#og

mrps-v01.c

eZine's profile picture
Published in 
 · 8 months ago
... and small os fingerprinting. * look for further versions. * * thanks: robosok for debugging help * * IOHO Zine (http://chickenz.net/og) * #og at irc.ndrsnet.com * * orbflux (orbflux@inorbit.com) 2001 * */ #include <stdio.h> #include <stdlib.h> #include <signal.h> #include <string.h> #include <unistd.h> // optarg #include <sys/errno.h> #include <sys/types.h> #include <sys/socket.h> #include <netinet/in.h> #include <netdb.h> #include <rpc/rpc.h> #include <rpc/pmap_prot.h> #include <rpc/pmap_clnt.h> FILE *in; char infile ...

fawx3.c

eZine's profile picture
Published in 
 · 8 months ago
/* [og] fawx3.c, sends every type of icmp/igmp type+code to <host> * -- heeb (heeb@phayze.com), #og @ irc.ndrsnet.com */ #include <stdio.h> #include <unistd.h> #include <stdlib.h> #include <string.h> #include <sys/types.h> #include <sys/time.h> #include <sys/socket.h> #include <netdb.h> #include <netinet/in.h> #include <netinet/ip.h> #include <netinet/ip_icmp.h> #include <netinet/igmp.h> #include <netinet/icmp.h> void banner(void) { printf("[og] fawx3.c, sends every icmp/igmp ...

strscan2b1.c

eZine's profile picture
Published in 
 · 8 months ago
/* ( IOHO 2001 #og irc.ndrsnet.com ) */ /* strscan.c v2b1 by ka0z@ndrsnet for IOHO E-Zine http://chickenz.net/og */ /* Basically, I made this for myself and it was suggested that I put */ /* this in the e-zine so I did. Any ideas on how to implement the */ /* multiple line banner checking would be greatly appreciated. */ /* this has been optimized with ntohl and htonl and shit like that blah */ /* blah blah blah.....ok */ #include <stdio.h> #in ...

rvscan v4-rel

eZine's profile picture
Published in 
 · 8 months ago
... ix system with telnet, rpcinfo, showmount, nmap, and host. RESOURCES : email: elicit@comic.com web: http://chickenz.net/og irc: elicit at #og on irc.ndrsnet.com THANKS : all of #og. shekk, robosok, orbflux, and ka0z for bug testing. ChangeLog v4-rel: made a whole lot of improvements to make things more efficient. added automatic nmap installation. no longer requires 'strobe'. added an attempt at telnet banner grabbing (works occasionally). => added new checks for vulnerable BIND versions. added new checks for vulnerable IMAPD versions. rewrote some things in perl for more stability. added new checks for vulnerable HTTPD ve ...

dbsnatch 1.0

eZine's profile picture
Published in 
 · 8 months ago
README # DB Snatch v1.0 -- ben-z (bentothez@phayze.com) || #og @ undernet.org # nice way to log various information about a host.. edit the 'logdir' # variable to wherever you want dbnsatch to log all its scans to. Each # host's log file will be saved as the name of the host in your $logdir. # Also, make sure the binfo-udp binary is in your $PATH somewhere! # requires: # dig, whois, traceroute, nc, nmap, and a seedless watermelon # recommended installation: # cd dbsnatch-1.0 # gcc -o binfo-udp binfo-udp.c # ln -s `pwd`/binfo-udp /bin # ...

cockblaster.irc

eZine's profile picture
Published in 
 · 8 months ago
# # [og] cockblaster.irc, makes up a whole lot of random insults. # compiled by #og @ irc.ndrsnet.com for good wholesome family fun! # @cb=[!cb!] @one.0=[johnson] @one.1=[cock] @one.2=[dyke] @one.3=[clitoris] @one.4=[dick] @one.5=[testicle] @one.6=[penis] @one.7=[penii] @one.8=[muppet] @one.9=[default] @one.10=[breastmilk] @one.11=[mammogram] @one.12=[cervix] @one.13=[wang] @one.14=[dildo] @one.15=[papsmear] @one.16=[butthole] @one.17=[asshole] @one.18=[rectum] @one.19=[anus] @one.20=[butt] @one.21=[salami] @one.22=[beefcake] @one.23=[breast] @one.24=[vagina] @one.25=[bone ...

Random irc quotes

eZine's profile picture
Published in 
 · 8 months ago
... nning netbsd <@seraph> im irc studdering ! <@robosok> i slid my jimmy up its catoosh <@robosok> call me "captain planet" * >ka0z #og is away, taking a big dump (+lp) || <@ka0z> whoa that was fucking huge <@Makaveli> and im going to shave my base coq a few days before so its prickaly <@robosok> my fingers are assholes <@ka0z> i have mad goto skills <@orbflux> id have sex with oprah before using mandrake <@robosok> can i take a dump first? | <@orbflux> no | <@robosok> i will anyway | <@robosok> that one was foamy | <@robosok> it does that whenever i eat mashed potatoe ...

[og] brute force package 1.0.1

eZine's profile picture
Published in 
 · 8 months ago
... [og] brute force package, version 1.0.1 -- by elicit (benz@slacknet.org) includes an smtp login probe, and pop3/ftp brute force password guessing #og @ irc.ndrsnet.com NOTES : before you read any further, please understand that THIS IS NOT A HACKING TOOL! this was written for educational *LEGAL* purposes only, and i will not be responsible for what you do with this. now that we have that clear.. this package has pretty much everything needed to retrieve account names from a host and brute force the passwords for them, except word files. enjoy. SMTP LOGIN PROBE : if the smtp server does not send the same message for both valid and invalid use ...

alfred.pl

eZine's profile picture
Published in 
 · 8 months ago
... ddos server for non-root shells using perl sockets.. # listening port disuises itself as an eggdrop irc bot. # # crafted by: heeb (heeb@phayze.com) [#og @ irc.ndrsnet.com] # # version 0.1 (2/19/2001): # very slow.. needs a whole lot of work to make it worth using. # includes ident request flood, http GET / flood, smtp HELO flood, # and a netbios \n flood. use IO::Socket; use Net::hostent; # use Data::Dumper;$Data::Dumper::Useqq=1; # print Dumper "blah" to see ending line chars $PORT = 23201; $JUNK = "\015\012"; $BLANK = $JUNK x 2; $server = IO::Socket::INET->new( Proto => 'tcp', LocalPort => $PORT, Listen => SOMA ...

Tyrone v1.0

eZine's profile picture
Published in 
 · 8 months ago
tyrone.sh by ben-z; 11/22/00 - neat DoS tool using B.O. servers for educational purposes only.. CAUSE YOU BETTER CALL TYRONE! thanks to #og @ irc.ndrsnet.com. benz@slacknet.org (ben-z@ndrsnet) Requires : bounix-1.21 (follow instructions in INSTALL file) Description : Sweeps an entire IP block with the Back Orifice command to spawn ping -t -l 5000 <target> . Depending on how many BO infected boxen are in the given range, it shouldn't take very long for a dozen or so computers to be sending large icmp_echo requests to your target. Of course the victim has no way of tracing back who actually launched the attack. Sorry i didn ...
loading
Neperos cookies
This website uses cookies to store your preferences and improve the service. Cookies authorization will allow me and / or my partners to process personal data such as browsing behaviour.

By pressing OK you agree to the Terms of Service and acknowledge the Privacy Policy

By pressing REJECT you will be able to continue to use Neperos (like read articles or write comments) but some important cookies will not be set. This may affect certain features and functions of the platform.
OK
REJECT