SniffJoke is middleware software for Linux that is managed by a web interface and enables connection scrambling technology, also known as sniffer evasion techniques.
3ddbc8756a222412a41f8e31495b0a877901d1129de1745d59798a8f482a99d4
SniffJoke is middleware software for Linux that is managed by a web interface and enables connection scrambling technology, also known as sniffer evasion techniques.
5ddc5fffbed7e6ff9f0d22260acc4ad37ef5df2df0d55152510d368444648800
ShellExecuteFisaco - This is a temporary, third-party patch to help mitigate the URL handling issue discovered in Windows XP and Windows Server 2003.
0ff695c1b0c5d9e7f8c0aa50738be627a3c4f7d8d77fd0b2c0b6be7970eab8f2
SniffJoke implements sniffer/IDS evasion techniques. SniffJoke runs on a network connected box by selectively applying evasion techniques to sessions involving it. Evasion application is governed by user rules and implemented with a netfilter/ulogd module.
fa26b5c1f7404da6b5ac31e14a7fe20607c48b583e5075bb8539ff76fdf04493
SniffJoke implements sniffer/IDS evasion techniques. SniffJoke runs on a network connected box by selectively applying evasion techniques to sessions involving it. Evasion application is governed by user rules and implemented with a netfilter/ulogd module.
235306c2ac3afe63439af4c38b56c6ce848e7c2f06a9113a6c7e7975c14779a1
Sandboxing tool for Windows.
377947465e7e61277e2c6eaff1e63082f0c4dc92ae72150346049bef6c993b79
Apmislay (avoid+privacy+mislay) is a library to make anonymous connections without performance loss. It implements a simple technique based on IP spoofing and suits well for file sharing systems or anonymous transfers of large amount of data.
1361d415c01016679dab321c68085b3417b894004a9cb77ea39617715a4fa9db
BigBoo is a YABASST, Yet Another Block And Superblock Subversion Tool. It swallows, encrypts and hides your files in a ext2/ext3 or swap partition.
8dc8de2c28d02a5a800080fda7db637c17cc5b80323a6992cb451a25b9745367
SABBIA protocol anonymizes low latency connections by making a continuous and constant padding over the net. This is an example of implementation on a trusted core.
5e527cac19b060ebb445c3a811d23707127e64c157a48427dbddc3de91179817
Innova is a framework that permits to manipulate network sessions starting at layer 3 and is transparent to the application. It runs entirely in userspace on Linux and supports plugins.
76a6b396d0382cb1e3ce80a6fdabd05fd9b1230c10e350f7bde29acae52e3420
This code shows how to send hidden data steganographed into a simulation of common (worm) traffic.
72789619c48df1f96f8be7684eaa9420f1b13be1f7734eed11122fd57144ff76
sud (superuser daemon) permits a user to switch to root privileges and to use a suid program in a nosuid environment. It is based on a client/server model and on the ability to pass file descriptors between processes. sud permits you to choose your authentication method, and your effective credentials will be checked by using a Unix domain socket.
c4fdf9dfc7a58daf75cb37d2bc4d10d3767216e2b8e4861a87c2d274bac252a0
Generic time path analysis via ttysnoop-0.12c patching.
13016e6b61ab15b5890f728bf71f7270d8fdfbbb5dc4099f6534aa603a989044
Kernel Security Therapy Anti-Trolls (KSTAT) is a very powerful security tool to detect many kinds of rogue kernel rootkits. It analyzes the kernel through /dev/kmem and detects modified syscalls as well as various other problems. This version runs on 2.4.x only, and can assist in finding and removing trojan LKMs. It supports network socket dumps, sys_call fingerprinting, stealth module scanning, and more.
812c5cc62aa476aea9387d2843ecea645455345d2f9415eacffea7e0beea1515
Kstat is a powerful tool for Linux v2.4.x which displays information taken directly from kernel structures taken from /dev/kmem. This is especially useful when we can't trust output from usual sources and applications, for example after an unauthorized access to our systems. Effective if something like ps, ifconfig, lsmod, or system calls are patched.
8ee897a12c159a2bc0dc9c6babaec6df62f6271169fe30d9b5a432b2792ee52a
TCP Congestion paper and proof of concept code - A vulnerability in the TCP protocol affects several OS's, allowing remote denial of service attacks. Includes a netfilter module which implements a new method of blocking the attack. More information on TCP congestion vulnerabilities available here
0edb50b6b224df0e09b02f95c53904eddb7d8941511032d777f824bc13c0fd20
Umpf is a system for managing encrypted files without using encrypted filesystems such as cfs/tcfs loop-aes/kerneli. Does not require root to run, is lightweight, and transparent.
3aad55bb1c34d97b342fdc0a9b37279257a60a4cbdf3c450c433f6d11856d3c9
The Spapem project aims to how how to elude securelevel under *BSD systems by hiding the fact that the system has been rebooted. Includes code to restore the PID, a LKM to change the uptime, a generic rootkit example, a module to remove startup messages, and instructions for patching init(8).
82b43738fe9aaba0129a0e6210d475fb733357a302d34ecc0480bd867274d1d5
SMS Spoofing Tool - Spoof your SMS by using this code with smsclient.
a7a3711d77b652fedd02778c8ac4d72e71b429baf3fe53b63871119f2eef3eb7
L.L.H.M. - Low Level Header Manipulation is a tool hides pieces of information in your files. Works on Win32.
eccdb1985f2a974e1aacf87cf7ef8144192301a191b8349e4c103473dac78563
THC Backdoor for Linux - This is a simple but useful backdoor for Linux based on a FreeBSD lkm by pragmatic/THC.
734681babd24cd7bc455259f89ac4b384ee909a5df908ba0169dabc078d2cb69
THC Backdoor ported to OpenBSD - This is a simple but useful backdoor for OpenBSD based on a FreeBSD lkm by pragmatic/THC.
05fcfdd8024ff5dbbf471ea66e27a53a4139f2377df3255c490eb5dd6a1f349a
SRaw for OpenBSD is a kld which makes all users able to open raw sockets. Supported protocols are IPPROTO_RAW, IPPROTO_ICMP, IPPROTO_IPIP, IPPROTO_IPV4, IPPROTO_IGMP.
300627a1e608cd638ff2fafcf814d528749f49e60213764e8e75763181c9f58e
SRaw is a kld for FreeBSD which disables EPERM in socket() and permits to allocate inpcb even if the socket is raw and users haven't root permissions bypassing suser() in pru_attach() functions.
1d9e7f1c99f8c59d6f38efccb713756d713efba1264fdc59cc1c0e336e75b6b1
This FreeBSD module shows how to intercept getpass(3) function and print anything that is typed without terminal echo.
231f569e4f8c8dfa8c9421da154803e5c86e7b176b954311ca32ed72fd9e91b5