.:[ packet storm ]:.
                           
evolve or die
evolve or die

 Section:  .. / Win  /

Windows tools - This directory contains hundreds of assorted Windows security tools. Try them out first on a test machine first unless you are sure you know what you are doing.

Page 1 of 16
<< 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 >> Files 1 - 25 of 380
Currently sorted by: File NameSort By: Last Modified, File Size

 ///  File Name: 32pexe20.zip
Description:
PrivateEXE. Add password protection to NT EXE files.
File Size:151806
Last Modified:Aug 16 20:04:22 1999
MD5 Checksum:64d4f08e8e46e3f8269b46f12908d763

 ///  File Name: aat4xx.zip
Description:
G-Lock Software Advanced Administrative Tools v4.3 is a multithreaded network diagnostic tool which combines 9 tools into one. Its purpose is to accumulate data pertaining to network status and availability, using all of the latest development tools in network research. Includes a port scanner, cgi scanner, proxy analyzer, netstat, process info, and more. 30 day shareware trial. Tested on Win 95/98/NT/2000. Screenshot available here.
Author:G-Lock Software
Homepage:http://www.glocksoft.com
Changes:Added registry cleaner and some new things.
File Size:1412007
Last Modified:Feb 2 14:05:52 2001
MD5 Checksum:05d864224d22d4048b078a568c8c4f34

 ///  File Name: accp.exe
Description:
Accp.exe recovers lost passwords on MS Access 97 mdb files. Ported from Java.
Author:Haris Bjelak
File Size:171451
Last Modified:Jan 12 19:42:50 2001
MD5 Checksum:aa40aee2369d860225a440c113052fd5

 ///  File Name: achilles-0-27.zip
Description:
Achilles is a tool for Windows designed for testing the security of web applications. Achilles is a proxy server, which acts as a man-in-the-middle during an HTTP session. A typical HTTP proxy will relay packets to and from a client browser and a web server. Achilles will intercept an HTTP session?s data in either direction and give the user the ability to alter the data before transmission. For example, during a normal HTTP SSL connection a typical proxy will relay the session between the server and the client and allow the two end nodes to negotiate SSL. In contrast, when in intercept mode, Achilles will pretend to be the server and negotiate two SSL sessions, one with the client browser and another with the web server. As data is transmitted between the two nodes, Achilles decrypts the data and gives the user the ability to alter and/or log the data in clear text before transmission.
Homepage:http://www.digizen-security.com/projects.html
File Size:433167
Last Modified:Aug 16 01:06:47 2001
MD5 Checksum:53c77733109f3d7b33a5143703e8cf05

 ///  File Name: ackcmd.zip
Description:
AckCmd is a special kind of remote Command Prompt for Windows 2000. It communicates using only TCP ACK segments. This way the client component is able to directly contact the server component through a firewall in some cases. More information can be found in the AckCmd FAQ and in the ACK Tunneling Trojans paper.
Author:Arne Vidstrom
Homepage:http://www.ntsecurity.nu/toolbox/ackcmd
File Size:24498
Last Modified:Aug 15 02:30:08 2000
MD5 Checksum:3bbbc2ffe5b7a002556c3f97a35bf45a

 ///  File Name: Adig02f.zip
Description:
Advanced DIG is a TCP-based DNS client for Windows that supports most of the available options, including AXFR zone transfer. It features an extended mode which utilizes a TCP connection to acquire any info that can be supplied by server and supports 20 different queries to nameserver.
Author:Averk
Homepage:http://nscan.hypermart.net
File Size:84770
Last Modified:Jul 12 13:22:19 2000
MD5 Checksum:7e3fc8430f09ece5d1ec86b15a8e0911

 ///  File Name: AdvancedWinServiceManager.zip
Description:
AdvancedWinServiceManager is a smart tool to remove hidden rootkit services. It makes it easy to eliminate such malicious services by separating out third party services from Windows services. By default it shows only third party services along with more details such as Company Name, Description, Install Date, File Path etc at one place which helps in quickly differentiating between legitimate and malicious services. It comes with rich features such as detecting hidden rootkit services, exporting the service list to html based log file, displaying only third party services etc.
Homepage:http://www.spywareanalytics.com/
File Size:226161
Last Modified:Mar 6 10:33:26 2010
MD5 Checksum:edff068f86952106dba21a8ffe5e9a9d

 ///  File Name: aH1.zip
Description:
aH scans for open NetBIOS shares on a system and reports them to the user in an easy to use copy and paste format utilizing the net command. C++ source code and binary included.
Author:r-22
Homepage:http://www.manshadow.org/projects/aH/
File Size:24517
Last Modified:Mar 10 22:16:46 2003
MD5 Checksum:656fffd42dc52226dae267b6d32a3913

 ///  File Name: ah1_0beta.zip
Description:
Assault Hackworks is a security scanning tool which features include subnet management, exploiting NBT security hole with easy access to remote files via Explorer-like interface, and scanning for Khe Sanh servers.
Homepage:http://dive.to/ita
File Size:1207797
Last Modified:Apr 27 21:09:05 2001
MD5 Checksum:4a898f3dc17dce2ded28b6125e415c5c

 ///  File Name: Alcatel.zip
Description:
Alcatel.zip is a Windows tool for getting the challenge response for easy offline config of an alcatel modem. Often used for "patching" a speedtouch home to pro, as discussed on http://brunning.com.
Author:Autor Herman
Homepage:http://www.bruring.com/adsl/
File Size:19515
Last Modified:Apr 25 00:58:51 2002
MD5 Checksum:d20b862383bca011585fd66738ba9152

 ///  File Name: alpr.zip
Description:
Advanced Lotus Password Recovery v1.02 is a program to recover lost or forgotten passwords to the files/documents created in IBM/Lotus applications (all versions): Organizer, WordPro, 1-2-3 and Approach. The passwords are recovered instantly; multilingual passwords are supported.
Homepage:http://www.elcomsoft.com/alpr.html
File Size:650682
Last Modified:Dec 18 20:33:23 2000
MD5 Checksum:c8679e6d683159664a9ede5d0c357224

 ///  File Name: antimeter.zip
Description:
This is a small tool that scans memory to detect and kill Metasploit's meterpreter.
Author:Mert SARICA
Homepage:http://www.mertsarica.com/
File Size:2331680
Last Modified:May 22 14:56:18 2010
MD5 Checksum:13d6e85413c467d68c2202dd7d11ccaa

 ///  File Name: antimeter2.zip
Description:
This is a small tool that scans memory to detect and kill Metasploit's meterpreter.
Author:Mert SARICA
Homepage:http://www.mertsarica.com/
Changes:Added a logging feature, auto kill feature, detection mode only and exclusion support.
File Size:2359814
Last Modified:May 26 20:20:18 2010
MD5 Checksum:c01d2b32294164ee4e39b03507e535a9

 ///  File Name: ao20pr_p.zip
Description:
Advanced Office 2000 Password Recovery (professional edition) - Recovers lost passwords for Microsoft Word, Excel, Access, PowerPoint 97, Project, Money, Outlook, Backup, Schedule+, Mail, IE 3, 4, and 5, Visio 4 and 5, and others. All passwords are decrypted instantly except Word/Excel 97/2000 which has strong crypto and is only vulnerable to brute force attack. 30 day trial, although it does not actually expire.
Homepage:http://www.elcomsoft.com/ao2000pr.html
File Size:971536
Last Modified:Dec 15 20:05:24 2000
MD5 Checksum:c85be087f2ef1e373d2703874add42b4

 ///  File Name: Apache-Chunked-Scanner.zip
Description:
Apache Chunked Transfer vulnerability scanner for Windows. Does not check the banner - crashes a thread and watches the web server behavior.
Author:Felipe Moniz
Homepage:http://www.nstalker.com
File Size:243812
Last Modified:Jun 29 13:41:19 2002
MD5 Checksum:009aa8ca460938ac21e0b42bd3acf00c

 ///  File Name: archpr.zip
Description:
Advanced Archive Password Recovery (or ARCHPR for short) can be used to recover lost or forgotten passwords to ZIP (PKZip, WinZip), ARJ/WinARJ, RAR/WinRAR and ACE/WinACE archives. At the moment, there is no known method to extract the password from such compressed files, so the only available methods are "brute force" and dictionary attacks (for ARJ and ZIP formats, known-plaintext attack is also available).
Homepage:http://www.elcomsoft.com/archpr.html
File Size:733155
Last Modified:Dec 18 20:35:45 2000
MD5 Checksum:ef3ab37d8ced965628df95d51ff1b54f

 ///  File Name: arpinject.zip
Description:
ARPInject v0.1 is a windows tool which sends custom ARP reply packets at a specified interval, causing most systems to update their arp tables. Requires Winpcap.
Author:Blade
File Size:218078
Last Modified:Apr 9 01:37:41 2001
MD5 Checksum:de77274988919ae235919e2f535cc8d7

 ///  File Name: arptoxin.exe
Description:
ARPToxin is a fully functional command line ARP Poisoning utility for the Windows platform which uses winpcap. Includes preset modes of operation for different attacks and the ability to change any field in the ARP packet.
Author:Phrite
Homepage:http://www.phrite.net/default.php?page=tools
File Size:61440
Last Modified:Dec 16 15:08:37 2003
MD5 Checksum:22d8fcd774b35c9480df44dcc81b0880

 ///  File Name: ArpWorks10.EXE
Description:
ArpWorks v1.0 is a utility for Windows which sends customized Arp Announce packets over the network. All ARP parameters, including the Ethernet Source MAC address can be changed. Also features an IP to MAC resolver, subnet MAC discovery, host isolation, packets redirection, and IP conflict packets.
Author:Mao
File Size:342371
Last Modified:Jul 25 19:47:17 2000
MD5 Checksum:61f048ae6dd0bb719ce4bb9d91689c60

 ///  File Name: atk-2.0.zip
Description:
Attack Tool Kit, or ATK, was developed to provide a very small and handy tool for performing simple security checks on Windows. It requires minimal interaction and is very modular in design.
Author:Marc Ruef
Homepage:http://www.computec.ch/projekte/atk/
File Size:992092
Last Modified:Sep 8 18:00:37 2004
MD5 Checksum:dd0ae72cd5aeefc2ae1d1ea3072ee6a4

 ///  File Name: atk-3.0.zip
Description:
The Attack Tool Kit (ATK) is an open-source utility to perform vulnerability checks and enhance security audits. The most important changes in ATK 3.0 are the introduction of a dedicated exploiting routine and the Plugin AutoUpdate (over HTTP). Check the website for more details. Binary version.
Author:Marc Ruef
Homepage:http://www.computec.ch/projekte/atk/
Related File:atk-3.0src.zip
File Size:1296250
Last Modified:Nov 20 14:06:18 2004
MD5 Checksum:b07eb5e0268aef658ac9205b772070cd

 ///  File Name: atk-3.0src.zip
Description:
The Attack Tool Kit (ATK) is an open-source utility to perform vulnerability checks and enhance security audits. The most important changes in ATK 3.0 are the introduction of a dedicated exploiting routine and the Plugin AutoUpdate (over HTTP). Check the website for more details. Source version.
Author:Marc Ruef
Homepage:http://www.computec.ch/projekte/atk/
Related File:atk-3.0.zip
File Size:648922
Last Modified:Nov 20 14:06:47 2004
MD5 Checksum:81d9769516693346e33b68eb4d2f9a8e

 ///  File Name: ATLAS.ZIP
Description:
Windows / Dos CGI scanner (binary only) which checks for 65 remote vulnerabilities.
Author:Digital Monkey
File Size:24358
Last Modified:Dec 17 23:52:41 1999
MD5 Checksum:25c81706316875ae889ea753dcc42546

 ///  File Name: attacker.zip
Description:
Attacker v3.0 is a TCP/UDP port listener. You provide a list of ports to listen on and the program will notify you when a connection or data arrives at the port(s). Can minimize to the system tray and play an audible alert. This program is intended to act as a guard dog to notify you of attempted probes to your computer via the Internet.
Author:Robin Keir
Homepage:http://www.foundstone.com
File Size:24252
Last Modified:Dec 14 21:59:09 2000
MD5 Checksum:e5ca4ee8d9a9d075a9272fddbf49fbd7

 ///  File Name: auto.txt
Description:
Auto.txt lists eleven known and unknown methods of starting programs upon bootup in Windows. Trojans, backdoors, and keyloggers often use these to restart themselves.
Homepage:http://www.tlsecurity.net
File Size:6395
Last Modified:Mar 15 20:14:09 2001
MD5 Checksum:3ebed47c33e095692bde2be83dcd1d1c






 ///  File Name: barblanker.zip
Description:
BarBlanker is a windows program which covers virtually all major Viewbars with a black window.
Author:Cash4All Admin
File Size:4454
Last Modified:Dec 17 12:50:18 1999
MD5 Checksum:534000031632afc1e30293238ce998ff

 ///  File Name: bcwipe.exe
Description:
NT file wipe utility. Disables intruder restore capability.
File Size:736691
Last Modified:Aug 16 20:04:08 1999
MD5 Checksum:833084bfade27b5c6280b8e1b6da749a

 ///  File Name: bdgen.zip
Description:
Bdgen generates temp passwords for Fortres 101.
File Size:12215
Last Modified:May 30 15:04:55 2001
MD5 Checksum:7d9a30012fcfdb9e9444fb8ab2a9a651

 ///  File Name: be2100.zip
Description:
Boss Everyware gives a clear picture of how a Windows computer is being used. It secretly logs program names, window titles, visited URLs, user names, and keystrokes. With its Report Manager, Boss Everyware provides a powerful tool for the analysis of logged data. Can monitor one or many computers.
Homepage:http://boss.dids.com
File Size:1727887
Last Modified:Oct 30 18:58:14 2000
MD5 Checksum:8c786e33857c2efc22b38219c7b55397

 ///  File Name: bintext.zip
Description:
BinText v3.0 is a small and fast text extractor that will be of particular interest to programmers. It can extract text from any kind of file and includes the ability to find plain ASCII text, Unicode (double byte ANSI) text and Resource strings, providing useful information for each item in the optional "advanced" view mode. It's comprehensive filtering helps prevent unwanted text being listed. The gathered list can be searched and saved to a separate file as either a plain text file or in informative tabular format.
Author:Robin Keir
Homepage:http://www.foundstone.com
File Size:17255
Last Modified:Dec 13 01:22:57 2000
MD5 Checksum:e06a602d752700d5fb98d6d731b0279d

 ///  File Name: BISSE.zip
Description:
Broadcast Internet String Search Engine (BISSE) is a windows based scanner which searches your network for servives who have banners which match a user specified string.
Author:L. Lizerman
Homepage:http://members.xoom.com/BISSE/
File Size:246134
Last Modified:Apr 25 15:25:21 2000
MD5 Checksum:26d91263d31131695ec63da33c53cffe

 ///  File Name: blast-1.1.zip
Description:
Blast - a small, quick TCP service stress test tool. Blast does a good amount of work very quickly and can help spot potential weaknesses in your network servers.
Author:JD Glaser
Homepage:http://www.ntobjectives.com
File Size:18264
Last Modified:Dec 22 21:51:21 1999
MD5 Checksum:ce5ee9e7d9539b6b850c615917fa6463

 ///  File Name: Blast20.zip
Description:
Blast v2.0 - A small, quick TCP service stress test tool. Blast does a good amount of work very quickly and can help spot potential weaknesses in your network servers.
Author:JD Glaser
Homepage:http://www.foundstone.com
File Size:22625
Last Modified:Dec 14 21:55:26 2000
MD5 Checksum:23782dce17859e49f01fb6ecd52477d3

 ///  File Name: boping.zip
Description:
BOPing is a network scanner for the infamous Back Orifice trojan. It is many times faster than the ping sweeper built in to the original client program. This is intended as a vigilante tool to notify victims who unknowingly have the trojan on their system. It includes the ability to notify detected victims by sending them a BO message box message directly from within the program.
Author:Robin Keir
Homepage:http://www.foundstone.com
File Size:5682
Last Modified:Dec 13 01:26:12 2000
MD5 Checksum:061f1d24551da1881a25eb144341698c

 ///  File Name: brutus-aet2.zip
Description:
Brutus AET2 obtains username / password pairs using simple dictionary attack. Uses the following protocols: Pop3, ftp, imap, telnet, web server passwords, routers, and switches, and custom scripting to brute force anything. Features Multi-stage authentication engine, Single User mode cracking, Multiple User mode cracking, Full brute-force capability, Up to 60 simultaneous connections, Save and Continue Session, Auto-backup session, Import and Export Custom authentication types, Word list processing/generation, SOCKS proxy support and HTML Form analysis.
Author:G
Homepage:http://www.hoobie.net/brutus
File Size:338947
Last Modified:Jan 31 16:54:16 2000
MD5 Checksum:1e40a2f8de389bb662f8322e05f28c6d

 ///  File Name: brutus-v1-b2.exe
Description:
Brutus obtains username / password pairs using simple dictionary attack. Uses the following protocols: Pop3, ftp, imap, telnet, web server passwords, routers, and switches.
Homepage:
File Size:3138565
Last Modified:Feb 8 10:30:27 1999
MD5 Checksum:f8f096902611b294af4c3618054f5547

 ///  File Name: bububu.zip
Description:
Utility that is a Microsoft Windows 2000 command-line application that creates a fake host in a Windows workgroup.
Author:GriYo,TheVoid
Homepage:http://griyo.hellsparty.com
File Size:20739
Last Modified:Oct 17 17:10:53 2003
MD5 Checksum:e0e39899b2ed4400f54911f9b21192d1

 ///  File Name: buGregCon-hotfix.EXE
Description:
Fix for bugregcon.vbs, a small script that added c:/con/con to the registry, rendering a windows system useless.
Author:Carlos Eduardo Oliveira
File Size:4567
Last Modified:Mar 8 06:05:04 2000
MD5 Checksum:a161cb76b1ce2eec070c1583f2ea1e62

 ///  File Name: bugregcon.vbs.txt
Description:
Windows script which modifies the registy to include c:/con/con, rendering the system useless and unfixable. May affect win2k as well.
Author:Carlos Eduardo Oliveira
File Size:440
Last Modified:Mar 7 07:07:16 2000
MD5 Checksum:f5f3625b5d51a67afa940368d118826e

 ///  File Name: cachedump-1.0.zip
Description:
CacheDump is a tool that demonstrates how to recover cache entry information: username and hashed password (called MSCASH). This tool also explains the technical issues underneath Windows password cache entries, which are undocumented by Microsoft.
Author:Arnaud Pilon
Homepage:http://www.cr0.net:8040/misc/cachedump.html
File Size:42014
Last Modified:Jan 12 02:50:43 2005
MD5 Checksum:5065266fbad9362d5a329c5388627ea5

 ///  File Name: cachedump-1.1.zip
Description:
CacheDump is a tool that demonstrates how to recover cache entry information: username and hashed password (called MSCASH). This tool also explains the technical issues underneath Windows password cache entries, which are undocumented by Microsoft.
Author:Arnaud Pilon
Homepage:http://www.cr0.net:8040/misc/cachedump.html
Changes:Bug fixes, domain DNS, and display domain name changes.
File Size:42838
Last Modified:Mar 25 00:18:17 2005
MD5 Checksum:dec7d6a768a1f3f403f1d8a45eb061b9

 ///  File Name: celsetupb.exe
Description:
ClearEventLog is a freeware NT application that can clear the system, application, and security event logs via a simple command-line operation.
Author:Mike Machado
File Size:925675
Last Modified:Oct 7 19:58:20 1999
MD5 Checksum:3cd1c86b7dd6058398dbf45bc5e2faa1

 ///  Directory: / cgi-scanners /
Description:
Windows CGI / Web Vulnerability Scanners
Total Files:3
Last Modified:Sep 5 21:26:22 2007

 ///  File Name: CGIScan.zip
Description:
CGI scanner for windows - looks for 60 vulnerable CGI scripts, , and new ones can easily be entered into the exploit data file.
Author:Wang Master
Homepage:http://freespace.virgin.net/david.wood6/
File Size:175264
Last Modified:Mar 24 15:03:00 2000
MD5 Checksum:686318aa963b64f997d67d4491aa0310

 ///  File Name: changemac-win.c
Description:
MAC changing utility that can be used on Windows from the command line.
Author:Robbe De Keyzer
File Size:6144
Last Modified:Dec 31 02:34:47 2005
MD5 Checksum:4eff620a8f4c19d1135ff3278e7da1c3

 ///  File Name: ChkLock.zip
Description:
A Win32 networking API called NetUserModalsGet() requires no authentication, just the establishment of a NULL NetBIOS session. This API function can be used to get the system-wide password policy information (intruder lockout, the depth of the password history, minimum password length requirements, the name of the PDC, and so forth) from Windows NT and Windows 2000 machines. Because it's RPC-based, like all the net functions, it can be executed remotely (providing the relevant ports are not blocked by an intermediate router or firewall). A tool called ChkLock is available to use this function and retrieve sensitive information from remote computers.
Homepage:http://www.berbee.com/security/chklock.html
File Size:35305
Last Modified:Nov 15 22:18:03 2000
MD5 Checksum:1632c9cfefc3243ae0f091543352c650

 ///  File Name: cifspwscan-1_0_3.tar.gz
Description:
A CIFS/SMB password scanner based on the jcifs implementation. The scanner and jcifs are both 100% pure Java, making it possible to run the scanner on a few different platforms. Both the Java source and binary distributions are included.
Author:Patrik Karlsson
Homepage:http://www.cqure.net/
File Size:610744
Last Modified:Jun 18 03:24:57 2004
MD5 Checksum:e6e80ca7923622aa55c17d56fc6176ce

 ///  File Name: cis.zip
Description:
CIS vulnerability scanner Version 5.0.0 (formerly NTInfoScan) - Scans systems for remote vulnerabilities. Runs on Windows NT or 2000. Features a GUI, multi-threaded operation, and updates via DLL.
Homepage:http://www.cerberus-infosec.co.uk/
File Size:230868
Last Modified:Jan 27 18:09:17 2000
MD5 Checksum:b2b0acf5eee1ff9444473687a1f08f81

 ///  File Name: CLT_Beta.zip
Description:
Coherent Light Bruteforce Toolkit - Contains IRCrack v0.98, a tool which connects directly to an IRC server and uses a wordlist to brute force a channel key, and Boomcrack v0.5, a bruteforce FTP account cracker. The VB6 runtimes are neccesary.
Author:Cerebus Artifact
Changes:Logging, encrypted logging, and a status bar.
File Size:527965
Last Modified:Mar 23 21:20:30 2000
MD5 Checksum:f4ef88de3f00d47d02eb526935826c4e

 ///  File Name: collabreate-defcon.tgz
Description:
CollabREate is an IDA Pro plugin with a server backend that allows multiple people to collaborate on a single RE (reverse engineering) project. This is the Defcon demo bundle.
Author:Chris Eagle,Tim Vidas
Homepage:http://www.idabook.com/defcon/
File Size:233811
Last Modified:Aug 20 03:34:31 2008
MD5 Checksum:d205984bf3188797c6e56f224938cda7






 ///  File Name: ConConFix.zip
Description:
Unofficial fix for the /con/con vulnerability. Win 95/98/se server operators may want to give it a try.
Author:Arisme
File Size:4450
Last Modified:Mar 6 06:41:54 2000
MD5 Checksum:e8c2885d2ad42324328e44e8ecfe9c9f

 ///  File Name: ConConFix2.zip
Description:
Unofficial fix for the /con/con vulnerability. Win 95/98/se server operators may want to give it a try.
Author:Arisme
Changes:Fixes all devices, not just con/con.
File Size:4498
Last Modified:Mar 9 14:25:42 2000
MD5 Checksum:8dee9800936c9a8b2c4fa0f40a80c0ae

 ///  File Name: CoolCon0.01.rar
Description:
A simple command-line converter written in C language that converts input as string or integer. ASCII to Binary/Decimal/Octal/Hexadecimal, Binary to Decimal/Octal/Hexadecimal, Decimal to Binary/Octal/Hexadecimal. ROT13 feature. Compiled .exe binary and .c source code included.
Author:LiquidWorm
Homepage:http://www.itsec.com.mk/
File Size:10362
Last Modified:Jul 26 00:31:42 2007
MD5 Checksum:c02ed83c71b286f70df477d9f643609b

 ///  File Name: CrackDate.zip
Description:
CrackDate will "crack" any Windows time limited program by changing the system date when the program is run / exits.
Author:Samy Nada
File Size:66479
Last Modified:Feb 7 15:42:22 2000
MD5 Checksum:9fa4a8d462fd8804bd010624a1743205

 ///  File Name: crypt2pa.zip
Description:
Encryption library for NT kernel.
File Size:874656
Last Modified:Aug 16 20:04:09 1999
MD5 Checksum:09b6c6aea0e4336961a28ac836695243

 ///  File Name: crypto.zip
Description:
This text file which will explain to you how to decrypt win9X paswords stored in the registry. In doc,ascii,and palmpilot formats.
Author:Mr.Mojo
Homepage:http://www.dis.org/mrmojo/hacking.htm
File Size:3338
Last Modified:Mar 10 19:30:21 2000
MD5 Checksum:4be8f4bedcef71c2186757c68df585ec

 ///  File Name: cssetup.zip
Description:
Cisco Scanner for Windows v1.02. Cisco Scanner will scan a range of IP address for Cisco routers that havn't changed their default password of "cisco".
Author:Movax4c00int21h
Homepage:http://www.geocities.com/~weborg/cs.htm
Changes:Added extra code to verify that verify that the server being scanned is a valid Cisco router.
File Size:1743779
Last Modified:Jan 12 16:46:24 2000
MD5 Checksum:fd36542e887a450d22ea47741fc568f2

 ///  File Name: Cyclops-1.2-Stand.zip
Description:
Cyclops 1.2 is a Log Auditing Tool for Web Servers. Cyclops looks for patterns in the log files that suggest an intruder is attacking. The log file formats supported are Apache, Common Log Format, Microsoft IIS, NCSA, PWS and Sambar Server. Tested on Windows 95, 98, ME, NT, 2000 or XP.
Author:Felipe Moniz
Homepage:http://www.nstalker.com/cyclops
File Size:638244
Last Modified:Jul 17 01:32:03 2002
MD5 Checksum:ecd8b7b42793969f205ed23a1f701dd4

 ///  File Name: DateHack.zip
Description:
Datehack changes your computer date in an attempt at letting you use shareware longer.
Author:Samyn
File Size:28824
Last Modified:Feb 27 02:50:20 2001
MD5 Checksum:b18a0cf43897d17f9f64cfbc898a5ac8

 ///  File Name: dcetest-1.2.tar.gz
Description:
Dcetest is a tool which probes a windows machine over TCP port 135, MSRPC endpoint information. It can be though of as the equivalent of rpcinfo -p against a Windows box. Dcetest can also be very useful once inside a DMZ to fingerprint Windows machines on the network.
Homepage:http://www.atstake.com/research/tools/index.html#info_gathering
File Size:23366
Last Modified:Oct 18 01:16:57 2001
MD5 Checksum:5413d6338d8d06ac19703717b4116cb1

 ///  File Name: decoguid.zip
Description:
decoguid extracts the date, time, etc. from GUIDs conforming to Internet Draft "draft-leach-uuids-guids-00.txt".
Author:Jimmy Dean.
File Size:15943
Last Modified:Aug 16 20:04:19 1999
MD5 Checksum:494ad1b69970c148f16c2dffa50a6703

 ///  File Name: devicelock.zip
Description:
Devicelock gives network administrators control over which users can access what removable devices (floppies, Magneto-Optical disks, CD-ROMs, ZIPs, etc.) on a local computer. It can protect network and local computers against viruses, trojans and other malicious programs often injected from removable disks. This version is for Windows 2000/NT. Windows ME version available here.
Homepage:http://ntutility.com/dlme/
File Size:892586
Last Modified:Oct 30 19:10:44 2000
MD5 Checksum:da3c0f5d58230b6048055ef47632cdb9

 ///  File Name: DiabloMin.zip
Description:
Diablo Keys is an advanced keystroke logger for Windows. Features the ability to send logs to an FTP account, make .exe server side files, email notification, encryption and compression, and more.
Author:Kodapt
Homepage:http://www.diablokeys.cjb.net
File Size:672333
Last Modified:Mar 13 19:01:38 2001
MD5 Checksum:22631f8022d9c5666c99a85dd0eca7c3

 ///  File Name: dmpacl.zip
Description:
Dump the permissions for the file system as well as the registry.
File Size:169534
Last Modified:Aug 16 20:04:09 1999
MD5 Checksum:a8a14087ec0e703c2fc3eb8d896ec041

 ///  File Name: DomainScanV1_0.zip
Description:
Domain Scanner. It scans selected IP range and looks for selected port if open. Scan public servers and find lots of backdoors. An essential tool for hackers.
Author:Misoskian
Homepage:http://www.xcoders.com/
File Size:198445
Last Modified:Aug 16 20:04:14 1999
MD5 Checksum:51c4b285dd01baaba571f364152845d5

 ///  File Name: DoorWatch.zip
Description:
Doorwatch is a tool for Windows 95/98/ME/NT/2000 which does IP scanning, port scanning, NetBios scanning, Trojan scanning, and more. Documentation in Korean - English here..
Homepage:http://www.cyberarmy.co.kr/DoorWatch
File Size:1539498
Last Modified:Feb 20 21:04:33 2001
MD5 Checksum:2df0ac7df4a710cbef98074523da8d00

 ///  File Name: dumpwin.zip
Description:
DumpWin v2.0 is a tool that can be used to gather an extensive amount of information about Windows NT/2000 machines, including software, users, ACLs, account lockout policies, running processes, services, etc. More information about this tool can be found here.
Author:Arjun Pednekar
Homepage:http://www.nii.co.in/
File Size:53254
Last Modified:Nov 12 08:58:03 2002
MD5 Checksum:0998c8929aa84fe126d1544cb6139ce5

 ///  File Name: dunrape.zip
Description:
Dunrape will harvest all the dialup accounts out of any win95/98/98se and even the new windows millenuim (sorry still dosent work on NT or 2k). Requires VB5 runtimes.
Author:Mr.Mojo
Homepage:http://www.dis.org/mrmojo/hacking.htm
File Size:1437508
Last Modified:Mar 9 20:20:40 2000
MD5 Checksum:a6c0b5db988da90b15cfc560e39e0b53

 ///  File Name: dz_w2knt.zip
Description:
Windows NT/2k remote shellcode.
File Size:8858
Last Modified:Oct 17 03:42:48 2000
MD5 Checksum:9d12cd71ee4025c2a1f5cd157e248453

 ///  File Name: EchoMirage-1-1.zip
Description:
Echo Mirage is a generic network proxy. It uses DLL injection and function hooking techniques to redirect network related function calls so that data transmitted and received by local applications can be observed and modified. Windows encryption and OpenSSL functions are also hooked so that plain text of data being sent and received over an encrypted session is also available. Traffic can be intercepted in real-time, or manipulated with regular expressions and action scripts
Author:Dave
Homepage:http://www.bindshell.net/tools/echomirage/
File Size:651660
Last Modified:Oct 3 19:04:26 2006
MD5 Checksum:44055140ab5472d8e65d685ca86ee0c6

 ///  File Name: enumshare.zip
Description:
Enumshare is a Windows utility which enumerates shares on local and remote machines and displays which users are currently logged into those shares.
Author:Faz
File Size:12523
Last Modified:Nov 19 10:58:56 2002
MD5 Checksum:8dfbd96af5754983b75677db9fd0b864

 ///  File Name: eraser52.zip
Description:
Eraser is a utility for all versions of Windows which securely deletes data so it can not be undeleted easily.
Homepage:http://www.tolvanen.com/eraser
File Size:768871
Last Modified:Oct 26 01:08:38 2001
MD5 Checksum:658df79a6420fafa9ad4525f41c6b590

 ///  File Name: ethadapt.zip
Description:
ethadapt extracts the network adapter IDs from the ASCII and UNICODE encoded GUIDs stored in specified directories and their subdirectories and reports network adapter ID vs. file descriptor. For Win95/98/NT. Source code and executable included.
Author:Jimmy Dean.
File Size:19223
Last Modified:Aug 16 20:04:19 1999
MD5 Checksum:58adf5e46b5511cc2cbb03321078062c

 ///  File Name: FakeMail.zip
Description:
An anonymous mailer. It also give chance to change date of mail. I entered only the Turkish mail servers but you can enter your favorite server. Don't forget to find a relay supported mail server.
Author:Misoskian
Homepage:http://www.xcoders.com/
File Size:149932
Last Modified:Aug 16 20:04:14 1999
MD5 Checksum:38875b5ea22f4aa69522e8b293983142

 ///  File Name: fg3decoder.zip
Description:
Decrypts Fortress 101 2.51 or 3.0 passwords from the fset (2.51) or the default.fg3 (3.0).
File Size:10638
Last Modified:May 30 15:05:31 2001
MD5 Checksum:90924b1f55c64c422206871e0a249e1f






 ///  File Name: FGC_tools_v1.zip
Description:
FGC_Tools exploits Fortress security by simply making calls to the DLL used by their program. Disables security or overwrites the password without prior knowledge of the current password. Includes TASM source.
Author:Frost Byte
File Size:4347
Last Modified:May 23 19:18:17 2001
MD5 Checksum:3c987ae8b14ab9ed345931274c699cb9

 ///  File Name: Filemon.zip
Description:
Filemon is a GUI/device driver combination that together monitor and display all file system activity on a system. It has advanced filtering and search capabilities that make it a powerful tool for exploring the way Windows 95 works, seeing how applications use files and DLLs, or tracking down problems in system or application configurations.
File Size:45069
Last Modified:Aug 16 20:04:14 1999
MD5 Checksum:266a58089069d80cc0628ae58229df8a

 ///  File Name: find.asm
Description:
Find file routine for Windows, in asm.
Author:Angelo Rosiello
Homepage:http://www.rosiello.org
File Size:2217
Last Modified:Dec 15 01:53:09 2003
MD5 Checksum:ba5d9eb7bc0e1ca5b7a2eb5d6d824d35

 ///  File Name: findadap.zip
Description:
findadap finds the files in the specified directories and their subdirectories containing the specified MAC address encoded as binary, ASCII, or UNICODE. (Use the command "ipconfig /all" to find the MAC address of your network adapter). For Win95/98/NT. Source code and executable included.
Author:Jimmy Dean.
File Size:18536
Last Modified:Aug 16 20:04:19 1999
MD5 Checksum:8eb24c56507c4dfd6f65e27ffba25c51

 ///  File Name: firewar.zip
Description:
FireWar is a tool that can be used to remotely shutdown Windows firewall software such as ZoneAlarm by using an exclusive technique. Effective against ZoneAlarm, Tiny, Sygate, Norton, Outpost, McAfee, Kerio firewalls.
Author:Paolo Iorio.
Homepage:http://www.paoloiorio.it
File Size:5157
Last Modified:Nov 12 08:41:45 2002
MD5 Checksum:e3414e1517992f299be2779b3c77908c

 ///  File Name: fscan112.zip
Description:
FSCAN is a fast command line port scanner for Windows which will scan both TCP and UDP ports, grabs banners, has adjustable timeouts, and scans ranges of IPs.
Author:Foundstone Labs
Homepage:http://www.foundstone.com
File Size:14567
Last Modified:Aug 10 14:16:04 2000
MD5 Checksum:abe398a1c1394490e107770ace4aff9c

 ///  File Name: fssetup.zip
Description:
FTP Scanner v2.2.59 is a windows application which will scan a range of IP addresses for any login and password you specify.
Author:Movax4c00int21h
Homepage:http://www.geocities.com/~weborg/
Changes:Fixed the overflow problem with the Socket Shutdown function. FTP Scanner now has support for 256 threads under Windows 2000.
File Size:1994733
Last Modified:Apr 24 19:20:34 2000
MD5 Checksum:7dbdfcdf3e643c0e08d6324d2b09d149

 ///  File Name: ftpcrack.exe
Description:
Ftpcrack is a brute force FTP service cracker.
Author:K. van der Raad
File Size:20480
Last Modified:Feb 13 17:51:08 2001
MD5 Checksum:3b3a668302ac331c7e27debebc773c83

 ///  File Name: g2kBIOSspoof.zip
Description:
Windows keystroke logger - aimed at stealing a bios password. Visual Basic source included.
Author:Sodaphish
File Size:28590
Last Modified:Apr 20 16:04:00 2000
MD5 Checksum:9c715294ff53e44d81234a65127ed5f6

 ///  Directory: / genius /
Description:
Genius - Enhancements for Windows 95/98/NT
Total Files:6
Last Modified:Oct 15 22:31:40 2007

 ///  File Name: genius10.zip
Description:
Genius v1.0 - The full-featured, final release of the Genius Swiss Army Knife, by Messiah and sinnerz.com. Excellent tool for Win95/98/NT.
File Size:1084741
Last Modified:Aug 16 20:04:11 1999
MD5 Checksum:4bb961f27a7dbcd380d8c47dbf382924

 ///  File Name: getwksinfo.exe
Description:
Getwksinfo is a little program coded for Windows 95/98/NT/2000 that gets the parameters of a remote Windows NT server, parameters include NetBIOS name, NetBIOS domain/workgroup, amount of users currently logged in, and remote operating system version.
Author:Missnglnk
Homepage:http://tribune.intranova.net/archives/
File Size:80896
Last Modified:Jan 11 16:30:29 2000
MD5 Checksum:8d0c2ceb3d5086baac6b4dbd29ecfdb8

 ///  File Name: gooey.txt
Description:
Gooey chatversion 1.0 and 2.0beta uses a very weak encryption scheme to store the password in the registry.
Author:forensic
File Size:1580
Last Modified:Nov 2 17:36:43 1999
MD5 Checksum:a9f24a88a897801bfc6a960a8ff5f5c8

 ///  File Name: gswtnet.zip
Description:
Windows NT Secure Telnet Server with FULL data stream encryption. Loads of features, turns NT servers into true, secure multi-user systems.
Author:Georgia Softworks.
File Size:933204
Last Modified:Aug 16 20:04:13 1999
MD5 Checksum:6695c700cf15757bcea3dfbae60de133

 ///  File Name: gzip.exe
Description:
Gzip for Windows! gzip is gnu zip. This is the self extracting archive.
Homepage:http://www.gzip.org
File Size:159995
Last Modified:Oct 28 16:49:41 2000
MD5 Checksum:b83c0bb3bfa36e832ad6108d6c81d036

 ///  File Name: gzip124xN.zip
Description:
GNU zip (gzip) for Windows!
File Size:62203
Last Modified:Oct 28 16:47:50 2000
MD5 Checksum:6ce3d0ea4c41189c4c7cc090161ffc66

 ///  File Name: has.zip
Description:
Hash Analysis Studio is an advanced open source cryptanalysis Windows application for attempting to recover messages/strings from an MD5, SHA-1 or SHA256 hash string. It has a powerful brute force engine along with a large dictionary compilation of common words and phrases. Included is a quick hash generator and documentation. This is meant to encourage the study of one-way hash functions and their applications in every day life.
Author:David Midkiff
Homepage:http://www.simtel.net/pub/pd/56834.shtml
File Size:11291959
Last Modified:Nov 17 01:54:41 2001
MD5 Checksum:65684b7afea62f95eb13c402b7b2f9bb

 ///  File Name: hedgehog_poc.zip
Description:
HedgeHog is a simple proof-of-concept portscanner written in VBA for Excel. Useful utility for scanning when in a locked down terminal environment.
Author:Jonas Ländin
Homepage:http://www.cqure.net
File Size:26057
Last Modified:Nov 30 21:15:19 2003
MD5 Checksum:fadb0136606db217cb2074032729f149

 ///  File Name: hfn.exe
Description:
Hackn' for Newbies is an all in one package for someone who has never used trojans, but would like to start. It contains the deepthroat 2.0 and netbus 1.7 trojan interface along with various scanners,an exe patcher,pasword crackers,user configurable buttons and more.
Author:rastas dabastas
File Size:3160772
Last Modified:Jan 4 03:50:01 2000
MD5 Checksum:a52b20347ec1065995f8b5e63b00aa64

 ///  File Name: Hijetter_exe.zip
Description:
Hijetter is a tool to directly communicate with network printers via the Printer Job Language (PJL) using port 9100. Features include full file system access (if installed on printer), environment variable "tuning" and setting of display messages. Platform: Windows
Author:FX
Homepage:http://www.phenoelit.de
File Size:682602
Last Modified:Aug 18 16:05:09 2002
MD5 Checksum:07a783e8707067206ed8dfde874a331b

 ///  File Name: hk2000.exe
Description:
History Kill 2000 for Windows removes all traces of history in both Netscape and IE by removing URL drop-list history, detailed history file, cache, and cookies. 21 day evaluation.
Author:Swanksoft
Homepage:http://www.swanksoft.com/historykill/
File Size:2237312
Last Modified:Feb 18 13:39:49 2000
MD5 Checksum:e1dd9d07b98ea1ffa5bbb22230393576

 ///  File Name: HookExplorer.zip
Description:
HookExplorer is a small GPL utility designed to scan a target process and identify any IAT or detours style hooks that may be installed by unknown code. Data is presented in an easy to digest format and allows for custom filters to help trim results.
Homepage:http://labs.idefense.com/labs-software.php?show=19
File Size:250442
Last Modified:Apr 4 16:59:34 2006
MD5 Checksum:2bb04344700caf643472255f3c4dafbf

 ///  File Name: httpg.asm
Description:
httpg.asm - uses the WinInet module to download and execute a file. Assembles to 432 bytes.
Author:Orcrist
Homepage:http://orcrist.box.sk
File Size:5661
Last Modified:Dec 2 23:29:52 2000
MD5 Checksum:160a57a55dc47950382dd1aabcff7d31

 ///  File Name: httprint_win32_107.zip
Description:
httprint is a web server fingerprinting tool. It relies on web server characteristics to accurately identify web servers, despite the fact that they may have been obfuscated by changing the server banner strings, or by plug-ins such as mod_security or servermask. httprint can also be used to detect web enabled devices which do not have a server banner string, such as wireless access points, routers, switches, cable modems, etc. httprint uses text signature strings and it is very easy to add signatures to the signature database. The current version of httprint can import web servers from nmap network scans, if they are saved in XML format. Microsoft Windows version.
Homepage:http://net-square.com/httprint/
File Size:826843
Last Modified:Oct 15 00:06:41 2003
MD5 Checksum:1277e772b4871fba372f9ec8d18d39c6

 ///  File Name: httprint_win32_200.zip
Description:
httprint is a web server fingerprinting tool. It relies on web server characteristics to accurately identify web servers, despite the fact that they may have been obfuscated by changing the server banner strings, or by plug-ins such as mod_security or servermask. httprint can also be used to detect web enabled devices which do not have a server banner string, such as wireless access points, routers, switches, cable modems, etc. httprint uses text signature strings and it is very easy to add signatures to the signature database. httprint can import web servers from nmap network scans, if they are saved in XML format. The current version adds the ability to save reports in CSV and XML formats, and features a completely new method of scoring by confidence ratings to minimize false positives. This version is the Windows release.
Author:Saumil Shah
Homepage:http://net-square.com/httprint/
File Size:844613
Last Modified:Jan 8 00:39:43 2004
MD5 Checksum:483f22a5e6ad0041e7920303632012aa






 ///  File Name: httprint_win32_202.zip
Description:
httprint is a web server fingerprinting tool. It relies on web server characteristics to accurately identify web servers, despite the fact that they may have been obfuscated by changing the server banner strings, or by plug-ins such as mod_security or servermask. httprint can also be used to detect web enabled devices which do not have a server banner string, such as wireless access points, routers, switches, cable modems, etc. httprint uses text signature strings and it is very easy to add signatures to the signature database. httprint can import web servers from nmap network scans, if they are saved in XML format. The current version adds the ability to save reports in CSV and XML formats, and features a completely new method of scoring by confidence ratings to minimize false positives. This version is the Windows release.
Author:Saumil Shah
Homepage:http://net-square.com/httprint/
Changes:Version 202 has a completely rewritten engine, internally, to increase efficiency and portability across platforms. A minor feature enhancement in version 202 is the ability to automatically follow 301 and 302 redirections.
File Size:797036
Last Modified:May 25 17:55:14 2004
MD5 Checksum:20bc7ccb135a893b243cf4ebf624a8a1

 ///  File Name: httprint_win32_301.zip
Description:
httprint is a web server fingerprinting tool. It relies on web server characteristics to accurately identify web servers, despite the fact that they may have been obfuscated by changing the server banner strings, or by plug-ins such as mod_security or servermask. httprint can also be used to detect web enabled devices which do not have a server banner string, such as wireless access points, routers, switches, cable modems, etc. httprint uses text signature strings and it is very easy to add signatures to the signature database. httprint can import web servers from nmap network scans, if they are saved in XML format. The current version adds the ability to save reports in CSV and XML formats, and features a completely new method of scoring by confidence ratings to minimize false positives. This version is the Windows release.
Author:Saumil Shah
Homepage:http://net-square.com/httprint/
Changes:New multi-threaded engine. SSL in formation gathering. Automatic SSL port detection. Various bug fixes.
File Size:811893
Last Modified:Dec 28 18:16:18 2005
MD5 Checksum:a66408308c3f540030bbb0d59716b032

 ///  File Name: hwing.zip
Description:
hwing is a win32 version of the ever favorite utility hping. It allows an administrator the ability to send customized pings, gather raw fingerprinting data, and more. Original Linux version is available here. Original Solaris version is available here.
Author:snooq
Homepage:http://www.angelfire.com/linux/snooq
File Size:32392
Last Modified:Nov 30 21:44:51 2003
MD5 Checksum:3d1590eecaf0a8d36ec6c1119e6f24f0

 ///  File Name: icmp_tunnel.h
Description:
Covert Tunnelling in ICMP 0x00 ECHO REPLY messages for Windows.
Author:Dark Schneider
File Size:4716
Last Modified:Jan 10 14:16:44 2000
MD5 Checksum:b13a7e398e176106aec24e9a357ab0fe

 ///  File Name: iehist-src-0_0_1.zip
Description:
IEHist dumps Internet Explorer history from index.dat files into delimited files suitable for import into other tools.
Author:Patrik Karlsson
Homepage:http://www.cqure.net/tools.jsp?id=13
File Size:14982
Last Modified:Apr 3 11:16:40 2003
MD5 Checksum:a27a5c5e28e8ed10f599dc3da80177bb

 ///  File Name: IEreg.zip
Description:
Registry updates for Microsoft Windows that help to prevent priorly unknown IE flaws from compromising a machine due to cross zone access flaws.
Author:http-equiv, Christopher V. Calderon
File Size:505
Last Modified:Jun 14 06:45:25 2004
MD5 Checksum:d4be5b8effb7a0704e84810788258652

 ///  File Name: ifstat.zip
Description:
Ifstat is a command line bandwidth monitor for Windows.
Author:Cys
File Size:16656
Last Modified:Sep 17 18:34:46 2002
MD5 Checksum:319932c9b13de5e6ef00776bb00623e2

 ///  File Name: IISS_ap.ZIP
Description:
Microsoft Access database password cracker. Works on Access 97 or Access 2000.
Author:Icer
Homepage:http://ic3d.tsx.org
File Size:8655
Last Modified:Nov 15 21:06:09 1999
MD5 Checksum:921ecb9144bdf5278c5b5332caadbb05

 ///  File Name: incntrl3.zip
Description:
InCtrl 3 lets you track system changes made by Windows 95 and Windows NT installation programs. It tracks file additions and deletions as well as changes made to .INI files. In addition, it handles long filenames and tracks changes to the Registry.
File Size:244285
Last Modified:Aug 16 20:04:14 1999
MD5 Checksum:c2ce08acdcb732d56cefa7bffd4f380a

 ///  File Name: IP_Converter.exe
Description:
Dotted IP to 32 bit long IP converter, for Windows. Binary only.
Author:Negative9
File Size:315392
Last Modified:Nov 8 20:10:35 2003
MD5 Checksum:c946cdc87a9f3f2001fbaa1a70172251

 ///  File Name: ipeyegui.rar
Description:
This is a GUI for the windows TCP portscanning tool ipEye. ipEye GUI comes with a copy of ipEye, and include visual basic 6 source code.
Author:Digital Blast Inc.
Homepage:http://digitalblast.shinranet.com/
File Size:42893
Last Modified:Oct 18 19:24:58 2005
MD5 Checksum:97dde445e1208c331949d061f490080c

 ///  File Name: IRCR.zip
Description:
IRCR is a collection of tools that gathers and/or analyzes forensic data on a Microsoft Windows system. You can think of this as a snapshot of the system in the past. It is similar to TCT by Dan Farmer and Wietse Venema, as most of the tools are oriented towards data collection rather than analysis. The idea of IRCR is that anyone could run the tool and send the output to a skilled Windows forensic security person for further analysis.
Author:John McLeod
Homepage:http://www.incident-response.org/IRCR.htm
File Size:1054972
Last Modified:Apr 24 21:10:04 2001
MD5 Checksum:59c334066248e963dc735f43cbbd76dd

 ///  File Name: IRCRv2.1.zip
Description:
The Incident Response Collection Report is a script to call a collection of tools that gathers and/or analyzes data on a Microsoft Windows system. You can think of this as a snapshot of the system in the past. Most of the tools are oriented towards data collection rather than analysis.
Author:John McLeod
Homepage:http://tools.phantombyte.com/
Changes:IRCR version 2 is a complete code change from Perl to DOS batch file. Anyone should be able to modify the batch file to suite their needs. Requires the HELIX (www.e-fense.com/helix) IR folder to run.
File Size:32300
Last Modified:Aug 13 03:06:23 2005
MD5 Checksum:7061fd54ada29878c7b513b9cff1bc39

 ///  File Name: IRCRv2.3.zip
Description:
The Incident Response Collection Report is a script to call a collection of tools that gathers and/or analyzes data on a Microsoft Windows system. You can think of this as a snapshot of the system in the past. Most of the tools are oriented towards data collection rather than analysis.
Author:John McLeod
Homepage:http://tools.phantombyte.com/
Changes:Fixed all path and command locations to meet Helix version 1.8 areas.
File Size:35580
Last Modified:Nov 20 11:56:52 2006
MD5 Checksum:98d72034d5d39c40a39cc6fb8b2c53ea

 ///  File Name: k-mac.zip
Description:
K-MAC is an ethernet MAC address changer for Microsoft Windows. Binary only is included.
Author:M. Neset KABAKLI
Homepage:http://www.neset.com/
File Size:481691
Last Modified:Aug 24 04:35:56 2004
MD5 Checksum:f4dabed5c32b2c12d1d80e85cc3c5e4a

 ///  File Name: k9-setup.exe
Description:
K9 is a Windows tool for passive OS detection. It uses WinPCAP to capture network traffic and a user friendly interface to handle results, fingerprint database, etc.
Author:Robota
Homepage:http://www.robota.net
File Size:204920
Last Modified:Apr 25 01:10:24 2002
MD5 Checksum:d3be655ac792af0cab135030a967cf03

 ///  File Name: KeepAlive.tar.gz
Description:
This is a Cygwin port of keepalive.c, which sends a null character every couple minutes, keeping alive telnet/ssh connections forever. Ported by Luigi Grandini
File Size:354205
Last Modified:Jun 5 12:43:58 2002
MD5 Checksum:4472d085e13103da05fe144501464e36

 ///  File Name: keylog25.exe
Description:
MS-DOS keystroke logger.
File Size:56569
Last Modified:Aug 16 20:04:12 1999
MD5 Checksum:48a08dea850e752696f9d06e34d9008e

 ///  File Name: KILLOE.zip
Description:
KillOE is a modified msoe.dll which gets rid of the MSN Outlook Express 5.5 Banner when used in conjunction with hotmail accounts. Replacing C:\program files\Outlook Express\msoe.dll with this version of the DLL will allow you to use whatever HTML code you wish to see in place of the banner. No longer supported by author.
Author:Digital Vampire
File Size:640301
Last Modified:Feb 27 03:14:57 2001
MD5 Checksum:9d781337839c84e4a5fde52f6fb44fc5

 ///  File Name: KNOCK-0-81.ZIP
Description:
The Doorman is a port-knocking listener daemon which helps users secure private servers. It allows a server to run invisibly, with all TCP ports closed. This version is the Microsoft Windows binary executable release.
Author:Bruce Ward
Homepage:http://doorman.sourceforge.net/
Changes:Fixed the silent doorman problem.
File Size:36738
Last Modified:Sep 7 04:36:53 2005
MD5 Checksum:c299f069aded9f65d74c37de0c93e031

 ///  File Name: Kohlea.exe
Description:
Unavailable.
File Size:547840
Last Modified:Dec 4 02:57:18 2002
MD5 Checksum:66319c09cf0bbeb389182434acadfb95

 ///  File Name: KomodiaLSP.zip
Description:
A repacked version of the Microsoft free LSP sample and Komodia's LSP guide. LSP is a technology that allows to intercepts all commands between an application and winsock (ws2_32.dll) thus allowing to log all network data, modify network commands and even change inbound/outbound data.
Author:Barak Weichselbaum
Homepage:http://www.komodia.com/
File Size:347055
Last Modified:Dec 21 18:03:58 2006
MD5 Checksum:081cca7fedf92a49ec20deae011b2235

 ///  File Name: languard.exe
Description:
LANguard Internet Access Control monitors all Internet traffic to prevent unproductive use of the Internet. Its rules engine allows you to specify which sites are allowed, and what type of content your users can search for or read. LANguard has extensive internet usage reporting tools. Because LANguard uses a sniffer engine, it is easy to install and does not affect Internet performance or require you to reconfigure your network clients. It also protects against; External threats (hackers), Internal threats (users accessing shares they are not authorized).
Homepage:http://www.languard.com
File Size:3116762
Last Modified:Mar 11 18:37:00 2000
MD5 Checksum:1106d8ff30114479d14721a57d966703

 ///  File Name: lbrute.zip
Description:
lbture is a local Windows account password brute forcer. It supports dictionary attacks and resume. Works on Windows NT/2K/XP/2K3.
Homepage:http://warl0ck.metaeye.org/
File Size:40640
Last Modified:Apr 12 00:22:52 2006
MD5 Checksum:7b9101ddddd40f32e3d74eda14219e54

 ///  File Name: leviathan.zip
Description:
The Leviathan Auditor is an enumeration and penetration testing tool which runs on and against Microsoft machines. It dumps Users, Groups, Services, Shares, Transport devices and MAC addresses over port 139 or 445. It enumerates RPC portmapper entries over port 135 and also tries to exploit MS SQL servers if it is presented. With its built-in SQL Server exploit you can execute remote commands as Local System. Source code is freely available on demand.
Author:Egemen Tas
File Size:862742
Last Modified:Jan 25 01:54:20 2002
MD5 Checksum:6904f9d4553cfc85ac0b86d6f3bf1aa5






 ///  File Name: libPJL-1.2-src.tgz
Description:
PFT is a command line tool to directly communicate with network printers via the Printer Job Language (PJL) using port 9100. Features include full file system access (if installed on printer), environment variable "tuning" and setting of display messages. Platform: Windows and UNIX
Author:FX
Homepage:http://www.phenoelit.de/
File Size:58549
Last Modified:Aug 18 16:07:57 2002
MD5 Checksum:f3ba61afdaead2f44d21a2e001cb0aef

 ///  File Name: log40free.zip
Description:
This tool is a log file monitoring and centralization tool. You can use it to monitor the Event Viewer logs, and ASCII log files from just about any application, including, but not limited to, antivirus, personal firewalls, ComLog, Snort, etc. LogAgent 4.0 also comes with 2 companion tools that are ADSScan and the combo HashGen and IntegCheck. ADSScan is an alternate data streams scanner, and HashGen/IntegCheck is a MD5-SHA1 file system integrity checker, or also known as a host-based intrusion detection system.
Author:Floydman
Homepage:http://securit.iquebec.com
File Size:2139232
Last Modified:May 29 01:10:16 2003
MD5 Checksum:68928c66d3b622655059be9ec939d474

 ///  File Name: logagnt20beta.txt
Description:
Logagent is a Windows tool in Perl which monitors several ascii logfiles and redirect any change made to a central location. Supports remote logging.
Author:Floydman
Homepage:http://securit.iquebec.com
File Size:17838
Last Modified:May 15 00:23:20 2002
MD5 Checksum:94562194a468e624d9aa592f1285d8db

 ///  File Name: logids10free.zip
Description:
LogIDS 1.0 is a real-time, log-analysis based intrusion detection system able to analyze log files from various sources, and can be used with LogAgent 4.0 to supply these log files. This utility allows for a user specified formatting of each log file it utilizes which then enables an end user to define rules for each of the files given, resulting in one single interface to analyze and display all this data gathered from varied sources, IE. Event Viewer, ComLog, antivirus logs, personal firewall logs, Snort logs, LogAgent 4.0 Pro Logs, ADSscan, IntegCheck, just to name a few examples. The interface is also pretty innovative as the GUI is a logical representation of your network architecture, where each node possesses its own window where logs belonging to it are displayed. Sounds can also be emitted for alerts and warnings with this utility. Screen captures are available here and here.
Author:Floydman
Homepage:http://securit.iquebec.com
File Size:1191128
Last Modified:May 30 06:22:08 2003
MD5 Checksum:f96604ce04c23e41dfef32bdd05ecc26

 ///  File Name: logids20free.zip
Description:
LogIDS 2.0 is a real-time, log-analysis based intrusion detection system able to analyze log files from various sources, and can be used with LogAgent 4.0 to supply these log files. This utility allows for a user specified formatting of each log file it utilizes which then enables an end user to define rules for each of the files given, resulting in one single interface to analyze and display all this data gathered from varied sources, IE. Event Viewer, ComLog, antivirus logs, personal firewall logs, Snort logs, LogAgent 4.0 Pro Logs, ADSscan, IntegCheck, just to name a few examples. The interface is also pretty innovative as the GUI is a logical representation of your network architecture, where each node possesses its own window where logs belonging to it are displayed. Sounds can also be emitted for alerts and warnings with this utility. Screen captures are available here and here.
Author:Floydman
Homepage:http://securit.iquebec.com
Changes:Minimal cross-compatibility changes.
File Size:1084512
Last Modified:Nov 5 22:25:13 2003
MD5 Checksum:9ff43cf56c9ff7a970e6fce1e066b61f

 ///  File Name: lsadump2.zip
Description:
This is an application to dump the contents of the LSA secrets on a machine, provided you are an Administrator. It uses the same technique as pwdump2 to bypass restrictions that Microsoft added to LsaRetrievePrivateData(), which cause the original lsadump to fail.
Author:Izar
File Size:97086
Last Modified:Feb 17 14:25:38 2000
MD5 Checksum:2d8b4b37e20f1a5249e5be486bfa1d17

 ///  File Name: mac_v01.zip
Description:
MAC address modification utility for Windows 2000 / XP / 2003 Server.
Author:Gogu Gigi
File Size:8192
Last Modified:Jan 7 11:34:48 2005
MD5 Checksum:d02dc661b03005c109e03c5be8cde416

 ///  File Name: macromedia_decrypter.zip
Description:
Macromedia Decryptor is a utility which decrypts the the website password stored in the registry by all the macromedia dreamweaver (tested on ultradev 3 and 4).
Author:Dart and Wanderlus7
File Size:275272
Last Modified:May 30 15:24:00 2001
MD5 Checksum:c835b124eb456bdb9d472e7c1cd42fb2

 ///  File Name: mbenum-src-1_5_0.zip
Description:
MBEnum is a tool that queries the master browser for whatever has been registered. Helpful in giving an overall view of a Microsoft Window environment.
Homepage:http://www.cqure.net
File Size:19090
Last Modified:Oct 14 00:28:36 2003
MD5 Checksum:1f5144185a6ff241280623ad46cd941b

 ///  File Name: MDCrack.zip
Description:
Win32 port of MD5Crack.
Author:Goldie
Homepage:http://www.checksum.org/library/checksum
File Size:28356
Last Modified:Mar 19 03:28:46 2001
MD5 Checksum:ec809b1a55bd17be6c6c3f7d27237cc4

 ///  File Name: mersypop3.zip
Description:
MersyPop3.exe is a tool that can be used by network administrators to test the strength of pop3 passwords. A "Guessing" utility.
Author:snake and rootshell
File Size:29662
Last Modified:Aug 30 20:29:09 2000
MD5 Checksum:d540e0dbe7b6eb220ac15e86357db572

 ///  File Name: metacab-2006-04-R3.zip
Description:
Metacab (meta.cab) is a single, inclusive Microsft CAB file of remote administration tools. The CAB file and everything within can be decompressed, installed and used with only cmd.exe. Includes: WinPcap needed for Nmap, DCOM RPC overflow exploit, Simple bat file to ping sweep a Class D, HOD's PnP exploit, Netcat CAB, Nmap CAB, VNC CAB.
Author:Phoenix 2600
Homepage:http://www.phx2600.org
File Size:1116569
Last Modified:Apr 17 14:45:28 2006
MD5 Checksum:6e4ae30da5c8fe91318f6252447e5cf1

 ///  File Name: metacab-2006-04-R5.zip
Description:
Metacab (meta.cab) is a single, inclusive Microsft CAB file of remote administration tools. The CAB file and everything within can be decompressed, installed and used with only cmd.exe. Includes: WinPcap needed for Nmap, DCOM RPC overflow exploit, Simple bat file to ping sweep a Class D, HOD's PnP exploit, Netcat CAB, Nmap CAB, VNC CAB.
Author:Phoenix 2600
Changes:Now includes TCPDUMP, install.bat hides Metacab install, map.bat timeout cut in half, Naming is cleaner, Updated README, including links to sources. Homepage http://www.phx2600.org.
File Size:1398661
Last Modified:Apr 27 18:04:45 2006
MD5 Checksum:c6ee4155396f5027ab2b60cb3d79f2fd

 ///  File Name: mfsetup.zip
Description:
Modem Finder v2.0b84 is a Windows based wardialer.
Author:Movax4c00int21h
Homepage:http://www.geocities.com/~weborg/mf.htm
Changes:Added error correction to prevent crashes from opening comm port, fixed problem with not being able to set comm port or dialing method in options menu.
File Size:1688908
Last Modified:Jan 12 16:52:18 2000
MD5 Checksum:9b3a5a8cc04a2b270a3650f88bd1b8f9

 ///  File Name: minishell.zip
Description:
Small bindshell (908 bytes for binary) for Windows compacted to 804 bytes with a little Headers modification. Both binary and Source code (VC++) included.
Author:Tarako, aT4r
Homepage:http://www.haxorcitos.com/
File Size:5206
Last Modified:Feb 13 23:52:12 2006
MD5 Checksum:e275e14e75886fcd4294ead4c4c1667b

 ///  Directory: / misc /
Description:
Miscellaneous Windows Files (e.g. OCX/VB/Winsock) to run certain applications.
Total Files:32
Last Modified:Sep 5 21:26:27 2007

 ///  File Name: mousemove.zip
Description:
Moves your mouse every specified period of time. Can be very useful for things that check this, like free internet service.
Author:Cash4All Admin
Homepage:http://members.xoom.com/_XM%20CM/mousemove/index2.html
File Size:35285
Last Modified:Feb 10 21:09:37 2000
MD5 Checksum:d071983ea033a97f21b8c85b6e1ac395

 ///  File Name: ms99-061.info.txt
Description:
More information on the vulnerability described in ms99-061, a problem in IIS that causes it to parse invalid escape sequences, allowing a carefully made string to bypass IDS systems, ISAPI filters, and extension handlers. Includes a perl script to test for vulnerability.
Author:Rain Forrest Puppy
File Size:4080
Last Modified:Dec 30 18:01:23 1999
MD5 Checksum:0af787a2fcf7d7bcecc7e44df69fa355

 ///  File Name: MSDecripter.exe
Description:
Decrypt MSN passwords from the registry.
Author:Underground Security Systems Research
File Size:8192
Last Modified:Oct 21 15:57:37 1999
MD5 Checksum:c6442d27f5961cf863535a34473baf8e

 ///  File Name: msnfuzzer.txt
Description:
Fuzzer that can be used for checking MSN passwords.
Homepage:http://www.class101.org/
File Size:17337
Last Modified:Aug 11 01:09:27 2005
MD5 Checksum:25c1e4a9daf86d6454c5fd253da92841

 ///  File Name: N-Stealth-3.5-b62.zip
Description:
N-Stealth v3.5 is a vulnerability assessment tool for Windows which scans webservers for bugs that allow attackers to gain access. Uses a database of 19,000 vulnerabilities and exploits.
Author:Felipe Moniz
Homepage:http://www.nstalker.com
Changes:New holes added. Improved Top 20 Scan (based on SANS/FBI Top 20 v2.6). Improved N-Stealth Report. New interface adjustments. Code optimization.
File Size:1097370
Last Modified:Oct 22 00:54:55 2002
MD5 Checksum:edf1c589ee4ecaa6510b928f8ea8aded

 ///  File Name: NamedPipes.zip
Description:
This tool allows you to impersonate user credentials (with namedpipes) and execute a shell. One of the best features of this tool is that it includes some new attack vectors (payload generator with -t parameter) to force network users to connect to a remote host (desktop.ini, html code, lnk files, url files,pps,) so smbrelay can also be used.
Author:Andres Tarasco Acuńa
Homepage:http://www.514.es/
File Size:13322
Last Modified:Oct 9 00:50:07 2006
MD5 Checksum:390e81394206a7f20af432fe95663554

 ///  File Name: nbtdump.exe
Description:
This utility dumps NetBIOS information from Windows NT, Windows 2000 and *NIX Samba servers such as shares, user accounts with comments etc and the password policy. Runs on Windows NT 4 and Windows 2000.
Author:Cerberus Information Security
Homepage:http://www.cerberus-infosec.co.uk/
File Size:40960
Last Modified:Dec 3 19:34:46 1999
MD5 Checksum:25f8e68d1f37ba224eea83cb4465dffa

 ///  File Name: NBTEnum10.zip
Description:
NBTEnum 1.0 is a utility for Windows which can be used to enumerate one single host or an entire class C subnet. This utility can run in two modes: query and attack. The main difference between these modes is that when NBTEnum is running in attack mode it will seek for blank password and for passwords that are the same as the username but then in lowercase letters.
Author:NTSleuth
File Size:584820
Last Modified:Jan 10 23:56:49 2002
MD5 Checksum:24d2a81f09cb3b55dacc62f7c133fb99

 ///  File Name: NBTEnum11.zip
Description:
NBTEnum 1.1 is a utility for Windows which can be used to enumerate one single host or an entire class C subnet. This utility can run in two modes: query and attack. The main difference between these modes is that when NBTEnum is running in attack mode it will seek for blank password and for passwords that are the same as the username but then in lowercase letters.
Author:NTSleuth
Homepage:http://ntsleuth.0catch.com/
Changes:Dictionary attack added, now does enumeration of NT version and Service Pack level, AutoAdminLogon detection, WinVNC encrypted password extraction, and Enumeration of NT services.
File Size:644029
Last Modified:Jan 31 01:51:56 2002
MD5 Checksum:860c595884ace0c85030e2b74cca7ac8






 ///  File Name: NBTEnum12.zip
Description:
NetBIOS Enumeration Utility v1.2 (command line version) is a utility for Windows which can be used to enumerate NetBios information from one single host or an entire class C subnet. The information that is enumerated includes the account lockout threshold, local groups and users, global groups and users, and shares. This utility will also perform password checking with the use of a dictionary file. Runs on Windows NT 4.0/2000/XP.
Author:NTSleuth
Homepage:http://ntsleuth.0catch.com/
Changes:New enumeration routines, better HTML reporting, support for IP input file.
File Size:617960
Last Modified:Apr 25 00:52:38 2002
MD5 Checksum:2dea94401be86154c64562fa34a34027

 ///  File Name: NBTEnum20.zip
Description:
NetBIOS Enumeration Utility v2.0 is a utility for Windows which can be used to enumerate NetBios information from one single host or an entire class C subnet. The information that is enumerated includes the account lockout threshold, local groups and users, global groups and users, and shares. This utility can also check for blank passwords and for passwords that are the same as the username in lowercase letters. Runs on Windows NT 4.0/2000/XP.
Author:NTSleuth
Homepage:http://ntsleuth.0catch.com/
Changes:Enumerates more things. Bugs were fixed. Features were added.
File Size:59650
Last Modified:Feb 27 00:21:29 2002
MD5 Checksum:2f0427a1f49400313b8c785fc6588afd

 ///  File Name: NBTEnum20beta1.zip
Description:
NetBIOS Enumeration Utility v2.0 beta 1 is a utility for Windows which can be used to enumerate one single host or an entire class C subnet. This utility can run in two modes: query and attack. The main difference between these modes is that when NBTEnum is running in attack mode it will seek for blank password and for passwords that are the same as the username but then in lowercase letters. Runs on Windows NT 4.0/2000/XP.
Author:NTSleuth
Homepage:http://ntsleuth.0catch.com/
Changes:Enumerates more things. Checks for user accounts with blank passwords and accounts with the same username and password.
File Size:42453
Last Modified:Feb 26 00:35:40 2002
MD5 Checksum:720662512acf6434193129146b44974f

 ///  File Name: NBTEnum21.zip
Description:
NetBIOS Enumeration Utility v2.0 is a utility for Windows which can be used to enumerate NetBios information from one single host or an entire class C subnet. The information that is enumerated includes the account lockout threshold, local groups and users, global groups and users, and shares. This utility will also perform password checking with the +use of a dictionary file. Runs on Windows NT 4.0/2000/XP.
Author:NTSleuth
Homepage:http://ntsleuth.0catch.com/
Changes:Bug fixes.
File Size:68802
Last Modified:Mar 22 11:01:20 2002
MD5 Checksum:a606b7498943d3b29950151b2b988cd0

 ///  File Name: NBTEnum30.zip
Description:
NetBIOS Enumeration Utility v3.0 is a utility for Windows which can be used to enumerate NetBIOS information from one host or a range of hosts. The information that is enumerated includes the account lockout threshold, local groups and users, global groups and users, shares, and more. This utility will also perform password checking with the use of a dictionary file. Runs on Windows NT 4.0/2000/XP.
Author:NTSleuth
Homepage:http://ntsleuth.0catch.com/
Changes:Enhanced HTML reporting, bugs fixed. Added new enumeration routines, better HTML reporting, and support for IP input files.
File Size:670341
Last Modified:Jul 4 02:35:40 2002
MD5 Checksum:7716101ce83a03b2481741dd61a062aa

 ///  File Name: nbtenum31eval.zip
Description:
NetBIOS Enumeration Utility v3.1 is a utility for Windows which can be used to enumerate NetBIOS information from one host or a range of hosts. The information that is enumerated includes the account lockout threshold, local groups and users, global groups and users, shares, and more. This utility will also perform password checking with the use of a dictionary file. Runs on Windows NT 4.0/2000/XP.
Author:Lazy Sysadmin
Homepage:http://lazysysadmin.com/
File Size:860044
Last Modified:May 7 17:50:44 2003
MD5 Checksum:1cb19a7ce55cf92c03f23537d2cd7fb2

 ///  File Name: NBTEnum33.zip
Description:
NetBIOS Enumeration Utility (NBTEnum) is a utility for Windows that can be used to enumerate NetBIOS information from one host or a range of hosts. The enumerated information includes the network transports, NetBIOS name, account lockout threshold, logged on users, local groups and users, global groups and users, and shares. If run under the context of a valid user account additional information is enumerated including operating system information, services, installed programs, Auto Admin Logon information and encrypted WinVNC/RealVNC passwords. This utility will also perform password checking with the use of a dictionary file. Runs on Windows NT 4.0/2000/XP/2003. PERL source included.
Author:Reed Arvin
Homepage:http://reedarvin.thearvins.com/tools.html
Changes:Bug fixes. Completely rewritten RestrictAnonymous bypass routine. Included source code for educational purposes.
File Size:1104464
Last Modified:Nov 28 21:41:50 2006
MD5 Checksum:807fcb02ec2c5f28c6c5f3380dd063f3

 ///  File Name: nbtname.exe
Description:
Nbtname.exe is a simple utility that takes a NetBIOS name and puts it through the mangle process to prepare the name for NetBIOS session setups.
File Size:13427
Last Modified:Aug 16 20:04:12 1999
MD5 Checksum:d14e6258f356eb9dfb8dc62c5326599c

 ///  File Name: nbtname.zip
Description:
Nbtname.exe and Rnbtname.exe.
File Size:16919
Last Modified:Aug 16 20:04:12 1999
MD5 Checksum:2d56e932063e95443436538f89ad8ad5

 ///  File Name: nc11nt.zip
Description:
Weld Pond's port of Hobbit's NetCat, the network Swiss Army knife.
File Size:96561
Last Modified:Aug 16 20:04:09 1999
MD5 Checksum:ec23eb106197f0616a7b2b5556ad72bd

 ///  File Name: nemesis11.zip
Description:
Tired of all those annoying windows trojans? are you a sysadmin who's afraid that unsuspecting users on his/her network might run trojans and then come to him with complaints? wanna help your friends by scanning them for trojans? wanna be the greatest script kiddie in the world? then download this super-fast local/remote remote administration trojans scanner (scans for hundreds of annoying trojans).
Author:Raven.
Homepage:http://blacksun.box.sk
File Size:112232
Last Modified:Oct 25 14:32:38 1999
MD5 Checksum:e6df6765681bcad9389ddca60ee43222

 ///  File Name: NESS.txt
Description:
The N(etbios) E(numerating) S(ecurity) S(weep) is a batch file which scans a subnet checking for smb shares and attempts to login as administrator with a null password. Runs under win2k or xp and logs 4 seperate types of info.
Author:Gabriel
File Size:2433
Last Modified:Sep 12 08:53:23 2002
MD5 Checksum:ab758d24dc8cfb631a1cd6aff462385c

 ///  File Name: netbios.bat
Description:
Auto NetBIOS Hacker for Windows 95/98/NT v1.2 - Gets the target's NetBIOS name-table, connects to the IPC$ hidden null share and gives you the available shares of the target with one single command.
Author:Neon-Lenz
Homepage:http://security.ellicit.org
Changes:Command line operation!
File Size:658
Last Modified:Apr 4 06:10:28 2000
MD5 Checksum:08a1acb2d1a9139334663f1da2939c9c

 ///  File Name: netcop16.zip
Description:
Automatic Port Scanner, Finger, Whois, in one small package
File Size:277782
Last Modified:Aug 16 20:04:13 1999
MD5 Checksum:b8d0a6e9ad0f2430390e6ca835f0d5eb

 ///  File Name: NetKnife.zip
Description:
Java-based swiss army knife. GUI-based application with ping, traceroute, finger, whois, DNS, time, quote, pop abstract, pop passwd, network scan, network perfmeter, tcp term. Requires JAVA 1.1.X. Works on all operating systems and platforms.
File Size:63692
Last Modified:Aug 16 20:04:11 1999
MD5 Checksum:beff3572ba49fda4f057e2d1d2e72889

 ///  File Name: NetMAN.zip
Description:
NetMAN is a comprehensive utility for managing Windows NT-based networks. Centralized Registry Editor, Explorer, Share Manager, User Manager, Service Controller, Process Viewer, etc for any machine on the network. Use NetMANs Service Controller to Install/Control services remotely, Edit/Fix registries across the network, LogOff/ShutDown machines, etc. Features: Machine Statistics - IP address, Full name, Type of operating system and its version, Name of users logged on to the machine, Drives on machine; NetMAN Share Manager - Shares on the remote machine and their types, Creating and Managing shares and their permissions, Mapping shares as your local drives, View connected users to those shares and alternatively disconnect them; NetMAN User Manager - Lists all user groups on remote machine, Lists all the members belonging to the User group; NetMAN Service Controller - Services installed, Status of each Service, Start/pause/stop services, Remove (uninstall) services; NetMAN ProcessViewer - Running Processes, Their Process IDs; Remote Access - To shutdown and/or restart a remote machine. Note: You need to have administrative access on target machine to make it work properly.
Author:Cybermedia Software Private Limited (CSPL).
File Size:135995
Last Modified:Aug 16 20:04:16 1999
MD5 Checksum:ea45885bfb8d2fb06daa98706b735e81

 ///  File Name: netstat.zip
Description:
Xnetstat - GUI based netstat monitor for Win95/NT. Simple to use. Coded by Freshman.
File Size:147529
Last Modified:Aug 16 20:04:13 1999
MD5 Checksum:64d42656bd2a7dc91a452861935cde54

 ///  File Name: netw-ib-ox-ag-5.19.0.tgz
Description:
Netwox is a utility that can be thought of as a one stop shop network toolbox. It includes a graphical front-end called Netwag. This kit comes with 150 tools that can be used to perform a multitude of tasks that are very useful to any administrator. It supports various protocols (DNS, FTP, HTTP, NNTP, SMTP, SNMP) and performs low level functions like sniffing, spoofing traffic, and playing client/server roles. Both Windows and Unix versions are included.
Author:Laurent Constantin
Homepage:http://www.laurentconstantin.com/en/netw/
Changes:Feature enhancements and bug fixes.
File Size:2117286
Last Modified:Jul 8 02:31:00 2004
MD5 Checksum:db9a5c43c54921e6ad6455d1c9c530da

 ///  File Name: netwox_netwag-5.16.tgz
Description:
Netwox is a utility that can be thought of as a one stop shop network toolbox. It includes a graphical front-end called Netwag. This kit comes with 150 tools that can be used to perform a multitude of tasks that are very useful to any administrator. It supports various protocols (DNS, FTP, HTTP, NNTP, SMTP, SNMP) and performs low level functions like sniffing, spoofing traffic, and playing client/server roles. Both Windows and Unix versions are included.
Author:Laurent Constantin
Homepage:http://www.laurentconstantin.com/en/netw/
File Size:1594924
Last Modified:May 16 22:04:48 2004
MD5 Checksum:5b45b7dea44ec3cfa9f172b27885753e

 ///  File Name: netzero.c
Description:
NetZero Password Generator - Generates a NetZero username/password pair suitable for use in PPP/Dial-Up Networking.
Homepage:http://tribune.intranova.net/archives/
File Size:5135
Last Modified:Jan 6 17:59:17 2000
MD5 Checksum:88a207ac379bf20093bfe069e0762bf9

 ///  File Name: NmapW_1.0.3_Beta.exe
Description:
NmapW is a free Win32 GUI application for the latest Nmap version. It allows easy access to all features and information and enables users to create and manage various configurations.
Homepage:http://www.syhunt.com
File Size:1440256
Last Modified:May 12 20:02:30 2004
MD5 Checksum:36384c74520991b59b8cc7330011acb8

 ///  File Name: nncookct.zip
Description:
Netscape Navigator Cookie Cutter - Let you choose which cookies to use under Windows Netscape.
Homepage:http://www.roninsg.com/nncookct.htm
File Size:77496
Last Modified:Jan 1 00:35:31 2001
MD5 Checksum:86e6e99134299a355ec53ba16ceab2d4

 ///  File Name: NS102.zip
Description:
Net Sentinel 1.02a - This program: checks continuously the users connected to the share on your computer, warns you as soon as someone is connected, works under WIN 98 and WIN NT4.
Homepage:http://www.surf.be/members/FdW/NS/NS.htm
File Size:1196991
Last Modified:Jan 25 21:28:47 2000
MD5 Checksum:7430097f10b3734ba53f511c2a4db33c

 ///  File Name: NScan0666b14f.zip
Description:
NScan is a very fast portscanner for Windows (up to 200 ports per second) for both hosts and large networks with numerous features: it scans not only address ranges, but also files with host lists (e.g. proxy list, domain zone or old log), writes logs at the different detail levels, has speed limits, pre-defined service sets and so on. It includes a set of additional tools: whois client, that supports automatic information recognition and fetch, has query history and other features; traceroute, that traces all the way to the host at once in one or two seconds, making route discovery tenth times faster; TCP-based DNS client that supports most of the available options, including AXFR zone transfer.
Author:Averk
Homepage:http://nscan.hypermart.net
Changes:Serious bugfixes, whois improvment.
File Size:329548
Last Modified:Aug 2 18:12:17 2000
MD5 Checksum:bf757939b349ee7b65e191b7f859e477

 ///  File Name: nscan07.exe
Description:
NScan is a very fast portscanner for Windows (up to 200 ports per second) for both hosts and large networks with numerous features: it scans not only address ranges, but also files with host lists (e.g. proxy list, domain zone or old log), writes logs at the different detail levels, has speed limits, pre-defined service sets and so on. It includes a set of additional tools: whois client, that supports automatic information recognition and fetch, has query history and other features; traceroute, that traces all the way to the host at once in one or two seconds, making route discovery tenth times faster; TCP-based DNS client that supports most of the available options, including AXFR zone transfer.
Author:Averk
Homepage:http://nscan.hypermart.net
Changes:Bug fixes and updates.
File Size:495616
Last Modified:Dec 15 16:59:05 2000
MD5 Checksum:ec931ec7b777632e4fa99e1e37ffeb8f






 ///  File Name: null.pl
Description:
Null.pl is a Perl script which uses a dictionary file to launch a brute force attach against a remote host using a null session.
Author:Lawrence Lavigne
Homepage:http://neoerudition.net
File Size:791
Last Modified:Jul 9 02:40:52 2002
MD5 Checksum:c3ee8e2e5ce7d30d55a5caed3e1599d3

 ///  File Name: Null_ProtectNT.c
Description:
Null_ProtectNT.c is a small program that disables NULL access to your Windows NT/2K/XP NetBIOS shares through IPC$.
Author:Ian McKenzie
Homepage:http://www.nullage.com/rf
File Size:597
Last Modified:Dec 5 03:23:13 2002
MD5 Checksum:e987df24c2b46705d9545db6af9ddedc

 ///  File Name: nview10.zip
Description:
NetView Scanner is a suite of three security tools for the system administrator or home user. NetView scans IP addresses for available Windows File & Print Sharing resources, PortScan scans IP addresses for listening TCP ports, and WebBrute scans web directories that are protected with HTTP authentication, testing the strength of the users' passwords. This suite is freeware penetration analysis software that will run on your Windows workstation.
Author:M Adams
Homepage:http://www.rawlogic.com/netview
File Size:254530
Last Modified:Jul 27 23:22:59 2000
MD5 Checksum:f6f6c15022d6554af17d53bf40a58e51

 ///  File Name: nzdial.zip
Description:
NZdial uses the windows API to connect to netzero, using the algorithm from net0.c to obtain the correct username and password.
Author:the plug-0-matic 3.ooo
File Size:39306
Last Modified:Apr 8 16:04:00 2000
MD5 Checksum:ad8f7cc88b225af6f643dc7992f9a588

 ///  File Name: nzero-ae.c
Description:
Quick recode of netzero.c - From 200 lines to 3.
Author:Christopher Abad
File Size:747
Last Modified:Feb 29 03:37:57 2000
MD5 Checksum:d4f4ec753c9ff8e8402d5670c1ea11f7

 ///  File Name: olly_bp_man.zip
Description:
iDEFENSE Labs release of the OllyDbg Breakpoint Manager, an OllyDbg plug-in developed to address some shortcomings of the built-in breakpoint management functionality. The plug-in provides three main functions - breakpoint exporting, breakpoint importing and automatic breakpoint loading. Offsets are used in place of absolute addresses to support setting and restoring breakpoints on modules that move around in memory.
Author:Pedram Amini
Homepage:http://labs.idefense.com
File Size:160324
Last Modified:Apr 17 14:09:20 2005
MD5 Checksum:0c98bebf071a90b41292fd1860c42960

 ///  File Name: olly_heap_vis.zip
Description:
OllyDbg Heap Vis plugin that adds the Heap option under the View menu for Windows variants that do not have this functionality.
Homepage:http://labs.idefense.com/
File Size:329232
Last Modified:Jun 18 15:40:50 2005
MD5 Checksum:815b1dd9cd01a6dae3a2374cac590384

 ///  File Name: OPCODE_OUTPUT.zip
Description:
When you write buffer overflows you need to put the opcodes, not the actual assembly in the script, or file or whatever. This program allows you to insert the assembly into the program, and then it outputs it to a text file in string format so you can put it directly into a char buffer in a C\C++ program.
Author:Jason
Homepage:http://www.technotronic.com/jason/
File Size:6484
Last Modified:Jan 10 14:17:43 2000
MD5 Checksum:7ad978064a420630065e5535d5235cd1

 ///  File Name: optout.exe
Description:
OptOut - A clean and simple Spyware Detection and Removal tool for Windows. Many software now contains the Aureate (Radiate) "Spyware" software that sends some statistics on your computer use into a central server, to be used for "Marketing".
Author:Steve Gibson
Homepage:http://grc.com/optout.htm
File Size:32256
Last Modified:Jan 24 17:24:23 2001
MD5 Checksum:820134fb57554cfe4b794cc0e42053c5

 ///  File Name: ossetup.zip
Description:
Omega Scanner by itself does nothing. When it is loaded with a script, it can be turned into any type of scanner that you specify it to be. For example, if you wish to do a FTP Scanner type scan, all you have to do is browse for that script file and begin the scan. You can also design your own scripts to scan for whatever you wish for.
Author:Ian Tessier
Homepage:http://www.geocities.com/~weborg/
Changes:Omega Script has been updated now supports constants Added new script: SMTP Scanner Fixed bugs in Scan Options menu Fixed bug in Omega Script debugger that would truncate any text after the variables
File Size:1994934
Last Modified:Mar 18 15:31:00 2000
MD5 Checksum:9b8a86f6358361bd907b6cfef5b4af7f

 ///  File Name: ou-audit2002.msi
Description:
Opticon Users 2002 is a simple tool to show administrators who is logged onto the network and from what workstation that user is accessing the network from. Information about the workstation used to logon from, the domain, the logon server, and the date/time of logon is also displayed. This tool makes it easy to spot unauthorized logons from a certain workstation or logons using an administrative account.
Author:Security Storm
Homepage:http://www.securitystorm.net/
File Size:815104
Last Modified:Oct 25 01:26:57 2002
MD5 Checksum:44f1c5880e93cbc062786c7e81bc4ef4

 ///  Directory: / patches /
Description:
Unavailable.
Total Files:3
Last Modified:Sep 5 21:26:30 2007

 ///  File Name: patchit.zip
Description:
Patchit v2.0 is a file byte-patching utility. This is driven by a simple scripting language. It can patch sequences of bytes in any file, search for byte patterns (with wildcards) and also extract and utilize DLL exported function addresses as source positions in files to be patched.
Author:Robin Keir
Homepage:http://www.foundstone.com
File Size:11448
Last Modified:Dec 13 01:24:11 2000
MD5 Checksum:38ec13b906d6b9b617e088171cced2e8

 ///  File Name: Pcanyscan.exe
Description:
Pcanyscan.exe is a windows tool which uses nc.exe to scan for PC Anywhere hosts.
Author:Neon-Lenz
File Size:1982
Last Modified:Oct 3 17:07:44 2000
MD5 Checksum:1818456e0396d33d6798bd2c5e30a10e

 ///  File Name: phasma.gif
Description:
Unavailable.
File Size:11670
Last Modified:Aug 16 20:04:07 1999
MD5 Checksum:ea2d4d3dfe1bb74a6a03196db8d44892

 ///  File Name: phasma14pro_full.zip
Description:
Phasma 1.4 a GUI based anonymous emailer. Allows you to enter arbitrary mail headers.
Author:Phasma
Homepage:http://www.8th-wonder.net
File Size:2425983
Last Modified:Jun 30 12:04:29 2000
MD5 Checksum:2117f99b1344e4ba098dc70fd283c62e

 ///  File Name: phasma_full.zip
Description:
Phasma 1.3 is a GUI based anonymous emailer. Allows you to enter arbitrary mail headers. Screenshot here.
Author:Phasma
Homepage:http://www.ad4.nu
File Size:2264118
Last Modified:Dec 6 18:42:45 1999
MD5 Checksum:d2cfd6c2582a0280f550c1e8ab921aff

 ///  File Name: pocketpc-portscan.zip
Description:
A fully functional TCP port scanner for the PocketPC. Screenshot available here.
Author:Russ Spooner
Homepage:http://www.interrorem.com/software
File Size:2240715
Last Modified:Nov 20 13:12:09 2000
MD5 Checksum:4adf56e6d9bd3d4ee6dfe5d87f427c6e

 ///  File Name: port-block.zip
Description:
Scan and block specific ports from intruders.
File Size:246773
Last Modified:Aug 16 20:04:10 1999
MD5 Checksum:c76a88c1283bd8540db8ea778a110077

 ///  File Name: portblock.zip
Description:
Another port blocking tool.
File Size:3392
Last Modified:Aug 16 20:04:10 1999
MD5 Checksum:f2066daf155b8fd48fc76a55056e4db1

 ///  File Name: portcatch10.zip
Description:
Portcatch listens on a TCP port and records the addresses of people who connect.
Author:Nate D
File Size:197594
Last Modified:Jul 15 17:19:42 2000
MD5 Checksum:99e1d432c7ed1033cd973d409adb94f8

 ///  File Name: portcatch11.zip
Description:
Portcatch listens on a TCP port and records the addresses of people who connect.
Author:NTD
Changes:Updates.
File Size:198193
Last Modified:Dec 11 18:56:33 2000
MD5 Checksum:f3179d4b0439b83a9422fee3d229dc83

 ///  File Name: portforward.zip
Description:
A simple Windows port forwarder
File Size:46233
Last Modified:Oct 9 14:05:13 2002
MD5 Checksum:1005dc5d390236bc03b33938da2ade91

 ///  File Name: porting.zcools.zip
Description:
Exploits ported to Windows with the Cygnus compiler. Includes fuck_them.exe, gdm-exploit.exe, inndx.exe, orgams.exe, portn.exe, rwhokill.exe, tentacle.exe, wingatecrash.exe, and winnuke.exe.
Author:Zcools
File Size:701975
Last Modified:Jul 13 03:06:39 2000
MD5 Checksum:98a48bff9d6048809218ff76f8913158

 ///  File Name: PortListen.zip
Description:
Windows based port listener, with source code. This program opens a port and listens it for connection and received data. Examine source and see how easy a nukenabber can be written.
Author:Misoskian
Homepage:http://www.xcoders.com/
File Size:157684
Last Modified:Jan 25 17:38:48 2000
MD5 Checksum:ef1240a9ac43e7b4454ccd8b7f9c3575






 ///  File Name: portnumbers.html
Description:
Port numbers from 0-1024, with base descriptions.
File Size:42513
Last Modified:Aug 16 20:04:10 1999
MD5 Checksum:0ecc0c5c8ca1a0b19094b9cd0b68675c

 ///  File Name: portnumbers2.html
Description:
Registered port numbers from 1024-47557, with descriptions.
File Size:38818
Last Modified:Aug 16 20:04:10 1999
MD5 Checksum:afb0d37dfee737e35b4ce7577783c7c0

 ///  File Name: ppp_setup.exe
Description:
Increase PPP performance by up to 3x with this excellent freeware program.
File Size:355790
Last Modified:Aug 16 20:04:10 1999
MD5 Checksum:151e636bc72db421bc05cd10ee71b919

 ///  File Name: process_stalker.zip
Description:
Process Stalker is a software package that combines the process of run-time profiling, state mapping, and tracing. Consisting of a series of tools and scripts, the goal of a successful stalk is to provide the reverse engineer with an intuitive visual interface to filtered, meaningful, run-time block-level trace data.
Author:Pedram Amini
Homepage:http://labs.idefense.com/
File Size:978069
Last Modified:Jul 7 09:39:47 2005
MD5 Checksum:279fef6cbfb8a5edddc8456f6942d13b

 ///  File Name: ProcessInjector.zip
Description:
This tool enumerates all processes and threads running and shows their Token owner information. Users with SE_DEBUG_NAME privilege should be able to inject code on a local process and execute code with their privileges. This could be useful to obtain an interactive shell (at port 8080) when an user session is locked.
Author:Andres Tarasco Acuńa
Homepage:http://www.514.es/
File Size:9225
Last Modified:Oct 9 00:45:51 2006
MD5 Checksum:e796f7eec43b81ff4b2e9868c808c48d

 ///  File Name: promiscan002.zip
Description:
Promiscan is Windows software which searches for machines which are in promiscuous mode on the local network.
Author:Daiji Sanai
Homepage:http://www.securityfriday.com/promiscan_doc.html
File Size:266278
Last Modified:Mar 26 17:10:59 2001
MD5 Checksum:367a9f26f3beb8b79fba5068dbc94a03

 ///  File Name: promiscan003.zip
Description:
Promiscan is Windows software which searches for machines which are in promiscuous mode on the local network. It does this quickly and without generating a high network load. Tested on Windows 2000 professional. Requires Winpcap.
Author:Daiji Sanai
Homepage:http://www.securityfriday.com/promiscan_doc.html
Changes:Bug fixes.
File Size:266686
Last Modified:Jul 24 00:18:01 2001
MD5 Checksum:9498905347ab74ac596ecc88939e1b52

 ///  File Name: prosrc.zip
Description:
proDETECT 0.1 BETA is an open source scanner that uses an ARP packet analyzing technique to detect network adapters which are in promiscuous mode. This tool can therefore be used by security administrators to detect sniffers in a LAN. It can be scheduled for regular scanning over periods and includes advanced reporting capabilities. This is the source code package, the binary package is available here. Requires: WinPcap.
Author:Egemen Tas.
Homepage:http://http://www.cmpe.boun.edu.tr/~tas/
File Size:149256
Last Modified:Feb 3 03:19:03 2003
MD5 Checksum:393ab37cabf47a513fd7ebbec6e9e52c

 ///  File Name: proton-1.0.0.4-setup.zip
Description:
Proton is a proxy tunneling application for Windows which supports SOCKS v4 and 5. When a connection is established with ProTon, it'll create a chain of proxy connections through many proxy servers until it reaches its destination.
Author:movax4c00 int21
Homepage:http://www.ftpscanner.com/proton.htm
File Size:70571
Last Modified:Oct 23 22:37:56 2001
MD5 Checksum:049cd55543e4824a92a1808c1d816f98

 ///  File Name: pshtoolkit-1.0.tgz
Description:
The Pass-The-Hash Toolkit contains utilities to manipulate the Windows Logon Sessions maintained by the LSA (Local Security Authority) component. These tools allow you to list the current logon sessions with its corresponding NTLM credentials (e.g.: users remotely logged in thru Remote Desktop/Terminal Services), and also change in runtime the current username, domain name, and NTLM hashes (YES, PASS-THE-HASH on Windows!). Both source tarball and binary tarballs are included.
Author:Hernan Ochoa
Homepage:http://oss.coresecurity.com/
File Size:122577
Last Modified:Aug 16 04:51:32 2007
MD5 Checksum:93512dd3912e0cbc8c16551c50592991

 ///  File Name: pshtoolkit-1.1.tgz
Description:
The Pass-The-Hash Toolkit contains utilities to manipulate the Windows Logon Sessions maintained by the LSA (Local Security Authority) component. These tools allow you to list the current logon sessions with its corresponding NTLM credentials (e.g.: users remotely logged in thru Remote Desktop/Terminal Services), and also change in runtime the current username, domain name, and NTLM hashes (YES, PASS-THE-HASH on Windows!). Both source tarball and binary tarballs are included.
Author:Hernan Ochoa
Homepage:http://oss.coresecurity.com/
Changes:Improvements for the German and French versions of Microsoft Windows XPSP2, Windows 2003 SP1/SP2, and more.
File Size:134356
Last Modified:Sep 5 01:08:20 2007
MD5 Checksum:c3c250b9475fbfe42cf275475d05bd3c

 ///  File Name: pshtoolkit_v1.2_src.tgz
Description:
The Pass-The-Hash Toolkit contains utilities to manipulate the Windows Logon Sessions maintained by the LSA (Local Security Authority) component. These tools allow you to list the current logon sessions with its corresponding NTLM credentials (e.g.: users remotely logged in thru Remote Desktop/Terminal Services), and also change in runtime the current username, domain name, and NTLM hashes (YES, PASS-THE-HASH on Windows!). Both source tarball and binary tarballs are included.
Author:Hernan Ochoa
Homepage:http://oss.coresecurity.com/
Changes:Various updates.
File Size:17212
Last Modified:Jan 21 21:42:32 2008
MD5 Checksum:9ed448f068a585eee10146a1cffb428f

 ///  File Name: pshtoolkit_v1.3-src.tgz
Description:
The Pass-The-Hash Toolkit contains utilities to manipulate the Windows Logon Sessions maintained by the LSA (Local Security Authority) component. These tools allow you to list the current logon sessions with its corresponding NTLM credentials (e.g.: users remotely logged in thru Remote Desktop/Terminal Services), and also change in runtime the current username, domain name, and NTLM hashes (YES, PASS-THE-HASH on Windows!).
Author:Hernan Ochoa
Homepage:http://oss.coresecurity.com/
Changes:Various updates.
File Size:38281
Last Modified:Mar 3 14:35:45 2008
MD5 Checksum:548e936b9b17ab10fa8032b0ecb61283

 ///  File Name: pst19upg.zip
Description:
This utility was originally designed to upgrade the Microsoft Outlook PST format to version 19. One of its side effects, however, is that it can strip out the PST (Outlook) password. This can therefore be used to recover passwords you may have forgotten on your PST files.
File Size:102267
Last Modified:Nov 15 22:11:54 2000
MD5 Checksum:2f64a589b2164952251db67be3a03d65

 ///  File Name: ptlink_ipfinder.zip
Description:
This program finds the real IP address behind the masked IP address on PTlink version 6.14.2 and other versions of PTlink which has SpoofMethod set to 0 in network.dconf.
Author:Mert
Homepage:http://grayhat.netfirms.com
File Size:427901
Last Modified:Feb 11 11:09:20 2003
MD5 Checksum:b156def9f73da54cae21306c3626233b

 ///  File Name: Purge-It.exe
Description:
Purge-it is a Windows utility that allows the end-user to take a look inside a system, see what programs are running, which ports are open. The user chooses what happens to the system, and can remove various malware such as backdoors, trojans and spyware.
Homepage:http://www.Purge-it.com/?p
File Size:561207
Last Modified:Aug 29 17:48:22 2000
MD5 Checksum:51f36d275d24e62e454109f7c6e5be3b

 ///  File Name: r032b.zip
Description:
Windows XP port scanner. Screenshots available here.
Homepage:http://home.zonnet.nl/wwijbrands
File Size:23999
Last Modified:Oct 22 02:57:00 2002
MD5 Checksum:203fdea1459563a07a0b2405159bd7e8

 ///  File Name: RA-AnonEmail.zip
Description:
Root Access Anonymous Emailer is an anonymous email program that can send email to anyone and you, the user can make it look like it came from ANY address.
Author:Cipher
Homepage:http://rootaccess.tsx.org
File Size:9536
Last Modified:Nov 29 18:02:56 1999
MD5 Checksum:be3f9b6d38af146f9eb203c521f08123

 ///  File Name: RA-Cache.zip
Description:
Root Access Cached Password Explorer is a very handy tool that finds cached password on your computer.
Author:Variable
Homepage:http://rootaccess.tsx.org
File Size:6006
Last Modified:Nov 29 18:04:37 1999
MD5 Checksum:23aad072a447b9b176e69b924ed2a7c9

 ///  File Name: RA-Portscan.zip
Description:
Root Access Portscanner is a windows based portscanner that scans a remote computer and looks for open ports.
Author:Variable.
Homepage:http://rootaccess.tsx.org
File Size:9326
Last Modified:Nov 29 18:15:03 1999
MD5 Checksum:6092d51e641370c304587dde7f28a6f4

 ///  File Name: ras-hacker.zip
Description:
View RAS passwords (locally) on a Win 9X box.
File Size:242345
Last Modified:Feb 23 03:30:34 2000
MD5 Checksum:06e6b5b5ced895d04b9f488a0d944cb9

 ///  File Name: Rats-1.3_Win32_Bin.zip
Description:
Win32 port of RATS v1.3, a security auditing utility for C, C++, Python, Perl and PHP code. Source available on homepage. Added recursive directory scanning while porting.
Author:Mike Ellison
Homepage:http://tek.net/~mike/index.html
File Size:211839
Last Modified:Feb 19 01:57:11 2002
MD5 Checksum:aa56b17993d81363b6bc8da6e28157e0

 ///  File Name: RawPortTCP10.exe
Description:
A low level interface to a TCP/IP socket for Windows. Send exactly what you want in hex or ascii, receive information formatted in a logical manner. Full diagnostic window to assist you in debugging problems. Great if you're a programmer wanting to learn how protocols work, or to experiment.
Homepage:http://www.btinternet.com/~lithiumsoft/
File Size:343671
Last Modified:Nov 18 17:14:54 1999
MD5 Checksum:91314e3f3a956171e055b87e7363e792

 ///  File Name: RecyclerSnooper.exe
Description:
RecyclerSnooper exploits the vulnerability described in ms00-007 by creating many directories in the recycle bin, allowing you to retrive items others have recycled. Works on WinNT and Win2K.
Author:Nobuo Miwa
Homepage:http://www.lac.co.jp/security/
File Size:28672
Last Modified:Feb 2 18:16:29 2000
MD5 Checksum:af700336da4b3fdb7b50645e215ed172

 ///  File Name: Redscan-Beta.zip
Description:
Code Red II Removal Tool 1.0 Beta - For Windows.
Author:Felipe Moniz
Homepage:http://www.hideaway.net/stealth/
File Size:137553
Last Modified:Aug 15 02:06:36 2001
MD5 Checksum:1caedb09aecd80f2c845bdcf50bd36b8






 ///  File Name: regfind.html
Description:
NT RegFind manual.
File Size:8554
Last Modified:Aug 16 20:04:15 1999
MD5 Checksum:899cdf7d467b7f76562e220898bf5e4c

 ///  File Name: regfind.zip
Description:
NT RegFind - Win32 registry search utility for use with NT.
File Size:39317
Last Modified:Aug 16 20:04:15 1999
MD5 Checksum:26b2867ee601af817d216ff9824b072a

 ///  File Name: RegistryAnalyzer.zip
Description:
Registry Analyzer is a program that can analyze a Windows 95/98 registry file (user.dat,system.dat). Use this program to read the registry database of another computer registry file.
Author:TheWiz
File Size:83077
Last Modified:Apr 12 16:04:00 2000
MD5 Checksum:eb45ece94f91f65ba2f53de76766df3e

 ///  File Name: RegistryLib-0.2.tar.gz
Description:
Registry.pl is a Perl library which allows you to create, manipulate, and manage Windows 95 style registries (path/key/value based) as a replacement to .conf files. It is quick and is entirely text based to allow for manual editting. web site.
File Size:10240
Last Modified:Aug 16 20:04:13 1999
MD5 Checksum:51a4f913406266f31c071d8ed1f3bc62

 ///  File Name: Regmon.zip
Description:
Tool to monitor registry changes.
File Size:22460
Last Modified:Aug 16 20:04:14 1999
MD5 Checksum:eb818806d2cdb412d4b502be8bb16544

 ///  File Name: regraper.zip
Description:
Extracts .reg files from user and system.dat.
Author:Mr.Mojo
Homepage:http://www.dis.org/mrmojo/hacking.htm
File Size:1316
Last Modified:Mar 10 19:33:34 2000
MD5 Checksum:98b479f31876c5eb2244205296fd1a22

 ///  File Name: rfpatch.exe
Description:
RFPatch.exe is an unofficial fix for the windows exploit RFParalyze, which Rain Forest Puppy wrote some time ago. Keeps backups and a log of changes.
Author:Fides
File Size:221184
Last Modified:Dec 8 04:08:45 2000
MD5 Checksum:f5627fce4744123212fcfec90c7da8a8

 ///  File Name: RFPoison.c
Description:
Source for the RFPoison, a NT remote DOS. NT 4.0 server and workstation are vulnerable, even with SP level 1, 3, 5, or 6.
Author:rain forest puppy
Homepage:http://www.wiretrip.net/
Changes:AVP no loger thinks this is a trojan, and it no longer reboots the machine it is running on.
File Size:7201
Last Modified:Jan 21 22:17:53 2000
MD5 Checksum:f26384176158aff289f4bb80a692931b

 ///  File Name: rinetd.zip
Description:
rinetd redirects TCP connections from one IP address and port to another. rinetd is a single-process server which handles any number of connections to the address/port pairs specified in the file /etc/rinetd.conf. Since rinetd runs as a single process using nonblocking I/O, it is able to redirect a large number of connections without a severe impact on the machine. For Windows 95/98/NT.
Homepage:http://www.boutell.com/rinetd/
File Size:85303
Last Modified:Aug 16 20:04:16 1999
MD5 Checksum:d1fd34b4bf6fb523c1c4dda92d832d71

 ///  File Name: ringzero.ppt
Description:
SANS Network Professionals, in cooperation with the internet community, documented the "Hunt for RingZero." View the PowerPoint slides that describe this threat, how to recognize its behavior, the steps used to isolate this program and methods for tracing the origin of this malicious virus. From SANS
File Size:241152
Last Modified:Oct 9 23:23:06 1999
MD5 Checksum:ec58d34cad8379649e88bebdcfe949f3

 ///  File Name: rnbtname.exe
Description:
Rnbtname.exe does the reverse - it takes the mangle and converts it back into a NetBIOS name - perfect for sniffers.
File Size:13683
Last Modified:Aug 16 20:04:12 1999
MD5 Checksum:224f3b7b0ed2dda1eecb5deeec6cb67f

 ///  File Name: rpcdump.exe
Description:
This little utility dumps SUN RPC information from *NIX systems (does the same job as running rcpinfo -p remote_host from a *NIX shell prompt.) Runs on Windows 95, 98, NT 4 and 2000.
Author:Cerberus Information Security
Homepage:http://www.cerberus-infosec.co.uk/
File Size:32768
Last Modified:Dec 3 19:32:13 1999
MD5 Checksum:dd10c9c5e636dac6f35fc78c85a0ada3

 ///  File Name: rtm.zip
Description:
Remote Task Manager is a system control interface that can be run from any Windows 2000/NT computer. The simple-to-use, tabbed interface separates applications, services, processes, events, shared resources and performance monitor, making each of these very easy to manage.
Homepage:http://ntutility.com
File Size:1481146
Last Modified:Oct 30 19:12:41 2000
MD5 Checksum:8a2644b32ac0f27856f2b6010ed2ef5d

 ///  File Name: rulezcgi.zip
Description:
Rulezcgi is a Windows based CGI scanner. Includes executable and nothing else.
Author:Mtec
File Size:30516
Last Modified:Oct 9 20:51:44 2000
MD5 Checksum:c79e9c891eb9d7573c4ccf57b12d097f

 ///  File Name: RWSaverBust.zip
Description:
Ratware Win9x Screen Saver Buster V1.0 is a tool for busting into a Win9x PC that has a screen saver/password active. It needs to be cut to a CD, inserted into the said PC, and works by exploiting the autoplay 'feature' to disable the screen saver password.
Author:Ratware
File Size:316785
Last Modified:Sep 15 18:35:36 2000
MD5 Checksum:caf4e25a09189d1c2dca3bd38fc1ded4

 ///  File Name: scanner.zip
Description:
SuperScan version 2.06 - "This is a powerful connect-based TCP port scanner, pinger and hostname resolver. Multithreaded and asynchronous techniques make this program extremely fast and versatile. Perform ping scans and port scans using any IP range or specify a text file to extract addresses from. Scan any port range from a built in list or any given range. Resolve and reverse-lookup any IP address or range. Modify the port list and port descriptions using the built in editor. Connect to any discovered open port using user-specified "helper" applications and assign a custom helper application to any port. View responses from connected hosts. Save the scan list to a text file. Transmission speed control. User friendly interface."
Author:Rob Keir
Homepage:http://members.home.com/rkeir/
Changes:list merging and other enhancments.
File Size:201596
Last Modified:Dec 18 00:49:49 1999
MD5 Checksum:54ead53c1bd3e09ab5cd6da6699a95c6

 ///  File Name: sclean10.zip
Description:
ShareClean is free Win95 software which allows you to control Win95 file sharing to prevent access to your drives by other high speed internet users while online.
Author:Kevin McAleavey
Homepage:http://www.nsclean.com
File Size:737189
Last Modified:Dec 17 13:41:47 1999
MD5 Checksum:379db47883788db2dc3bf1127206f534

 ///  File Name: sec_cloak.zip
Description:
Security Cloak is designed to protect against TCP/IP stack fingerprinting and computer identification/information leakage via timestamp and window options by modifying relevant registry keys. The settings used are based on the results of SYN packet analysis by p0f. While the OS reported by other OS detection scanners were not identical to those of p0f, testing against Nmap, xprobe2, queso and cheops showed that they were unable to identify the correct operating system/version after Security Cloak settings had been applied.
Author:Craig Heffner
Homepage:http://www.craigheffner.com/security
File Size:10138
Last Modified:Mar 8 23:40:08 2006
MD5 Checksum:71270c9f80595377033308ee642d084d

 ///  File Name: securepe-1.5.zip
Description:
SecurePe is a freeware tool coded in ASM which protects Microsoft Windows® PE files with strong RC4 encryption and password while leaving them totally functional.
Author:TheWizard
File Size:317680
Last Modified:Sep 14 00:48:07 2001
MD5 Checksum:fce830e5e939e774271c30a2108aac54

 ///  File Name: seekh_01a3.zip
Description:
L.L.H.M. - Low Level Header Manipulation is a tool hides pieces of information in your files. Works on Win32.
Author:Valvo.
Homepage:http://www.s0ftpj.org
File Size:18152
Last Modified:Jan 4 19:40:46 2001
MD5 Checksum:ac5284de6f39df9f50c9dda36949630a

 ///  File Name: sendtcp.c
Description:
sendtcp.c v0.1 is a simple TCP packet generator for the win32 platform.
Author:messer
File Size:6027
Last Modified:Jun 11 01:24:40 2003
MD5 Checksum:590dff67036a23fcb1afc7bef48e9656

 ///  File Name: SFPDisable.zip
Description:
SFPDisable is a utility that disable Microsoft Windows' File Protection by patching sfc.dll under Windows 2000 and sfc_os.dll in Windows XP. This allows a remote attacker to delete, manipulate, and backdoor any file on the system without Windows noticing upon reboot.
Author:Delikon
Homepage:http://www.delikon.de/
File Size:17593
Last Modified:Oct 14 00:09:29 2003
MD5 Checksum:298791d17fa78dcd6d5d0bcda6166b25

 ///  File Name: shade10.zip
Description:
Disk encryption for NT.
File Size:65725
Last Modified:Aug 16 20:04:09 1999
MD5 Checksum:3cbe19ed978cd5a6687db33b65e8c8d3

 ///  File Name: Shadowmailer1.2.zip
Description:
Shadow Mailer version 1.2 will send out anonymous emails allowing specification of all the headers, supports socks proxy 4, 4A, 5, mail bombing, skins, auto saves everything, and has a stable and fast engine.
Author:OblivionBlack
File Size:552892
Last Modified:Aug 6 11:09:47 2003
MD5 Checksum:05a86bc855aec7b2a26763b677043829

 ///  File Name: SharesFinder.zip
Description:
Share finder is a tool for System Administrators to examine what is being shared on their networks. Scans for open shares and lists contents.
Author:Diskiller
Homepage:http://nfisher.campus.vt.edu/Ogre%20Electronics/index.php
File Size:155247
Last Modified:Apr 30 15:04:23 2001
MD5 Checksum:5ef809ec617a1a2de0ec3fd1078b27f1






 ///  File Name: showin.zip
Description:
Showin is a utility which can display hidden password editbox fields (text behind the asterisks *****). This will work in many programs although Microsoft have changed the way things work in some of their applications, most notably MS Office products and Windows 2000. ShoWin will not work in these cases. Neither will it work for password entry boxes on web pages, at least with most web browsers.
Author:Robin Keir
Homepage:http://www.foundstone.com
File Size:9110
Last Modified:Dec 13 01:20:28 2000
MD5 Checksum:0ba0909771ca10a8a0cb050e933fc975

 ///  File Name: ShowPassV1_0.zip
Description:
ShowPass 1.0 - like dripper - dial up password ripper for Windows. With this program you can find every password in a machine! "*" shadowed passwords, dialup passwords and cached passwords are on your hire. It's like a combination of Dripper, Revolution and Pwlview. Program supports both English and Turkish. Warning: This program will cause many AV programs, including McAffee, to give a false alarm. ;Homepagehere.
Author:Misoskian
File Size:142494
Last Modified:Jan 25 17:38:48 2000
MD5 Checksum:2153cd0a6155dc92c95b5cb59116ff35

 ///  File Name: sibylle_setup.exe
Description:
Sibylle 1.0 is a password manager that make use of the following features: 3-Way block encryption, A simple and easy to use interface, and DOD 5220.22-M secure file deletion function. It is Securengine (securengine.isecurelabs.com) 3.0 compatible and offers multiple user support. All passwords are stored in an encrypted file that can be easily backed up.
Author:Cabezon Aurélien
Homepage:http://sibylle.isecurelabs.com
File Size:2406315
Last Modified:Jun 21 18:27:33 2003
MD5 Checksum:c4511a5d98dd18369fdb55ab9965ee61

 ///  File Name: SIDTk10.zip
Description:
The SIDTk 1.0 is a collection of command-line tools aimed at improving host-based intrusion detection conditions on Windows desktops and servers. This kit includes ADSScan, an alternative data stream scanner, IntegCheck, a Tripwire clone, LogUser, a module to detect invalid user accounts, and various other utilities.
Author:Floydman
Homepage:http://securit.iquebec.com
File Size:4200052
Last Modified:Nov 5 22:44:19 2003
MD5 Checksum:da672503a181d9d36a75490749caa2d2

 ///  File Name: SilentLog.zip
Description:
SilentLog is a keystroke logging tool that runs under several Windows 32 versions (it should also run under NT). The best of it's features is it's small size: only 7 KB compiled. (But it's NOT a DOS program, it uses 32Bit-Windows). The source code (FASM assembly syntax) is included. The executable also contains a DLL which it recreates when loaded. (So the real sizes are 3 KByte executable and 4 KByte for the DLL). The program logs all standard keys (the return key is also processed correctly). See Readme.txt included.
File Size:7126
Last Modified:Feb 12 01:48:19 2002
MD5 Checksum:7626973501e3f345e04beae4a70ee4f3

 ///  File Name: skl0g.zip
Description:
SkLog is a very small and effective keylogger for Win32 that can log all keystrokes, is case-sensitive and supports all standard keys. It has been written in vb, uses the GetAsyncKeyState API call and doesn't need any other dll or ocx file(only the standard vb6 dlls). It restarts when you start windows (modifies the registry) and can be started/stopped anytime by using key combinations.
Author:Rex0xd
Homepage:http://skl0g.cjb.net
File Size:12784
Last Modified:Dec 16 23:43:44 2001
MD5 Checksum:d498fe31ec43bc647e66dc8703f118da

 ///  File Name: skl0g_v1.14.zip
Description:
skl0g is a simple and compact keylogger for Windows. It runs invisibly and effectively. It logs everything that is typed at the computer and saves them in log files according to the date.
Author:Klemster
Homepage:http://www.indiasec.com/tools/
File Size:12348
Last Modified:Aug 30 23:16:51 2004
MD5 Checksum:60b8fd205db4528620aacf19c593cb81

 ///  File Name: smac20_setup.exe
Description:
SMAC 2.0 is a MAC Address spoofer for Windows 2000, XP and 2003 systems. Users can generate random MAC Address and SMAC will validate MAC Address before spoofing. User can pre-define MAC addresses and load the MAC Address list. Spoofed MAC Address can sustain from reboots.
Author:KLC Consulting Security Team.
Homepage:http://www.klcconsulting.net/smac
File Size:5168831
Last Modified:May 21 15:23:18 2006
MD5 Checksum:f97d67f4a512b747d736151a11cacde4

 ///  File Name: smac_1.1.zip
Description:
SMAC v1.1 is a Windows MAC Address Modifying Utility which allows users to change MAC address for almost any Network Interface Cards (NIC) on the Windows 2000 and XP systems, regardless of whether the manufactures allow this option or not.
Author:KLC Consulting Security Team.
Homepage:http://www.klcconsulting.net
File Size:1973634
Last Modified:Feb 5 04:38:03 2003
MD5 Checksum:953099db684a4fbf7b3841f655cf13ca

 ///  File Name: SMB-Scanner.zip
Description:
SMB-Scanner.zip is an executable and Perl Script for Win and Unix. Scans network blocks for file sharing status and guesses what the file sharing target might be Samba or NT or Windows depending on MAC ADDRESS.
Author:B-Root
File Size:266509
Last Modified:Apr 24 20:03:08 2001
MD5 Checksum:b1ff551b3b87ea17aa8ccbf818a1618a

 ///  File Name: smbbf-0.9.1.tar.gz
Description:
The SMB Auditing Tool is a password auditing tool for the Windows and the SMB platform. It makes it possible to exploit the timeout architecture bug in Windows 2000/XP, making it extremely fast to guess passwords on these platforms. Running a large password file against Windows 2000/XP, shows statistics up to 1200 logins/sec. This means that you could run a commonly used English dictionary with 53 000 words against a server under a minute. Supports SMB over Netbios and native SMB over tcp port 445. Compiles on Linux, BSD, and Cygwin.
Author:Patrik Karlsson
File Size:30528
Last Modified:Oct 23 22:50:52 2001
MD5 Checksum:ddee38c0194ecef0bc0fe41aa6429ceb

 ///  File Name: smtsec11.zip
Description:
Restricts access to local devices by user account.
File Size:176849
Last Modified:Aug 16 20:04:09 1999
MD5 Checksum:7cb15ae8d86f183d5c20738114fc8a74

 ///  File Name: Snadboys.Revelation.2.0.zip
Description:
Snadboy's Revelation enables you to retrieve long-forgotten passwords that Windows presents as a mysterious row of asterisks. Drag and drop the Snadboy's Revelation marker to the masked password field to retrieve the information.
Homepage:http://www.snadboy.com
File Size:40244
Last Modified:Feb 27 02:40:42 2001
MD5 Checksum:a9bc008e13347aa5231824b5a6bfa9f2

 ///  File Name: snitch.exe
Description:
Snitch turns back the asterisks in password fields to plaintext passwords.
Author:Arne Vidstrom
Homepage:http://www.ntsecurity.nu/toolbox/snitch
File Size:24576
Last Modified:Aug 15 02:26:35 2000
MD5 Checksum:f517d5537ab9dde173081af6df01f70f

 ///  File Name: snscan.zip
Description:
SNScan v1.04 is a Windows GUI SNMP detection utility that can quickly and accurately identify SNMP enabled devices on a network. This utility can effectively indicate devices that are potentially vulnerable to SNMP related security threats. SNScan allows for the scanning of SNMP specific ports (e.g. UDP 161, 193, 391 and 1993) and the use of standard (i.e. "public") and non-standard (i.e. user-defined) SNMP community names. User defined community names may be used to more effectively evaluate the presence of SNMP enabled devices in more complex networks.
Author:Robin Keir
Homepage:http://www.foundstone.com
File Size:18882
Last Modified:Feb 19 01:34:11 2002
MD5 Checksum:15a77747bf2146c15440d721f35fca0f

 ///  File Name: spade106.zip
Description:
The ULTIMATE Swiss Army Knife. Ping, nslookup, whois, IP block whois, dig, traceroute, finger, SMTP VRFY, web browser, keep-alive, DNS zone transfer, SMTP relay check, USENET cancel check, website download, website search, email header analysis. For Windows 95/98/NT. Freeware from Blighty Designs.
File Size:865893
Last Modified:Aug 16 20:04:12 1999
MD5 Checksum:d836eca8854db2007985d8a3633b8848

 ///  File Name: spade107.zip
Description:
Sam Spade.
File Size:935270
Last Modified:Aug 16 20:04:12 1999
MD5 Checksum:e2739358c59315b32c6b1d6b5609a55b

 ///  File Name: spade110.exe
Description:
Sam Spade is an integrated network query tool for Windows 95 and NT4.0. This latest release contains the following tools in a multi-threaded, multi-window environment: ping, nslookup, whois, IP block whois, dig, traceroute, finger, SMTP VRFY, web browser, keep-alive, DNS zone transfer, SMTP relay check, Usenet cancel check, website download, website search, email header analysis. This is a 5-star Packet Storm Security favorite! Freeware by Blighty Designs.
File Size:946764
Last Modified:Aug 16 20:04:14 1999
MD5 Checksum:9add42a5fdab28fc5da74c7f44ed72ca

 ///  File Name: spc001.zip
Description:
Share Password Checker acquires the list of shared folders of a Windows 95/98/Me machine on the network and shows you those folders' passwords. This tool acquires the list of the shared folders also for Windows NT/2000 machines, but it only distinguishes folders who have no password. "Share Password Checker" uses the"Share Level Password" Vulnerability. And "Share Password Checker" aims to check whether the patch for this vulnerability has been applied to the target host. Please see the topic Reveal Windows9x Share Password for more detail.
Author:Temeran
Homepage:http://www.securityfriday.com/spc_doc.html
File Size:337327
Last Modified:Mar 15 15:32:41 2001
MD5 Checksum:fe96e5bd0a6c0fc0a00f0b03f7474520

 ///  File Name: spc002.zip
Description:
Share Password Checker acquires the list of shared folders of a Windows 95/98/Me machine on the network and shows you those folders' passwords. This tool acquires the list of the shared folders also for Windows NT/2000 machines, but it only distinguishes folders who have no password. "Share Password Checker" uses the"Share Level Password" Vulnerability. And "Share Password Checker" aims to check whether the patch for this vulnerability has been applied to the target host. Please see the topic Reveal Windows9x Share Password for more detail.
Author:Temeran
Homepage:http://www.securityfriday.com/spc_doc.html
Changes:Another password (Read Only or Full Access Password) is shown in the "Password2" column.
File Size:341606
Last Modified:Jul 24 00:23:23 2001
MD5 Checksum:34e74754ad55579b62e5340b1f1b4a72

 ///  File Name: sqldict.exe
Description:
Sqldict is a dictionary attack tool for Microsoft SQL Server which lets you test if the accounts are strong enough to resist an attack or not.
Author:Arne Vidstrom
Homepage:http://www.ntsecurity.nu/toolbox/sqldict/
File Size:135168
Last Modified:Nov 9 03:35:13 2000
MD5 Checksum:0895cc3c5abeeec189431c9ed11fb307

 ///  File Name: sqlping.zip
Description:
Sqlping v1.2 is a tool which sends a specially crafted UDP packet to port 1434 on SQL Server 2000 which will return gobs of useful info including SQL version and service pack. Features the ability to send broadcast queries. Released at Black Hat Windows 2000 Feb 14th and 15th.
Author:Chip Andrews
Homepage:http://www.sqlsecurity.com
File Size:17725
Last Modified:Mar 15 18:00:51 2001
MD5 Checksum:b6f79de05785547cfb08cc941a3f14a8

 ///  File Name: ss2002-setup.msi
Description:
Server Scan is a simple tool for detecting web servers on a network. Created originally to detect unauthorized web servers on a network, server scan can serve many purposes from detecting unauthorized web servers to checking what types of web servers are running on your network. Server Scan is compatible with Windows 95, Windows 98, Windows Me, Windows NT 4, Windows 2000, and Windows XP.
Homepage:http://www.securitystorm.net/products/tools/serverscan/index.asp
File Size:267264
Last Modified:Jul 30 17:24:37 2002
MD5 Checksum:d60452a3baa94bf1794a542280febbb2

 ///  File Name: sslcrack.zip
Description:
sslcrack is a basic VB5 win9x brute force PIN SSL cracker. Zip includes HomeBanking.txt, which explains a common weakness in Home Banking systems that allows brute forcing the PIN.
Author:Efrain 'ET' Torres
File Size:308795
Last Modified:Nov 15 18:36:18 1999
MD5 Checksum:fadf78f286a4e7e5b2282305a32b401d

 ///  File Name: STC3.zip
Description:
STC 3.0 is a multipurpose tool for Windows, which does the work of 30 seperate programs. Includes a .htaccess Brute-Forcer, Anonymous FTP Scanner, List of Bios Master Passwords, tiny CD-Player *g*, CGI-Vulnerability Scanner, Country Codes List, Dictionairy Generator, DNS, DomainScannerr, File Compare (Patch Engine), FTP Brute-Force, Service Scanner, Cached ISP Passwords Retriever, Hex/bin/dex/ascii converter, HTML Grabber, IRC Channel Brute-Force, IRC_Flooder, Link-Looker, NetBios Password Cracker, Password Generator, Ping / Traceroute, Port2Service, Portflooder, Portscanner, PortCheck (checks for open Ports), Port Watcher, Screensaver Password Retriever, Anonmailer / Mailbomber, OOB Nuke, Telnet Brute-Force and Whois lookup.
Author:SnakeByte
Homepage:http://www.KryptoCrew.de/snakebyte/
File Size:2659600
Last Modified:May 4 20:13:36 2000
MD5 Checksum:ec404986eb565969ca36e04946f4a252






 ///  File Name: Stealth-1.0-b29.zip
Description:
Stealth HTTP Security Scanner 1.0 build 29 - Checks for 5677 CGI vulnerabilities. Run on Win32 and Linux under Wine. Free.
Author:Felipe Moniz
Homepage:http://www.hideaway.net/stealth/
Changes:Checks for Microsoft FrontPage 2000 Server Extensions Buffer Overflow, MS Index Server and Indexing Service ISAPI Extension Buffer Overflow, CGI Decode, and IIS 4.0 ISAPI Buffer Overflow.
File Size:691911
Last Modified:Jul 11 10:12:41 2001
MD5 Checksum:a2481fa0ed395431d780767b806fd3cf

 ///  File Name: Stealth-1.0-b30.zip
Description:
The Stealth HTTP Security Scanner v1.0b30 provides more than 12000 http vulnerability checks. Runs on Win32 and Linux under Wine. Free.
Author:Felipe Moniz
Homepage:http://www.hideaway.net/stealth/
Changes:New holes added: IDA "Code Red" Vulnerability and IIS Double Decode. Added Scan List and German language support.
File Size:777116
Last Modified:Jul 29 11:26:09 2001
MD5 Checksum:75e04c3946ce2203ce59ac1ca9a63f12

 ///  File Name: Stealth-2.0-b35.zip
Description:
The Stealth HTTP Security Scanner provides more than 13000 http vulnerability checks. Runs on Win32 and Linux under Wine. Free.
Author:Felipe Moniz
Homepage:http://www.hideaway.net/stealth/
Changes:More checks.
File Size:737218
Last Modified:Nov 5 07:32:47 2001
MD5 Checksum:8e091abdb6e512fca19f4f8aa64c19e5

 ///  File Name: stn210.zip
Description:
ShareTheNet v2.1.0 - ShareTheNet lets Micro$oft Windows users build a single diskette Linux-based router in 10 minutes. IP Masquerading/DHCP/DNS/etc are all easy to set up and maintain with the integrated admin server. Commercial version with support for those who want the convienance of "it's already done for you", and a free version for those who want to roll their own.
Author:John Lombardo.
Changes:Support for inbound services, new web interface for adminsitration, Dynamic DNS, etc.
File Size:4476065
Last Modified:Aug 17 02:04:19 1999
MD5 Checksum:7f2bbf42975e8503e6ea438ae5462a7c

 ///  File Name: stn211.zip
Description:
ShareTheNet 2.1.1 - ShareTheNet lets Microsoft Windows users build a single diskette Linux-based router in 10 minutes. IP Masquerading/DHCP/DNS/etc are all easy to set up and maintain with the integrated admin server. A commercial version is available with support for those who want the convenience of "it's already done for you", and a free version for those who want to roll their own.
Author:John Lombardo.
Changes:PPP issue where the remote host picked up the wrong IP address fixed, pppd upgraded to version 2.3.7, new option to disable screen blanking if you have a monitor attached, new status screens for DHCP and free disk space, the user name used to log into the web based administrator is now configurable.
File Size:4485515
Last Modified:Aug 17 02:04:22 1999
MD5 Checksum:f80ec1fc8502fc417c1b2f6e5ddd8f27

 ///  File Name: swb001.zip
Description:
SWB enables the SMB(CIFS) session setup in any Windows settings. Tested on Windows NT/2000/98SE/ME.
Author:Temeran
Homepage:http://www.securityfriday.com/tools.html
File Size:291348
Last Modified:Apr 17 03:11:42 2001
MD5 Checksum:42b9b867c6a7b287ef50b80a9d4a589e

 ///  File Name: syslogd.zip
Description:
Syslog daemon for NT.
File Size:24120
Last Modified:Aug 17 02:04:09 1999
MD5 Checksum:37b1958352bf5e975c5c85591f3d26d7

 ///  File Name: sysspy1.zip
Description:
System Spy is a windows program which will hide on a users computer and record the actions of another user through program title capturing. Captures active window title, time window was opened, time window was closed, and total time window was active. Invisible to user while running, including Task List. Captured data is stored encrypted, in dated files.
Author:Kevin Woodford
File Size:493763
Last Modified:Dec 17 18:50:18 1999
MD5 Checksum:8da087e44aeb76f955029d9308b9875b

 ///  File Name: TalonDynDNS14.zip
Description:
TalonDynDNS is a Dynamic DNS client allowing you to use JustLinux.com's free DNS service under windows.
Author:Proof
File Size:1373913
Last Modified:Feb 23 02:10:30 2000
MD5 Checksum:0710b296017faf5d554c1f096b848f1f

 ///  File Name: tar.exe
Description:
This is GNU tar, ported to Windows.
File Size:167936
Last Modified:Oct 28 22:44:01 2000
MD5 Checksum:d8bb79256c579552c955ed39b103a00c

 ///  File Name: task-1.50.tar.gz
Description:
The [at]stake Sleuth Kit (TASK) is an open source forensic toolkit for a complete analysis of Microsoft and UNIX file systems. TASK enables investigators to identify and recover evidence from images acquired during incident response or from live systems. Features the ability to analyze images generated by the 'dd' utility, Supports the NTFS, FAT, FFS, and EXT2FS file systems, 14 command line tools that allow the user to control what data is processed and presented, identify deleted files by name and location, and create time lines of file activity to identify files and directories to analyze.
Author:Brian Carrier
Homepage:http://www.atstake.com/research/tools/task
File Size:323129
Last Modified:Sep 12 13:25:02 2002
MD5 Checksum:f21e123e9dc5b3634d0e974cff61fc93

 ///  File Name: tcb_noad.zip
Description:
Tcb_noad.zip is a hack which removes the ad banners from AOL's Instant Messenger. ASM source available here.
Homepage:http://tcb-noad.chat.ru
File Size:3936
Last Modified:Feb 14 07:50:22 2001
MD5 Checksum:bbfe417dc70788b19c9592ac5bbab22b

 ///  File Name: tcpip_lib2.zip
Description:
Tcpip_lib V2 is a library for Windows 2000 which allows arbitrary packet creation. It uses sockets 2 and opens up a raw socket, allowing you to send raw IP headers, do IP spoofing, and play with the nuts and bolts of networking protocols.
Author:Barak Weichselbaum
Homepage:http://www.komodia.com
Changes:now works also with NT (regular async sockets), supports regular sockets (async and blocked) and added ICMP. (samples like traceroute, ping, TCP server, simple attacker).
File Size:239557
Last Modified:Sep 28 00:24:23 2000
MD5 Checksum:bad93d8385ce011dece39cbad3f694eb

 ///  File Name: tcpip_lib3.zip
Description:
Tcpip_lib V3 is a library for Windows 2000 which allows constructing IP's, IP spoofing, attacks, and more. It uses sockets 2 and opens up a raw socket, allowing you to send raw IP headers, do IP spoofing, and play with the nuts and bolts of networking protocols.
Author:Barak Weichselbaum
Homepage:http://www.komodia.com
Changes:Redesigned most of the OOD, added more functionality and samples. (traceroute,ping,sniffer,ipconfig,TCP server, UDP server, Stealth TCP scanner, UDP scanner), all the samples comes with a complete source code.
File Size:687634
Last Modified:Feb 2 20:18:03 2001
MD5 Checksum:b6d10b11fd2e341542bcbf6d33cb692a

 ///  File Name: tcpip_lib31.zip
Description:
Tcpip_lib V3.1 is a library for Windows 2000 which allows constructing IP's, IP spoofing, attacks, and more. It uses sockets 2 and opens up a raw socket, allowing you to send raw IP headers, do IP spoofing, and play with the nuts and bolts of networking protocols.
Author:Barak Weichselbaum
Homepage:http://www.komodia.com
Changes:Major OOD redesign, added new UDP/TCP functionality, enhanced documentation, support for multithreading and added new samples.
File Size:1914365
Last Modified:Apr 28 00:11:10 2001
MD5 Checksum:5e459f49dcda3ccff6718578c4d69749

 ///  File Name: tcpip_lib32.zip
Description:
Tcpip_lib V3.2 is a library for Windows 2000 which allows constructing custom packets, IP spoofing, attacks, and more. It uses sockets 2 and opens up a raw socket, allowing you to send raw IP headers, do IP spoofing, and play with the nuts and bolts of networking protocols.
Author:Barak Weichselbaum
Homepage:http://www.komodia.com
Changes:Major OOD redesign, added new UDP/TCP functionality, enhanced documentation, support for multithreading and added new samples. Includes a Stealth TCP scanner, UDP scanner, TCP server, UDP server, ping, traceroute, ipconfig, attacker, PacketCrafter (IP spoofing).
File Size:2611627
Last Modified:Jul 12 07:46:56 2001
MD5 Checksum:174a54fa8861273a6e98537f9bf9d43d

 ///  File Name: tcpip_lib5.zip
Description:
Tcpip_lib is a library for Windows 2000 which allows constructing custom packets, IP spoofing, attacks, and more.
Author:Barak Weichselbaum
Homepage:http://www.komodia.com
Changes:Various bug fixes and it has been stripped of all raw socket support.
File Size:717301
Last Modified:Dec 22 00:00:58 2006
MD5 Checksum:c6504e82cc56a394faf2b7541157c764

 ///  File Name: tcpspeed.zip
Description:
Check your tcp speeds with this tool.
File Size:31672
Last Modified:Aug 17 02:04:10 1999
MD5 Checksum:e31b45e64a9083d442ea2bff831dfac1

 ///  File Name: testdisk22.zip
Description:
Testdisk can undelete deleted partitions! Windows / DOS version.
Homepage:http://www.esiea.fr/public_html/Christophe.GRENIER/index.html?testdisk.html
File Size:131858
Last Modified:Jan 6 03:02:44 2001
MD5 Checksum:1d7c761fe9c180fc915eabdec978f31c

 ///  File Name: TokenExecution.zip
Description:
This tool is able to duplicate all Tokens stored in the system by calling NtQuerySystemInformation(). Duplicated Tokens allow users with local Administrator rights to execute code with credentials of every user that is logged on to the system locally or over network. Default mode only extracts tokens from the lsass process.
Author:Andres Tarasco Acuńa
Homepage:http://www.514.es/
File Size:9336
Last Modified:Oct 9 06:47:44 2006
MD5 Checksum:b43f47d0201d27b9e9030a786b74014b

 ///  File Name: Tracert011f.zip
Description:
Traceroute - specially for quick network route discovery (1-2 secounds to find the route). Unlike standard traceroute it traces all the way to host at once, therefore saving time. Also measures the time neccesary for packet to return and looks up all intermediate routers. Unlike Windows tracert it's based on UDP protocol, therefore allowing to trace networks where incoming ICMP messages are filtered.
Author:Averk
Homepage:http://nscan.hypermart.net
File Size:109690
Last Modified:Jul 12 19:11:36 2000
MD5 Checksum:7b7b16027951d9e22c9d70d39d47ddc2

 ///  File Name: trout.zip
Description:
Trout v2.0 is a visual (i.e. GUI as opposed to command-line) traceroute and Whois program. Pinging can be set at a controllable rate as can the frequency of repeatedly scanning the selected host. The built-in simple Whois lookup can be used to identify hosts discovered along the route to the destination computer. Parallel pinging and hostname lookup techniques make this traceroute program perhaps the fastest currently available.
Author:Robin Keir
Homepage:http://www.foundstone.com
File Size:19246
Last Modified:Dec 13 18:41:05 2000
MD5 Checksum:86bea5f3b024ade783a1790d95c2741d

 ///  File Name: Trustscn_6.4_b85.exe
Description:
TrustSight Security Scanner 6.4 Build 85 is a new version of the web security scanner originally known as the Stealth HTTP Security Scanner. It provides 13,000 http vulnerability checks and runs on Win32 and Linux under Wine.
Author:Felipe Moniz de Aragao
Homepage:http://www.syhunt.com/
Changes:Improved scanning performance of web servers. Minor fixes. CVE Compatible.
File Size:2243584
Last Modified:Jan 6 01:26:36 2004
MD5 Checksum:95375c9e30089c3e8b31ebac7770e912

 ///  File Name: uhooker_v1.0.tgz
Description:
The Universal Hooker is a tool to intercept execution of programs. It enables the user to intercept calls to API calls inside DLLs, and also arbitrary addresses within the executable file in memory. The Universal Hooker tries to create very simple abstractions that allow a user of the tool to write hooks for different API and non-API functions using an interpreted language (python), without the need to compile anything, and with the possibility of changing the code that gets executed when the hooked function is called in run-time.
Homepage:http://oss.coresecurity.com/projects/uhooker.htm
File Size:113511
Last Modified:Jun 29 05:07:25 2006
MD5 Checksum:3ce6915a59ff45b32055d496e4f67760

 ///  File Name: uhooker_v1.2.tgz
Description:
The Universal Hooker is a tool to intercept execution of programs. It enables the user to intercept calls to API calls inside DLLs, and also arbitrary addresses within the executable file in memory. The Universal Hooker tries to create very simple abstractions that allow a user of the tool to write hooks for different API and non-API functions using an interpreted language (python), without the need to compile anything, and with the possibility of changing the code that gets executed when the hooked function is called in run-time.
Homepage:http://oss.coresecurity.com/projects/uhooker.htm
Changes:Multiple bug fixes, enhancements, and features have been added.
File Size:61894
Last Modified:Sep 7 11:14:40 2006
MD5 Checksum:694b79a4fda0e478e560620f0f1e445f






 ///  File Name: uhooker_v1.0.tgz
Description:
The Universal Hooker is a tool to intercept execution of programs. It enables the user to intercept calls to API calls inside DLLs, and also arbitrary addresses within the executable file in memory. The Universal Hooker tries to create very simple abstractions that allow a user of the tool to write hooks for different API and non-API functions using an interpreted language (python), without the need to compile anything, and with the possibility of changing the code that gets executed when the hooked function is called in run-time.
Homepage:http://oss.coresecurity.com/projects/uhooker.htm
File Size:113511
Last Modified:Jun 28 23:07:25 2006
MD5 Checksum:3ce6915a59ff45b32055d496e4f67760

 ///  File Name: uhooker_v1.2.tgz
Description:
The Universal Hooker is a tool to intercept execution of programs. It enables the user to intercept calls to API calls inside DLLs, and also arbitrary addresses within the executable file in memory. The Universal Hooker tries to create very simple abstractions that allow a user of the tool to write hooks for different API and non-API functions using an interpreted language (python), without the need to compile anything, and with the possibility of changing the code that gets executed when the hooked function is called in run-time.
Homepage:http://oss.coresecurity.com/projects/uhooker.htm
Changes:Multiple bug fixes, enhancements, and features have been added.
File Size:61894
Last Modified:Sep 7 05:14:40 2006
MD5 Checksum:694b79a4fda0e478e560620f0f1e445f

 ///  File Name: uhooker_v1.3.tgz
Description:
The Universal Hooker is a tool to intercept execution of programs. It enables the user to intercept calls to API calls inside DLLs, and also arbitrary addresses within the executable file in memory. The Universal Hooker tries to create very simple abstractions that allow a user of the tool to write hooks for different API and non-API functions using an interpreted language (python), without the need to compile anything, and with the possibility of changing the code that gets executed when the hooked function is called in run-time.
Homepage:http://oss.coresecurity.com/projects/uhooker.htm
Changes:Several bug fixes.
File Size:74047
Last Modified:Dec 17 21:10:18 2007
MD5 Checksum:677ed30fea6cdd16a26416b1b89bf16c

 ///  File Name: urc.zip
Description:
This utility demonstrates a simple UDP backdoor which allows for remote program execution on a Microsoft Windows server.
Author:Angelo Rosiello
Homepage:http://www.rosiello.org
File Size:5576880
Last Modified:Jan 6 22:17:20 2004
MD5 Checksum:86d9079c78155ad855cdeca267f5a020

 ///  File Name: userdump.zip
Description:
The purpose of this app is to illustrate inconsistencies in the MS implementation of the RestrictAnonymous registry setting.
File Size:42950
Last Modified:Feb 20 18:09:59 2001
MD5 Checksum:09c672d9f600fe4680bd8eef2279b4c6

 ///  File Name: userinfo.zip
Description:
The purpose of this app is to illustrate inconsistencies in the MS implementation of the RestrictAnonymous registry setting.
File Size:41287
Last Modified:Feb 20 18:10:43 2001
MD5 Checksum:b64028748e2d20a353f8c4ec3aab15aa

 ///  File Name: uspoof.zip
Description:
This program allows you to send Net Send and Winpopup messages to a machine and make it look like it came from any name that you want. It uses API calls to write directly to the \\mailslot\ resource. Visual Basic source code provided.
Author:r-22
Homepage:http://www.manshadow.org
File Size:25333
Last Modified:Dec 24 20:01:54 2002
MD5 Checksum:9d1317276e038d28edc97facaaf7837f

 ///  File Name: valhalasource.zip
Description:
Valhala Honeypot is a simple and easy-to-use honeypot for Windows. It provides servers like ftp, finger, telnet, smtp, etc.
Author:Marcos Flavio
Homepage:http://www.sourceforge.net/projects/valhalahoneypot/
File Size:226877
Last Modified:Sep 13 04:08:16 2005
MD5 Checksum:236022aec33ae9b98f0fa3519b661d63

 ///  File Name: VB_Script_Exe_Creator.zip
Description:
VB Script Creator takes an executable, and stores it in ascii codes into a vb script. When this vb script is executed, it will create a new exe and execute it. It could be useful but it shows how an executable can live dormant inside a vb script. Windows source included.
Author:Day-Jay
File Size:117944
Last Modified:Feb 26 03:22:00 2001
MD5 Checksum:28517a892e018f0e4b5605b3579da567

 ///  File Name: versioner-09.zip
Description:
Versioner is a graphical utility for Windows tool that traverses directories gathering extended file properties and information, including md5 checksum. This is useful for checking for intrusions, or finding out exactly what has changed since it was run last, or finding differences between hosts. Versioner will output its information in a human readable text format as well as a comma seperated version that can be imported directly into MS-Excel or MS-Access. Screenshot available here, or when using Excel, here.
Author:Vacuum
Homepage:http://www.technotronic.com/versioner/
Changes:Added output.csv Edit Box, updated output options, and code cleanups and optimizations.
File Size:30227
Last Modified:Nov 8 18:42:28 2000
MD5 Checksum:0228113a46fa06d25bafdd29975f650e

 ///  File Name: viewbarhider.zip
Description:
Removes ALL major Viewbars from your desktop, and hide/show all (hidden) windows. Reclaims the reserved desktop space taken up by the Viewbars!
Author:Cash4All Admin
Homepage:http://members.xoom.com/_XM%20CM/mousemove/index2.html
File Size:37019
Last Modified:Jan 27 15:57:53 2000
MD5 Checksum:2a4b5174ea57caacfbdf49e8515a2e4f

 ///  File Name: vxd.txt
Description:
This article explains the basics of Windows 9x kernel module development and contains the full source of a VXD based loadable kernel module (LKM) named Burning Chrome which captures TCP and dialup traffic and emails captured passwords. It is virtually undetectable with standard windows tools.
Author:Solar Eclipse
File Size:97123
Last Modified:Jul 12 20:36:01 2000
MD5 Checksum:5ad2975cd03a01b3de5ce1b521f22dda

 ///  File Name: waterfall_122.zip
Description:
Decreases your CPU temp by up to 30c. Works with Intel, Cyrix, AMD, and IDT CPU's, and does not compromise performance.
File Size:113591
Last Modified:Aug 16 20:04:10 1999
MD5 Checksum:4c2a2c2695311a573eb3a485dd067876

 ///  File Name: wci.c
Description:
WCI for Windows is a simple ARP connection interceptor for switched networks and especially for SMB, based on ARP0c2.c. Features automated bridging and routing, ARP redirection/spoofing, automated connection interception for ALL SMB servers in the local subnet, and network cleanup on exit. On startup, WCI enumerates all resources in the Windows netwoking environment (SMB) and intercepts all possible connections (any2any). Requires the Packet Driver Developers Pack. Binaries available here.
Author:FX
Homepage:http://www.phenoelit.de
File Size:44962
Last Modified:Jul 5 16:40:56 2000
MD5 Checksum:a68bfc84f695776e5ab21a599c4e15aa

 ///  File Name: wds.zip
Description:
WinDNSSpoof is a simple DNS ID Spoofer for Windows 9x/2K. You must be able to sniff traffic of the target - if you are in a switched network you can use ARP Cache Poisoning tools like winarp_sk or winarp_mim (see http://www.arp-sk.org).
Author:Valgasu
Homepage:http://www.securiteinfo.com
File Size:55079
Last Modified:Nov 13 07:39:04 2002
MD5 Checksum:93dfdb454eedfe12b75393eab6b0ad60

 ///  File Name: weakness.zip
Description:
Weakness is a useful little dos/win command line utlity that will scan a target host for 94 known www (CGI) vulnerabilities.
Author:John Bissel
Homepage:http://yohaku.dhs.org/~hightimes
File Size:30635
Last Modified:Dec 6 22:25:20 1999
MD5 Checksum:f2086035246e101cfd17deb7938ca15b

 ///  File Name: WebGet.exe
Description:
Unavailable.
File Size:571392
Last Modified:Sep 6 02:49:23 2002
MD5 Checksum:e9764d53e00c98c5598a5b6723e51050

 ///  File Name: webonycer.zip
Description:
Webonycer is a tool to assist newbies in chaining proxies.
Author:Fox Mulder
File Size:150780
Last Modified:Sep 21 20:12:11 2000
MD5 Checksum:bedd0152bf7a8da4660270225b10302f

 ///  File Name: webscan.exe
Description:
This is a web security scanner designed to find known web server security issues. Runs on Windows 95, 98, NT 4 and 2000.
Author:Cerberus Information Security
Homepage:http://www.cerberus-infosec.co.uk/
File Size:77824
Last Modified:Dec 3 19:33:52 1999
MD5 Checksum:6b6fcc6307e6123f503525fd48f76a94

 ///  File Name: WebScan.zip
Description:
Simple WWW scanner.
File Size:35269
Last Modified:Apr 1 16:04:00 2000
MD5 Checksum:7c956e4e486bb73a555673ccb1b0365e

 ///  File Name: whcc-0.6.64.exe
Description:
Web Hack Control Center is an administrative tool that scans web servers for known vulnerabilities. Scans HTTP and HTTPS (SSL) servers, and it's exploits database contains over 1500 vulnerabilities. WHCC can be used as your primary browser or be launched from Internet Explorer.
Author:Jeffrey Barber
Homepage:http://www.ussysadmin.com/whcc/default.php
File Size:7079983
Last Modified:Dec 14 01:34:06 2002
MD5 Checksum:16525c79c8b536384bbef094c61aed07

 ///  File Name: whcc-0.6.65.exe
Description:
Web Hack Control Center is an administrative tool that scans web servers for known vulnerabilities. Scans HTTP and HTTPS (SSL) servers, and it's exploits database contains over 2000 vulnerabilities. WHCC can be used as your primary browser or be launched from Internet Explorer.
Author:Jeffrey Barber
Homepage:http://www.ussysadmin.com/whcc/default.php
Changes:This release has 600+ more exploits than the last.
File Size:7430506
Last Modified:Jan 6 12:44:39 2003
MD5 Checksum:1c25e9a967703837c5a1b4319401f3f4

 ///  File Name: whcc_setup.exe
Description:
Web Hack Control Center v0.63beta is a spin off of Nikto's Web Scanner but runs on Windows. Scanner and Web Browser wrapped up into one. Contains a database of over 1500 web vulnerabilities. Prop's to Chris at CIRT.Net for the exploits database.
Author:Jeffrey Barber
Homepage:http://www.ussysadmin.com/whcc/default.php
File Size:7078527
Last Modified:Dec 3 00:01:57 2002
MD5 Checksum:2ddfe9e95d99c1193852e96e4d22c4dc

 ///  File Name: Whois02f.zip
Description:
Whois - flexible whois client that automatically finds requested info in the 4 predefined databases and able to search in user-defined databases also. Supports easy linked navigation in the database, data saving, interface customization and holds the list of old requests.
Author:Averk
Homepage:http://nscan.hypermart.net
File Size:80233
Last Modified:May 22 14:19:40 2000
MD5 Checksum:cc483218f0a07d98573bec7841ae2111

 ///  File Name: winarp_mim-0.9.4.zip
Description:
An ARP Man In the Middle tool for Windows, which allows one to redirect traffic on a LAN. See http://www.arp-sk.org/ for further information.
Author:Cedric Blancher
Homepage:http://www.arp-sk.org/
File Size:52515
Last Modified:Jul 8 01:48:15 2002
MD5 Checksum:bd2f42cd207d2da2db3137ac24dcf2f6






 ///  File Name: winarp_sk-0.9.1.zip
Description:
An ARP packet generator for Windows designed to illustrate ARP protocol flaws and applications such as ARP cache poisoning. See http://www.arp-sk.org/ for further information.
Author:Cedric Blancher
Homepage:http://www.arp-sk.org/
File Size:61175
Last Modified:Jul 8 01:47:37 2002
MD5 Checksum:97609790e1307965a0b890d7d8098a5a

 ///  File Name: winblox-open-2005.03.11.tar.gz
Description:
Winblox is a User-mode WINAPI-level and open-source tool for controlling the behavior of applications running on Windows workstations.
Author:Liu Die Yu
Homepage:http://www.umbrella.name/computer/winblox/
File Size:1183226
Last Modified:Mar 17 02:15:24 2005
MD5 Checksum:0603be6f877a21daeb56aa89bbd488d5

 ///  File Name: WinDial100.zip
Description:
WinDial 1.0 -- a Windows War Dialer (modeled after PhoneTag and improved for my needs).
Homepage:http://www.twistedinternet.com/impaler/
File Size:37827
Last Modified:Nov 29 22:10:35 1999
MD5 Checksum:26d9edea8596aacc8ebc133ce3c0dff4

 ///  File Name: WindowsANIZeroDayPatch.zip
Description:
Quick and dirty blanket fix for the Microsoft Windows ANI zero-day vulnerabilities. Prevents loading cursors from outside the Windows directory.
Homepage:http://research.eeye.com/html/alerts/zeroday/20070328.html
File Size:276671
Last Modified:Apr 2 18:23:21 2007
MD5 Checksum:a4a751a3a61919b3029cdc4c35c271c3

 ///  Directory: / winfingerprint /
Description:
Winfingerprint 2 is a console based Win32 discovery tool.
Total Files:24
Last Modified:Jan 3 20:22:53 2008

 ///  File Name: winhole.zip
Description:
Winhole will put Wingate onto 95/98 system without its owners knowledge (easily done if the system is compromised with BO/Netbus/etc).
Author:Courtney Loveless
File Size:404651
Last Modified:Jan 25 17:38:48 2000
MD5 Checksum:c3ce1f7215aa60e0f293f943e826a079

 ///  File Name: winject.zip
Description:
Winject is a low-level packet builder/injector for win9x dialup users. It allows you to create custom packets with real or spoofed IP addresses.
Author:Moofz
Homepage:http://big.badlink.net
File Size:31881
Last Modified:Feb 16 17:17:54 2001
MD5 Checksum:1080620a17a024797819ed18cea3adcc

 ///  File Name: wintcphard.tgz
Description:
This TCP/IP stack hardening tool for Microsoft Windows 2000/XP helps to make the OS resistant to many denial of service attacks. Binary and source included.
Author:D'Amato Luigi
Homepage:http://www.securitywireless.info/
File Size:21641
Last Modified:Jul 16 11:09:00 2004
MD5 Checksum:47783ff271f6d521514473c6fd8f1a4c

 ///  File Name: winupw.zip
Description:
The WinU password cracker v0.7b decrypts WinU's stored passwords from the registry. Versions 2.0-5.2 are supported.
Author:Nu Omega Tau
Homepage:http://www.nuomegatau.com
File Size:10137
Last Modified:Nov 29 12:03:59 2000
MD5 Checksum:c4ef64d2ba8ca9b0101fff563d9a19a6

 ///  File Name: winzapper.zip
Description:
WinZapper is a tool which allows you to erase event records selectively from the Security Log in Windows NT 4.0 and Windows 2000. Winzapper FAQ available here.
Author:Arne Vidstrom
Homepage:http://www.ntsecurity.nu/toolbox/winzapper
File Size:29008
Last Modified:Nov 4 19:01:50 2000
MD5 Checksum:a65ff77e71977ded0fe4fa4964f33c48

 ///  File Name: WNMSB-LAN.zip
Description:
WNMSB-LAN is a Windows Messenger Service Bomber. Includes C++ source and a windows executable.
Author:PAgVac
File Size:41464
Last Modified:Dec 2 22:47:47 2003
MD5 Checksum:2ff196a71f4cbd1ed6aa0e7ce296b5a8

 ///  File Name: ws301.exe
Description:
For controlling access to undesirable web sites.
File Size:1362890
Last Modified:Aug 16 20:04:10 1999
MD5 Checksum:3984098fc874ddc67e1dbadf12112396

 ///  File Name: wsc11.zip
Description:
Winsniffer is a packet sniffer for the Windows console designed to be effecient and flexible. Screenshot available here. This is a trial version.
Homepage:http://winsniff.hypermart.net
File Size:102335
Last Modified:Sep 30 21:45:10 2000
MD5 Checksum:86e3294892d57e11ec7d6235a112e971

 ///  File Name: wsm.zip
Description:
WinSSLMiM implements a HTTPS man in the middle attack from the Windows platform. It includes FakeCert a tool to make fake certificate (like the DCA of sslmim in Phrack 57). It can be used to exploit the Certificate Chain Vulnerability in Internet Explorer. Tested under Windows 9x/2000.
Author:Valgasu
Homepage:http://www.securiteinfo.com
File Size:453573
Last Modified:Nov 13 07:36:00 2002
MD5 Checksum:698404fc7f9442e9022b9f71645c4dbe

 ///  File Name: wtgold.zip
Description:
Wintrasher GOLD v5.1 for Windows95/98 is an advanced and powerful Windows configuration utility and Shell/Desktop Management tool. Features in this release include: reboot/boot computer into REAL DOS mode, change the shortcut arrow to whatever you want, check file integrity on startup (detect locally installed trojans, keyloggers, and viruses), log file editor to View/Edit/Clear all your Windows log files from one program, personalize your Desktop, change the Windows 9x folder structure, watch what the uninstall programs call, when they launch, create your own and remove the ones that don't work anymore, watch what windows launches behind your back (Edit/Remove/Insert), change the layout of your Deskop and some of it's features, clear your all of your history files when leaving Windows, log logins at startup, change your registration information, retrieve and/or remove stored password files, Wintrasher Calendar & Popups, backup of critical system files in case you have a system crash or install something you wish you hadn't, lock your system as with Windows NT, Wintrasher GOLD password protection, much more. Shareware by René Vindum of The Silents Denmark.
File Size:1602978
Last Modified:Aug 16 20:04:16 1999
MD5 Checksum:98fbeb74af01a1e59d56b7d596a7c37a

 ///  File Name: wtk.zip
Description:
WinTCPKill is a TCP connection killer for Windows 9x/2K. You must be able to sniff traffic of the target - if you are in a switched network you can use ARP Cache Poisoning tools like winarp_sk or winarp_mim (see http://www.arp-sk.org).
Author:Valgasu
Homepage:http://www.securiteinfo.com
File Size:48638
Last Modified:Nov 13 07:37:15 2002
MD5 Checksum:3e98ff3654679ffdaa449d5a15936d62

 ///  File Name: x1bscanner.rar
Description:
x1bscan is a console based tcp connect() port scanner with HTTP and service banner grabbing. Written in perl and compiled into a Windows executable.
Author:x1b
File Size:1070423
Last Modified:Dec 14 23:49:14 2003
MD5 Checksum:139fd385b3f2a4968e99bd935aee4273

 ///  File Name: XaviorBeta4.exe
Description:
A remote password auditing and recovery tool that allows dictionary or complex brute-force scans. Scripting support allows you to define any plaintext login procedure. Optimised WWW basic authentication scanning.
Author:Lithiumsoft
Homepage:http://www.btinternet.com/~lithiumsoft/
Changes:Scripting - Xavior now gives you the power to scan *anything* that uses simple plaintext password entry.
File Size:384997
Last Modified:Nov 25 00:20:00 1999
MD5 Checksum:cc82db97b36c9c20ca56496aa4fded1b

 ///  File Name: xintruder.zip
Description:
Xintruder is a utility for cracking password protected Windows 95/98/ME shares. xIntruder exploits vulnerability in SMB implementation on these operating systems, which allows for very effective collection of passwords (any password in local network less than one minute, in the internet less than 10 minutes), originally discovered by www.nsfocus.com. xIntruder was created in the development possess of the project xSHaReZ 2 and is recommended to be used in conjunction with xSHaReZ 2. Tested on Windows 95/98/NT/2000.
Author:xPoison
File Size:264963
Last Modified:May 30 14:34:07 2001
MD5 Checksum:12d71376f18f967e4f4ac4eb03d31ebf

 ///  File Name: xns25.exe
Description:
X-NetStat v2.5 - X-NetStat is a tool for advanced users to see your current internet connections, and the status of those connections. Excellent interface and many features. One of those "must-have" programs. For Win95/98/NT.
Author:Fresh Software.
File Size:402811
Last Modified:Aug 16 20:04:14 1999
MD5 Checksum:65e9df7babecded96778c201b459f918

 ///  File Name: xns26.exe
Description:
X-NetStat v2.6 - Latest release of the "must-have" tool for Windows 95/98/NT. X-NetStat is a tool for advanced users to see your current internet connections, and the status of those connections. Now multi-threaded and faster! Another 5-star release!
Author:Fresh Software.
File Size:283814
Last Modified:Aug 16 20:04:15 1999
MD5 Checksum:b341be520cf42d71eb6e70fafcf513d5

 ///  File Name: xns3setup.exe
Description:
X-NetStat 3.0 is a program for Windows 9x/NT that monitors your current network and Internet connections. XNS will display your each of your connections' source and remote network address (Hostname or IP), the local and remote port the connection is utilizing, the protocol (ICMP, UDP, TCP) being used to communicate, and the status of the connection. Any time you connect to a website, check your email, send an ICQ message, or unknowingly open a backdoor or your system, XNS will take notice and display the details of each connection in it's window. X-Netstat lets you go behind the scenes of your network activity, has an intuitive interface, and can be stowed away unobtrusively in the system tray. Bottom line, X-NetStat is the fastest and easiest way to see what exactly is going on over the Internet or your LAN. Excellent GUI and plenty of very useful options. Shareware by Fresh Software.
File Size:452099
Last Modified:Aug 16 20:04:07 1999
MD5 Checksum:6cd6be28da58ae9abda45648de6a7e96

 ///  File Name: xpfiremon.zip
Description:
XPFiremon is a system tray application that will monitor the settings and services associated with the Windows firewall to ensure they are running. If they are disabled a warning is popped up onto the screen and the system tray icon will turn red. The program allows the user to configure, start, and stop the firewall.
Author:Inferno
File Size:54622
Last Modified:Nov 20 02:40:53 2005
MD5 Checksum:c4a18c09cb25d33d3861576df1dbd43e

 ///  File Name: xrunas11eval.zip
Description:
XRunAs is a tool that allows administrators to run commands on remote computers under the context of a specified user account without the use of the Schedule service. If XRunAs is used in conjunction with a domain account, commands that are run will be able to access network resources given that the domain account used to run the command has access to the network resource. All information that is transferred over the network while using XRunAs is encrypted using a standard encryption algorithm.
Author:LazySysadmin
Homepage:http://lazysysadmin.com
File Size:1520311
Last Modified:Apr 27 19:22:21 2003
MD5 Checksum:397f8b26a89af73eeae08ffe8a4ce367

 ///  File Name: xrunas12eval.zip
Description:
XRunAs is a tool that allows administrators to run commands on remote computers under the context of a specified user account without the use of the Schedule service. If XRunAs is used in conjunction with a domain account, commands that are run will be able to access network resources given that the domain account used to run the command has access to the network resource. All information that is transferred over the network while using XRunAs is encrypted using a standard encryption algorithm.
Author:LazySysadmin
Homepage:http://lazysysadmin.com
Changes:Removed dependency on srvany.exe, enhanced speed.
File Size:887686
Last Modified:May 23 03:50:48 2003
MD5 Checksum:4a8cfb4b8978eb04f257f14322bbb0c7







 .:. TopPrivacy Statement | Copyright Notice