what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 25 of 53 RSS Feed

Files

showcode.zip
Posted Oct 14, 1999
Authored by Corrosion

Win 9x showcode.asp exploit. With pascal source.

tags | asp
SHA-256 | c5cc83425a58499a3ac6156161faabf5c9fa4ed983610b46fdb335c906f9dedc
plookup_251.zip
Posted Oct 12, 1999

A fast multithreaded NSLookup program that can be used with Proxy Hunter. 32 bit DOS, GPL, Ada 95.

SHA-256 | d6fb8f7e172812ea71021112485fcb3e56cba99cd4db0c048720b852f8710735
PingAlivev1.zip
Posted Aug 17, 1999

Utility to ping other hosts in MSDOS.

SHA-256 | 61fa16cfa9318aaf84d494a85db71d2f033d81cffa2dc3d25ce21c913fbefd87
ds95.exe
Posted Aug 17, 1999

Directory Snoop v2.1 - Directory Snoop is a 32-bit freeware utility program for Windows 95/98 (but not NT) that allows you to snoop around your disk drives at a very low level. Features: View the raw DIRENTRY structures for any directory (including hidden & system dirs), View the device parameters and disk map for any drive, View the names of your "erased" files with the option to purge them, View the file allocation table (FAT), View raw clusters for any file or directory, Step forwards or backwards through the cluster chains, Map files and directories to cluster numbers, Unerase files by sending cluster data to a specified target file, Verify the effectiveness of file/disk wiping programs.

systems | windows
SHA-256 | 249a4e4a33ee1590e9d6baccb60b80940e80275d686d68351aea45f203c39951
dos-log2.zip
Posted Aug 17, 1999

dos-log2.zip

SHA-256 | 31fc5a2691f2a5542cfa337d4711ede6194fb81d66c43b20b337092471a6bd3e
sentry21full.exe
Posted Aug 17, 1999

Sentry v2.1 is a computer program that can "lock down" your computer on demand, so it stays secure even when you aren't using it. You can customize the appearance of your screen while Sentry is running, and have your favorite screen savers run within Sentry. Sentry can even take messages from people who dropped by your workstation while you were away. Say someone wanted to talk to you, only to find that you were in a meeting. That person can simply leave a message through Sentry, and when you get back from your meeting, you can browse through all messages that people have left - including theirs. Sentry is ideal for people in workplaces, who may have to leave their system unexpectedly, and don't want co-workers to snoop around in their files. It's also great for teachers, parents, etc, who don't want the kids messing with their computers if left on. Contents: Entire Sentry program, 3 screensavers, User Manual, Boot-up Configurer.

Changes: optimized code, bugfixes, and several new features. 5-star shareware by Fresh Software
SHA-256 | 4653287d530b80bf50e1d932ffcbd1c809d531d4e48bf2fbfb5d47e3f8564eae
ps.zip
Posted Aug 17, 1999
Authored by Rene Vindum

PowerSettings v6.0a for Windows 95/98 is an excellent Windows Shell/Desktop Management Tool that provides numerous configuration and security options for the Windows user. Features: reconfigure/change virtually every aspect of Windows, check files for changes at startup (ala TripWire), view/edit/clear all Windows logfiles, change the Windows folder/directory structure, monitor and remove install/uninstall programs watching changes they make to your Registry and what programs they call, monitor all programs launched by Windows [read: watch for trojans], clear your history files when exiting from Windows, log all logins to your PC, change your registration information, access all password files, backup critical system files such as your Registry, lock your PC (ala Windows NT), edit the manufactor/model properties, much, much more.

tags | shell, trojan, registry
systems | windows
SHA-256 | 08a09bada0cd8deacd75abe628b4ac00613d55c9c95283e2e47f670b623d1213
cleaner21.exe
Posted Aug 17, 1999
Authored by Puppet of MooSoft Development

The Cleaner v2.1 is designed to remove Trojan horses from your computer. Currently, the program can identify and remove over 110 different trojans.

tags | trojan
SHA-256 | 83261f198e94a90cc2025f70f2e190a1b85317a20ee474751d5c9a50f423690b
emf.zip
Posted Aug 17, 1999
Authored by PC Magic

Encrypted Magic Folders - Encrypt, hide, and password protect folders.

SHA-256 | 428b30ce04df98112ebcf702428b54787bf32d40cdb2f9018844ddd654560395
guidclean.zip
Posted Aug 17, 1999

guidclean.zip

SHA-256 | cf30da082f0e27a60c508a57c3aa365c776608cb3b8f53c17df75d7ca844e2b0
guideonv110.exe
Posted Aug 17, 1999
Authored by Vector Development

Guideon v1.10 allows you to defeat the Microsofft GUID and maintain your privacy. Microsoft Office applications include an identifier called a GUID (Globally Unique Identifier). This identifier is unique to each machine. As a result, any document could be traced back to its original creator. Guideon lets you remove these identifiers from the files with no ill effects to the data files. Features: Replaces GUID with either zeros or an optional string you specify. Can make backup copies in case something unforseen should occur. Can log it's actions to a file you specify. Can replace the GUID on all Office files in a given directory or even drive. Detects office files based on content not name so it will even fix Document Templates. Optional logging of the orignal GUID. Support for running from the command line allowing, macros or batch files to call it. This release includes bugfixes and code optimizations.

SHA-256 | d2d9fc4b7bfc24a5dfefdd0b23bb1d9fc39d928f43a60a9979fc8eb6a4df2e51
mfd.zip
Posted Aug 17, 1999
Authored by PC Magic

Magic Folders - Hide folders and password protect them.

SHA-256 | c34ea4002dd8d6d7e52e7a61472ece60fd1c42c491b80a1de30aa7a2c6a31a46
ssu20l.zip
Posted Aug 17, 1999
Authored by Michael Miller

Security SetUp II (build 203) is a 'security shell' for Windows 9x and Windows NT. The software will allow you to edit the security settings of your Windows 95/98/NT PC. Especially useful for households with children, system administrators, and Internet cafes, Security SetUp 2 has the following features: Disable changes of Printer settings, Disable changes of Network settings, Disable changes of the desktop (resolution, colors), Disable AutoRun (CD-ROM), Specify what program-files that can be executed, Hide items in the Control panel, Disable the Control panel, Activate / deactivate special items in the start-menu, and much, much more. Excellent shareware with plenty of features. 952k.

tags | shell
systems | windows
SHA-256 | b13af14fba1fc290862a07972e8e2253e9899a1dc1c1972e5ba7a7b8db9536f2
cleaner2.exe
Posted Aug 17, 1999
Authored by Puppet

Cleaner v2.0 - The (Multi-Trojan) Cleaner for Windows95/98/NT. Scans for 38 of the most common trojans, including latest releases of Back Orifice and NetBus.

tags | trojan
SHA-256 | 1d964a3b5be239d1e12d80924931364e28b1125aa33e7c0b4158531ea4128be2
nn29b.exe
Posted Aug 17, 1999
Authored by Puppet

NukeNabber 2.9b - NukeNabber sets itself up to listen on TCP and UDP ports commonly attacked over the internet. A total of 50 ports can be monitored simultaneously. ICMP dest_unreach attacks are now logged. It is designed to give you the information you need in order to trace an attacker including a method of finding an attacker's nickname on IRC (mIRC, VIRC and PIRCH clients are supported). This release fixes a portscanning bug that could make NN crash.

tags | udp, tcp
SHA-256 | d81aaf804e481625f415491829544af6a0b39485050fef010916fd904aab83af
cleaner2beta61.exe
Posted Aug 17, 1999
Authored by Puppet

cleaner v2beta61 - The (Multi-Trojan) Cleaner for Windows95/98/NT. Scans for most popular trojans, including latest releases of Back Orifice and NetBus.

tags | trojan
SHA-256 | 31197242dedcdb0a165b7ad18b66843587c967912a5455eda104a0288951ba0f
cleaner2beta62.exe
Posted Aug 17, 1999
Authored by Puppet

The (Multi-Trojan) Cleaner for Windows95/98/NT. Scans for most popular trojans, including latest releases of Back Orifice and NetBus.

tags | trojan
SHA-256 | 17648facf541c0bab2e708bcbb291597acf4587334c61d6e57a176f53393ff0d
red_400.exe
Posted Aug 17, 1999
Authored by Hard Drive Software

RedHand Security Monitor 32-bit v4.00 - Quietly monitors your computer and tells you exactly what someone did while you were away, when they did it, and how long it took. Windows 95/98.

systems | windows
SHA-256 | 4f16426d4526f4ef858ae144a2a240530454fb371a9a1548d8a316d2941ad246
red2416.zip
Posted Aug 17, 1999
Authored by Hard Drive Software

RedHand Security Monitor 16-bit v2.40 - Quietly monitors your computer and tells you exactly what someone did while you were away, when they did it, and how long it took. Windows 3.1.

systems | windows
SHA-256 | f6fd3fa19e8eddbcf5895b0d8042b3bddacb661eb6dc35551f25860965dca07a
registry-guard-v26.zip
Posted Aug 17, 1999

The Registry Run Guard v.2.6 - Monitors registry for trojans and other anomalities.

tags | trojan, registry
SHA-256 | d7da8b5ae933e7c551e00ab35696de88ac91c70b83cc96346486141397680a21
rules.zip
Posted Aug 17, 1999

Custom ruleset for Conseal PC firewall designed to prevent popular "hacker" attacks.

SHA-256 | 8ac36a279cc1203027ae325d5ab0224a06181a82f2d11ef29fbdbb958e1531ee
cleaner2beta.2.0.0.35.zip
Posted Aug 17, 1999
Authored by Puppet

The (Multi-Trojan) Cleaner for Windows95/98/NT. Scans for and cleans your computer of 19 of the most common trojans.

tags | trojan
SHA-256 | 5b9104232a080618da1606638eaf2efb2429e5cd8e541ebd9d831fecd47bbcc5
cleaner2beta.2.0.0.46.zip
Posted Aug 17, 1999
Authored by Puppet

The Cleaner v2beta.2.0.0.46 - The (Multi-Trojan) Cleaner for Windows95/98/NT. Scans for most popular trojans, including latest releases of Back Orifice and NetBus. This release optimizes scanning speed by 50%, and includes a "live database update feature."

tags | trojan
SHA-256 | 6ce5aad64648a932f8bc62a6c3b528c9baff86cb92b1c9c32583b930210290a2
shred95.exe
Posted Aug 17, 1999
Authored by Gale Force Software

Shredder95 goes way beyond Government-grade, Department of Defense, requirements to "completely destroy" files. Every bit of a file is overwritten numerous times and then randomized.

SHA-256 | de3e017cae084ac5bd9a286c5eef96d2f6133d7446e6c8e3cad02eedefa60a74
security-setup20l.zip
Posted Aug 17, 1999

Security program that allows you to add security to many Windows 95 features, menus, setup options, etc. Very comprehensive. web site

tags | web
systems | windows
SHA-256 | bceb1b040e54ef9fd9dd5bc5b7dc68812f04a8f29a490ace1b7184ca0b5397f0
Page 1 of 3
Back123Next

Top Authors In Last 30 Days

Recent News

News RSS Feed
Microsoft Power Pages Misconfigurations Exposing Sensitive Data
Posted Nov 15, 2024

tags | headline, privacy, microsoft, data loss
Man Gets 5 Years For Laundering Crypto From Bitfinex Hack
Posted Nov 15, 2024

tags | headline, hacker, data loss, fraud, cryptography
Five Eyes Infosec Agencies List 2024's Most Exploited Software Flaws
Posted Nov 14, 2024

tags | headline, government, usa, canada, britain, australia, flaw, new zealand
CISA, FBI Confirm China Hacked Telecoms To Spy
Posted Nov 14, 2024

tags | headline, government, privacy, usa, phone, china, data loss, cyberwar, spyware, backdoor
Two Men Charged For Hacking US Tax Preparation Firms
Posted Nov 14, 2024

tags | headline, hacker, privacy, usa, fraud, identity theft
Iranian Threat Group Targets Aerospace Workers With Fake Job Lures
Posted Nov 14, 2024

tags | headline, hacker, fraud, phish, iran
Air National Guardsman Gets 15 Years For Leaking Docs On Discord
Posted Nov 13, 2024

tags | headline, government, usa, data loss, military
Citrix, Cisco, Fortinet Zero-Days Among 2023's Most Exploited Vulnerabilities
Posted Nov 13, 2024

tags | headline, hacker, flaw, cisco, zero day
Ivanti Patches 50 Vulnerabilities Across Several Products
Posted Nov 13, 2024

tags | headline, flaw, patch
Intel And AMD Have Released Many Advisories
Posted Nov 13, 2024

tags | headline, flaw, patch, intel
View More News →
packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close