Tuesday, July 10, 2007
Hack Proofing Wireless Networks E-Book
Essential e-book for those with a wireless network!
Learn how to protect your system from hackers.
Download Link
pdf. format You will need Adobe to read this file!
Kaspersky Security Suite '07
Kaspersky® Anti-Virus 6.0 combines reactive antivirus detection with the latest proactive technologies to provide your computer with solid and dependable protection against malicious programs
Download Link
Windows Vista Ultimate Build
Windows Vista Ultimate Build
Download all parts and unzip to a new folder
Run setup.exe
Check Folder after unzip for serial/crack
Archive password www.mastidl.com
Download Link
Saturday, June 23, 2007
Net Stumbler
Yes a decent wireless tool for Windows! Sadly not as powerful as it’s Linux counterparts, but it’s easy to use and has a nice interface, good for the basics of war-driving.
NetStumbler is a tool for Windows that allows you to detect Wireless Local Area Networks (WLANs) using 802.11b, 802.11a and 802.11g. It has many uses:
* Verify that your network is set up the way you intended.
* Find locations with poor coverage in your WLAN.
* Detect other networks that may be causing interference on your network.
* Detect unauthorized “rogue” access points in your workplace.
* Help aim directional antennas for long-haul WLAN links.
* Use it recreationally for WarDriving.
DownLoad Link
Cain & Abel Password Cracker
My personal favourite for password cracking of any kind.
Cain & Abel is a password recovery tool for Microsoft Operating Systems. It allows easy recovery of various kind of passwords by sniffing the network, cracking encrypted passwords using Dictionary, Brute-Force and Cryptanalysis attacks, recording VoIP conversations, decoding scrambled passwords, revealing password boxes, uncovering cached passwords and analyzing routing protocols. The program does not exploit any software vulnerabilities or bugs that could not be fixed with little effort.
DownLoad Link
Eraser
Eraser is an advanced security tool (for Windows), which allows you to completely remove sensitive data from your hard drive by overwriting it several times with carefully selected patterns. Works with Windows 95, 98, ME, NT, 2000, XP and DOS. Eraser is Free software and its source code is released under GNU General Public License.
An excellent tool for keeping your data really safe, if you’ve deleted it..make sure it’s really gone, you don’t want it hanging around to bite you in the arse.
DownLoad Link
An excellent tool for keeping your data really safe, if you’ve deleted it..make sure it’s really gone, you don’t want it hanging around to bite you in the arse.
DownLoad Link
VNC Scan
VNCScan is the well known popular Network Administration package tool that will enable you to remotely connect to and manage all of your desktops and servers from one single location.
· Scan for and deploy VNC Remote Control on your network
· Make use of Terminal Servers and XP Remote Control
· Manage unlimited computers with a deployable service
· Deploy standard settings for all of your VNC servers
· Execute scripts on remote computers
· Create custom commands for computers
· Create custom profiles and settings for VNC deployments
· Search your network for where a user is logged in
· Send Wake On LAN MagicPackets
DownLoad Link
Add on Link
Patch Link
KeyGen Link
· Scan for and deploy VNC Remote Control on your network
· Make use of Terminal Servers and XP Remote Control
· Manage unlimited computers with a deployable service
· Deploy standard settings for all of your VNC servers
· Execute scripts on remote computers
· Create custom commands for computers
· Create custom profiles and settings for VNC deployments
· Search your network for where a user is logged in
· Send Wake On LAN MagicPackets
DownLoad Link
Add on Link
Patch Link
KeyGen Link
Nikto Web Scanner
Description
Nikto is an Open Source (GPL) web server scanner which performs comprehensive tests against web servers for multiple items, including over 3300 potentially dangerous files/CGIs, versions on over 625 servers, and version specific problems on over 230 servers. Scan items and plugins are frequently updated and can be automatically updated (if desired).
Nikto is not designed as an overly stealthy tool. It will test a web server in the shortest timespan possible, and it's fairly obvious in log files. However, there is support for LibWhisker's anti-IDS methods in case you want to give it a try (or test your IDS system).
Features
# Uses rfp's LibWhisker as a base for all network funtionality
# Main scan database in CSV format for easy updates
# Determines "OK" vs "NOT FOUND" responses for each server, if possible
# Determines CGI directories for each server, if possible
# Switch HTTP versions as needed so that the server understands requests properly
# SSL Support (Unix with OpenSSL or maybe Windows with ActiveState's Perl/NetSSL)
# Output to file in plain text, HTML or CSV
# Generic and "server type" specific checks
# Plugin support (standard PERL)
# Checks for outdated server software
# Proxy support (with authentication)
# Host authentication (Basic)
# Watches for "bogus" OK responses
# Attempts to perform educated guesses for Authentication realms
# Captures/prints any Cookies received
# Mutate mode to "go fishing" on web servers for odd items
# Builds Mutate checks based on robots.txt entries (if present)
# Scan multiple ports on a target to find web servers (can integrate nmap for speed, if available)
# Multiple IDS evasion techniques
# Users can add a custom scan database
# Supports automatic code/check updates (with web access)
# Multiple host/port scanning (scan list files)
# Username guessing plugin via the cgiwrap program and Apache ~user methods
DownLoad Link
Nikto is an Open Source (GPL) web server scanner which performs comprehensive tests against web servers for multiple items, including over 3300 potentially dangerous files/CGIs, versions on over 625 servers, and version specific problems on over 230 servers. Scan items and plugins are frequently updated and can be automatically updated (if desired).
Nikto is not designed as an overly stealthy tool. It will test a web server in the shortest timespan possible, and it's fairly obvious in log files. However, there is support for LibWhisker's anti-IDS methods in case you want to give it a try (or test your IDS system).
Features
# Uses rfp's LibWhisker as a base for all network funtionality
# Main scan database in CSV format for easy updates
# Determines "OK" vs "NOT FOUND" responses for each server, if possible
# Determines CGI directories for each server, if possible
# Switch HTTP versions as needed so that the server understands requests properly
# SSL Support (Unix with OpenSSL or maybe Windows with ActiveState's Perl/NetSSL)
# Output to file in plain text, HTML or CSV
# Generic and "server type" specific checks
# Plugin support (standard PERL)
# Checks for outdated server software
# Proxy support (with authentication)
# Host authentication (Basic)
# Watches for "bogus" OK responses
# Attempts to perform educated guesses for Authentication realms
# Captures/prints any Cookies received
# Mutate mode to "go fishing" on web servers for odd items
# Builds Mutate checks based on robots.txt entries (if present)
# Scan multiple ports on a target to find web servers (can integrate nmap for speed, if available)
# Multiple IDS evasion techniques
# Users can add a custom scan database
# Supports automatic code/check updates (with web access)
# Multiple host/port scanning (scan list files)
# Username guessing plugin via the cgiwrap program and Apache ~user methods
DownLoad Link
The New P0F
What is p0f v2?
P0f v2 is a versatile passive OS fingerprinting tool. P0f can identify the operating system on:
- machines that connect to your box (SYN mode),
- machines you connect to (SYN+ACK mode),
- machine you cannot connect to (RST+ mode),
- machines whose communications you can observe.
P0f can also do many other tricks, and can detect or measure the following:
- firewall presence, NAT use (useful for policy enforcement),
- existence of a load balancer setup,
- the distance to the remote system and its uptime,
- other guy's network hookup (DSL, OC3, avian carriers) and his ISP.
All this even when the device in question is behind an overzealous packet firewall, when our favourite active scanner can't do much. P0f does not generate ANY additional network traffic, direct or indirect. No name lookups, no mysterious probes, no ARIN queries, nothing. How? It's simple: magic. Find out more here.
Show me!
194.236.50.173:2502 - Linux 2.2 (1) [Bonet Sweden] (up: 9 hrs)
-> 217.8.32.51:80 (distance 5, link: ethernet/modem)
>> Masquerade at 206.157.248.34/ns1.mosaicsoftware.com: indicators at 43%.
>> Masquerade at 213.158.197.100/ptcnat.era.pl: indicators at 60%.
>> Masquerade at 216.88.158.142/crawlers.looksmart.com: indicators at 52%.
>> Masquerade at 193.110.121.3/evil.tpi.pl: indicators at 86%.
But why, why, why?!
P0f is quite useful for gathering all kinds of profiling information about your users, customers or attackers (IDS, honeypot, firewall), tech espionage (laugh...), active or passive policy enforcement (restricting access for certain systems or otherwise handling them differently; or detecting guys with illegal network hookups using masquerade detection), content optimization, pen-testing (especially with SYN+ACK and RST+ACK modes), thru-firewall fingerprinting... plus all the tasks active fingerprinting is suitable for. And, of course, it has a high coolness factor, even if you are not a sysadmin.
P0f v2 is lightweight, secure and fast enough to be run almost anywhere, hands-free for an extended period of time.
DownLoad Link
P0f v2 is a versatile passive OS fingerprinting tool. P0f can identify the operating system on:
- machines that connect to your box (SYN mode),
- machines you connect to (SYN+ACK mode),
- machine you cannot connect to (RST+ mode),
- machines whose communications you can observe.
P0f can also do many other tricks, and can detect or measure the following:
- firewall presence, NAT use (useful for policy enforcement),
- existence of a load balancer setup,
- the distance to the remote system and its uptime,
- other guy's network hookup (DSL, OC3, avian carriers) and his ISP.
All this even when the device in question is behind an overzealous packet firewall, when our favourite active scanner can't do much. P0f does not generate ANY additional network traffic, direct or indirect. No name lookups, no mysterious probes, no ARIN queries, nothing. How? It's simple: magic. Find out more here.
Show me!
194.236.50.173:2502 - Linux 2.2 (1) [Bonet Sweden] (up: 9 hrs)
-> 217.8.32.51:80 (distance 5, link: ethernet/modem)
>> Masquerade at 206.157.248.34/ns1.mosaicsoftware.com: indicators at 43%.
>> Masquerade at 213.158.197.100/ptcnat.era.pl: indicators at 60%.
>> Masquerade at 216.88.158.142/crawlers.looksmart.com: indicators at 52%.
>> Masquerade at 193.110.121.3/evil.tpi.pl: indicators at 86%.
But why, why, why?!
P0f is quite useful for gathering all kinds of profiling information about your users, customers or attackers (IDS, honeypot, firewall), tech espionage (laugh...), active or passive policy enforcement (restricting access for certain systems or otherwise handling them differently; or detecting guys with illegal network hookups using masquerade detection), content optimization, pen-testing (especially with SYN+ACK and RST+ACK modes), thru-firewall fingerprinting... plus all the tasks active fingerprinting is suitable for. And, of course, it has a high coolness factor, even if you are not a sysadmin.
P0f v2 is lightweight, secure and fast enough to be run almost anywhere, hands-free for an extended period of time.
DownLoad Link
Friday, June 22, 2007
Super BlueTooth Hack
Once connected to a another phone via bluetooth you can:
- read his messages
- read his contacts
- change profile
- play his ringtone even if phone is on silent
- play his songs(in his phone)
- restart the phone
- switch off the phone
- restore factory settings
- change ringing volume
- And here comes the best
Call from his phone" it includes all call functions like hold etc.
Notes:
1.) When connecting devices use a code 0000
2.) At start of programm on smartphones do not forget to turn on bluetooth before start of the application
DownloadLink
Password : gOzz
- read his messages
- read his contacts
- change profile
- play his ringtone even if phone is on silent
- play his songs(in his phone)
- restart the phone
- switch off the phone
- restore factory settings
- change ringing volume
- And here comes the best
Call from his phone" it includes all call functions like hold etc.
Notes:
1.) When connecting devices use a code 0000
2.) At start of programm on smartphones do not forget to turn on bluetooth before start of the application
DownloadLink
Password : gOzz
Rapidshare Hacking
Hacking Rapidshare.com [Unlimited Download]
« on: February 06, 2007, 05:18:33 PM »
Hacking Rapidshare.com [Unlimited Download]
This Tool Enables you to download from Rapidshare.com without any problem.What you have to do is to just paste the rapidshare.com link,then your download will start automatically.You can queue rapidshare.com links here.Download will start one after another automatically.
Also contains a tool for unlimited download from rapidshare.com.After Reaching The Download Limit Rapidshare Blocks You And Force You To Wait Hours / To Buy Premium Account Then you have to run the tool.Then you can again download from Rapidshare.com
DownLoad Link:
Password :edonito
Flux Hacking Kit
Flux Hacking Kit v1.0
Description:
This is the first release of a remote administration tool named Flux.
This application allows you to administer a remote computer, capable of bypassing a router or
protected by a firewall.
DownLoad Link
Description:
This is the first release of a remote administration tool named Flux.
This application allows you to administer a remote computer, capable of bypassing a router or
protected by a firewall.
DownLoad Link
Myspace Hacking
There are over 90 million profiles on MySpace. How do you make yours stand out? You use these programming tricks and techniques to tweak the look, feel, and content of your profile. You get the inside scoop on hot design and photography. You maximize the effects of HTML and CSS. And, if you happen to be a musician, you check out Chapter 30 to see how MySpace can launch your career. It's all in here. What are you waiting for? Make it all about you.
Complete code and instructions for these and more MySpace hacks:
* Embedding graphics
* Creating animated images
* Developing your own background
* Building custom cursors
* Changing profile text styles
* Getting kinky with links
* Adding a comments box
* Altering your contact table
* Redesigning the navigation bar
* Making DIV overlays
A companion Web site provides even more tricks and techniques.
Visit www.myspaceismyplace.com to find all code from this book, links to software and featured profiles, a reader forum, and more.
DownLoad Link.
Hack It v2.0
ArcaVir 1.0.4 Clean 2.69267 secs
avast! 3.0.0 Clean 0.0109391 secs
AVG Anti Virus 7.5.45 Protected File 2.43151 secs
BitDefender 7.1 Clean 10.6369 secs
CAT QuickHeal 9.00 Clean 4.90087 secs
ClamAV 0.90/3192 Clean 2.33094 secs
Dr. Web 4.33.0 Clean 8.27769 secs
F-PROT 4.6.7 Unknown 0.824592 secs
F-Secure 1.02 Protected File 0.206139 secs
H+BEDV AntiVir 2.1.10-37 Clean 5.54858 secs
McAfee Virusscan 5.10.0 Clean 1.63879 secs
NOD32 2.51.1 Protected File 2.66968 secs
Norman Virus Control 5.70.01 Clean 6.81692 secs
Panda 9.00.00 Clean 1.36092 secs
Sophos Sweep 4.16.0 Protected File 3.93723 secs
Trend Micro 8.310-1002 Clean 0.0504251 secs
VBA32 3.11.4 Clean 2.80036 secs
VirusBuster 1.3.3 Clean 2.0923 secs
So the file is clean.
From the creator:
What it does is:
-checks the database of exploits
-checks if the site has any XSS bugs
-checks if the site has any SQL Injection bugs
DownLoad Link
avast! 3.0.0 Clean 0.0109391 secs
AVG Anti Virus 7.5.45 Protected File 2.43151 secs
BitDefender 7.1 Clean 10.6369 secs
CAT QuickHeal 9.00 Clean 4.90087 secs
ClamAV 0.90/3192 Clean 2.33094 secs
Dr. Web 4.33.0 Clean 8.27769 secs
F-PROT 4.6.7 Unknown 0.824592 secs
F-Secure 1.02 Protected File 0.206139 secs
H+BEDV AntiVir 2.1.10-37 Clean 5.54858 secs
McAfee Virusscan 5.10.0 Clean 1.63879 secs
NOD32 2.51.1 Protected File 2.66968 secs
Norman Virus Control 5.70.01 Clean 6.81692 secs
Panda 9.00.00 Clean 1.36092 secs
Sophos Sweep 4.16.0 Protected File 3.93723 secs
Trend Micro 8.310-1002 Clean 0.0504251 secs
VBA32 3.11.4 Clean 2.80036 secs
VirusBuster 1.3.3 Clean 2.0923 secs
So the file is clean.
From the creator:
What it does is:
-checks the database of exploits
-checks if the site has any XSS bugs
-checks if the site has any SQL Injection bugs
DownLoad Link
Rapid Hacker Final
Rapid Hacker Final V2.0
RapidHacker Final Build 2.0
Author: xyr0x
Langauge: Visual Basic, MS VisualC++
ReleaseDate: February 13th, 2007.
Special Thanks to Ouwop on FileExist procedure help. IXI for like, my niggeh!
Platforms: Windows 98, ME, Windows 2000, Windows XP, home/pro, Windows Vista
New features
- Change Resolution For better appearance, is it's designed under 1024x768 Display
- Better Cookie Removal (Fixed some issues)
- Restore (Now RapidHacker restores your Internet Configuration, back to its original configuration)
- Put www.informationleak.net as Default for OnPageLoad, when applications executed. (neat advertising imho for my favorite site in the whole worlds!) haha
- Changed GUI to darker appearance, instead of boring Gray.
- Added some detailed information where specified/clicked around the program.
NOTES: Even though RapidHacker, says RapidHacker, it can also be used for any other Download site.
e.g Megaupload, and soforth. I just chose RapidHacker, just to anounce it as it takes advantage of
RapidShare.
RapidHacker Final Build 2.0
Author: xyr0x
Langauge: Visual Basic, MS VisualC++
ReleaseDate: February 13th, 2007.
Special Thanks to Ouwop on FileExist procedure help. IXI for like, my niggeh!
Platforms: Windows 98, ME, Windows 2000, Windows XP, home/pro, Windows Vista
New features
- Change Resolution For better appearance, is it's designed under 1024x768 Display
- Better Cookie Removal (Fixed some issues)
- Restore (Now RapidHacker restores your Internet Configuration, back to its original configuration)
- Put www.informationleak.net as Default for OnPageLoad, when applications executed. (neat advertising imho for my favorite site in the whole worlds!) haha
- Changed GUI to darker appearance, instead of boring Gray.
- Added some detailed information where specified/clicked around the program.
NOTES: Even though RapidHacker, says RapidHacker, it can also be used for any other Download site.
e.g Megaupload, and soforth. I just chose RapidHacker, just to anounce it as it takes advantage of
RapidShare.
AIMBOT FOR WOLFENSTIEN ENEMY TERRITORY
etbot v3.33b
This aimbot has been reported to punkbuster and is no longer pb proof
Unzip then copy and paste all files and folders inside the et8ot to Etmain folder, start with et8ot.exe, select et.exe when asked for executable
Press F5 to open aimbot menu, Use Numpad Arrows to Navigate Menu , Numpad 6 to confirm settings.
Download Link.
Crusher Flex 666
Possibly the best public aimbot avaliable. Unzip/unrar to etmain, start game with crusher.exe, select et.exe when asked for executable. Press insert to open menu, keypad arrows to navigate menu.
Download Link
These aimbots are not punkbuster proof and you will get kicked if you play on punkbuster servers.
I.P. Hider
Hide Your i.p. address from all. Selction of proxy servers and setup wizard.
Remember to re-connect to ur Service Provider after selecting proxy server.
Download Link
Subscribe to:
Posts (Atom)