffer is running
on Sun machines.
Nuking |
sping.tar.gz - Linux
binary and source of 'sping' which causes Win95 machines
to crash.
Winnuke.c - This sends
Out of Band Data to Win95/NT computers causing panics and
reboots.
Jolt.c - Sends
oversized fragmented packets to Win95 boxes causing them
to lock up.
jping.tar.gz - This is
another simple IMCP flooding program that compiles under
Linux.
puke.c - Spoofs an
ICMP unreachable error to a target, causing connection
drops.
Synk4.c - An improved
and updated Syn Flooder that also supports a random IP
spoofing mode
fping.tar.gz - Like
UNIX ping(1), but allows efficient pinging of a large
list of hosts.
simping.c - Simulates
the "ping -l 65510 victim.host" from Windows95
- also compiles on Linux.
<pong.c - Attacks an
arbitrary host by sending a flood of spoofed ICMP
packets.
land.c - Crash WFW311,
Win95, and WinNT by sending a spoofed packet with the SYN
flag from a host on an open port setting as source the
same host and port.
teardrop.c - Exploits
the overlapping IP fragment bug present in all Linux
kernels and NT 4.0 / Windows 95 (others?)
pentium_bug.c - Denial
of service attack for the Intel Pentium CPU for any
operating system.
Tiger (V2.2.3) - Tiger
attemps to exploit known bugs, holes, and
misconfigurations to attain root
Netcat (V1.10) - Like
Unix cat(1) but this one talks network packets (TCP or
UDP). Excellent tool.
Auto-Hack v1.0- First,
its general overview of AutoHack. It contains two basic
programs inone. A Scanner, which will scan through a set
range of numbers and check for carriers, and a Hacker,
which will "hack" through codes on a given Long
Distance service, such as MCI, Sprint, Metrophone, or
Allnet
Allnet Hacker v4.0-
Good for Telenet, PooPnet, or any other computer that you
want to hack on.
Modem Jammer-
supposedly makes your modem untracable
COPS (Computer Oracle
and Password System) checks for many common Unix system
misconfigurations. I find this tool very valuable, as it
is non-trivial to break a system which has passed a COPS
check. I run it on all the systems I admin. It's getting
a bit old, but it's still an excellent way to
systematically check for file permission mistakes.
ICMPinfo V1.10 -
ICMPinfo is a tool for looking at ICMP messages received
on the running host.
ISS (V1.3) - The
Internet Security Scanner is used to automatically scan
subnets and gather information about the hosts it finds,
including the guessing of YP/NIS domainnames and the
extraction of passwd maps via ypx. It also does things
like check for verisons of sendmail which have known
security holes.
Phobia.tgz - This
utility does a scan of an internet host looking for
various vulnerabilities.
Keyloggings |
Playback - version
1.9c
Keytrap - Keyboard Key
Logger TRS
Keycopy v1.01 -
keystroke recorder great for recording macros
Phantom- A keystroke
recorder and playback for MS-DOS
Windows Key Login - A
keystroke recorder and playback for Windows
Denial of Service (Mail
Bombers) |
Anonymous Mailer- Just
a plain anonymous mailer. Sends one at a time and is very
easy to use.
Fuckin' Sendmail
Unabomber v.1.0 -
forget everything else get this one is easy to use and
very configurable to your own liking.
Kaboom - A great
mailbomber written in ObjectPascal.
Mailbomb - Just a
plain mailbomber.
Up Yours v3.0 - Great
Progam. Has a standard bomber, with a pre-done list of
mail servers to use. Also has a Flamer option, that puts
your victem on as many mailing lists as you would like.
Virii starting with 1 to 9
| Virii starting with I to L
| Virii starting with V to Z
| Virii starting with A to D
| Virii starting with M to P
| Virii starting with E to H
Virii starting with Q to U
Dos Based (to crack Unix Passwd Files) |
XIT 2.0- descent
cracker with Source Code (Borland C) |
PCUPC- The Personal
Computer Unix Password Cracker (PCUPC) is a program which
effectively encrypts passwords from a list of words,
comparing them to any unix etc/passwd file's encrypted
passwords; matching passwords are recorded for future use.
Killer Cracker v.9.5-Disk
Jockey modified Killer Cracker v9.5 - One of the fastest
crackers around, this is the one I use. |
Glide- Cracks the
Win95 password file
Crack v4.1f for OS/2 |
Brute Force - A brute
force approach to hacking Unix password
Cracker Jack v.4.1- is
a Unix password checker/cracker "supposedly the
best" (tried using it always gave me errors |
NewPW Cracker-
Unix-based password cracking program
JackAss v1.1 |
Unix Based (to crack Unix Passwd Files) |
Killer Cracker v9.11-
Unix-based FAST password-cracking program |
Hellfire Cracker V1.3
- very slow but effective
Lard v2.0- Unix-based
password cracking program |
crack-2a.tgz - Unix
Password Cracker 2.0(a) by Scooter Corp. (Comes with
crack dictionary).
Crack v5.0 - Pretty
descent passwd cracker, this is the one I use for Linux |
Miscellaneous |
Windows Screensaver Cracker - I'm not even sure if it works |
Claymore by Grenadier-a
really really bad cracker "Claymore is a brute force
program for Windows. Claymore keeps throwing out
passwords until you are let into the program you are
using it on"
VMS Password cracker v1.0 |
Kill Cmos- Resets CMOS
password
ANV Crack v2.0-
Password Recoverer |
Rawcopy - Removes copy
protection from many games
Date Crack- Turns off
the time-limited demo of most programs |
Breakzip v1.0 - pkzip
password cracker
BreakARJ v1.0 - ARJ
Password Recoverer |
Fastcracker.tgz - This
program is designed to quickly crack DES encrypted
passwords.
486 Disassembler- TC
source for 486 code stream disassembler
8048/8049 Disassembler-
in C (with source) |
ASMGENSQ- This is a
program for users of ASMGEN. It finds most of the text
and some of the data in a .COM file, and creates a .SEQ
file for ASMGEN to use.
ASMGEN- This program
will generate 8086/87/88 assembly code text that is
compatible with the IBM Personal Computer Macro Assembler
from any executable diskette file up to 65,535 bytes. |
ASMGEN v3.0 - This
program will generate 8086/87/88 assembly code text that
is compatible with the IBM Personal Computer Macro
Assembler from any executable diskette file up to 65,535
bytes.
Bubble Chamber Dissassembler Beta Release - This program decompiles *.exe or *.com files
to assembly. |
Intel HEX-
disassembler for 8048 microprocessor
Interactive Disassembler 2.12 - Attempting to unassemble anything using it
requires a lot of manual work and some work can be done
with same efficiency as DEBUG. |
Disaster Disassembler
Dumpprog v2.01 - Take
up to 80486 codes |
Dodi VB Disassembler
HEXedit32 v1.2-
Hexadecimal editor for binary files. |
HEX editor- Just a
basic Hex Editor
Hexcalibur v1.02 - is
a high quality editor designed expressly for examining,
modifying, or otherwise manipulating disk files in their
raw, or binary, format. |
HexEdit 2.1- another
Hex editor
HexIt v0.98á -
80x25/28/43/50 textmode hexeditor. |
HEXpert for Windows -
allows you to view and edit data in hex, octal, binary
and ASCII
Intelligent Disassembler v1.2 |
Interactive Dissassembler v2.05 - Disassembling for Intel 8080, 8085, Z 80,
8086, 80286/287, and 80386/287
PPLD V3.00á1-
decompiles the PCBoard Programming Language Executables
(.PPE) |
Proview- is a
Integrated System Analyzer and Editor
VBDisassembler -
DoDi's Discompiler for Visual Basic 2.0 and 3.0 generates
the complete source files including the forms, modules
and the MAK file, ready to run the program in the VB
environment |
Word List |
Abbreviations - a list
of some abbreviations |
Common strings/character combinations
UN*X words- a list of
words like anonymous and stuph its pretty big. |
ZipCodes- a huge list
of most used zip codes
Phrases: Quick/Easy/Common words |
/etc/host Words-
Jargon- a bunch of
jargon |
The Ultimate- forget
the rest of them get this one, is 27.5 megs unzipped
Dictionary Generators |
Dictionary Maker-
you'll come out with 1.4 gig wordlists. |
© Copyright 1995-1998 CodexOnline - All Rights Reserved - All Wrongs Revenged