Traducidos
- Manual del Novicio al Hacking
- HACKERS Llaneros Solitarios, Libro sobre el hacking!
- Quien es quien en el mundo del hacking.
- Introduccion al hacking por Wendigo -SHE-
- Introduccion al UNIX por Trader -SHE-
- Bugs de seguridad Windows 95 -By Galahad-
- Bugs de seguridad IEXPLORER 3
- Guia rapida para hackear Novell Netware
- Descripcion-FAQ de IBERPAC
- WarDialer traducido al castellano
- Listado de Numeros 900 conectados a computadoras
- Mas listados de Numeros 900 conectados a computadoras
- Bloquea ordenadores a traves de CHAT
- Generador de diccionarios -TYHS-
- Diccionario de palabras del castellano
- Explicacion de la seguridad en UNIX
- Descripcion del sistema KERBEROS
- Interesante informacion sobre RADIUS
- Como conseguir listas de FTP WAREZ
- Como pinchar una linea telefonica
- Asi son los hackers
- Evita las multas de trafico
- Mejorar la seguridad de tu sistema irrumpiendo en el mismo.
- Agujeros de seguridad se manifiestan (en general) en cuatro modos...
- La Historia de Mitnick
- Explicación Del Bug "PHF"Para conseguir el Fichero /etc/passwd desde tu navegador!
- Asm.zipCurso de ensamblador
- Chat.zipComo bloquear un chat
- Findholes.zipComo encontrar problemas de seguridad
- Gtmbeg.zip
- Gtmbeg2a.zip
- Gtmbeg2b.zip
- Gtmbeg2c.zip
- Gtmbeg3a.zip
- Gtmbeg3b.zip
- Gtmbeg4a.zip ups..Muy bueno todo sobre el hacking, finger,telnet,falsificar e-mail,como detectarlo, y mucho mas ;-P
- Gtmhh1.zip
- Gtmhh2.zip
- Gtmhh3_1.zip
- Gtmhh3_2.zip
- Gtmhh3_3.zip
- Gtmhh3_4.zip
- Hacker.zipComo son,sus perfiles,gustos..formas de actuar
- Hackpage.zip¿hackear alguna web????
- Lanhack.zipUna lan te¿suena?
- Miercsp.zipcompleto manual de irc en Espanich-ole
- Multas.zipVah!! y por que no??,como librarse de ellas
- Newbie.zipimprescidible manual novicio
- Novicio.zip¿has leido lo de arriba?pues igual
- PgPes.zipmanual de pgp en castellano-espanich-ole
- Radius.zippara systemas radius
- Raven.zipExplicacion delos ficheros password de unix
- Ravunix.zipGuia definitiva para hackear unix
- Uncle.zipun clasico de nuestras estanteria,el tio joe
- W95hack.zipHouston we have a problem,no tan seguro
- Wendigo.zipIMPRESCIDIBLE,vale vale aqui esta la "N"
Textos, con site en La Rarriolla
- La Etica del Hacking
- Como hacer fingering via Telnet
- Manual del Novicio Hacker
- Llaneros Solitarios (Libro)
- Introduccion al Hacking
- Guia del Hacking (casi) Inofensivo#1
- Guia del Hacking (casi) Inofensivo#2
- Introduccion al UNIX
- Guia definitiva para hackear UNIX
- Guia rapida para hackear Novell Netware
- HACKERS Llaneros Solitarios, Libro sobre el hacking!
- Introduccion al hacking por Wendigo -SHE-
- Introduccion al UNIX por Trader -SHE-
- Manual del Novicio al Hacking
- Quien es quien en el mundo del hacking
- Programa para hackear WIN95.
- Programas para alentar WINNT " Solo correr en la maquina con NT "
- Programa para scannear puertos IP.
- Programa para crackear la clave del screen saver de windows.
- Programa para sacar a alguien de una maquina UNIX " TALK BOMBER ".
- Programa Nuke de windows para botar a usuarios del IRC.
- HACK FAQ
- Warez Sites
- Algoritmos para generar tarjetas de credito.
- Como falsear E-mail y "pillar" mail falso
- Como el finger puede ser usado como una de las maneras mas comunes de violar zonas privadas de un servidor
- Como los spammers de Usenet son kickeados de sus ISPs
- Mas acerca de los spammers de Usenet
- Como "joder" webs ofensivas
- Internet para "capullos" :)
- Linux Para Principiantes
- Introduccion a TCP/IP
- Mas acerca de TCP/IP
- Guia de Hacking para administradores de sistemas
- Hackear Unix system V
- Hacking avanzado
- Hacking: Un estado mental
- Internet Hacking
- La etica del hacking
- La guia definitiva del Hacking para principiantes
- La guia del Hacking para novicios
- La jerga del Hacker
- Listado de agujeros
- ********PC Hacking
- Sendmail v.8.6.4: Pillar una root shell account
- Sniffer FAQ
- The Inner Circle: Tecnicas de Hacking
- Unix: Tutorial de Hacking
- Diccionario de palabras en castellano
Hold down SHIFT and then hit the mouse button to get something. | |||
---|---|---|---|
|
Overwrites a buffer in gethostbyname(), giving root on AIX 4.x PPC systems. | ||
|
Another buffer overrun exploit that gives root on AIX 4.x PPC from lchangelv. | ||
|
This will overwrite a buffer in /usr/bin/X11/xlock on AIX 4.x PPC, giving root. | ||
|
A Linux sniffer that is designed to retrieve web usernames and passwords. | ||
|
A normal user can run X on a reserved port thus blocking legitmate daemons. | ||
|
A massive amount of authorization requests can render a system unusable. | ||
|
Using SSH, a non-root user can open privleged ports and redirect them. | ||
|
In /proc under FreeBSD 2.2.1, you can modify a setuid executable's memory. | ||
|
This will overwrite a buffer in /usr/bin/zgv on Redhat Linux systems, giving root. | ||
|
It is possible to execute remote commands on IRIX 6.3 and 6.4 via /usr/sysadm. | ||
|
Spoofs IMCP packets resulting in multiple replies to a host from a single packet. | ||
|
Bind8.1.(1) can't update the same RR more than once in the same DNS packet. | ||
|
This is overwrite a buffer on Linux systems in smbmount from smbfs-2.0.1. | ||
|
Overwrites a buffer in innd on Linux x86 systems thus giving a remote shell. | ||
|
This is a fully functional logic bomb designed render Linux systems unuseable. | ||
|
Overwrites a buffer via LD_PRELOAD env. variable, giving root on Linux. | ||
|
On Solaris 2.x systems, any user can crash or reboot the system using ping. | ||
|
Exploit for seyon, giving you the euid or egid of whatever seyon is suid to. | ||
|
Overwrites a buffer in /usr/dt/bin/dtaction via HOME env. variable, giving root. | ||
|
Makes a pipe between a listen port on localhost and a port on a remote machine. | ||
|
Linux binary and source of 'sping' which causes Win95 machines to crash. | ||
|
Overwrites a buffer in NSCA httpd v1.3 on linux systems, giving a remote shell. | ||
|
On IRIX systems, /cgi-bin/handler can be used to issue arbitrary commands. | ||
|
The umask for wuftpd 2.4.2-b13 is 002 making files group writeable by anyone. | ||
|
Glimpse HTTP (Interface to Glimpse Search Tool) can issue remote commands. | ||
|
On Linux systems, it is possible to get part of the shadow file w/ cores. | ||
|
Overwrites a buffer in ircII daemons, causing a segmentation fault in the server. | ||
|
A way to 'reverse telnet' from a box behind a firewall that allows ICMP packets. | ||
|
Runs a qmail system out of memory by feeding an infinite amount of recipients. | ||
|
This is a replacement sendmail-binmail system providing security and efficiency. | ||
|
Allows you to sneak past port filters on port 111 and get dumps of RPC services. | ||
|
Synlog monitors half open TCP connections such as synfloods or synscans. | ||
|
This is a generic wrapper to prevent the exploitation of suid/sgid programs. | ||
|
On Solaris, users can do control requests on a root created socket descriptor. | ||
|
Shell script that implements a long path attack causing various problems on Linux. | ||
|
Useful for seeing if users on your subnet are "stealing" IP addresses. | ||
|
This will overwrite a buffer in /usr/dt/bin/dtterm on AIX 4.2 PPC, giving root. | ||
|
Wraps programs on IRIX to prevent command line argument buffer overruns. | ||
|
This will overwrite a buffer in /bin/df on IRIX systems, thus giving a root shell. | ||
|
This overwrites a buffer in /usr/lib/desktop/permissions, giving egid of sys on IRIX. | ||
|
This will overwrite a buffer in /bin/login on IRIX systems, giving root. | ||
|
This will give root by overwriting a buffer in /usr/bin/X11/xlock on IRIX. | ||
|
Script in perl which watches for inbound connections (SYN's) and logs them. | ||
|
Reading /dev/tcx0 on a SunOS 4.1.4 Sparc 20 causes a system panic. | ||
|
Get remote root access on Redhat Linux systems by overwriting a buffer in impad. | ||
|
On Linux systems, this will overwrite a buffer in setuid xlock, giving root access. | ||
|
This utility does a scan of an internet host looking for various vulnerabilities. | ||
|
Overwrites a buffer in Elm and Elm-ME+ on Linux via TERM environ. variable. | ||
|
This script will exploit a bug in SGI's Registration Software under IRIX 6.2. | ||
|
This program will brute force it's way into a web server giving a user and passwd. | ||
|
A tool for network monitoring and data acquisition. (needs library packet capture.) | ||
|
This sends Out of Band Data to Win95/NT computers causing panics and reboots. | ||
|
Overwrites a buffer in the sperl5.001 and sperl5.003, thus giving root access. | ||
|
Dip will allow an ordinary user to gain control of arbitrary devices in /dev. | ||
|
Exploits for ping, minicom, su and others on Linux via NLSPATH env. variable. | ||
|
Script for Solaris that breaks lp, then use lp priv to break root (or bin, etc...). | ||
|
Overwrites a buffer in /usr/sbin/mount on AIX 4.x systems via LC_MESSAGES. | ||
|
This will overwrite a buffer in /usr/bin/fdformat on Solaris 2.x systems giving root. | ||
|
This program is designed to test buffer overflows on SunOS 4.1.x boxes. | ||
|
This overwrites a buffer in Chinese xterm Linux systems, thus giving root access. | ||
|
This will overwrite a buffer in /usr/X11/bin/color_xterm, giving root on Linux. | ||
|
This program is a random source host UDP flooder that compiles under Linux. | ||
|
Allocates a port and sets up a telnet gateway making it difficult to trace telnets. | ||
|
This is another simple IMCP flooding program that compiles under Linux. | ||
|
A light weight printing system especially designed with security in mind. | ||
|
Sends oversized fragmented packets to Win95 boxes causing them to lock up. | ||
|
This will remove your presence from wtmp, wtmpx, utmp, utmpx, and lastlog. | ||
|
Overwrites a buffer on Solaris 2.x systems in /usr/bin/eject, giving a root shell. | ||
|
Version 8.1.1 of bind with many improvements - (includes documentation). | ||
|
Spoofs an ICMP unreachable error to a target, causing connection drops. | ||
|
A minimalist web server designed primarily for security and handles redirects. | ||
|
This explains how to get root remotely by overwriting a buffer in in.talkd. | ||
|
This is an implenmentation of the udpstorm attack. Works with Linux. | ||
|
A portscanner that avoids tcp-logging by not completing the 3-way TCP handshake. | ||
|
This overwrites a buffer in /usr/X11/bin/SuperProbe on Linux, thus giving root. | ||
|
Overwrites a buffer in gethostbyname() on AIX 4.2 Power PC, giving a root shell. | ||
|
Exploit for /usr/lib/tour/bin/RemoveSystemTour on IRIX 5.3 & 6.2 that gives root. | ||
|
Lets a normal user crash AIX 4.1.4, AIX 4.1.5, HP-UX 10.01, and HP-UX 9.05 | ||
|
This show how to exploit /usr/lib/nis/nispopulate on Solaris 2.5 systems. | ||
|
It is possible to deny service from xdm and xdm does not close file handles correctly. | ||
|
Unix Password Cracker 2.0(a) by Scooter Corp. (Comes with crack dictionary). | ||
|
Get root on the lastest versions of Linux (at the console) using LD_PRELOAD. | ||
|
Perl script that acts as a fake r* daemon and logs the usernames sent from clients. | ||
|
An improved and updated Syn Flooder that also supports a random IP spoofing mode. | ||
|
A portmapper that supports access control in the style of the tcp wrapper package. | ||
|
On Irix systems /var/adm/badlogin contains failed logins and passwords in clear text. | ||
|
Microsoft Internet Explorer bugs one through six in text and html format. | ||
|
Demonstrates how to send single UDP packets from an arbitray souce/destination. | ||
|
This is a gateway that allows a more secure user access to CGI programs. | ||
|
This program is designed to quickly crack DES encrypted passwords. | ||
|
Poor Man's Access - A daemon that lets you issue shell commands remotely. | ||
|
Programs to create thousands of directories and to delete these directories. | ||
|
This is a tcp portscanner that shows accepted connections on a remote host. | ||
|
This program will freeze a Solaris/x86 2.5.1 systems, causing denial of service. | ||
|
This shows how to get a listing of directories (755) from cgi-bin/wrap on Irix 6.2. | ||
|
Prevents users from logging in by monitoring utmp and closing down user's tty ports. | ||
|
rtin/tin will create /tmp/.tin_log with mode of 0666 in /tmp and follows symbolic links. | ||
|
If you have a sun SPARC, this script will stop all forms of buffer overrun attacks. | ||
|
This is a set of routing internet protocol utilities designed for Linux systems. | ||
|
This will attack a target host by sending various sizes and numbers of IP packets. | ||
|
Using the CGI program test-cgi, you can inventory files on remote systems. | ||
|
On AIX systems you can read any file (in hex) on the system with lquerypv. | ||
|
(Computer Oracle & Password System) checks for Unix system misconfigurations. | ||
|
Got access to password or shadow file? Shows what other user's passwords are. | ||
|
This is a general 50,000 word dictionary for use with Crack or other programs. | ||
|
Source code for basic ethernet Sniffer. ( Straight out of Phrack ). | ||
|
This program lets you send an rwall message from an arbitrary host of your choice. | ||
|
Like UNIX ping(1), but allows efficient pinging of a large list of hosts. | ||
|
Simulates the "ping -l 65510 victim.host" from Windows95 - also compiles on Linux. | ||
|
This describes a potenital denial of service problem with BIND-4.9.5-P1. | ||
|
Attacks an arbitrary host by sending a flood of spoofed ICMP packets. | ||
|
A DNS spoofer that exploits the cache vulnerability in most BIND daemons. | ||
|
Another DNS spoofing type program much like jizz.c. Compiles on Linux. | ||
|
Exploits a world-writeable /etc/utmp and allow the user to modify it interactively. | ||
|
This is a neat little shell for experimentation with lots of interesting features. | ||
|
This lets you monitor NFS requests to any given machine or the entire network. | ||
|
The rpcspy/nfstrace package lets you to perform NFS tracing by network monitoring. | ||
|
Exploits a bug in wu-ftpd to create or overwrite a file anywhere on the filesystem. | ||
|
Exploit a bug in wu-ftpd to assemble and view the shadow password file. | ||
|
This will reconstruct shadow entries from the core file from ftp daemon segmenting. | ||
|
ICMPinfo is a tool for looking at ICMP messages received on the running host. | ||
|
TCP scanner that gets the username of the daemon running on the specified port. | ||
|
Program for Linux designed to attack Ascend routers with zero length tcp offsets. | ||
|
While a file is being compressed with gzip it is world readable. | ||
|
Internet Security Scanner. Scans subnets and gathers info. about the hosts it finds. | ||
|
This is a hacked libc.so.5 for Linux that spawns a shell when a call is made to crypt(). | ||
|
This explains to how exploit sdtcm_convert on Solaris machines to get root access. | ||
|
Exploits a hole in HP-UX 9 rpc.mountd program and lets you steal NFS file handles. | ||
|
Like Unix cat(1) but this one talks network packets (TCP or UDP). Excellent tool. | ||
|
This should be very useful if you have located an insecure NFS server. | ||
|
This allows you to crash ANY Livingston PortMaster by overflowing buffers. | ||
|
Attemps mulitple username/password guesses on machines running POP3. | ||
|
This code exploits a race condition in Solaris, thus allowing you to make a root shell. | ||
|
Programs like ps, ls, & du which have been modified to hide certain files & processes. | ||
|
Shell Script to get a list of running hosts from a DNS nameserver for a given domain. | ||
|
This is a program that exploits the TCP Sequence Number Generator bug. | ||
|
On Solaris 2.5x86, /tmp/.asppp.fifo can be used to make a world writeable .rhosts file. | ||
|
Explains how to get root on solaris 2.5 by exploiting /usr/openwin/bin/kcms_calibrate. | ||
|
A universal utmp, wtmp, and lastlog editor that also compiles under AIX & SCO. | ||
|
If /dev/kmem is writeable by normal users, then this program will get you root. | ||
|
Slammer lets you issue arbitray commands on hosts by exploting yp daemons. | ||
|
Daemon that sits on a specified IP port and provides passworded shell access. | ||
|
This is a version of ESniff.c that has been modified for Solaris 2.X. | ||
|
This is a neat way to send keyboard events to another user's X window. | ||
|
This program allows you to spy on another user's keyboard events like xkey.c | ||
|
Scans TCP ports on a target host and reveals which daemons are running. | ||
|
Tiger attemps to exploit known bugs, holes, and misconfigurations to attain root. | ||
|
This overwrites a buffer in /usr/sbin/lquerylv on AIX systems, thus giving a root shell. | ||
|
Traceroute is an indispensable tool for troubleshooting and mapping your network. | ||
|
Identifys open UDP ports by sending a bogus UDP packet and wait for a response. | ||
|
A daemon that listens on a port and provides passworded shell access. | ||
|
This lets you send oversized ICMP packets from a unix box just like Win95. | ||
|
Analyze your system logs for security problems while ignoring normal behavior. | ||
|
On Debian v1.1, /usr/sbin/dos can be used to read any file on the system. | ||
|
Yet another ping for Linux. Packets of size > 65535 octets are supported. | ||
|
Source code that gets you a pointer to an X Display even after an xhost - | ||
|
Attach to any X server you have permission to and watch the user's keyboard. | ||
|
If you have access on a host's X server,this will show the window on your X-server. | ||
|
Parses through /var/adm/messages to see if user typed password at login prompt. | ||
|
This exploit will overwrite a buffer on sendmail 8.6.12 running on FreeBSD 2.1.0. | ||
|
Shared library for SunOS 4.1 and later that will help protect your RPC daemons. | ||
|
This handy little program will get you yp domain names, yp maps, and yp maplists. | ||
|
YPX guesses NIS domain names.YPX will extract the maps directly from domains. | ||
|
This program exploits the ftp protocol to let you scan services on firewalls. | ||
|
This will write past a buffer, straight onto the stack, giving a root shell on FreeBSD. | ||
|
ttywatcher lets a user monitor and interact with every tty on the system. | ||
|
An older exploit for Linux that overwrites a buffer in /usr/bin/splitvt, giving root. | ||
|
All Linux versions are vulnerable to this buffer overflow attack on suid mount. | ||
|
perl-ex.sh is a simple little sperl script that gives you a root shell via suidperl. | ||
|
This will explain how to exploit sendmail version 8.8.4 to get root access. | ||
|
In default setup for irix, xhost is set to global acess when someone logs into console. | ||
|
Gives access to all of Linux's linear memory to user processes at will, and thus root. | ||
|
Linux dip Exploit. Overwrite a buffer in do_chatkey(), thus giving you a root shell. | ||
|
The rexecd can be used easily to scan the client host from the server host. | ||
|
This is program that is designed to scan subnets for rpc services. | ||
|
Exploits a popen() call issued by rxvt on Linux machines, thus giving a root shell. | ||
|
Demonstates a security problem in unfsd guessing the file handle of the root FS. | ||
|
A Linux exploit for Red Hat 2.1. This gives a root shell by exploitng abuse.console. | ||
|
A program that overwrites a buffer in libXt.so while xterm is suid to root. | ||
|
Quick and Simple way to read the /etc/shadow file as well as many other things. | ||
|
Another Red Hat 2.1 exploit for resizecons due to lack of absolute pathnames. | ||
|
Like crack except this gives increased cracking speeds at the expense of disk space. | ||
|
A rootkit designed for Linux systems. Comes with ps, netstat, and login. | ||
|
A cool little tool that lets you search for things (like hacking) on the web. | ||
|
This will get root on Linux systems using /usr/games/doom/killmouse. | ||
|
This pings floods a host, thus wasting bandwidth and denying service. | ||
|
This will create a shared library that gives a root shell remotely or locally. | ||
|
Read the contents of the mail spool of a user when they connect to in.popd. | ||
|
Some versions of (q)popper from qualcomm allow you to read other user's mail. | ||
|
This code lets you have multiple IP addresses for a single interface. | ||
|
Amodload is a tool which allows the loading of arbitrary code into SunOS kernels. | ||
|
getthers scans all address on an ethernet and producing a hostname/ethernet list. | ||
|
Here is another root kit designed for SunOS operating systems. Lots of cool stuff. | ||
|
A suite of trojan programs opening back doors to root on a Linux system. | ||
|
telnet-hacked.tgz is a hacked telnet daemon that gives a root shell w/o password. | ||
|
This let's you issue arbitrary commands as root on GNU cfingerd 1.0.1. | ||
|
Shows some potential problems with Linux in.nfsd concerning read-only exports. | ||
|
If Linux CD is mounted w/ suid flag, older suid exploits will work on live filesystem. | ||
|
On Redhat Linux systems this will overwrite a buffer in crontab, thus giving root. | ||
|
This is a simple Linux Sniffer that shows you incoming TCP packets on most ports. | ||
|
You can figure out valid usernames on hosts by examining the response from in.rshd. | ||
|
Another Linux sniffer much like the one above. Shows more detailed TCP info. | ||
|
A very flexible network sniffer that has many interesting features (like curses). | ||
|
Solaris 2.4 exploit that allows you to overwrite files when a suid prog. core dumps. | ||
|
On Solaris 2.5, the Admintool can be used to create a writeable /.rhosts file. | ||
|
On IRIX, /usr/lib/print/netprint calls 'disable' without specifying absolute path. | ||
|
Floods a port with TCP packets with the SYN bit turned on causing inetd to segment. | ||
|
A login trojan program to be run at the console to get other user's passwords. | ||
|
A quick and easy to scan for hosts that still have the phf bug which gives /etc/passwd. | ||
|
This tries to find out as much information about the person calling phf as possible. | ||
|
This program watches for TCP packets with the SYN bit turned on. | ||
|
Logs all ICMP packets to a log file so you can see who is ping flooding you. | ||
|
On BSDi systems, you can use /usr/contrbi/bin/screen to read /etc/master.passwd. | ||
|
Implementation of the ftp Bounce Attack allowing you to anonymously do things. | ||
|
A very stupid/simple program to get passwords from users logging in on the consol. | ||
|
Another sniffer type program designed for Sun OS 4.1 architectures using /dev/nit. | ||
|
Exploit that allows local users to chmod arbitrary directories on hosts running pcnfsd. | ||
|
Contains various (and older) web security issues and exploits from Netcraft. | ||
|
This is a supercharged version of the classic fork() denial of service attack. | ||
|
Creates a signature of binary files, and then checks to see if these file were modified. | ||
|
A set of perl scripts that enable you to run ftp and telnet commands across a firewall. | ||
|
This allows you to write to system logging facilites via UDP packets to port 514. | ||
|
Lets you change your username, password, gecos, or shell via yppasswd daemon. | ||
|
This runs as a daemon and purportedly creates bad sectors on a hard drive. | ||
|
By recursively fingering a host, you can cause a possible crash of in.fingerd. | ||
|
Version 5.6 of a suite of tcp/ip programs that enhance network system logging. | ||
|
This is a replacement program for su that mails you when an attempt to su is made. | ||
|
This code allows up to kill any process on Linux boxes running older kernels. | ||
|
On Sun 4 platforms, this trojan ping gives you a root shell when you make a triggerfile. | ||
|
This will explain how to issue shell commands remotely using /cgi-bin/webgais. | ||
|
Another trojan for Sun 4 machines that is trigger with a triggerfile. | ||
|
A libpcap based sniffer that supports multiple interfaces and PPP (with no filtering). | ||
|
A replacement for the standard unix finger daemon designed for security. | ||
|
snifftest.c will try to tell you if a sniffer is running on Sun machines. | ||
|
IPIvestigator is another sniffer that lets you watch traffic between machines. | ||
|
Generic Network Message Passing is a simple client server messaging system. | ||
|
Exploit shell script that gives a root shell on IRIX systems. | ||
|
This small program exploit the suid root lpr program giving root. | ||
|
There is a problem with XFree86 3.1.2 that lets you overwrite files. | ||
|
Assembly Language program that will remove the first 10 sectors of a hardrive. | ||
|
This is an exploit for minicom on Linux systems that will overwrite a buffer. | ||
|
On HP-UX, the System Administration Manager (sam) can be used to truncate files. | ||
|
zip file illustrating five simple denial of service attacks on a unix. | ||
|
xspy is a program that makes logins appear on your display. | ||
|
This is a perl script that scans subnets and reports if rexd or ypserv is running. | ||
|
scans subnets for unsecured X clients and automatically logs results. | ||
|
BSD cron exploit. This program overruns a buffer, giving root access. | ||
|
On OSF1, /usr/tcb/bin/dxchpwd can be used to overwrite any file on the system. | ||
|
Setting SO_REUSEADDR options and calling bind allows user to steal udp packets. | ||
|
This program wipes all traces of a user from a UNIX system. | ||
|
Script that exploits /usr/bin/convfont on Linux systems to get root access. | ||
|
This program demonstrates how to send arbitrary tcp/ip packets. | ||
|
This program is a log editor with lots of interesting features. | ||
|
A Linux port scanner program that reports the services running on another host. | ||
|
On Linux systems /sbin/dump can be used to read arbitrary files. | ||
|
This program is another finger daemon trojan program. | ||
|
This program listens on ttys and tries to get login and passwords. | ||
|
Generic buffer overrun program for Linux, SunOS, and Solaris. | ||
|
This program overwrites a buffer in the suid program lpr, thus giving a root shell. | ||
|
On SunOS, chsh and chfn use getenv("USER") to validate the userid of the caller. | ||
|
This program causes denial of service by attacking inetd. Runs on Linux systems. | ||
|
Tons of old and miscellaneous exploits from different versions of unix. | ||
|
This shell script lets you create a file anywhere on the system. | ||
|
An old security hole in /usr/bin/mailx still exists in the mailx on Solaris 2.5 | ||
|
Discusses a denial of service attack against older versions of Oracle Webserver. | ||
|
Lots of exploits for HP/UX from the Scriptors of Doom. | ||
|
hpjetadmin can be tricked giving away root by a writeable .rhosts file. | ||
|
IRIX buffer overruns for df, eject, /sbin/pset, /usr/bsd/ordist, and xlock. | ||
|
This will overwrite a buffer in xterm on IRIX systems, giving a root shell. | ||
|
This will overwrite a buffer in /usr/sbin/iwsh on IRIX 5.3, giving root access. | ||
|
This will overwrite a buffer in /usr/sbin/printers on IRIX systems giving root. | ||
|
Messes up another user's terminal by issuing a talk request with vt100 escape chars. | ||
|
This program will overrun a buffer in /usr/bin/modstat on FreeBSD systems. | ||
|
This script is an exploit for pine. It can be used to create .rhosts files. | ||
|
On some httpd distributions, you can use cgi-bin/view-source to read arbitray files. | ||
|
This is an exploit script for sendmail 8.7-8.8.2 for FreeBSD and Linux. Gives root. | ||
|
smh.c is an exploit for sendmail 8.6.9. It gives a bin owned setuid shell. | ||
|
This overwrites a buffer in gethostbyame() on Solaris 2.5.1, giving a root shell. | ||
|
A denial of service attack by opening tons of socket connections to a remote host. | ||
|
Expect does not make handles to pseudo tty's inaccessable to other processes. | ||
|
Shows interesting links to put in your HTML pages causing denial of service. | ||
|
autoreply(1) can be used to create root owned files with a mode of 666. | ||
|
On older versions of Linux, this will overwrite a buffer in suid bdash, giving root. | ||
|
Get root on IRIX via /usr/Cadmin/bin/csetup in conjunction with /usr/sbin/sgihelp. | ||
|
On Solaris-x86 2.5, any normal user can connect to unix domain sockets. | ||
|
Exploit for Solaris 2.5.(1) that overwrites a buffer in passwd, giving root access. | ||
|
Another TCP port scanner that escapes logging by using half open connections. | ||
|
On YP systems, when a password expires, the old password is not required. | ||
|
On BSDi 3.x, users arbitrarly write files with binary data, but not overwrite them. | ||
|
This program overwrites a buffer in /usr/sbin/ffbconfig on Solaris 2.5.1 giving root. | ||
|
This will overwrite a buffer in pppd on FreeBSD systems, giving a root shell. | ||
|
On Solaris 2.4, if the license manager is running, root can be obtained. | ||
|
This file explains how to get root on Linux system with the pkgtool program. | ||
|
On IRIX systems, startmidi can be exploited to obtain root privileges. | ||
|
On Linux, if you have access to uid 65535 (nobody), then root can be obtained. | ||
|
This will get root on Linux systems by exploiting the doom sndserver. | ||
|
This will exploit /usr/bin/ps and /usr/ucb/ps on Solaris systems, giving root access. | ||
|
This script exploits /usr/sbin/dop on DEC unix 4.0, 4.0A, and 4.0B, giving a root shell. | ||
|
Version 7.5 (the latest) of the tcp/ip wrapper for inetd. (Does logging and monitoring). | ||
|
This is an rpcbind replacement that includes tcp wrapper style access control. | ||
|
Netscape's server key format is susceptible to dictionary attacks. | ||
|
Examples and text on the art of IP spoofing. (For Linux 1.3.x kernels). | ||
|
This file show how to exploit dataman on irix system to obtain root access. | ||
|
This is an exploit for /var/rfindd/fsdump that gives root on irix systems. |
Revista Saqueadores: Hacking, Cracking, etc.
- Revista Minotauro ( Hacking, phreaking, Virus) #1
- Revista Minotauro ( Hacking, phreaking, Virus) #2
- Revista Minotauro ( Hacking, phreaking, Virus) #3
- Revista Minotauro ( Hacking, phreaking, Virus) #4
- Revista Minotauro ( Hacking, phreaking, Virus) #5
- Revista Minotauro ( Hacking, phreaking, Virus) #6
- Revista Minotauro ( Hacking, phreaking, Virus) #7
- Revista Minotauro ( Hacking, phreaking, Virus) #8
- Revista Minotauro ( Hacking, phreaking, Virus) #9
- Revista Minotauro ( Hacking, phreaking, Virus) #10
TYHS: The Young Hacker of Spain
- Revista Saqueadores: Hacking, Cracking, etc.#1
- Revista Saqueadores: Hacking, Cracking, etc.#2
- Revista Saqueadores: Hacking, Cracking, etc.#3
- Revista Saqueadores: Hacking, Cracking, etc.#4
- Revista Saqueadores: Hacking, Cracking, etc.#5
- Saqueadores #6
- Saqueadores #7
- Saqueadores #8
- Saqueadores #9
- Saqueadores #10
Virtual Zone Magazine
PSYCHO
RareGaZz
Sab_Mag
Harmless Hacking
- Sab_Mag #0 26k
- 't Klaphek - Dutch hack/phreak magazine.
- 2600, The Hacker Quarterly.
- 020 - 795611, - Swedish 3L33T mag.
- Commodore Hacking E-Zine
- Cybertek
- Havoc Technical Journal - large collection of hacking and phreaking information.
- Legion of Lame Information Exchange, - an e-text zine devoted to destruction of censorship in all of it's forms, most especially when concerned with electronic platforms.
- Phone Losers of America@
- Phrack
- SystemDown, - hacking magazine in Italian.
Grabadoras de Registros de Teclado
- PCUPC- Unix Password Cracker
- Boom Crash variousUnix systems
- Various Unix Programs
- Get-VIP v1.00Unix passwd analyzer
- Decodificador de cuentas UNIX
- Ami Bios Crack
- Ami Bios Decoder
- Award Bios Crck
- AutoHacker
- Brute 2.0
- Claymore 1.0
- CrackerJack 1.4
- Dictionary Make
- Disaster 1.0
- Glide
- Guess 2.1
- Hades 1.0
- JackAss 1.1
- John the Ripper 1.0
- Killer Cracker 9.5
- Lard Scripts 2.0
- NEWHACK 2.0
- PCUPC 2.01
- PGPCrack 0.6 BETA
- Rempass 2.6
- Star Cracker 0.3a
- Trump-Hack 1.1
- XiT 2.0
- Break ARJ
- Crackmaster 2.5
- Fast Zip Cracker 1.4
- MS CD-Key Generator '95
- MS Word Password Cracker 8
- Nagbuster 1.2d
- NONAG 2.0
- Screen Saver Cracker for Windows
- Word Password Cracker
- ZipCrack 1.0
EDITORES HEXADECIMALES
- Ami Bios Decoder
- Award Bios password cracker
- Bios password checker
- 8080opcd.zip
- 8086tut.zip
- asm_ed.zip
- asmfaq.zip
- asmgen.zip
- bubble.zip
- c101_0.zip
- c101_1.zip
- c101_2.zip
- c101_3.zip
- crackman.zip
- disaster.zip
- hex51a.zip
- hexcal.zip
- hexed_21.zip
- hexedit.zip
- hexpert.zip
- howtocrk.zip
- htc1.zip
- hw32v210.zip
- hworks32.zip
- d12.zip
- msdpfaq.zip
- pcwatch.zip
- pv_12.zip
- snoopd11.zip Hack tools - Passwords
- brute.zip
- claymore.zip
- guess.zip
- hades.zip
- hc120.zip
- lard.zip
- linuxtrj.zip
- netcrack.zip
- newhak20.zip
- pcupc.zip
- trmphack.zip
- xhu_p1.zip
- xit20.zipDesensambladores - Editores Hexadecimales
- Bubble Chamber
- Disaster Disassembler 1.0
- DOS Edit
- Hexcaliber
- HexWorkshop 2.20
- Intelligent Disassembler 1.2
- Soft Ice '95 1.95
- SoftICE DOS 2.80
- Windows 486 Disassembler 1.7b
- WinSock Spy Facility 0.91 Utilidades Network-Hacking
- Advanced Network Security Cracker
- IPX Remote Node Control Utility
- NetCrack 1.0
- Netware Bindery Tools
- Netware Hack
- Novell Fake File Server
- Novell Hacking Fun
- Novell Netwatch
- Novell Password Hacker
- Novell Spy Pack
- Novell Supervisor Privilage Mod
- NWP Crack 0.5b
- PC Pursuit Thief
- SETSPass Module
- Supervisor Checker 1.0
- Thief-Novell Password Stealer
- User Dump 1.3 Programas Anti-AOL
- AcidTOS
- AOAlf '96
- AoCrAsH '97
- AOCreep
- AODeath '97
- AOExtasy
- AOHell '95 v_3
- AOKilla
- AOKrush
- AOLsd
- AOWizardNT>
- AOL Password List
- AOL Password List
- Digital 3.5
- Epod 96
- FATE 9.0
- Master AOL
- PNewq '97
- CD -X-
- DCC Newq
- Fake Novell Utility
- Hard Disk Killer1
- AutoExecuted
- Portsufer Pro
- SIN War Script v2.5
- Singe
- AweShit
- Dr. Spewfy
- Klone -X-
- BoxTone 1.0
- Darkryption
- FakeDOS 1996
- IRCpipe
- IRCserv
- Lamer Text Converter 1.0
- lynch0
- Phreakazoid
- Random Word Generator
- Death&Destruction 3.1
- Encrypt It 1.0
- Fake ID Generator
- Hacker Tools 2.0
- Netscape Utilities
- WilterCrypt 1.0 for Windows
- Wiltercrypt 1.5 for DOS
- Word List Gereator ALPHA 0.1 Powwow Tools
- PhuckPowwow
- PowKrash)
Packets, trojans, C stuff
A quién no le gusta Joder a Güindows 95?
Aunque es un tema ya pasado de moda, a lo mejor hay gente q le gustan: Virus
Mas Programas, de != clasificaión
- Virus Creation lab
- Instant Virus Production Kit v1.7
- MuTation Engine v1.00
- Nowhere Utilities v2.0
- NuKE Randomic Life Generator v.66b
- Phalcon/Skism's v.70
- TridenT Polymorphic Engine v1.4
- Trojan Horse Construction Kit v2.0
- TSR Time Bomb
- Virus Creation Laboratory v1.0
- Virus Lab Creations v1.1
- Curso de Ensamblador por AESOFT
- Cursos de Emsablador, Virus, Demos - Edison Temple
- Curso de ASM por Wintermute (29A)
- Curso Ortopedico de Encriptacion de Virus
- Listado BBS,FTP y WWW dedicadas a los virus
- Ansi Bomb 2.0
- Biological Warfare Creation Kit
- Gy's Virus Generator
- Instant Virus Production Kit 1.0
- Instant Virus Production Kit 2.0 BETA
- Mini Mutation Engine 1.0
- Mutation Engine 1.0
- Rajaat's Tiny Flexible Mutator
- TASM.exe (Imprescindible!)
- TLINK.exe (Imprescindible!)
- Trident Polymorphic Engine
- Trojan Horse Kit
- Virus Creation Lab
- Virus Lab Tools
Utilidades para descomprimir por las buenas o por las malas: Compresores
- News You Can Use - 7.0
- Root Kit_v1.0
- Firewall Cracker
- Glide - Windows95 .pwl Password cracker
- Login Hacker
- Box Tone Generator v1.0
- Cellular A-Z Programming
- Cellular Manager v2.0b
- Mutate v1.0 wordlist mutator
- Novell Networks Hacker
- Netcrack v1.0Netware Utility - does a legal query to obtain passwords
- Omnibox v1.1
- PBX Hacker v1.1
- PR-Dates v1.2
- Remote Access BBS Hacking Tools
- Security Package 4 PCEncryption Utilz
- Sock Get root
- TCPR FTP and Telnet commands across an Internet Firewall
- Telix Hacker v.40b
- Winsock32 Spy Facility v.91
- Xenocide's Hacking Utilities
Mas aplicaciones Hack.Con Diccionarionarios Generadores,y mas aplicaciones Utiles