The purpose of this software is to host a firmware image for a cable modem to boot from. Generally, you will need to decompress a firmware image using FIP, add a ELF header (using the ELF utility below) and then rename the file to vxWorks.st. This application requires the VB6 runtime library.
Coax Thief, (also known as CMSniff), is a generic cable modem sniffer application that can be used to discover the names of cable modem configuration files. To run this software, you may need these runtime files installed.
DiFile Thief is a packet sniffer that captures DHCP packets with boot filenames (also known as a config file). The purpose of this application is to discover all of the config files used on your local service provider. This application does require the WinPcap driver installed (www.winpcap.org).
DiFileCPE is an all purpose config file editor and viewer. Using this application, you can drag-and-drop a config file into the main window and it will automatically display the contents of the config file for you to view. This application is most useful when you want to know the download and upload speeds of a config file, or the SNMP community string.
FIP is an application that decompresses and compresses firmware for the SB4xxx series cable modem. This application is useful when disassembling firmware, or when it is necessary to decompress a firmware image, patch it with a firmware mod and then compress it again. Because this application is very important, there is also a Linux version available
OneStep is the software that took cable modem hacking mainstream. This famous application accomplishes the task of uncapping by incorporating all of the tedious steps into one easy to use program. By making uncapping easier, OneStep introduced cable modem hacking to individuals who may not have been able to accomplish it otherwise (and created many security concerns for service providers in the process). This application does require the Java runtime environment.
Mentioned in the book "Hacking the Cable Modem", this piece of software was used to create random buffers of bytes and send them via the Telnet protocol. This is a copy of the exact software used to discover the buffer overflow exploit that Open Sesame is based off of.