Description:
Forgetting a password to your own Word document or Excel worksheet is surely annoying,
but interfering with the office workflow causes substantial damage. If youÆre not in
hurry, you can try guessing the password. If you have no time to play games, just unlock
your documents and spreadsheets û guaranteed! No matter how long and complex your
passwords are, Advanced Office Password breaker recovers Word documents and Excel
spreadsheets within a limited timeframe. No need to perform lengthy attacks while a
40-bit encryption key can be crunched quickly and efficiently, and more importantly,
with a guaranteed positive result.
Advanced Office Password Breaker unlocks documents created with Microsoft Office Word
and Excel 97 and 2000, as well as documents saved with Microsoft Office XP and 2003
in Office 97/2000 Compatibility Mode.
Download Now
Password for rar file : appz-http://wareznet.net/
Size:
0.812 MB
Source
Monday, March 24, 2008
Advanced Office Password Breaker Pro 2.0
Labels: Hacking Tools, Software
Saturday, August 18, 2007
Keylogger
Keystroke logging (often called keylogging) is a diagnostic tool used in software development that captures the user's keystrokes. It can be useful to determine sources of error in computer systems and is sometimes used to measure employee productivity on certain clerical tasks. Such systems are also highly useful for law enforcement and espionage—for instance, providing a means to obtain passwords or encryption keys and thus bypassing other security measures. However, keyloggers are widely available on the Internet and can be used by private parties to spy on the computer usage of others.
Writing software applications for keylogging is trivial, and like any computer program can be distributed as a trojan horse or as part of a virus. What is not trivial however, is installing a keystroke logger without getting caught and downloading data that has been logged without being traced. An attacker that manually connects to a host machine to download logged keystrokes risks being traced. A trojan that sends keylogged data to a fixed e-mail address or IP address risks exposing the attacker.
lets see some of the key logger's what I known
Local Keylogger Pro 3.1 - Local Keylogger Pro allows you to monitor all users' activity on any computers in real time and record each computer's usage history. Local Keylogger Pro makes it easy to view, in real time, the screenshots of the any computers, all typed keystrokes, visited Web sites, used programs. You can view a list of running processes and terminate undesirable ones. Local Keylogger Pro can record all user activity to the log file. This information can be exported to HTML for convenient viewing in your web browser, or exported to MHT file for analysis. This allows you to see how long users worked with particular programs, how much time they spent on Internet, what sites they visited, what they typed in e-mails or chats.[Download][Crack]
XP Advanced Keylogger 2.5 - XP Advanced Keylogger is a top-rated invisible easy-to-use surveillance tool that records every keystroke to a log file. The log file can be sent secretly with email or FTP to a specified receiver. It can also detection specified keywords and take a screenshot whenever one is typed, displaying findings in a tidy log viewer. It causes no suspicious slowdowns and takes very few system resources. all this is happening in full stealth mode so the person you are monitoring will never be aware of it.{Windows 95, NT4, 98, Me, 2000, XP} [Download][Crack]
Blazing Tools Perfect Keylogger 1.67 - Perfect Keylogger is a new generation keylogger which is absolutely undetectable. It was created as an alternative to very expensive commercial products like iSpyNow, Spector Keylogger or E-Blaster. It has the same functionality, but is significantly easier to use. Complex internal mechanisms are hidden from the user behind the friendly interface. You can install Keylogger and immediately use it without changing of its settings.
Perfect Keylogger is an extremely compact, award-winning tool. It is translated into 20 languages and is increasingly popular around the world! It lets you record all keystrokes, the time they were made and the application where they were entered. It works in the absolutely stealth mode. Stealth mode means that no button or icon is present in the Task Bar, and no process title is visible in the Task Manager list.
Also, Perfect Keylogger can carry out visual surveillance. It periodically makes screenshots in invisible mode and stores the compressed images on the disk so you can review them later.
Perfect Keylogger was the first keylogging software solution which can be absolutely invisible in the Windows NT/2000/XP/Vista Task Manager![Download][Crack]
SC Keylogger Pro V3.2 - A Commercial Key Logger is a program that captures and logs keystrokes as they are entered on the computer for the purpose of monitoring the user. The logged data, which may be encrypted, is saved or sent to the person who installed the key logger. These applications often run in stealth mode and are invisible to the user that is being monitored. Such key loggers are sold commercially and may be used legitimately if deployed by authorized administrators and disclosed to the persons being monitored, as in a business environment. The use of a key logger to monitor persons without their knowledge has been ruled illegal in at least one jurisdiction.[Download]
Hook Keylogger v2.1 - Small and stealth keylogger without an installer; simplest keylogger possible Specify log file location Uses a WH_JOURNALRECORD hooking procedure to capture everything typed Hide and unhide the interface by pressing Ctrl+Shift+F7 [Download][Crack]
Advanced Invisible Keylogger 1.8 - Advanced Invisible Keylogger is an stealth spy tool, the best spy software offered by ToolAnywhere! Advanced Invisible Keylogger runs silently at the lowest level of Windows capturing every keystroke including usernames and windows log-on passwords.
Advanced Invisible Keylogger can also capture active window text, text typed in all popular instant messengers including AOL, YAHOO, ICQ, MSN and AIM.
All Desktop activity will be recorded through Advanced Invisible Keylogger’s secret! Have reports sent to your email address at anytime secretly! Advanced Invisible Keylogger is so stealthy and hides so well that not even a computer technician with years of experience can detect it running!
The most powerful stealth program at a most affordable price! An easy-to-use stealth solution for PC and Internet surveillance. Purchase your copy today and feel safe and secure.[Download]
This is my previous post on Key logger
visit this to
Labels: Hacking tips, Hacking Tools
Sunday, August 12, 2007
Rapidshare Downloader
CMS Grabber is the best tool I ever found on internet, this tool made me stun when I started using this, many rapid share users are still searching for free premium account, this tool make it useless. Using this tool we can download files from rapid share without any download limitations, multiple files at once, this is more than rapid share premium account. Lets see it in brief
THE ONLY LEGAL PROGRAM FOR DOWNLOADS FROM RAPIDSHARE !!!
Bypasses download limitations. Download multiple files at once. Download even more than with premium !
This release is sponsored by StackFile Corp.
What's new
- fixed rapidshare.com grabber
- fixed rapidshare.com link checker
- added huawei tool for renewing IP address for ADSL users(Supported hardware: SmartAX MT882 ADSL Router/Modem) - currently we support only USB mode, next version will alow to specify router address (it is now set to 192.168.1.2 -- you can configure your router to that address anyway so it will work in "Network Mode" -- i.e. when connected to the LAN NIC))
This release is sponsored by StackFile Corp and coded by SpongeBob.
NOTE: This program is not Vista compatible, but works fine with disabled UAC (User Account Control - very useful and inovative thing which renders your computer useless and annoying to use it).
Download from here
Homepage: CMSzone
The Home of grabber
Tuesday, July 10, 2007
Access Diver
AccessDiver is a security tester for WEB sites. It incorporates a set of powerful features which help you find and organize failures and weaknesses from your web site. Here is a quick list of the features available
>Contains fast security that uses up to 100 bots to do its analysis.
>Detects directory failures by comparing hundreds of known problems to your site.
>AccessDiver is fully proxy compliant and has a proxy analyzer (speed / anonymity) and a proxy hunter built-in.
>A built-in word leecher helps you increase the size of your dictionaries to expand and reinforce your analysis.
>A powerful task automizer manages your jobs transparently. You can tackle unlrelated tasks while Accessdiver is working, saving you time.
>An on-the-fly word manipulator lets you increase the strength of your dictionaries easily when doing your analyzis.
>A PING tester is included to tell you the efficiency of your site and the efficiency of an Internet address you would like to access.
>A DNS resolver lets you look up the host name of an IP address and reverse the process to learn an unknown host name.
>A feature called 'HTTP debugger' helps your understanding of how actual HTTP protocol works. It opens up the process so you see what really happens during a connection problem.
>A WHOIS gadget lets you retrieve owner information of a domain name (in case you would like to buy the domain or contact the actual owner).
>An update notifier automatically tells you when a new version of AccessDiver is available.
>And I welcome you to discover the other extremely features by yourself... :)
>A leeching system allows you to collect new proxies to make better proxy lists
>n A proxy Hunting system allows you to get even more proxies by scanning IP regions...
>A file splitting and file merging system allows you to mixup files, or cut them in mutiple parts. That's good to handle wordlists or proxylists.
Requirements
A PC compatible machine
Windows 9x,Me,2000,XP,2003
7 MB of space on your disk
192 MB of memory (RAM)
Pentium 200 or higher
Screen resolution : 800x600
[Download from here]
For more hacking tools visit : http://wehackershackingtools.blogspot.com/
Labels: Hacking Tools
Saturday, June 2, 2007
Hacking Help Doc
HELP ABOUT WEBSITE HACKING |
Different Methods Of Hacking With Bios |
How To Get Ip Address Of Victom Pc |
Tips About Hacking |
Help About Hacking With Trojans |
.PDF Files Contain Hacking Help |
How To Find Any Serial Number Of Software Or Games ect.. |
Telnet Dos Base Hacking Old Methods But Interesting |
Labels: Hacking tips, Hacking Tools
Thursday, May 31, 2007
Ethical Hacker Tools (Tutorials and Toolz) - added mirrors
Students then learn how intruders escalate privileges and what steps can be taken to secure a system. Students also learn about intrusion detection, policy creation, social engineering, DDoS attacks, buffer overflows, and virus creation. When students leave this intensive five-day class, they will have hands-on understanding and experience in ethical hacking.
Chapter 1 - Introduction to Ethical Hacking
Chapter 2 - Footprinting
Chapter 3 - Scanning
Chapter 4 - Enumeration
Chapter 5 - System Hacking
Chapter 6 - Trojans and Backdoors
Chapter 7 - Sniffers
Chapter 8 - Denial of Service
Chapter 9 - Social Engineering
Chapter 10 - Session Hijacking
Chapter 11 - Hacking Web Servers
Chapter 12 - Web Application Vulnerabilities
Chapter 13 - Web Based Password Cracking Techniques
Chapter 14 - SQL Injection
Chapter 15 - Hacking Wireless Networks
Chapter 16 - Evading IDS, Firewalls and Honey Pots
Chapter 17 - Linux Hacking
Chapter 18 - Buffer Overflows
Chapter 19 - Cryptography
Chapter 20 - Virus and Worms
Chapter 21 - Physical Security
Chapter 22 - Penetration Testing
Extract the file and rename it to ISO
Code:
http://www.megaupload.com/?d=VOUDZCCD
http://www.megaupload.com/?d=S43BLLWQ
http://www.megaupload.com/?d=7BW82RQ3
http://www.megaupload.com/?d=FJTZNC39
http://www.megaupload.com/?d=HQJ26BGM
http://www.megaupload.com/?d=DN9JE0AL
Hacking Toolbox
Backdoor: Intrude computer and control the computer with client program.
Crack tool: Crack passwords of systems or applications, crack the serial numbers.
Disassembler: Disassemble the program with it. If you have a executable file, you can look the source code of this file with it.
DoS tool: Make computer stop to respond to any request with these tools, so other people can not access the computer.
Document: Documents about hacker, cracker, etc.
E-mail tool: Destroy the computer system using these tools, the tools are all related to e-mail. It includes several tools about e-mail, for example, email bomber, tool to find someone’s email address, etc.
Editor: Edit or modify your program with them.
Encryption & decryption tool: Encrypt files of almost any type using many strong cryptography algorithms.
Executable file tool: Manipulate executable files with these tools, bind some executable files, split one executable file, etc. So, for example, you can add one executable file to another one.
ICQ tool: Destroy the computer system using these tools, the tools are all related to ICQ. All programs in it work with ICQ. With the tools, you can do many things, for example, recovering ICQ’s password, sharing your files, and encrypting your ICQ messages, and so on.
Keylogger: Record keystrokes when the program is running, so you can get some useful information, for example, password.
MISC: Examine source code for security holes, hack games, and other interesting tools for both linux and windows.
Packet forging: Modify the data packet on network at will.
Phreak tool: Test the paging transmitters and systems, and so on, it includes box and wardialier.
Scanner: Acquire the system information, for example, open ports, OS, and so on.
Sniffer: Intercept and capture the data on the network.
Snoop tool: Show information of your system. For example, it can show IP address of your computer, or it can show SCSI and ATAPI devices in your system, and so on.
Source code: Source code of many tools.
Spoof: Bypass an HTTP proxy, keep your connection active, creates fake credit card numbers, ip spoof, etc.
Virus: Source code of virus and executable virus.
Backdoor
1. Back Orifice: Tools about back orifice.
2. Backdoor kit: Collection of many backdoor program.
3. Backdoor source: Source of backdoor program.
4. Minigift: Another backdoor program.
5. Net spy: Allow you to gain control of another computer using the internet.
6. Trojan: Control other people’s computer.
Crack tool
1. AMI Crack: Crack the Ami BIOS.
2. AMI Decoder: Crack the password of ami BIOS.
3. ARJ Cracker: Cracks password protected ARJ Files.
4. AW: Crack the password of BIOS.
5. Adv Office 2000 Password Recovery (pro): Crack the password.
6. Adv Office 2000 Password Recovery (std): Crack the password.
7. Advanced Archive Password Recovery: Crack the password of archive.
8. Advanced Excel 2000 Password Recovery: A program to recover lost or forgotten passwords to files/documents created in Mic*ft Excel.
9. Advanced NT Security Explorer: An application for Windows NT/2000/XP system administrators for finding holes in system security.
10. Advanced Outlook Express Password Recovery: Crack the outlook express password.
11. Advanced PDF Password Recovery Pro: Crack the PDF password.
12. Advanced Word 2000 Password Recovery: Crack the password of word 2000.
13. Advanced ZIP Password Recovery: Crack the password of zip.
14. Ami BIOS cracker: Crack password of ami BIOS.
15. BIOS / CMOS tools: Crack the password of BIOS and CMOS.
16. CryptoExplorer for Borland Paradox: Recover Borland Paradox passwords.
17. Dictionary: Used by cracker to crack the password.
18. Dictionary Maker: Makes dictionary files for password crackers.
19. FBRUTE: Crack unix password.
20. Hades cracker: Crack the password.
21. John The Ripper: Crack unix password.
22. Kill CMOS ver 1.00: Crack the password of CMOS.
23. L0phtCrack 2.01: Recover passwords for Windows NT.
24. Lilo crack: Crack password of lilo.
25. Linux crack: Crack password on linux.
26. Lotus 1-2-3 Password Recovery Key: 1-2-3 Key is a program to recover passwords for Lotus 1-2-3 documents.
27. Lotus Word Pro Password Recovery Key: Recover Lotus Word Pro Password.
28. MS Access Password Detection: Crack password of MS Access.
29. Mac crack: Crack password on Mac.
30. MailPassword: Recover lost password of e-mail.
31. MakePwl: Create the PWL files.
32. NtPassword: Find holes in system security.
33. PGP Crack: Crack the PGP.
34. PWLCRACK: Crack the PWL files.
35. PalmCrack 1.1: The password testing tool for the Palm Computing Platform.
36. Passware Kit: Recover the password.
37. Password Recovery Tools: Recover some passwords.
38. Password dictionaries: Used by cracker to crack the password.
39. PwlTools: Recover login password.
40. Quicken Password Recovery Key: Recover password.
41. Register: Register the software.
42. RemPass Ver 2.6: Crack password of BIOS.
43. SERIALS 2000: Crack the register code.
44. Serial number: Used by cracker to crack s/n.
45. THC-CUPASS: Crack password of user on a WindowsNT/W2K server.
46. THC-PrintDates: Crack password using date.
47. Unix password crackers: Crack passwords for unix.
48. Windows crack: Crack password on windows.
49. Windows password crackers: Crack password on windows.
50. Word List: Word dictionary.
51. WordPerfect Password Recovery Key: Recover passwords for WordPerfect document files.
52. Wzippwd: Creates valid serial number for Winzip.
53. ZIP Cracker: Cracks ZIP Files that are password protected.
54. iMesh Password Recovery: Recover a password installed in the iMesh client.
55. variation tool: Prepare the word list used by cracker to crack password.
Disassembler
1. ASMGEN: A program to generate cross-referenced assembly language code from any executable file.
2. Bubble Chamber: Disassemble executable files.
3. DoDi’s Visual Basic Tools: DoDi is a VB kit.
4. PROVIEW: Analyze and view system.
5. Windows Disassembler: Disassembe Windows executables and dynamic link libraries.
DoS tool
1. Black: Bomb someone’s computer with it.
2. IGMP Nuker: Bomb other’s computer with this popular tool.
3. Windows DoS kit: Attack computer systems with this useful tools.
4. pagebomb: Bomb windows pager with this tool.
5. windows95/98 patch: Patch you system in order to avoid attack by hackers.
Document
1. Article about hack: Introduce some knowledge about hack.
2. Article about hacker: Tell you how to become a hacker.
3. Articles about DoS: Describe what is DoS attack.
4. Articles about crack: Teach you how to crack.
5. Articles about programming: Introduce some knowledge about programming.
6. Aticles about hack: Narrate some knowledge about hack.
7. Books about hacking: Narrate some knowledge about hacking.
8. Books about linux: Introduce information about linux.
9. Books about network: Tell you knowledge about network.
10. Books about programming: Introduce some knowledge about programming.
11. Document about jargon: Tell you some about jargon.
12. Document about pbx: Introduce some pbx knowledge.
13. Document about phreaking: Introduce knowledge about phreaking.
14. Other documents: Introduce you some information.
15. Phrack Documents: Discuss some questions about phrack.
16. The Trojans Removal Database: Describe a lot of Trojan programs.
E-mail tool
1. Anima: Bomb some others’ computers with this tool(e-mail bomber).
2. Anonymous emailer: Send e-mail without being recognized.
3. Bomber: Bomb someone’s e-mail box with it.
4. E-mail bomber kit: Bomb some e-mail box with these tools.
5. Euthanasia: Bomb other’s e-mail address with this tool.
6. Extreme mailer: Bomb some victim’s e-mail address with it.
7. Haktek: Use this program to attack your victim or protect yourself from being hacked.
8. KaBoom!: Bomb other’s e-mail box.
9. Mail Bomb: Bomb your victim by this e-mail bomber.
10. News Mail Agent: Find any e-mail address in news groups.
11. Quick Fyre: QuickFyre is an anonymous emailer \ mail bomber.
12. Stealth Mailer: Send bombs to other people with this tool.
13. Unabomb: Send people email bombs.
14. Web Mail Agent: Find any e-mail address in the internet.
Editor
1. HEXCALIBUR: Examining, modify or otherwise manipulate disk files in their raw, or binary format.
2. HEXpert for Windows: Edit windows multi-format binary files.
3. Hex Workshop: Edit, insert, delete, cut, copy, and paste hex to your files.
4. Hexedit: Edit your raw files.
5. Hiew: Dump NE-executable file and dump LE/LX-executable file.
6. Script Hack Wizard: Allow you to hack or modify many language scripts with ease.
7. Support Files: Add the necessary files that script hack wizard uses to run.
Encryption & decryption tool
1. Apocalypso: Crypto tool from HNC.
2. Cryptonite Pro: Uses a superfast 64 bit encryption algorithm on Windows 95/98/Me.
3. EasyFP: Performs file encryption to protect your files and folders from being read by others.
4. Encryption: Encrypt your system information by four tools.
5. Encryption tools: Collecting a huge munber of encryption and decryption tools.
6. Encryptonite: Encrypt and decrypt text file with it easily.
7. HTML Encrypt: Encrypt your HTML/Script program.
8. Macintosh Encryption: Include various Macintosh encryption tools.
9. NetMangler: Encrypt your emails and protect yourself with NetMangler.
10. PC-Encrypt: Compress and encrypt almost any type of file.
11. PGPfreeware: Protect your email form unauthorized view.
12. WebPassword: Protect your web pages with password.
13. WinSafe: Encrypt your files with some powerful algorithms.
Executable file tool
1. Bound File Detector & Remover: Detect bound file with this tool.
2. Exe file tool: Manage the exe files with these tools.
3. Fusion: Enable static, virtual or dynamic linking, with sophisticated version control when using dynamic linking.
4. Multi Binder: Bind an unlimited number of files, of any EXE/BAT type.
5. Newjoiner: Avoid av detection.
6. PEBundle: Allow for DLLs or other files to be ??bundled?? with an executable file.
7. Topo: Scan all sections in order to find large ‘usable’ areas.
8. WinSplit: Split and join files with this tool.
9. inPEct: Bind 2 executables in one.
10. inPEct source code: Bind 2 executables in one.
ICQ tool
1. Advanced ICQ Password Recovery: Recover passwords to ICQ accounts.
2. Aquila: Recover your passwords with it.
3. ICQ Document: There are two documents about ICQ.
4. ICQ File Share: Share your files over the internet with your online friends.
5. ICQ MachineGun: Attack victim computer by ICQ.
6. ICQ kit: Attack your victim with these tools.
7. ICQr Information: Read and reveal personal information stored in Mirabilis ICQ Database (.DAT) files.
8. PGP-ICQ: Encrypt your ICQ messages.
9. SecureICQ: Allow you to encrypt messages you send and to decrypt encrypted messages you receive.
10. Send It Agent: Send very large data in no time to the ICQ users.
11. Source code about ICQ: Snoop ICQ traffic for a set host.
Keylogger
1. G2kBIOSspoof: Spoof BIOS password for gateway pc’s simply.
2. HookThis: Set a systemwide keyboard-hook.
3. Hooker: Make intelligent trojan keylogger module.
4. Invisible KeyLogger Stealth: Monitor computer activity to steal key information invisibly.
5. KeyGhost: Record keystrokes with tiny module that clips on to PC keyboard cable.
6. KeySpy: Spy program as a keyboard logger and a PC remote controller.
7. KeyTrap: Log keyboard key effectively!.
8. Keycopy: Keep a record of any keyboard activity on your computer.
9. Keylog: Include keylog tools such as Keylogwn, Keylog95, Keylog5 and Keylog25, IKS12d-m.
10. PC Acme: Monitor activity on PC and saves all information in the LOG files.
11. PC Acme Pro: Monitor software on PC and saves all information in the LOG files.
12. Phantom2: Record and playback a keystroke program for MS-DOS.
13. Playback!: Record the complete task and then play it back with one keystroke.
14. SKInNT: Monitoring program developed for Windows NT and Windows 2000.
15. Skin: Monitors kit of Skin5pro, Skin98as, Skint5, and Skin5 Demo.
16. Slog: Provide you with a log of what you have typed on your own computer for later review.
MISC
1. Game Hack: Having Game Wizard 32 and CrackAid, two tools.
2. HeadStrong WebClicker: Use public proxies to create artificial banner ad clicks.
3. Linux_misc: Collect many Linux misc tools with some source files as TCFS, SILC, DDNSF, St Jude, FreeVSD.
4. Misc: Include many misc of source codes and tools that can do such job as hijacking, monitoring, or interception, etc.
5. Quick Socket: Allow you administrator to chat (via keyboard) directly to a remote user also running Quick Socket.
6. Shutdown 2000: Disturb running application program.
7. Windows_misc: Contain all kinds of Windows misc tools, especially Wat, Stealth Proxy, Outlook Header Exp, WebClicker2.0, Ap2.74, etc.
Packet forging
1. Netcat: Reading and writing data utility across network connections using TCP or UDP protocol.
2. Packet_Forging: Include 21 files that are all used to create and send arbitrary packets on ethernet networks.
3. Packet_tool: Having other five packing tools as tcpkill, packetx1, msmh, LibnetNT, arpinject in the kit.
4. Pksnd102: Packing 16 files as Winpkt, Pktsend, Ndis3pkt, Dump, Dumy, Dis_pkt9 in it, among which are packed or executable files and source files of packet driver programs.
5. Raw IP Packet Capture/Creation Utility: Allow you free reign to directly forge the packet in any way you so desire.
6. Snot: Use snort rules files as its source of packet information.
7. Winject: Inject packet for Windows 9x, also called drugs for Windows.
Phreak tool
1. Auto Dial: Help you to use a war dialer easily.
2. Blue Dial: Make it easy to create and use different frequency settings for dialing.
3. Boxtone: Create phone tones.
4. CATCALL: Deal out a sentence from mildly annoying to downright galling.
5. CHaoS DeViCe: Call random pagers, puts in a phone number, hangs up, and goes all over again.
6. CPhreak: It is the first fone phreaking utility.
7. Dialing Demon: Wardialer.
8. Grim Scanner: Search for dial tones and carriers in the same call.
9. No Carrier: Scan with Dos shell, graphics and more!.
10. POCSAG Decoder: Allow the off-air decoding of POCSAG paging signals at 512, 1200 or 2400 bits/second.
11. Pageit: Page a billion different pagers and put in one number, or Page ONE pager and put in a billion numbers!.
12. PhoneTag: Check for starttime every second while it’s running.
13. Phreak box: Construct and use phreak box.
14. Super Dial: Call all of your town (or cities) phone numbers.
15. THC-SCAN: Scan phone-number areas with your modem.
16. The Little Operator: It is another wardialer.
17. Tone Loc Utilities: It is also a wardialer.
18. ToneLoc: Dials numbers, looking for some kind of tone with it.
Scanner
1. 7th Dimension Port Scanner: Scan your port address more easily.
2. AB Complete Ping: Allow you to ping one or more IP addresses, to scan a network for shared resources and to scan a computer for open ports.
3. Angry IP Scanner: Scan IP very easily and rapidly!.
4. Dave’s Port Sniffer: Detect FTP, HTTP, POP, SMTP, TELNET and FINGER deamons running on any TCP host machine.
5. DeadBolt: Monitor holes in Windows and alert you when it detects suspicious activity, giving you the power to stop viruses dead in their tracks!.
6. Linux-Vuln-source: Carry the two scanner as Rnmap and VLAD ’s system security kit!.
7. MacAnalysis: Audit suite for your Macintosh to perform and help implement a security standard for your computer/network by performing some work.
8. NetBIOS Security Kit(unix): Perform various security checks on remote servers running NetBIOS file sharing services.
9. NetBIOS Security Kit(windows): Perform various security checks on remote servers running NetBIOS file sharing services.
10. Netmon: Monitor network connections.
11. Nmap: Explore or security audit network on Linux or Unix.
12. Port Invader: Scan a range or list of IP addresses to verify if there are open or closed ports.
13. Port Scanner: Scan a group of IP address looking for the presence of specific incoming TCP/IP ports.
14. PortScan: Scan port fast and configurably!.
15. Port_Scanner: Collet 20 tools to use in port sacanner on Linux or Unix!.
16. Portscan SMS Alert: Alert you when probed scandlogd logs information to syslog and invokes this shell script.
17. Scanner: Collect 84 tools and misc to scan.
18. SecureScan NX: Scan your distributed network architecture for vulnerabilities from one central location.
19. SkPortScan ActiveX Control: Integrate port-scanning capabilities into your applications with this ActiveX control.
20. THC-HappyBrowser: Check an NT-Server/Webserver for known vulnerabilities.
21. THC-Probe: Scan compilation for Linux.
22. THC-Scan: Automate tone, carrier, vmb scanning.
23. WhereIsIP: Find the geographic location of chat room members, ICQ members, and more.
24. Windows_Trojan_Scanner: Collect 6 little tools scanning whole networks to find well known Trojans.
25. Windows_port_scanner: Collect 9 Port Scanner running on Windows.
26. XSharez scanner: Scan, search and get specific resources for you.
Sniffer
1. Blackbox for AOL: Monitor application for America Online, AIM, ICQ, and Yahoo Messenger.
2. Colasoft Application Protocol Sniffer & Analyzer: It is a TCP/IP Network Sniffer & Analyzer program based on Windows system.
3. Ethereal0814: Free network protocol analyzer’s another version.
4. Ethereal0817: Analyze network protocol, another version of Ethereal.
5. Ethereal0820: Analyze network protocol freely for Win32.
6. Libpcap062: Needed for capturing packet to you as the packet capture library, the latest release of Libpcap.
7. Linux_sniff_source: Contain 18 sniffer tools on Linux and some source files.
8. LittleBrother: Allow supervisors to accurately manage and measure internet and network resource usage.
9. NetProb32 Network Analyzer: Analyze, Monitor Traffic, and Generator Packet program.
10. PacketX: Integrate winpcap packet capture functionality with VB or any other programming environment supporting Mic*ft ActiveX technology.
11. Phenoelit’s own security sniffer: Open a network interface for all packets and not only for these packets, which are send to this interface.
12. Proxy Workbench: It is a unique proxy server ideal for developers, trainers and security experts that displays its data in real-time.
13. Snarp: Allow the host to sniff the data from the wire.
14. Sniff-em: Base on a competively priced, performance minded Windows as a Network analyzer.
15. Sniffers: Having 34 files in it and among that are 28 sniffer tools and some source codes.
16. Socket Workbench: Designed to analyze socket communications.
17. Stealth Activity Recorder: Use newly and easily internet enabled tool for monitoring home and business PCs.
18. Tcpdump362: Capture and dumper program pretty much for the original protocol packet.
19. Windows_sniff: Facilitate the capture and visualization of network traffic kit of 5 tools and 1 source code files.
20. Winpcap: Capture and send raw data from a network card, the free Packet Capture Architecture for Windows!.
Snoop tool
1. ID: Display the ID information of machine’s specific hardware.
2. IPQuery: Show the current IP Address.
3. NetroSnooper: Find hidden files on the internet!.
4. Network Inventory: Provide network administrators with the ability to perform a software inventory on all machines located on a network.
5. Quadsoft’s IP Tool: Tell you your IP Address in a variety of ways.
6. ShellSPY: Track every process running on your PC.
7. Trouble In Paradise: Install nothing but trouble your machine with some showing message.
8. iNetTools for Windows: Collect menu-driven testing tools for internet and IP-based networks.
Source code
1. APG: Set for random password generation.
2. ARP Monitor: Trace arp requests from/to your machine.
3. Asm: Including msmh, inpect, GetDialPasswords, it is a kit.
4. Backdoor: Includes 17 Backdoor tools in the kit with their source code.
5. Blue Beep: Blue Beep is a wardialer, this includes its source code.
6. C_SOURCE: Contain 4 files in it, and get the tools source code after decompress them.
7. Emailcrk: Crack password of e-mail account.
8. Findhost: Scan port on the net for you.
9. Harvester: Contain the source of Harvester, which monitors remote web pages and FTP directories.
10. IgmpNuke: Use IGMP packet tool’s source code.
11. Jail Chroot Project: Build a chrooted environment on POSIX with source code of C.
12. Keylogger_SRC: Include all the full source of Keylogger recording keystrokes.
13. Misc_src: Misc source code of 10 tools.
14. Network Grep: Mimick as much functionality in GNU grep as possible, applied at the network layer.
15. Nutcracker: Check/crack password tool for Unix/Linux.
16. PgpIcq: Encrypt your ICQ messages using the power of the world’s best encryption software.
17. Portscanner: Scan a group of IP address.
18. SecurityFocus ARIS Extractor: Analyze IDS log sophisticatedly and filter important attacks from the noise.
19. ShareDecryption: Extract share passwords from registry.
20. VB_SOURCE: Contain 14 files in it, and get the tools source code after decompress them.
21. Wnuke4: This is the complete wnuke4 source file package.
22. Zebedee: Secure IP tunnel tool’s source code!.
Spoof
1. Credit probe: Creates fake credit card numbers.
2. HTTPort: Establish a transparent TCP/IP tunnel through a proxy server.
3. IP Spoofer: Support IP spoofing software kit.
4. Ircgspoofer: Spoofer software on IRC Ghost.
5. Pinger: Trick your ISP into thinking you are always active.
Virus
1. Virus_exe: Including six most typical executable virus programs.
2. Virus_source: Containing many virus source codes in the package, this page will be devoted to Virii and Trojan’s, 89 files in all.
Backdoor
extract the file and rename it to ISO
Code:
http://www.megaupload.com/?d=Z3RK5G91
http://www.megaupload.com/?d=X3AQJ4P2
http://www.megaupload.com/?d=3NEGK6RJ
http://www.megaupload.com/?d=V2JMPQUY
http://www.megaupload.com/?d=FA2XYT4A
http://www.megaupload.com/?d=YZ9W0LA0
http://www.megaupload.com/?d=YJP8RZHT
No password required.
-------------------------------------------------------
Mirrors:
Code:
http://www.torrentz.com/torrent_862027.html
OR:
Ethical Hacker Tools
Code:
http://rapidshare.de/files/34833817/ht.part1.rar
http://rapidshare.de/files/34833858/ht.part2.rar
http://rapidshare.de/files/34833845/ht.part3.rar
http://rapidshare.de/files/34833655/ht.part4.rar
http://rapidshare.de/files/34833881/ht.part5.rar
http://rapidshare.de/files/34833908/ht.part6.rar
http://rapidshare.de/files/35181615/ht.part7.rar
or:
Code:
http://rapidshare.de/files/34835424/CEH.part04.rar
http://rapidshare.de/files/34835413/CEH.part06.rar
http://rapidshare.de/files/34835342/CEH.part03.rar
http://rapidshare.de/files/34835235/CEH.part07.rar
http://rapidshare.de/files/34835226/CEH.part02.rar
http://rapidshare.de/files/34835214/CEH.part05.rar
http://rapidshare.de/files/34835184/CEH.part01.rar
http://rapidshare.de/files/34835124/CEH.part08.rar
Labels: Hacking Tools