///  File Name: 3wahas.tar.gz
Description:
LAN based SYN flooder which spoofs SYN ACK packets too, allowing to bypass SYN-cookies ;)
File Size:8459
Last Modified:Feb 11 10:28:47 2000
MD5 Checksum:1d0d220e8f4f835204e627c2ad1f7372

 ///  File Name: 7350cfingerd-0.0.4.tar.gz
Description:
Cfingerd prior to v1.4.2 remote root format string exploit. Includes information on finding offsets. Tested against Debian cfingerd v1.3.2, 1.4.0, 1.4.1, and RedHat 7.0 cfingerd 1.3.2.
Author:Scut
Homepage:https://www.team-teso.net
File Size:19713
Last Modified:Apr 24 03:35:18 2001
MD5 Checksum:b2014e7d2b6d5162f60557bb2a339a89

 ///  File Name: 7350cowboy.c
Description:
7350cowboy.c is supposedly a PHP/3.0.12, 3.0.15, and 3.0.16 with apache 1.3.12 remote format string exploit for FreeBSD 3.4, Slackware Linux 4.0, and 7.0. Very similar to http://packetstormsecurity.org/0010-exploits/phploit.c.
File Size:19629
Last Modified:Nov 17 15:04:24 2002
MD5 Checksum:49cb24b3e1a3f7c0b7a27e6879c6d0a2

 ///  File Name: 7350kscd.tar.gz
Description:
New TESO kscd exploit (cd player is KDE multimedia package)
Author:TESO
Homepage:http://www.team-teso.net
File Size:8307
Last Modified:May 15 21:43:59 2000
MD5 Checksum:26e4111c9742b12583d8696998612cde

 ///  File Name: 7350lapsus.pl
Description:
7350lapsus is a lpr-3.0.48 Local root exploit. Requires root on a host counted in hosts.lpd and local account on lpd box. This is proof of concept, chown()ing /etc/passwd to a user named 'stealth'.
File Size:1234
Last Modified:Nov 30 21:36:37 2002
MD5 Checksum:85d373c856befc7da5b6d2727b6291af

 ///  File Name: 7350nxt-v3.tar.gz
Description:
Exploit for the Bind NXT remote root vulnerability, which affects Bind v8.2 - 8.2.1. Compiles on Linux, tested against Irix, BSD, and Linux. Includes Irix shellcode for breaking chroot.
Homepage:https://www.team-teso.net
File Size:8729
Last Modified:Dec 19 03:16:52 2000
MD5 Checksum:3f3ad411c0a0e1da430789e6af29ae93

 ///  File Name: 7350oftpd.tar.gz
Description:
OpenBSD ftpd v2.4_BASE through 2.8 remote root exploit. Includes offsets for v2.6 through v2.8 and instructions for finding offsets of other versions. Requires a writable directory.
Author:Caddis
Homepage:https://www.team-teso.net
File Size:7127
Last Modified:Dec 19 03:05:22 2000
MD5 Checksum:e20dd6da52a10be4ea380d153144a729

 ///  File Name: 7350pippi.pl
Description:
7350pippi is a x86/Linux ipppd local root exploit.
File Size:2573
Last Modified:Nov 30 21:38:04 2002
MD5 Checksum:0c635de06e7fd0738cf3c235e1b74c8c

 ///  File Name: 7350qpop.c
Description:
qpopper 2.53 euidl x86/linux remote exploit. Includes a procedure to abuse format strings to find the correct offset. Tested on Debian 2.1, RedHat 6.1, Slackware 7, Suse 5.2 and 6.0.
Author:Scut
Homepage:http://www.team-teso.net
File Size:13372
Last Modified:Jul 16 01:34:29 2000
MD5 Checksum:a0c104c2554688da892bf011b04a91ea

 ///  File Name: 7350ssharp-0.51.tgz
Description:
ssharp is a tool for man in the middle attacks against SSH.
Author:stealth
Homepage:http://stealth.openwall.net/SSH
File Size:661389
Last Modified:Jun 25 13:45:00 2004
MD5 Checksum:8e8771914abfa95f80ea1fd9a7539c45

 ///  File Name: 7350wu-v5.tar.gz
Description:
7350wu.c is a Wu-ftpd v2.6.0 remote root exploit which does it the proper way. Works on Linux/x86 and FreeBSD.
Author:Scut
Homepage:https://www.team-teso.net
File Size:16229
Last Modified:Dec 31 19:53:49 2000
MD5 Checksum:eea111a6537ebd19799b49265f404dc8

 ///  File Name: adore-0.13.tar.gz
Description:
Adore is a linux LKM based rootkit. Features smart PROMISC flag hiding, persistant file and directory hiding (still hidden after reboot), process-hiding, netstat hiding, rootshell-backdoor, and an uninstall routine. Includes a userspace program to control everything.
Author:Stealth
Homepage:http://www.team-teso.net
File Size:6771
Last Modified:Feb 15 19:02:08 2000
MD5 Checksum:5b247f2588a6e476135954c220aba95c

 ///  File Name: adore-0.14.tar.gz
Description:
Adore is a linux LKM based rootkit. Features smart PROMISC flag hiding, persistant file and directory hiding (still hidden after reboot), process-hiding, netstat hiding, rootshell-backdoor, and an uninstall routine. Includes a userspace program to control everything.
Author:Stealth
Homepage:http://www.team-teso.net
Changes:Improved promisc hiding, port hiding fixed, and a readme.
File Size:7291
Last Modified:Feb 22 23:59:13 2000
MD5 Checksum:3879c8ab46ebf72dc61bf267ea1f00a2

 ///  File Name: adore-0.31.tar.gz
Description:
Adore is a linux LKM based rootkit. Features smart PROMISC flag hiding, persistent file and directory hiding (still hidden after reboot), process-hiding, netstat hiding, rootshell-backdoor, and an uninstall routine. Includes a userspace program to control everything.
Author:Stealth
Homepage:http://www.team-teso.net
Changes:Automatic configuration, bug fixes.
File Size:9738
Last Modified:Jan 9 19:54:45 2001
MD5 Checksum:4bdf75cfb7735741285ae82f5b5d4df6

 ///  File Name: adore-0.34.tgz
Description:
Adore is a linux LKM based rootkit for Linux v2.[24]. Features smart PROMISC flag hiding, persistent file and directory hiding (still hidden after reboot), process-hiding, netstat hiding, rootshell-backdoor, and an uninstall routine. Includes a userspace program to control everything.
Author:Stealth
Homepage:http://www.team-teso.net
Changes:Improved 2.4 support, better authentication checking, permanent PID removal, configure script, experimental exec redirection for i386.
File Size:13470
Last Modified:Mar 27 02:50:38 2001
MD5 Checksum:69b3453f1fb1650388fc63297652d221

 ///  File Name: adore-0.38.tar.gz
Description:
Adore is a linux LKM based rootkit for Linux v2.[24]. Features smart PROMISC flag hiding, persistent file and directory hiding (still hidden after reboot), process-hiding, netstat hiding, rootshell-backdoor, and an uninstall routine. Includes a userspace program to control everything.
Author:Stealth
Homepage:http://www.team-teso.net
Changes:Added 64bit FS support, now fools protection modules as StMichael, and minor fixes.
File Size:14316
Last Modified:May 26 00:17:46 2001
MD5 Checksum:72e80f9fa6ebe9358f7fd0358c8e959f

 ///  File Name: adore-0.39b4.tgz
Description:
Adore is a linux LKM based rootkit for Linux v2.[24]. Features smart PROMISC flag hiding, persistent file and directory hiding (still hidden after reboot), process-hiding, netstat hiding, rootshell-backdoor, and an uninstall routine. Includes a userspace program to control everything.
Author:Stealth
Homepage:http://www.team-teso.net
Changes:Now includes open()/stat() redirection and improved netstat hiding. Removed execution redirection.
File Size:14678
Last Modified:Jul 29 11:48:33 2001
MD5 Checksum:777cbd2a59268b394b79da2bda910a40

 ///  File Name: adore-0.42.tgz
Description:
Adore is a linux LKM based rootkit for Linux v2.[24]. Features smart PROMISC flag hiding, persistent file and directory hiding (still hidden after reboot), process-hiding, netstat hiding, rootshell-backdoor, and an uninstall routine. Includes a userspace program to control everything.
Author:Stealth
Homepage:http://www.team-teso.net
Changes:Added devpts fix, fixed is_secret64() to properly hide files, and fixed a memory leak.
File Size:14749
Last Modified:Sep 20 00:18:14 2002
MD5 Checksum:156ded13d5e16b84a9e31193bc9bc417

 ///  File Name: adore-ng-0.31.tgz
Description:
Adore is a Linux LKM based rootkit for Linux v2.[24]. Features smart PROMISC flag hiding, persistent file and directory hiding (still hidden after reboot), process-hiding, netstat hiding, rootshell-backdoor, and an uninstall routine. Includes a userspace program to control everything.
Author:Stealth
Homepage:http://www.team-teso.net
Changes:Syslog filtering, wtmp/utmp/lastlog filtering, relinking of LKMs as described in Phrack #61.
File Size:18140
Last Modified:Jan 6 01:33:29 2004
MD5 Checksum:4a925181db7030c1e9b67225a88abbe0

 ///  File Name: adore-ng-0.41.tgz
Description:
Adore is a Linux LKM based rootkit for Linux v2.[246]. Features smart PROMISC flag hiding, persistent file and directory hiding (still hidden after reboot), process-hiding, netstat hiding, rootshell-backdoor, and an uninstall routine. Includes a userspace program to control everything.
Author:Stealth
Homepage:http://www.team-teso.net
Changes:Ported to 2.6 and fixed a buffer overflow from version 0.32.
File Size:18877
Last Modified:Mar 12 02:34:01 2004
MD5 Checksum:3295d45f24060914c411d1d75343660a

 ///  File Name: adorebsd-0.34.tar.gz
Description:
AdoreBSD 0.34 - Based off Linux Adore by Stealth. Features hiding files and directories from view, makes processes invisible, hides promiscuous flag and syslog messages, execute as root, hides sysctl mib entries, netstat service hiding, authentication, and module hiding. Developed on FreeBSD 4.3-STABLE.
Author:Bind
Homepage:http://team-teso.net
File Size:9387
Last Modified:May 26 00:24:56 2001
MD5 Checksum:f98864a4f927e04d6f66a010934a08a0

 ///  File Name: adv1.tar.gz
Description:
Linux 2.2.x ISN Vulnerability Advisory and Exploit
File Size:5881
Last Modified:Feb 11 10:28:47 2000
MD5 Checksum:f80c0e70b42cc825c377c306075d3712

 ///  File Name: adv2.tar.gz
Description:
Linux Kernel 2.0.x and 2.2.x local Denial of Service attack
File Size:2502
Last Modified:Feb 12 18:50:18 2000
MD5 Checksum:62fd2a4802e7a8ad393ca9cb3bc165d1

 ///  File Name: adv3.tar.gz
Description:
Nameserver traffic amplify (DNS Smurf) and NS Route discovery (DNS Traceroute) advisory and exploit.
Author:Scut
Homepage:http://www.team-teso.net
File Size:27780
Last Modified:Feb 16 23:35:21 2000
MD5 Checksum:03bb040880d2f4294d655db3d59fe609

 ///  File Name: adv4.tar.gz
Description:
vulnerability in atsadc (installed on Halloween 4 Linux) (advisory + exploit)
File Size:2782
Last Modified:Apr 20 02:03:45 2000
MD5 Checksum:b290036932315c697d3155d24cc64fd7

 ///  File Name: adv5.tar.gz
Description:
vulnerability in wmcdplay (installed on Halloween 4 Linux) (advisory + exploit
File Size:3253
Last Modified:Apr 20 02:03:47 2000
MD5 Checksum:a94bcdee982bff03ff71e70305a88ffb

 ///  File Name: adv6.tar.gz
Description:
TESO Security Advisory - A vulnerability within the imwheel application for Linux has been discovered. Some of these packages are shipped with an suid-root wrapper-script that invokes the insecure program 'imwheel' with UID 0. Exploit included.
Author:S. Krahmer
Homepage:http://www.cs.uni-potsdam.de/homepages/students/linuxer/
File Size:3452
Last Modified:Mar 16 23:23:13 2000
MD5 Checksum:ba670a03a3b834008c8c0cada3eb9185

 ///  File Name: adv7.tar.gz
Description:
TESO Security Advisory - A vulnerability within the kreatecd application for Linux has been discovered. An attacker can gain local root-access. Exploit included.
Author:S. Krahmer
Homepage:http://www.cs.uni-potsdam.de/homepages/students/linuxer/
File Size:2538
Last Modified:Mar 16 23:24:45 2000
MD5 Checksum:3196d5b099afc3b97277955392b37069

 ///  File Name: advisory-009.txt
Description:
TESO Security Advisory #9 - BinTec router security and privacy weakness.
Author:using SNMP brute-force-techniques for SNMP community-names one is able to remotely gain the management accounts passwords, which are the same as the SNMP community names. Additionally the MIB-Tree holds security related information which should not be accessible through read-only/SNMP. These routers also offer services which can be abused rather easily, like dialing out and getting full line access via a CAPI interface, or a debugging interface which gives you all information which is sent over the BRI-lines. ;Homepage here.
File Size:14944
Last Modified:Apr 7 20:28:26 2000
MD5 Checksum:737ae5da6ecde109e2d4a33533a3634b

 ///  File Name: arpmim-0.2.tar.gz
Description:
Arpmim v0.2 implements an ARP man in the middle attack. Includes single or multiple host support, asymmetric MiM, arpop_request, and macoff.
Author:Skyper
Homepage:http://www.team-teso.net
File Size:4742
Last Modified:Apr 7 09:29:58 2001
MD5 Checksum:09271a5d4aa3e7652dd10d2a16b6a511

 ///  File Name: arpmitm-0.1.tar.gz
Description:
Arpmitm.c is another tool for using arp man-in-the-middle attacks which keeps sending the packets. Requires Libnet 1.00.
Author:xdr
Homepage:http://www.team-teso.net/releases.php3
File Size:1550
Last Modified:May 19 00:56:14 2000
MD5 Checksum:9fde0cc8caf1a1431b77496a900e158a

 ///  File Name: arptool-0.0.1.tar.gz
Description:
send arp packets useful for man-in-the-middle
File Size:2523
Last Modified:Feb 11 11:31:02 2000
MD5 Checksum:0b726f253723e0065939be9560569c95

 ///  File Name: ascend-foo.c
Description:
DoS ascend router with simple udp echo<->echo link
File Size:2173
Last Modified:Feb 11 11:35:36 2000
MD5 Checksum:d7322e75c24e815ff0e4380d0e57de18

 ///  File Name: burneye-1.0-linux-static.tar.gz
Description:
Burneye ELF encryption program, x86-linux binary, version 1.0 - new year release!
Homepage:https://teso.scene.at/releases.php
File Size:144240
Last Modified:Sep 20 00:15:37 2002
MD5 Checksum:13bd499f3695bb087c7742a82471c565

 ///  File Name: burneye-1.0.1-src.tar.bz2
Description:
Burneye ELF encryption program 1.0.1 with full source and docs.
Homepage:https://teso.scene.at/releases.php
File Size:346615
Last Modified:Dec 24 16:57:49 2002
MD5 Checksum:848ae0d696d2438a01753a0fad665270

 ///  File Name: burneye-stripped.tar.gz
Description:
Stripped burneye sources, for educational purposes (beside the speech + article).
Homepage:https://teso.scene.at/releases.php
File Size:23811
Last Modified:Sep 20 00:14:47 2002
MD5 Checksum:14f3aeb7cab6ab215e6c6a3997561408

 ///  File Name: chap.pdf
Description:
Weaknesses in the CHAP protocol as used within PPP and PPTP. Allows authentication in PPTP networks without knowing valid login/password combinations. This authentication scheme is widely used at universities (WLAN networks). A link to a special pppd which is able to authenticate without valid /etc/ppp/chap-secrets is included.
Author:Sebastian Krahmer
Homepage:http://www.team-teso.net
File Size:488807
Last Modified:Feb 26 07:28:20 2002
MD5 Checksum:6b4b918f410d855855fdaab340232b39

 ///  File Name: delefate.c
Description:
Delegate 5.9.x - 6.0.x remote exploit for Linux compilations
File Size:8359
Last Modified:Feb 11 10:28:54 2000
MD5 Checksum:b935030432adb3f76c867f950f83e085

 ///  File Name: dirthy.c
Description:
linux tty hijacker
File Size:2349
Last Modified:Feb 11 10:28:54 2000
MD5 Checksum:04489d81512965924340610277260d66

 ///  File Name: epta.tgz
Description:
Execution Path Timing Analysis of Unix Daemons - White paper on how to determine if a username is valid remotely by timing remote responses of login programs. OpenSSH diff against v2.99p2 which determines if a username exists even on the newest versions of OpenSSH included.
Author:Sebastian Krahmer
Homepage:http://www.team-teso.net
File Size:75700
Last Modified:Dec 3 07:20:53 2002
MD5 Checksum:3652eb952d213483c1e22f10b941883d

 ///  File Name: execve-shell.tar.gz
Description:
execve-shell.tar.gz allows you to easily create linux x86 shellcode that execs any command you supply.
Author:Scut
Homepage:
File Size:47364
Last Modified:May 29 23:05:27 2000
MD5 Checksum:ce5e7d60f9ccddc207136cdd9bdaabe7

 ///  File Name: exman.c
Description:
exman.c is a new man exploit.
Author:TESO
Homepage:http://www.team-teso.net
File Size:1047
Last Modified:May 4 00:02:15 2000
MD5 Checksum:190e272b5cffd235e97cc106a133a6de

 ///  File Name: fizzbounce-0.2.tar.gz
Description:
maps connections over http proxies (connect/post)
File Size:9013
Last Modified:Feb 11 10:28:47 2000
MD5 Checksum:0b5c338ccf9a5f5c432ed2212f8938b3

 ///  File Name: formatstring-1.2.tar.gz
Description:
Exploiting Format String Vulnerabilities v1.2 - Includes over 30 pages of well organized information along with several examples.
Author:Scut
Homepage:https://www.team-teso.net
File Size:214530
Last Modified:Oct 11 06:41:48 2001
MD5 Checksum:b83261bd868fa46874290b59915bda58

 ///  File Name: grabbb-0.1.0.tar.gz
Description:
very fast, clean and mean, but functional banner scanner, with part of the functionality of netcat :-)
File Size:6379
Last Modified:Feb 11 11:40:03 2000
MD5 Checksum:c3b922819aa2cf93e8d343cfce6bedf5

 ///  File Name: guess-who-0.44.tgz
Description:
guess-who version 0.44 is a password brute force utility for SSH2.
Author:Sebastian Krahmer
Homepage:http://www.team-teso.net
File Size:16475
Last Modified:May 28 11:03:54 2003
MD5 Checksum:a40161347c970fe627631a1354f7d35d

 ///  File Name: hack.pl
Description:
Suidperl v5.00503 and others tmp race local root exploit.
Author:Sebastian Krahmer
Homepage:http://www.team-teso.net
File Size:5580
Last Modified:Nov 30 21:39:50 2002
MD5 Checksum:8041a1da62bd891ae9e65c3a2871a6c2

 ///  File Name: hellkit-1.1.tar.gz
Description:
Hellkit is a shellcode generator. You write the your shellcode in C, and it gets converted to ASM for use with both heap and stack based overflows. Examples included.
Author:Stealth
Homepage:http://www.team-teso.net
File Size:10644
Last Modified:Feb 15 19:14:08 2000
MD5 Checksum:2a288b645f90c951843fed37ad797345

 ///  File Name: hellkit-1.2.tar.gz
Description:
Hellkit is a shellcode generator. You write the your shellcode in C, and it gets converted to ASM for use with both heap and stack based overflows. Many examples included.
Author:Stealth
Homepage:http://www.team-teso.net
Changes:Added generic shellcode decoder which can handle shellcode up to 64kb in length containing any bytes, added encoder for this type of decoder, and fixed some signedness issues in array accessment.
File Size:22481
Last Modified:Mar 16 23:25:57 2000
MD5 Checksum:1dfa21f029e4fbc903c92734cfe98ca4

 ///  File Name: ifafoffuffoffaf.c
Description:
wuftpd 2.5.0 heap-based exploit
File Size:29277
Last Modified:Feb 11 10:28:54 2000
MD5 Checksum:7bf0400408d2f20dedc96ae3ed232562


 ///  File Name: iob-0.1.tar.gz
Description:
IOB stands for I/O bridge, a simple tty chaining program. It can be used to log almost any session, including ssh, gpg, pgp, cfsattach, losetup, etc.
Author:Scut
Homepage:https://www.team-teso.net
File Size:5899
Last Modified:Oct 11 06:40:44 2001
MD5 Checksum:e5014222fec4c7375e3f66dbb8edb43a

 ///  File Name: itunnel-1_2.tar.gz
Description:
ICMP tunneling tool
File Size:1709
Last Modified:Feb 11 10:28:47 2000
MD5 Checksum:3b57a6ef85c0cf4356b26d886bcfaf4c

 ///  File Name: l0phtl0phe-kid.c
Description:
l0phtl0phe-kid.c - Easy antisniff v1.02 exploit. l0pht messed up the fix for their problem in antisniff by not regarding the type signedness properties of the char and int values used, resulting in a cool of method bypassing the extra length + strncat checks. This version has been made easy enough for script kiddies to use - to avoid that "doesn't work" lamer claim.
Author:Scut
Homepage:http://www.team-teso.net/releases/
File Size:4367
Last Modified:May 19 07:57:00 2000
MD5 Checksum:be3e3604f8b86316a2061b17f2cdc123

 ///  File Name: l0phtl0phe.c
Description:
l0phtl0phe.c - antisniff exploit (1.02 included). l0pht messed up the fix for their problem in antisniff by not regarding the type signedness properties of the char and int values used, resulting in a cool of method bypassing the extra length + strncat checks.
Author:Scut
Homepage:http://www.team-teso.net/releases/
File Size:5516
Last Modified:May 19 00:29:50 2000
MD5 Checksum:c3a783b7bf5bef9f333b758e3f249586

 ///  File Name: lamescan-1.0.tar.gz
Description:
simple threaded portscanner
File Size:39392
Last Modified:Feb 11 10:28:47 2000
MD5 Checksum:53ded3da5f28b2c602f2a66a65e0440d

 ///  File Name: ldistfp-0.1.4.tar.gz
Description:
Ldistfp is an identd fingerprinting tool which works well with all Linux and most *BSD hosts that have their auth service running.
Author:Scut
Homepage:https://www.team-teso.net
Changes:Bugfixes, new fingerprints, and an auto-update facility to get new fingerprints.
File Size:14856
Last Modified:May 30 21:00:31 2001
MD5 Checksum:b346840d28141773178c81fd900b2fad

 ///  File Name: libtermcapsploit.c
Description:
lame libtermcap sploit
File Size:1399
Last Modified:Feb 11 10:28:54 2000
MD5 Checksum:2bb2b528d9023c77e63899d0eefe4621

 ///  File Name: loaded-0.21.tgz
Description:
loaded version 0.21 is an IPv4 load balancer for Linux. It requires netfilter and the QUEUE target enabled in the kernel.
Author:Sebastian Krahmer
Homepage:http://www.team-teso.net
File Size:6444
Last Modified:May 28 11:06:24 2003
MD5 Checksum:d467ee59815b3f7befd3c46911940c80

 ///  File Name: mipsshellcode.pdf
Description:
Introduction to the MIPS architecture and the IRIX operating system, focusing on how to write shellcode for IRIX. Includes 3 sample shell codes. This is an updated version of the article in Phrack 56.
Author:Scut
Homepage:https://www.team-teso.net
File Size:161051
Last Modified:Jan 19 18:52:59 2001
MD5 Checksum:c472df5fea5c517411de24591466e2b2

 ///  File Name: numby-0.2.tar.gz
Description:
scans for relay vulnerable http-proxies
File Size:11590
Last Modified:Feb 11 10:28:47 2000
MD5 Checksum:ff4339e62034040bf54458e5c46bcc4d

 ///  File Name: objobf-0.5.0.tar.bz2
Description:
objobf is an obfuscater for x86/Linux ELF relocatable object files (.o files) that can produce fancy graphs to visualize function structures. Released at CCCAMP 2k3.
Author:scut
Homepage:http://www.team-teso.net
File Size:188352
Last Modified:Aug 11 01:28:01 2003
MD5 Checksum:ba6b6f098f2c1e48c6946c6b13f568bb

 ///  File Name: openssh.reverse.tgz
Description:
Openssh-Reverse is a patched OpenSSH which goes in reverse, allowing outside users to connect to machines behind NAT firewalls. In reverse mode, sshd acts as a client and brings the connection to a modified ssh server.
Author:Sebastian Krahmer
Homepage:http://www.team-teso.net
File Size:477279
Last Modified:Oct 3 23:33:26 2000
MD5 Checksum:942f35d203b1fa524f6a92c140e9c23f

 ///  File Name: outp.c
Description:
outp.c will convert .s files to shell code.
Author:TESO
Homepage:http://www.team-teso.net
File Size:1077
Last Modified:May 4 00:01:07 2000
MD5 Checksum:458d6225aba406f32950ba38ff61d7f8

 ///  File Name: phoenix.tar.gz
Description:
shoots every TCP connection in LAN by spoofing TCP packets
File Size:8611
Last Modified:Feb 11 10:28:47 2000
MD5 Checksum:d8fe322d94614c3308931c949edc5f5e

 ///  File Name: phoenix2.tar.gz
Description:
like the first, but also spoofs the MAC address
File Size:8792
Last Modified:Feb 11 10:28:47 2000
MD5 Checksum:e334e3d43b87679a54a871d11274faa0

 ///  File Name: pro.tar.gz
Description:
proftpd exploit for 1.2.0pre3 linux x86
File Size:4779
Last Modified:Feb 11 21:46:32 2000
MD5 Checksum:f8a581ec312db9767e799ded5ca99a17

 ///  File Name: realown.c
Description:
unix-port of the RealSever exploit from dark spyrit
File Size:10867
Last Modified:Feb 11 10:28:54 2000
MD5 Checksum:da6339902daaf944a149fe55b384c013

 ///  File Name: reducebind.c
Description:
This utility converts a dynamically link Linux IA32 ELF binary to a static binary.
Author:scut
Homepage:http://www.team-teso.net/
File Size:6743
Last Modified:Jan 27 20:06:14 2003
MD5 Checksum:51bd11bc0ce5e38a9cb6933d910de716

 ///  File Name: reverb-0.0.2.tar.gz
Description:
maps passive to passive and active to active socket
File Size:6649
Last Modified:Feb 11 10:28:47 2000
MD5 Checksum:34a81bea809ba429c5bd58bc8bcbc265

 ///  File Name: reverb-0.1.0.tar.gz
Description:
Reverb is a tool to access firewalled, dynamic-dialin and otherwise protected hosts.
Homepage:https://www.team-teso.net
File Size:8518
Last Modified:Dec 19 03:09:34 2000
MD5 Checksum:e5dbf726d69ed3735d7a690aa0e37d7e

 ///  File Name: sparc.c
Description:
Remote root exploit for Solaris Napalm heap overflow - SPARC version. Tested against SunOS 5.6, 5.7, 5.8, and 5.9. Attempts to add a root shell to inetd.conf.
Author:Scut
File Size:9655
Last Modified:Jan 5 15:25:05 2003
MD5 Checksum:34c08bb66b18e41b75d2c0287149d5ad

 ///  File Name: telnetfp_0.1.0.tar.gz
Description:
Telnetfp is an OS detection tool which uses do / dont requests via telnet to determine remote OS type. Contains 23 OS fingerprints.
Author:Palmers
Homepage:http://www.team-teso.net
File Size:3908
Last Modified:Sep 6 06:35:09 2000
MD5 Checksum:826448f8419c26b5eb603ee19b4dd532

 ///  File Name: telnetfp_0.1.1.tar.gz
Description:
Telnetfp is an OS detection tool which uses do / dont requests via telnet to determine remote OS type. Contains 32 OS fingerprints.
Author:Palmers
Homepage:http://www.team-teso.net
Changes:New OS fingerprints and bug fixes.
File Size:4700
Last Modified:Sep 7 21:40:50 2000
MD5 Checksum:4e19cbda40093e1762ea7aa5fccdd9dc

 ///  File Name: telnetfp_0.1.2.tar.gz
Description:
Telnetfp is an OS detection tool which uses do / dont requests via telnet to determine remote OS type. Contains 72 OS fingerprints.
Author:Palmers
Homepage:http://www.team-teso.net
Changes:More fingerprints, bugfixes, interactive mode.
File Size:7103
Last Modified:Jan 13 01:48:13 2001
MD5 Checksum:d33ddb5cbc2ef98af89df5e2eb0a7212

 ///  File Name: teso-advisory-010.tar.gz
Description:
TESO Security Advisory #10 - KDE KApplication {} configfile vulnerability. Due to insecure creation of configuration files via KApplication-class, local lusers can create arbitrary files when running setuid root KDE-programs. Tested with SuSE 6.4 standard installation under KDE 1.1.2.
Author:Stealth
Homepage:http://www.team-teso.net
File Size:3358
Last Modified:Jun 1 00:12:56 2000
MD5 Checksum:6103db5015829edfd04b3e38410f29e5

 ///  File Name: teso-advisory-011.txt
Description:
TESO Security Advisory #11 - Multiple vendor Telnet Daemon vulnerability. Most current telnet daemons in use today contain a buffer overflow in the telnet option handling. Under certain circumstances it may be possible to exploit it to gain root privileges remotely. Affected systems include BSDI 4.x, FreeBSD, IRIX, Linux with netkit-telnetd < 0.14, NetBSD, OpenBSD 2.x, and Solaris.
Author:Scut
Homepage:https://www.team-teso.net
File Size:5544
Last Modified:Jul 29 11:59:35 2001
MD5 Checksum:56fb4e5983fdf5c58663113d30bc8c33

 ///  File Name: teso-advisory-012.txt
Description:
TESO Security Advisory - LIDS Linux Intrusion Detection System vulnerability. The "Linux Intrusion Detection System" security patch for the Linux kernel creates a security vulnerability. Exploitation is easy and local users may be able to gain unrestricted root privileges.
Homepage:http://www.team-teso.net
File Size:2404
Last Modified:Feb 5 08:21:07 2002
MD5 Checksum:798dd3ba6b7227152566567c49b9423c

 ///  File Name: teso-nxt.tar.gz
Description:
Exploit for BIND-8.2/8.2.1 (NXT)
File Size:6729
Last Modified:Feb 16 23:38:36 2000
MD5 Checksum:1e214fef8dfe3df3a399945b56a8b238

 ///  File Name: teso.atsadc.txt
Description:
TESO Security Advisory - The atsar application contains an exploitable vulnerability. The Halloween 4 Linux distribution, which is based on RedHat 6.1 is shipped with this suid-root program. It might be used to gain superuser privileges. Any system that has atsar-linux-1.4.2 package installed is vulnerable.
Author:S. Krahmer
Homepage:http://www.cs.uni-potsdam.de/homepages/students/linuxer/
File Size:4243
Last Modified:Mar 13 13:21:12 2000
MD5 Checksum:11418d3684b96ff6cb2f5295823e04fa

 ///  File Name: teso.gif
Description:
Unavailable.
File Size:24781
Last Modified:Feb 17 21:49:40 2000
MD5 Checksum:0f12f52a2b607ee56d9896035c965c78

 ///  File Name: teso.wmcdplay.txt
Description:
TESO Security Advisory - A vulnerability within the wmcdplay CD playing application for the WindowMaker desktop has been discovered. It allows local root compromise through arbitrary code execution.Any system which has wmcdplay installed as setuid root is vulnerable.
Author:S. Krahmer
Homepage:http://www.cs.uni-potsdam.de/homepages/students/linuxer/
File Size:4753
Last Modified:Mar 13 13:35:48 2000
MD5 Checksum:15def16c5e23da0e4e13393a8f8ffb0f

 ///  File Name: teso_crew_99_at_ccc-camp.jpg
Description:
TESO at CCC.
File Size:200472
Last Modified:Sep 15 05:38:06 2002
MD5 Checksum:38dcfc807b4384b2828156c0f51b981d

 ///  File Name: tesoiis.c
Description:
port of the eeye IIS4 exploit
File Size:8624
Last Modified:Feb 11 10:28:54 2000
MD5 Checksum:93644e652127df7212071dbda73f91e6

 ///  File Name: utcl.c
Description:
cloak users utmp host entry
File Size:2056
Last Modified:Feb 11 11:47:28 2000
MD5 Checksum:c6b5c92bd2fc0435fe56990907124052

 ///  File Name: Vortrag-1.0.tar.gz
Description:
German speech given at the CCC - "exploiting format string vulnerabilities". Including examples.
Author:Scut
Homepage:https://www.team-teso.net
File Size:99066
Last Modified:Dec 31 17:01:23 2000
MD5 Checksum:7a06a5c5d2cef4a82fb837d94c50fca8

 ///  File Name: vwxploit.c
Description:
Interscan VirusWall 3.23/3.3 exploit (by dark spyrit, unix port by team teso)
File Size:13237
Last Modified:Feb 11 10:28:54 2000
MD5 Checksum:6a9dfc39dc0464685fe6783cda168a23

 ///  File Name: zodiac-0.4.9.tar.gz
Description:
Zodiac is a portable, extensible and multithreaded DNS tool. It is meant to be used as a DNS packet monitor and DNS protocol test and debuging tool. It's basic features are: sniffing of DNS datagrams on an ethernet device, decoding of all types of DNS packets, including safe decompression (partly finished, SOA record are, for example, not decoded yet), nice display and gui, if you like ncurses and text based frontends, always interactive in all situations through built in command line, threaded and flexible design. Advanced features include: local DNS spoof handler, jizz DNS spoof, exploiting a weakness in old bind implementations, determines jizz-weakness, id-prediction and resolver type remotely, id spoofing, exploiting a weakness in the dns protocol itself, implements some advanced DNS denial of service attacks, including flood, label compression and unres attack, advanced DNS smurf.
Author:Scut
Homepage:http://www.team-teso.net
Changes:Now runs on *BSD, and fixed some bugs.
File Size:67620
Last Modified:Jun 19 07:28:29 2000
MD5 Checksum:9cca1d25152f969e0e28db1d1cc9a4e7

 ///  File Name: zylyx-0.1.1.tar.gz
Description:
http proxy-cache file finder (goes through http proxies from a file and request a file)
File Size:21766
Last Modified:Feb 11 10:28:47 2000
MD5 Checksum:476c506dde6c12fafd58528cc39e29f8