Hacking E-books and Videos:
1> Collection of Cracking Tutorials by Lena (A must for newbies)
Olly + assembler + patching a basic reverseme
Keyfiling the reverseme + assembler
Basic nag removal + header problems
Basic + aesthetic patching
Comparing on changes in cond jumps, animate over/in, breakpoints
"The plain stupid patching method", searching for textstrings
Intermediate level patching, Kanal in PEiD
Debugging with W32Dasm, RVA, VA and offset, using LordPE as a hexeditor
Explaining the Visual Basic concept, introduction to SmartCheck and configuration
Continued reversing techniques in VB, use of decompilers and a basic anti-anti-trick
Intermediate patching using Olly's "pane window"
Guiding a program by multiple patching.
The use of API's in software, avoiding doublechecking tricks
More difficult schemes and an introduction to inline patching
How to study behaviour in the code, continued inlining using a pointer
Reversing using resources
Insights and practice in basic (self)keygenning
Diversion code, encryption/decryption, selfmodifying code and polymorphism
Debugger detected and anti-anti-techniques
Packers and protectors : an introduction
Imports rebuilding
API Redirection
Stolen bytes
Patching at runtime using loaders from lena151 original
Continued patching at runtime & unpacking armadillo standard protection
Machine specific loaders, unpacking & debugging armadillo
tElock + advanced patching
Bypassing & killing server checks
Killing & inlining a more difficult server check
SFX, Run Trace & more advanced string searching
Delphi in Olly & DeDe
Author tricks, HIEW & approaches in inline patching
The FPU, integrity checks & loader versus patcher
Reversing techniques in packed software & a S&R loader for ASProtect
Inlining inside polymorphic code
Keygenning
In-depth unpacking & anti-anti-debugging a combination packer / protector
Unpacking continued & debugger detection by DLL's and TLS
Inlining a blowfish scheme in a packed & CRC protected dll + unpacking Asprotect SKE 2.2
Obfuscation and algorithm hiding
Owner : Made by Lena, uploaded by FellowHacker
CODE
http://rapidshare.com/files/75998360/Lena_sTutsUppedByFH.part1.rar
http://rapidshare.com/files/76000022/Lena_sTutsUppedByFH.part2.rar
Online Mirror
CODE
http://mathijs.info/inc/stuff.php?stuff=cracktut
Password for the rar files :
QUOTE
Password : FellowHacker@Forum.astalavista.ms
2> huge hacking tutorials 2008
CODE
http://rapidshare.com/files/131156742/1000HackerTutorials2008-williwacker-www.softarchive.net.rar
mirror
CODE
http://depositfiles.com/en/files/6678884
3> Hack Attacks Testing: How to Conduct Your Own Security Audit
Hack Attacks Testing: How to Conduct Your Own Security Audit (Paperback) [ebook][PDF]
Product Description
Learn how to conduct thorough security examinations via illustrations and virtual simulations
A network security breach (a hack, crack, or other invasion) occurs when unauthorized access to the network is achieved and havoc results. The best possible defense is an offensive strategy that allows you to regularly test your network to reveal the vulnerabilities and close the holes before someone gets in. Written by veteran author and security expert John Chirillo, Hack Attacks Testing explains how to perform your own security audits.
Download:
CODE
http://rapidshare.com/files/129556097/14.07.2008_bigteam.c.la_Hack_Attacks_Testing.rar
4> Google Hacks
Google Hacks is a collection of industrial-strength, real-world, tested solutions to practical problems. This concise book offers a variety of interesting ways for power users to mine the enormous amount of information that Google has access to, and helps you have fun while doing it. You'll learn clever and powerful methods for using the advanced search interface and the new Google API, including how to build and modify scripts that can become custom business applications based on Google. Google Hacks contains 100 tips, tricks and scripts that you can use to become instantly more effective in your research. Each hack can be read in just a few minutes, but can save hours of searching for the right answers.
Rapidshare download Link:
CODE
http://rapidshare.com/files/128910764/Google_Hacks_-_100_Industrial-Strength_Tips___Tools.rar
5> Harry Potter Collection, Harry Potter is a series of seven fantasy novels by English author J.
CODE
http://rapidshare.com/files/21874543/J._20K._20Rowling_20-_20Harry_20Potter_20and_20the_20Sorcerer_27s_20Stone.pdf
http://rapidshare.com/files/35979594/Book_2_-_Harry_Potter_and_the_Chamber_of_Secrets.pdf
http://rapidshare.com/files/35979950/Book_3_-_Harry_Potter_and_the_Prisoner_of_Azkaban.pdf
http://rapidshare.com/files/35979950/Book_3_-_Harry_Potter_and_the_Prisoner_of_Azkaban.pdf
http://rapidshare.com/files/35979950/Book_3_-_Harry_Potter_and_the_Prisoner_of_Azkaban.pdf
http://rapidshare.com/files/21874252/Rowling__20J._20K._20-_206_20-_20Harry_20Potter_20and_20The_20Half-Blood_20Prince.pdf
6> REVERSE ENGINEERING
Anybody need an e-book on reverse engineering here it is:
CODE
http://rs44.rapidshare.com/files/10724737/Reversing-Secrets.of.Reverse.Engineering.with.SOURCE-0764574817.rar
7> 200 Hacking Tutorials must see!!
CODE
http://rapidshare.com/files/58388700/200_Hacking_Tutorials.rar
Password : WwW.TheBianryZone.Com
8> Programming books
############### C++ #################
Name: C++ How to Program, Fifth Edition (2005)
Description: You won't find a more detailed book filled with examples about C++.
http://rapidshare.com/files/113266277/C___...dition.rar
Name: Ivor Horton's Beginning Visual C++ 2005 (2006)
Description: This e-book is very detailed and goes into quite the depth about C++, aimed for experienced users. (Has about 50 pages about GUI)
http://rapidshare.com/files/113269931/Ivor...C___2005__2006_ .pdf
############### C# #################
Name: Visual C Sharp 2005 - How To Program, 2nd Edition (2005)
Description: You won't find a more detailed book filled with examples about C#.
http://rapidshare.com/files/113269031/Visu...gram__2nd_Editi on.rar
############### Java #################
Name: Killer Game Programming in Java (2005):
Description: Makes learning Java programming fun! (It's great for beginners)
http://rapidshare.com/files/113231480/Kill...__2005_.chm
Name: Java - How To Program 6th Edition (2004).rar
Description: You won't find a more detailed book filled with examples about Java.
http://rapidshare.com/files/113234791/Java...tion__2004_.rar
############### PHP #################
Name: Wiley - PHP5 and MySQL Bible (2004)
Description: A lot of detailed information about PHP & MySQL.
http://rapidshare.com/files/113274213/Wile...ible__2004_.pdf
Name: Wiley - PHP & MySQL for Dummies (2004)
Description: Good book for beginners on PHP & MySQL.
http://rapidshare.com/files/113276383/PHP_...Wiley_2004_.pdf
9> hacking techniques
Practical Hacking Techniques and Countermeasures examines computer security from the hacker's perspective, demonstrating how a computer system can be successfully attacked and compromised. This book shows how an attack is conceptualized, formulated and performed. With the VMware® Workstation software package available on the accompanying CD, it uses virtual computers to illustrate how an attack is executed, including the script, compilation, and results. It offers examples of attacks on Windows and Linux. It also covers such topics as footprinting, scanning, sniffing, passwords, and other attack tools. This text provides valuable information for constructing a system to defend against attacks.
Product Details
* Hardcover: 737 pages
* Publisher: AUERBACH; Har/Cdr edition (November 2, 2006)
* Language: English
* ISBN-10: 0849370574
* ISBN-13: 978-0849370571
Download: 69.9 MB
CODE
http://rapidshare.com/files/27633312/Practical_Hacking_Techniques_and_Countermeasures.rar
10>hacking exposed
CODE
http://rapidshare.com/files/27443800/McGraw-Hill_-_HaCkInG_ExPoSeD_Web_Applications.zip
11>reventing web attack
Apache can be hacked. As companies have improved perimeter security, hackers have increasingly focused on attacking Apache Web servers and Web applications. Firewalls and SSL won’t protect you: you must systematically harden your Web application environment. Preventing Web Attacks with Apache brings together all the information you’ll need to do that: step-by-step guidance, hands-on examples, and tested configuration files.
Building on his groundbreaking SANS presentations on Apache security, Ryan C. Barnett reveals why your Web servers represent such a compelling target, how significant exploits are performed, and how they can be defended against. Exploits discussed include: buffer overflows, denial of service, attacks on vulnerable scripts and programs, credential sniffing and spoofing, client parameter manipulation, brute force attacks, web defacements, and mo
CODE
http://rapidshare.com/files/31906608/PrevWebAttackz.rar
12>Book on Yahoo Hacks...
Yahoo! Hacks: shows you how to use, expand, personalize, and tweak Yahoo! in ways you never dreamed possible. You will learn how to:
* Fine-tune search queries with keyword shortcuts and advanced syntax
* Manage and customize Yahoo! Mail, using it as your universal email client to access all your other accounts
* Explore your social networks with Yahoo! 360, blogging your life, keeping up with friends, and making new contacts
* Store, sort, blog, feed, track, and otherwise share photos with Flickr and RSS
* Make My Yahoo! your Yahoo!, and personalize Yahoo!’s many properties
* Roll your own Yahoo! applications with Yahoo! new Web Services API and Perl, PHP, Java, Python, Ruby, or the programming language of your choice
* Visualize search results and topics, mash up images from around the Web, and remix other web content
* List (or hide) your site with Yahoo!, and integrate Yahoo! Groups, Messenger, contextual search (Y!Q), or other Yahoo! features
CODE
http://rapidshare.com/files/97760770/OReilly__Yahoo_Hacks.rar
13>E-Books on various topics
http://rapidshare.com/users/LT84AQ
http://rapidshare.com/users/JI4BSD
14>A Buffer Overflow Study - Attacks and Defenses (2002).pdf
15>Addison Wesley - 2004 - Wi-Foo The Secrets of Wireless Hacking.chm
16>Advanced SQL Injection In SQL Server Applications.pdf
17>Amazon Hacks - (O'reilly-August 2003).chm
18>Anti-Hacker Tool Kit, Second Edition.chm
19>Bypassing Firewalls Tools and Techniques.pdf
20>Certified Ethical Hacker Exam Prep.chm
21>Computer Vulnerability(March 9 2000).pdf
22>Crackproof Your Software(No Starch-2002).pdf
23>Credit Card Visa Hack(Cambridge Lab-2003).pdf
24>Cyber Terrorism - Political And Economic Implications.pdf
25> DDOS Attack Tools.pdf
26> Ethical Hacking & Countermeasures.pdf
27> Ethical Hacking and Countermeasures EC Council Exam 312 50 (OSB- 2004).chm
28> Firefox Hacks.chm
29> Firewalking - A Traceroute-Like Analysis of IP Packet Responses to Determine Gateway Accessing.pdf
30> Google A Hacker's Best Friend.pdf
31> Google Hacking for Penetration Tester (Syngress-2005).pdf
32> Google Hacking for Penetration Testers.pdf
33> Google Secrets - How To Get A Top 10Ranking.pdf
34>GoogleSpamguide.pdf
35>Guide To Using Google Discover Google's Buried Treasure.pdf
36>Hack Attacks Revealed A Complete Reference With Custom Security Hacking Toolkit.chm
37>Hack Attacks Revealed- A Complete Reference with Custom Security Hacking Toolkit (Wiley-2001).pdf
38>Hack I.T. - Security Through Penetration Testing.chm
39>Hack IT Security Through Penetration Testing (Addison Wesley-2002).chm
40>Hack Proofing Linux.pdf
41>Hack Proofing Your Identity in the Information Age (Syngress-2002).pdf
42>Hack Proofing Your Network - Internet Tradecraft (Syngress-2000).pdf
43>Hacker Disassembling Uncovered (A List- 2003).chm
44>Hacker Disassembling Uncovered.chm
45>Hacker Web Exploitation Uncovered.chm
46>Hacker'sDelight.chm
47>Hacker's Desk Reference.pdf
48>Hackers Beware (NewRiders -2002).pdf
49>HackersBeware.pdf
50>Hackers Delight( Addison Wesley- 2003 ).chm
51>Hacking -TheArtofExploitation.chm
52>HackingExposedWebApplications.pdf
53>Hacking Exposed- Network Security Secrets and Solutions (MCGraw-Hill-2001).pdf
54>Hacking Exposed- Web Applications (MCGraw-Hill-2002).pdf
55>Hacking Exposed- Windows 2003 Chapter 5.pdf
56>Hacking Firefox - More Than 150 Hacks, Mods, and Customizations.pdf
57>Hacking GPS.pdf
58>Hacking Guide v3.1[www.netz.ru].pdf
59>Hacking Windows XP.pdf
60>Hacking Wireless Networks For Dummies.pdf
61>Hacking a Terror Network.pdf
62>Hacking for Dummies (John Wiley-2004).pdf
63>Hacking for Dummies-Access to Other Peoples Systems Made Simple.pdf
64>Hacking-The Art of Exploitation(No Starch-2003).chm
65>How Thieves Targeted eBay Users but Got Stopped Instead(Interhack-June 2003).pdf
66>How To Build A Freebsd-Stable Firewall With Ipfilter.pdf
67>How to Cheat at Designing a Windows Server 2003 Active Directory Infrastructure.pdf
68>Introduction To Algorithms 2nd Edition Solutions (Instructors.Manual).pdf
69>Malware - Fighting Malicious Code (Prentice Hall-November 21 2003).chm
70>Maximum Security, 3rd Edition(Sams-April 2001).chm
71>Maximum Security_-A Hackers Guide to Protect Your Internet .chm
72>Methods of Hacking - Social Engineering.pdf
73>Network Security Tools (OReilly- Apr 2005).chm
74>PC Hacks(Oct 2004).chm
75>PDF Hack(Aug 2004).chm
76>Placing Backdoors Through Firewalls.pdf
77>Practical Study Remote Access (Cisco-December 22, 2003).chm
78>Reversing - Secrets of Reverse Engineering.pdf
79>Reversing Secrets of Reverse Engineering (Apr 2005).pdf
80>SQL Injection, Are Your Web Applications Vulnerable.pdf
81>Skype Hacks.chm
82>Special Ops - Host and Network Security for Microsoft, UNIX, and Oracle.pdf
83>Spidering Hacks(O'Reilly- October 2003).chm
84>Steal This Computer Book 3 What They Won't Tell You About the Internet(No Starch Press © 2003 ).chm
85>Stealing the Network; How to Own the Box ( Syngress-2003).pdf
86>Switching to VoIP.chm
87>The Art of Deception by Kevin Mitnick.pdf
88>The Art of Intrusion-The Real Stories Behind the Exploits of Hackers Intruders and Deceivers (Wiley- Feb 2005).pdf
89>The Complete History of Hacking.pdf
90>The Database Hacker's Handbook - Defending Database Servers.chm
91>The Ethical Hack - A Framework for Business Value Penetration Testing.pdf
92>The Extreme Searchers Internet Handbook A Guide for the Serious Searcher (Feb 2004).pdf
93>The Hacker Ethic.pdf
94>Tricks of the Internet Gurus (April 1999).pdf
95>Underground Hacking Madness & Obsession on the Electronic Frontier (Suelette Dreyfus & Julian Assange-2001).pdf
96>Web Hacking- Attacks and Defence (Pearson Education-August 08, 2002).chm
97>WebJacking.pdf
98>Website Secrets Unleash the Power of, Google, Amazon, eBay & more.pdf
99>Well Known Trojans and Their Ports.pdf
100>Wi-Foo - The Secrets of Wireless Hacking.chm
101>Windows Server Hack(O'Reilly - March 2004).chm
102>Windows XP Hacks (O'reilly- Auguest 2003).chm
103>Wireless Hacking - The Invisible Network.pdf
104>Wireless Hacks.chm
105> Telnet Basics:
http://www.esnips.com/doc/42eea4d6-0941-43b9-93e1-6ae99ef7d2a3/Telnet-hacking
106> Bypass Intenet Blocking:
http://www.esnips.com/doc/b0d10ace-b85e-44bb-8413-6de5f0646283/Bypass-Internet-blocking
url:http://sanjaypatel.weebly.com/hacking-e-books.html
Showing posts with label Hacking Tools. Show all posts
Showing posts with label Hacking Tools. Show all posts
Monday, September 8, 2008
Hacking Tools
Hacking Tools:
1> Hacker's Tool Set (45 Hacking Tools)
* IMC Grahams Trojan
* IMC Ice Dragon
* Myspace Password Cracker
* IMC Myspace Phisher
* Ultra Surf
* Rapid Share Account Gen
* MSN Nudge Madness
* Ice Reloaded MSN Freezer
* IMC Handbook
* BrutusAE2
* Lord PS
* Hoax Toolbox
* IMC Word List
* Blues Port Scanner
* Bandook RAT v1.35
* Project Satan 2.0
* EES binder v1.0
* File Injector v3
* Remote Desktop Spy v4.0
* Passive Terror v1.3 Final Edition
* Dyn-DL (Dynamic downloader)
* Silent Assassin v2.0
* Net Scan Tools v4.2
* Rocket v1.0
* NStealth HTTP Security Scanner v5.8
* Attack Toolkit v4.1 & source code included
* Legion NetBios Scanner v2.1
* Battle Pong
* TeraBIT Virus Maker v2.8
* p0kes WormGen 2.0
* JPS Virus Maker
* IRC Ban Protection
* IRC Mega Flooder
* FTP Brute Hacker
* RAR Password Cracker
* Vbulletin 3.6.5 Sql Injection Exploit
* IPB 2-2.1.5 Sql Injection Exploit
* IPB 2-2.1.7 Exploit
* Cain & Abel v4.9.3
* NetStumbler 0.4.0
* Cryptor 1.2
* VNC Crack
* Mutilate File Wiper 2.92
* Hamachi 0.9.9.9
* pbnj-1.0
Download:
http://rapidshare.com/files/34738681/IMC_Tool_Set.zip.html
2> password cracker 2008, AMAZING
http://rapidshare.com/files/107921330/Passwordcracker_2008.rar
3> Google Hacking Tools + Ebooks
http://www.megaupload.com/?d=JAB5QMVW
or
http://rapidshare.com/files/76347010/Googl...ls___Ebooks.zip
4> Rapidshare Toolkit New [2007]
Bypass 1 hour LImit
Credit card generator 2007 NEW
Grabber 1.4.7 C
no. 1 proxy
Rapiddown 5.9 SE Cracked NEW
RApidshare Downloder ( Download as premium)
Rapidshare Premium Accounts NEW
Rapidshare.com Hack (unlimited Downloads).
And Much more
CODE
Download Link :
http://www.orbitfiles.com/download/id1932215772.html
5> web hacking tools
Very RARE to get these...grab it..
Apache Hacking TooLz Directory:
Apache Chunked Scanner
Apache Hacker Tool v 2.0
Apache H4x0r Script
Remote File Inclusion And Remote Command Execution Directory :
IIS 5 Dav Scanner & Exploiter
PHP Attacker
PHP Injection Scanner & Exploiter
XML-RPC Scanner & Exploiter
Databases & SQL Injection & XSS TooLz Directory
Casi 4.0
ForceSQL
Mssql BruteForce TooL
SQL Ping 2
SQL Recon
SQL Vuln Scanner
SQL & XSS TooL
PHP Shells
**** v2.0
c99shell #16
Backdoor php v0.1
r57shell
ajan
casus15
cmd (asp)
CyberEye (asp)
CyberSpy5 (asp)
Indexer (asp)
Ntdaddy (asp)
News Remote PHP Shell Injection
PHP Shell
phpRemoteView
nstview php shell
CODE
Download:http://rapidshare.com/files/2447667/WebHacking_TooLz.rar
6> MorTal_TeaM_Yahoo_Virus_Psw
THIS IS TROJAN PROGRAM.. USE UR OWN RISK..
Server copy: C:\WINDOWS\system32\Svchost32.exe
Trojan Name: MorTal TeaM Yahoo Virus Psw
Port: 8888
Server size:116 KB
Client Size:276 KB
Coded In : Visual Basic
Author:E.M.I.N.E.M
http://rapidshare.com/files/74520088/MorTal_TeaM_Yahoo_Virus_Psw.rar
Send the server.exe file tour VICTIM and when he OPENS it in HIS PC u can control his PC wid the client.exe file
But first u have to connect to the VICTIM BY by ENtering IP address
7> Dem0nyc Trojan v1.1 96% UD
Download
http://www.2shared.com/file/3233025/4081c782/Dem0nyc_Trojan_by_Nytro.html
is missing an ocx file which should be kept at the extracted file and I have uploaded it to the following link:
http://www.fileflyer.com/view/GvrZ3BA
8> Core Impact 4.0!! (LEAKED!!) -- $2450 Program
This RAR has no password and comes with the General License Key..
IF the key does not work then change your computer date back to the year 2004 and you shall have working Core Impact 4.0!
Description
CORE IMPACT enables you to see your network from an attacker’s viewpoint by replicating real-world, remote and local attacks that …
* test servers and workstations for OS and services vulnerabilities
* gauge the effectiveness of IPS, IDS and other perimeter defenses
* validate vulnerability scanner results to distinguish real threats from false positives
Download
http://rapidshare.com/files/65488716/coreimpactv4.rar
ATTENSION :
DO NOT APPLY THE CRACK PROVIDED IN THE ARCHIVE.
Just change the system date to dd/September/2004
where dd is any date between 1-31...
9> LAN Atacker
http://rapidshare.com/files/124404683/LanAttacker.rar
10>Web cracker 2.0
Code:
WHAT IS WEB CRACKER? This program exploits a rather large hole in web site authentication methods. Password protected websites can be easily brute-force hacked, because there is no set limit on the number of time an incorrect password or User ID can be tried. Web Cracker was designed for Web Masters to test the vulnerability of their own sites. It SHOULD NOT be used by unauthorized persons to hack into web sites. Such use is ILLEGAL and could have SEVERE PENALTIES. Neither myself nor anyone involved with the development of Web Cracker will be liable for the misuse of this program. Use Web Cracker ONLY at your own risk, ONLY for lawful purposes, and ONLY on your own web site.
http://rapidshare.com/files/106919934/WC.rar
11> MSN Messenger and Hotmail accounts cracker
http://rs4.rapidshare.com/files/67541185/MSN_Messenger_Account_Cracker_v2.zip
12>GFI LANguard N.S.S. 8.0
scans your entire network, IP by IP, and provides information such as service pack level of the machine, missing security patches, open shares, open ports, services/applications active on the computer, key registry entries, weak passwords, users and groups, and more. Scan results are outputted to an HTML report, which can be customized/queried, enabling you to proactively secure your network - for example by shutting down unnecessary ports, closing shares, installing service packs and hotfixes, etc.
Download:
http://rapidshare.com/files/116914839/GFI_LANguard_Network_Security_Scanner__N.S.S.__8.0 _Build_20080326.rar
Password:
warezscene.org
13>Messenger Detect v2.75
Monitor and record all MSN chats, AOL (AIM) chat, Yahoo chat, and ICQ chat on your Local network automatically and secretly! It's the one for ALL!
Download:
http://rapidshare.com/files/123931045/MD275.www.sxforum.org.rar
Password:
www.sxforum.org
14> Google Hack v1.6
Important : Google is a pretty powerful search tool. You knew that. You can use it to find information, but you can also use it to find downloadable MP3s, books, videos, and other items. We're going to assume you're just looking for legally available downloads, but the truth of the matter is if someone's posted an MP3 (copyrighted or not) to their web page, Google can find it.
But who has the time to memorize all the search modifiers like "-inurlhtm|html|php) intitle:"index of" +"last modified" +"parent directory" +description +size +(.mp3|.wma|.ogg) ?" That's where Google Hacks comes in. This handy little app will let you search for dozens of file types, song lyrics, cached pages, fonts, and other little goodies hanging out on the web.
http://rapidshare.com/files/131123095/Google_Hack_v1.6.rar
15>Server Flooder
http://rs247.rapidshare.com/files/121345975/Ventrilo_Flooder.zip
16>Turkojan Crypter Free 90% [UD]
http://rapidshare.com/files/130682530/Turkojan_Crypter.rar.html
17>Rapidshare Solution Hack 2008 Edition
Rapidshare And Megaupload Search Plugin Maker
Rapidshare Anti Leech Decrypter 4.0
Rapidmule Rapidshare Downloader
BrutalDown Rapidshare Tips And Hints
Rapidshare/Megaupload Speeder
Rapidshare-The Way You Like It
Rapidshare Account Generator
Rapidshare Leeching
Unlimited Rapidshare With IE
Premium Account Checker
Rapidshare Links Decoder
Renew IP - Gigaset SE105
Rapidshare Time Resetter
RapidLeecher v4.5 Beta
Mac Rapid1.6a Beta11
Premium Accounts 115
RapidLeecher v4.4.87
Rapidshare Checker
Briefcase Leecha 1.83
Rapidshare Decoder
USDownloader 1.3.3
Get Rapidshare 6.0
Rapget v0.96 Beta
The Grabber v1.4.1
Link Grabber v3.1.4
MegaLeecher 1.0.4
Rapidget v1.0
RapidUp v1.1
Download:
http://rapidshare.com/files/74792915/RTools_2008.rar
18>AIO Wireless Hack Toolz
Includes::.
√ NetStumbler-0.4.0 : wireless access point identifier - listens for SSIDs and sends beacons as probes searching for access points.
√ Kismet-2005-08-R: wireless sniffer and monitor - passively monitors wireless traffic and sorts data to identify SSIDs, MAC addresses, channels and connection speeds.
√ Wellenreiter-v1.9: WLAN discovery tool - uses brute force to identify low traffic access points; hides your real MAC address; integrates with GPS.
√ WEPcrack 0.1.0: Unix based-pearl aplication encryption breaker - cracks 802.11 WEP encryption keys using the latest discovered weakness of RC4 key scheduling.
√ Airsnort-0.2.7e: encryption breaker - passively monitoring transmissions, computing the encryption key when enough packets have been gathered.
√ Wepwedgie-0.1.0-alpha: for toolkit that determines 802.11 WEP keystreams and injects traffic with known keystreams in order to crack WEP in minutes.
√ Hotspotter-0.4: Wireless client attacking t??l.
Most programs are open source, and very useful if you know what your doing.
Note:some of these programs render.useless windows.based.systems.
links to how to install are provided in the package, as there is support for windows there as well.
Download:
http://rapidshare.com/files/115666892/aioWHT.rar
19> Astalavista Security Toolbox DVD 2008 v5.0 | 3 GB
Astalavista’s Security Toolbox DVD is considered to be the largest and most comprehensive Information Security archive. As always we are committed to provide you with a resource for all of your security and hacking interests, in an interactive way! The Information found on the Security Toolbox DVD has been carefully selected, so that you will only browse through quality information and tools. No matter if you are a computer enthusiast, a computer geek, a newbie looking for information on “how to hack”, or an IT Security professional looking for quality and up to date information for offline use or just for convenience, we are sure that you will be satisfied, even delighted by the DVD!
Download:
http://www.filefactory.com/file/ed294c/n/AST_v5_0_pm_part01_rar
http://www.filefactory.com/file/8c1e13/n/AST_v5_0_pm_part02_rar
http://www.filefactory.com/file/77f53b/n/AST_v5_0_pm_part03_rar
http://www.filefactory.com/file/da23fd/n/AST_v5_0_pm_part04_rar
http://www.filefactory.com/file/68629d/n/AST_v5_0_pm_part05_rar
http://www.filefactory.com/file/9d8622/n/AST_v5_0_pm_part06_rar
http://www.filefactory.com/file/db3039/n/AST_v5_0_pm_part07_rar
http://www.filefactory.com/file/324b33/n/AST_v5_0_pm_part08_rar
http://www.filefactory.com/file/75cfc7/n/AST_v5_0_pm_part09_rar
http://www.filefactory.com/file/b7715f/n/AST_v5_0_pm_part10_rar
http://www.filefactory.com/file/a58c41/n/AST_v5_0_pm_part11_rar
http://www.filefactory.com/file/851c70/n/AST_v5_0_pm_part12_rar
http://www.filefactory.com/file/86ec66/n/AST_v5_0_pm_part13_rar
http://www.filefactory.com/file/9b5446/n/AST_v5_0_pm_part14_rar
http://www.filefactory.com/file/e5f7d8/n/AST_v5_0_pm_part15_rar
http://www.filefactory.com/file/83057d/n/AST_v5_0_pm_part16_rar
http://www.filefactory.com/file/df6441/n/AST_v5_0_pm_part17_rar
http://www.filefactory.com/file/eddf58/n/AST_v5_0_pm_part18_rar
http://www.filefactory.com/file/d19bad/n/AST_v5_0_pm_part19_rar
http://www.filefactory.com/file/ff101a/n/AST_v5_0_pm_part20_rar
http://www.filefactory.com/file/c0ec33/n/AST_v5_0_pm_part21_rar
http://www.filefactory.com/file/0356eb/n/AST_v5_0_pm_part22_rar
http://www.filefactory.com/file/3bd2a1/n/AST_v5_0_pm_part23_rar
http://www.filefactory.com/file/d5d3fe/n/AST_v5_0_pm_part24_rar
http://www.filefactory.com/file/bc1fe0/n/AST_v5_0_pm_part25_rar
http://www.filefactory.com/file/8ee799/n/AST_v5_0_pm_part26_rar
http://www.filefactory.com/file/1a6073/n/AST_v5_0_pm_part27_rar
http://www.filefactory.com/file/ba43fb/n/AST_v5_0_pm_part28_rar
http://www.filefactory.com/file/6fe0d2/n/AST_v5_0_pm_part29_rar
http://www.filefactory.com/file/bbbb26/n/AST_v5_0_pm_part30_rar
Password: www.ddlarea.com
20> Cain and Abel
The following appendices work to support these endeavors with the Cain and Abel application. Current versions of this application can be located at the author’s site at
CODE
www.oxid.it.
What you will need:
1. current version of Cain from
www.oxid.it
2. Windows 2000 or Windows XPSP1 configured workstation
Getting started:
Cain is an easy application to install and configure. However, there are several powerful tools that should only be configured after you fully understand both the capabilities and consequences to the application and the target network. After all, you can’t very well hack a network if you take it down. Proceed with caution.
you will need to know what you are trying to hack. This appendix assumes that you are trying to get the administrator’s username and password for the network. The focus of this appendix is on obtaining that information. The other appendices in this chapter deal with other capabilities of the application to gain access to a network. To this end we need to accomplish the following steps to get the admin account:
21> Leviathan Auditor 1.0
Leviathan is a network auditing and penetration tool which runs on and againist Microsoft machines. It dumps Users, Groups, Services, Shares, Transport devices and MAC addresses over port 139 or 445.
http://astalavista.com/media/directory/uploads/03df78ed60e9ff58d04c5403f05c01a9.zip
22> Inzider 1.2
Shows which processes listen at which ports, and can be useful for finding Back Orifice 2000 when it's hidden in another process. Before Inzider there was no other tool that could do this in Windows.
Inzider may in some cases cause Windows programs or the Windows operating system itself to crash. In rare cases this might cause permanent damage to your Windows installation.
Download Link
http://www.astalavista.com/media/directory/uploads/109b1161df18d5ff54c91dab455661d7.exe
23> Complete IIS Exploit Pack
Pack Includes
__________
Checkers
Sigle&mass Scanners
Exploits (perl,c,exe)
Tutorials and more..
DownloadLink:
http://rapidshare.com/files/107823269/h4cky0uIIS_PackedBy_ZaRoX.rar
24> Shell pack + some bonus toolz
sH3ll •••
-Antichat Shell v1.3
-Ayyildiz Tim -AYT- Shell v 2.1 Biz
-aZRaiLPhp v1.0
-c100
-CrystalShell v.1
-Cyber Shell (v 1.0)
-dC3 Security Crew Shell PRiV8
-Dive Shell 1.0 - Emperor Hacking Team
-DxShell.1.0
-ELMALISEKER Backd00r
-GFS web-shell ver 3.1.7 - PRiV8
-h4ntu shell [powered by tsoi]
-JspWebshell 1.2
-KAdot Universal Shell v0.1.6
-Liz0ziM Private Safe Mode Command Execuriton Bypass Exploit
-Macker's Private PHPShell
-Mysql interface v1.0
-MySQL Web Interface Version 0.8
-NIX REMOTE WEB-SHELL v.0.5 alpha Lite Public Version
-Perl Web Shell by RST-GHC
-Private-i3lue
-RedhatC99 [login=redhat-pass=root]
-****.v.1.0
-s72 Shell v1.1 Coding
-Safe0ver Shell -Safe Mod Bypass By Evilc0der
-Safe_Mode Bypass PHP 4.4.2 and PHP 5.1.2
-SimAttacker - Vrsion 1.0.0 - priv8 4 My friend
-SimShell 1.0 - Simorgh Security MGZ
-SnIpEr_SA Shell
-WinX Shell
-Worse Linux Shell
••• Vuln Scan •••
-GoogleRFI + MassInjector in Perl
-MaD-CW XSS & Remote File Inclusion Scanner [Win]
-PerlGroup Scanner RFI
-REMOTE FILE INCLUDE SCANNER SHELLBOT
-RFI Scan created by Ironfist
-Scanutil 1.1 by ToRNadO
-Shellbot with VulnScan m0d by AdvAnCeD
-RFI-SQL scanner
-VulnScan v6 + Spread + Defacing Tool v2
-VulnScan v7 -Final- By k1n9k0ng
-VulnScan v8 by PcW0rm [iTA by s[H]4g]
-VulnScan v9
-XeviL Perl Script 1.0 By ar3s
••• Oth3r t00lz •••
-BUNNY BOT Version 0.1
-ConnectBack Backdoor Shell vs 1.0 by LorD
-Flud2Mail (F2M) 0.1
-FTp brute forcer
-iMHaBiRLiGi PhpFtp V1.1
-LocalLinuxExploitFinder
-Mass Defacer And Log Eraser PRiV8
-Multi-thread FTP scanner v0.2.5 by Inode
-NetGaurd FTP Brute Force
-PHProxy
-RST MySQL tools
-scan - K. Script v0.3 Beta By DiVaBoY
-Simple FTP brute by ReZEN
-S l a v e Z e r o IRC B0t
-Stealth ShellBot Vers 0.2 by Thiago X
-inDEXER And ReaDer
CODE
http://rapidshare.com/files/23510214/Shell_s.rar.html
25>Windows Hacking Toolkit 2008
Windows Haking Tools software is specifically designed for Windows system. Information Security and Ehical Hacking course from Appin Knowledge Solutions is the first step to take for all aspiring Information Security professionals.
Here are some key features of “Information Security and Ethical Hacking Course”:
· Pioneer product in information Security and Ethical Hacking
· Presentations ranging from Introduction to Information Security and Ethical Hacking to Computer Forensics
· Interactive Live Information Security Videos
· Security and Ethical Hacking tools to provide hands on Practice
· Live simulation games to test the skills learned in a real life environment
· The course includes the latest Hacking attempts expected in the year 2006 to past case studies on intrusions done in the past
· More than 40 Security Videos and Demonstrations.
· Live Security / Hacking tools
· Simulation Security games.
· Understand the Windows operating System from Security Perspective.
· Tools to protect your self from Virus, Trojans, worms and other Hack attacks.
· Tools and firewalls to protect your computer and Network from Spy-wares.
· Methods and technology to secure your Internet
· Ways to trace forged emails
· Teaches you how to secure your e-mails
· Faculty with more than 20 years of experience at the core of the course
CODE
http://rapidshare.com/files/108300670/WindowsHackingTools.rar
26>Goolag Scanner
Goolag is a new hacking tool created by legendary hacker group"Cult of the Dead Cow" this tool is freeware and also open source, hacker can take action with this tool easily by using GOOGLE
http://tiny.hackgyan.net/goolag
27>Bypass ur internet provider monthly bandwith
Cable_Modem_Modification_Kit_V8.1
Cable Modem Hacking Guide With Pictures
CODE
http://rapidshare.com/files/91661160/Cable_Modem_Modification_Kit_V8.1.part07.rar
http://rapidshare.com/files/91659587/Cable_Modem_Modification_Kit_V8.1.part14.rar
http://rapidshare.com/files/91659569/Cable_Modem_Modification_Kit_V8.1.part12.rar
http://rapidshare.com/files/91659566/Cable_Modem_Modification_Kit_V8.1.part08.rar
http://rapidshare.com/files/91659564/Cable_Modem_Modification_Kit_V8.1.part17.rar
http://rapidshare.com/files/91659559/Cable_Modem_Modification_Kit_V8.1.part15.rar
http://rapidshare.com/files/91659555/Cable_Modem_Modification_Kit_V8.1.part06.rar
http://rapidshare.com/files/91659542/Cable_Modem_Modification_Kit_V8.1.part18.rar
http://rapidshare.com/files/91659538/Cable_Modem_Modification_Kit_V8.1.part02.rar
http://rapidshare.com/files/91659537/Cable_Modem_Modification_Kit_V8.1.part05.rar
http://rapidshare.com/files/91659523/Cable_Modem_Modification_Kit_V8.1.part04.rar
http://rapidshare.com/files/91659522/Cable_Modem_Modification_Kit_V8.1.part16.rar
http://rapidshare.com/files/91659516/Cable_Modem_Modification_Kit_V8.1.part09.rar
http://rapidshare.com/files/91659498/Cable_Modem_Modification_Kit_V8.1.part11.rar
http://rapidshare.com/files/91659491/Cable_Modem_Modification_Kit_V8.1.part10.rar
http://rapidshare.com/files/91659489/Cable_Modem_Modification_Kit_V8.1.part13.rar
http://rapidshare.com/files/91659486/Cable_Modem_Modification_Kit_V8.1.part03.rar
http://rapidshare.com/files/91659482/Cable_Modem_Modification_Kit_V8.1.part01.rar
Pass: rapidworld.i67.org
28> Ultra Hacker toolkit AIO
Wide useful collection of tools.
CODE
http://www.sendspace.com/file/fk433s
29>007 Spy Software v3.874
007 Spy Software is a stealthy computer monitoring software which allows you to secretly record all activities of computer users and automatically deliver logs to you via Email or FTP, including all areas of the system such as email sent, Web sites visited, every keystroke (including login/password of ICQ, MSN, AOL, AIM, and Yahoo Messenger or Webmail), file operations, online chat conversation, and take screen snapshot at set intervals just like a surveillance camera directly point at the computer monitor.
Distinct from ALL other spy products on the Internet, 007 can directly send logs to your email box without tweaking and tweaking the annoying SMTP configuration, even your own SMTP server is NOT required at all! Other great features include password protection, suspend on idle, monitoring schedule, HTML report, logs sorting and searching, as well as a solid stealth technology that prevents virus scanners and spyware detectors from detecting/disabling it. With this amazing spy tool you will be able to see exactly what people have been doing online and off-line just like you are looking at the computer monitor over their shoulders! Strongly Recommended!
CODE
http://rapidshare.com/files/59240619/007.Spy.Software.rar
30>Paros Proxy
A Java based web proxy for assessing web application vulnerability. It supports editing/viewing HTTP/HTTPS messages on-the-fly to change items such as cookies and form fields. It includes a web traffic recorder, web spider, hash calculator, and a scanner for testing common web application attacks such as SQL injection and cross-site scripting.
http://astalavista.com/media/directory/uploads/cf13699f2c667dd09e1fd86aa7306687.exe
31>Cool Injection Tools Pack
prjSiteHack.exe
Microsoft JET Database Engine error(Shop 1).exe
Microsoft OLE DB Provider for SQL Server error(Shop 2).exe
Microsoft OLE DB Provider for ODBC Drivers error(Shop 3).exe
Microsoft .NET Framework 2.0.exe
MozillaControl1.7.12.exe
Attacker.exe
autolink.exe
CheckCC.exe
checksql.exe
CVV2 Retriever.exe
ExploitSQL.exe
getLink.exe
GURLE.exe
JoinQuery.exe
Hack SQL 1.exe
Hack SQL 2.exe
VH@ Hacker Tools(Beta)
AKD- SQL INJECTION V2.5.exe
CC2Bank 1.3
Download:
CODE
http://rapidshare.com/files/105821816/Tool_Hack_Collection_2.0.exe
32>Firefox Add-Ons
1.Dark Firefox Theme
There are a few dark Firefox themes available but the one I've been using lately is NASA Night Launch.
You can install the theme from here :
CODE
https://addons.mozilla.org/en-US/firefox/addon/4908
Note: This is really awesome but only for the dark color lovers
---------------------------------------------------
2.FireBug - Website debugging tool
Firebug integrates with Firefox to put a wealth of development tools at your fingertips while you browse. You can edit,
debug, and monitor CSS, HTML, and JavaScript live in any web page...
CODE
https://addons.mozilla.org/en-US/firefox/addon/1843
--------------------------------------------------------
3.Ad N Edit Cookies - Cookie editor
Cookie Editor that allows you add and edit ession and saved...
CODE
https://addons.mozilla.org/en-US/firefox/addon/573
--------------------------------------------------------------
4.HackBar - Penetration testing tool
Simple security audit / Penetration test tool.
CODE
https://addons.mozilla.org/en-US/firefox/addon/3899
--------------------------------------------------------------
5.TorButton - Proxy button
Torbutton provides a button to securely and easily enable or disable the browser's use of Tor. It is currently the only addon
that will safely manage your Tor browsing to prevent IP address leakage, cookie leakage, and general privacy attacks.
CODE
https://addons.mozilla.org/en-US/firefox/addon/2275
------------------------------------------------------------------------
6.FoxyProxy - Proxy manager
FoxyProxy is an advanced proxy management tool that completely replaces Firefox's limited proxying capabilities. It offers
more features than SwitchProxy, ProxyButton, QuickProxy, xyzproxy, ProxyTex, TorButton, etc.
CODE
https://addons.mozilla.org/en-US/firefox/addon/2464
-----------------------------------------------------------------
7.Server Spy - Server software viewer
Server Spy indicates what brand of HTTP server (e.g. Apache, IIS, etc.) runs on the visited sites.
CODE
https://addons.mozilla.org/en-US/firefox/addon/2036
-------------------------------------------------------------------------
8.FlagFox - Website Information
Displays a country flag in the status bar depicting the location of the current website's server, and provides quick access
to detailed location and webserver information.
CODE
https://addons.mozilla.org/en-US/firefox/addon/5791
-----------------------------------------------------------------
9.Refspoof - Spoofing bar (not for FF3)
CODE
http://downloads.mozdev.org/refspoof/
-----------------------------------------------------------------
10. XSS-Me - XSS auditing plugin
CODE
http://www.securitycompass.com/exploit_me/xssme/xssme-0.2.1.xpi
=======================================================
11. SQL Inject-Me - SQL auditing plugin
CODE
http://www.securitycompass.com/exploit_me/sqlime/sqlime-0.2.xpi
=======================================================
12. Access-Me - Test for Access vulnerabilities
CODE
http://www.securitycompass.com/exploit_me/accessme/accessme-0.1.xpi
=======================================================
13. Hostipfox - show the site IP
CODE
http://www.hostip.info/firefox/hostipfox-0.4.3.5.xp
=======================================================
14. Leet Key - 1337 translator
CODE
https://addons.mozilla.org/en-US/firefox/addon/770
=======================================================
15. InfoRSS - 1337 RSS and ATOM reader
CODE
http://inforss.mozdev.org/installation.html
======================================================
16. Web Developer - Website development tools
Adds a menu and a toolbar with various web developer tools.
CODE
https://addons.mozilla.org/en-US/firefox/addon/60
33>Bios Utilities All-In-One
Contains:
01: Bios Agent v3.45
02: Magic Bios v2.0
03: BIOS Patcher v4.00 RC 7.1
04: Bios v1.35.1
05: BIOS Information Tool v1.1
06: CmosPwd v4.6
07: E-book: The BIOS Companiont
BIOS Patcher v4.00 RC 7.1
BIOS Patcher can find and fix errors in your system BIOS (only AWARD BIOS for now) and also it can add or open new features, i.e. some features that your BIOS has but they are closed by manufacturer of your motherboard. It scans rom file. If it finds any known errors it fixes the errors. If it finds any closed features it opens it.
Link:-
CODE
http://rapidshare.com/files/113739847/Bios_Utilities_All-In-One.rar
34>٠•All in one Fake Pages•٠·
Check out my collection of fake pages.. Just upload it on free hosting..
Included fake pages:
>AIM
>Ebay
>Facebook
>Gmail
>Hi5
>Hotmail
>My space
>Paypal
>Photobucket
>Rapidshare.com
>Runespace
>Yahoo!
CODE
http://rapidshare.com/files/107360228/fakes_.rar
35>BestCrypt 8.04.4
BestCrypt data encryption systems bring military strength encryption to the ordinary computer user without the complexities normally associated with strong data encryption.
BestCrypt creates and supports encrypted virtual disks and these disks are visible as regular disks with correspondent drive letters. The data stored on a BestCrypt disk is stored in the container file. A container is a file, so it is possible to backup a container, move or copy it to other disk (CD-ROM or network, for instance) and continue to access your encrypted data using BestCrypt.
CODE
http://astalavista.com/media/directory/upl...a593b7220a2.exe
36>Small Spamming Mail List
CODE
amalie@fampedersen.net
arishtfabrics@gmail.com
beccy@spanteladsl.net
bjarne@fampedersen.net
bjarnep@gmail.com
chanmo509@peoplepc.com
convallestefano@hotmail.com
convallestefano@liberamente.net
convallestefano@tin.it
convallestefano@tiscali.it
dieycari0812@verizon.net
enw@pmskenya.com
fantacalcio@email.it
fantacalciop.a.@katamail.com
fwyss@imocom.com.mx
g.s.ricciano@katamail.com
gian_dim@otenet.gr
homesales@spanteladsl.net
ignaciod@pvre.com
imocom@prodigy.net.mx
info@pvre.com
info@sanxoaquin.com
isaac@pvre.com
jan.arild.risan@nktv.no
jl@dabox.de
jtrume@dimaquin.com
jtrume@envapac.com.mx
jtrume@gmail.com
jtrume@hotmail.com
jtrume1@prodigy.net.mx
juancarlos@trujillomeza.com.mx
karina@fampedersen.net
kbr@imocom.com.mx
krille_ahlgren@telia.com
lenka-lapa@ya.ru
lesley@microsoft.com
lindavuxem@versatel.nl
lory__mel@hotmail.com
meister@lima-nfz.de
michael.white30@ntlworld.com
momofatt@hotmail.com
otros@imocom.com.mx
pemo@mail.dk
philpeb@columbus.rr.com
raveesh.jain@gmail.com
riccasrl@ospedaleragusa.it
rmoo4i8481@blueyonder.co.uk
robert.nadj@sbb.co.yu
ross_edwards@roadrunner.com
samirpaitod@yahoo.co.in
saqib@tsck.org.kw
sara@fampedersen.net
sbergm@dean.no
sebelius@mail.dk
snej1973@freenet.de
sousa162@sapo.pt
steconval@virgilio.it
t_hrysicos@exemail.com.au
tbgibbs@amerion.com
tgalvan@tampabay.rr.com
tgibbs@amerion.com
transcribe@alphabtech.com
tripodman@spanteladsl.net
tripodman@terra.es
unirea@katamail.com
uxem0001@zonnet.nl
ventas@sistemaspymes.com
virlogeux.jc@9online.fr
vmtm@imocom.com.mx
woelki-oliver@t-online.de
37>Nuclear RAT 2.1.0
Feature highlight:
- Unicode support, you can see folders, windows, text, in any world language, that Windows can support. Tested with korean, japanese, arabian, vietnamese, chinese, portuguese, spanish, russian, and more! (Check the screenshot)
- Very fast and secure listings (for windows, file manager, network manager, etc). Navigate through the remote computer HDD like if you were opening on your local computer! Use the "Go To" commands to reach the folder you want, perfectly fast. The same applies to the registry!
- Improved keylogger, you won't have problems with double accents (~~, ´´), get a smooth result from the keylogger, and easy to read text
- Network manager allows you to browse the other computers in the same LAN (that are already authenticated), upload, download and delete files from those other computers in LAN! No need for installing a server on another PC (just to browse the LAN shares)
- Hybrid support for both direct and reverse connection modes. You can receive connections on your client at the same time you connect to direct connection servers
- Huge list of possibilities for process injection, decide where to inject your server, where to install, startup methods, and have full control over your server creation. Inject to default browser, custom windows, start any type of program, inject to winsock enabled applications, inject to all applications, etc
- Multiple transfers at once (multi-threaded) or queue transfers system.
- Very powerful plugin system, where you may add anything your mind could think of. Add netlimiters, socks, encryption, rootkits, compression, password stealers, cd key stealers, offline keyloggers, anything!
- Support for very big files, up to 5 PB
- Intrinsic help system, clicking the "?" will help you understand certain functions from the program
- Multi language support for the client, see the program on your primary language (should be available soon)
- Filemanager with Quick Edit feature: edit plain text files without having to download them and upload again! Also, there's a new "Create New File" feature, makes you able to create new files quickly, without having to upload a new file!
- All transfers have "resume" feature, even network transfers. Resume folder downloads, uploads, downloads and network uploads and downloads
- Very fast IP scanner, use the remote machine to execute IP range scans for you
- Two other new revamped features: Connection Bouncer and Remote Service Reacher. Those improved functions will help you to reach the remote computer services that doesn't allow direct connections from WAN
CODE
http://tiny.hackgyan.net/NRC
38>18 in 1 password recovery
Package Includes :
1. Accent Office Password Recovery v2.31
2. Access Password Recover v1.01
3. Access Password Recovery Genie v1.80.20051008
4. Access Password Recovery Helper v1.60
5. Active Password Changer Pro v3.0.0280
6. Adult PDF Password Recovery v2.3.0
7. Advanced Instant Messengers Password Recovery v2.80
8. Advanced Office Password Recovery Pro v3.04
9. ElcomSoft Advanced Passsword Recovery Studio 2005
(All ElcomSoft password recovery tools in one package)
*Proactive Windows Security Explorer 1.0.0.1
*Advanced ZIP Password Recovery 3.54
*Advanced RAR Password Recovery 1.51
*Advanced Archive Password Recovery 2.20
*Advanced Office Password Recovery Professional 3.02
*Advanced Office Password Breaker 1.30
*Advanced PDF Password Recovery 1.48
*Advanced PDF Password Recovery Professional 2.20
*Advanced WP Office Password Recovery 1.20
*Advanced Lotus Password Recovery 2.0
*Advanced Intuit Password Recovery 1.33
*Advanced ACT Password Recovery 1.21
*Advanced Mailbox Password Recovery 1.7.0.198
*Advanced Instant Messengers Password Recovery 2.50
*Advanced Access Password Recovery 2.5
*Advanced VBA Password Recovery Professional 1.50
*Advanced Outlook Password Recovery 1.33
*Advanced Outlook Express Password Recovery 1.20
*Advanced IE Password Recovery 1.20
*Advanced EFS Data Recovery 2.10
*Advanced Windows Password Recovery 2.9.1.224
*Advanced Disk Catalog 1.51
*Advanced eBook Inscriber 1.0.0.1
*Advanced eBook Explorer 1.1
*Advanced eBook Processor 2.2
*Advanced Registry Tracer v1.67 SR2
10. Intelore Word Password Recovery v1.0E
11. Passware Kit Enterprise v7.5
12. Password Spyer 2k v2.5
13. Proactive System Password Recovery V4.1.3.455
14. RAR Password Cracker 4.12
15. SeePassword v2.05
16. Ultimate ZIP Cracker v7.3.1.5
17. Visual Zip Password Recovery v6.0
18. ZIP Password Finder v1
Download:
CODE
http://rapidshare.com/files/17752635/mrW.TuX.PassAIO.rar.html
39> RapidShare Database Searcher
Do you want to search rapidshare? Try this tool...
Info:
Welcome to the world's largest file search engine!
If you have ever searched for, sent or received any files online, you've probably heard of RapidShare - the world's premium site for uploading files. Literally millions of files are uploaded to RapidShare every day; from photos and movies, to music albums, to software packages. But there is only one one problem... RapidShare doesn't allow you to search their files. So if you are looking for something specific, you don't know where to go.
And here's our solution!
We have built a sophisticated software that locates RapidShare file links on the Web and allows you to search for them. Your only task is to enter your keywords, such as movie title, actress name, song or album title, and so on. Our software will browse through the Web looking for RapidShare links with your keywords in the title or description, and will present you a comprehensive list with results.
The whole RapidShare world - at your fingertips...
Our software allows you to search the 3.5 Petabytes (yes, that's 3,500,000,000,000,000 bytes!) of files that are stored on RapidShare servers. From now on, whatever file you want to find, you'll get it there.
CODE
http://rapidshare.com/files/83441695/Database-Searcher.rar
40> Virus Maker Tool
USE IT ON YOUR OWN RISK
Education Purpose Only
Download:
CODE
http://rapidshare.com/files/92232964/VB_ViMaker32_RC_03.rar
Password
QUOTE
Password: HANYA UNTUK PENDIDIKAN
41>Turkojan 4.0
Turkojan is a remote administration and spying tool for Microsoft Windows operating systems.
You can use Turkojan for manage computers,employee monitoring and child monitoring...
http://www.turkojan.com/sayac/click.php?id=10
42> Ardamax Keylogger VERSION 2.85
Ardamax Keylogger - invisible keystroke recorder with remote installation. Ardamax Keylogger is a keystroke recorder that captures user's activity and saves it to an encrypted log file. The log file can be viewed with the powerful Log Viewer. Use this tool to find out what is happening on your computer while you are away, maintain a backup of your typed data automatically or use it to monitor your kids. Also you can use it as a monitoring device for detecting unauthorised access. Logs can be automatically sent to your e-mail address, access to the keylogger is password protected. Besides, Ardamax Keylogger logs information about the Internet addresses the user has visited
CODE
http://rapidshare.com/files/70256706/ardamax.rar
43>Reh Team Keylogger v1.0 -95%UD
Virus Scan Result
CODE
McAfee ----->>> VB-BackDoor.a.gen
http://www.virustotal.com/ro/analisis/e5e985a78b92ead61e9845c861a81f70#
CODE
http://rapidshare.com/files/108559933/Reh_Team_Keylogger_v1.0.rar
44>Rapidshare Password Steal0r
Download:
CODE
http://rapidshare.com/files/114771308/Rapidshare_Password_Steal0r.rar
45>Trojan Remover!!
Trojan Remover aids in the removal of Malware - Trojan Horses, Worms, Adware, Spyware - when standard anti-virus software either fails to detect them or fails to effectively eliminate them. Standard antivirus programs are good at detecting this Malware, but not always so good at effectively removing it.
Trojan Remover is designed specifically to disable/remove Malware without the user having to manually edit system files or the Registry. The program also removes the additional system modifications some Malware carries out which are ignored by standard antivirus and trojan scanners.
http://rapidshare.com/files/109957631/Trojan_Remover_v6.6.9_Build_2525.rar
46>Certified Ethical Hacker Exam Preparation (FULL PACKAGE)
Specialized Solutions EC-Council Training Videos
The Certified Ethical Hacker Training Solution from Specialized Solutions explores the existence and the use of hacking tools and security systems across 21 topical domains. Within each domain, students are presented with several tools that a hacker can use, and which countermeasures are most effective against their use.
Quote:
DISK 1:
http://rapidshare.com/files/51554963...isk1.part1.rarhttp://rapidshare.com/files/51554967...isk1.part2.rar
DISK 2:
http://rapidshare.com/files/51554937...isk2.part1.rarhttp://rapidshare.com/files/51554940...isk2.part2.rar
DISK 3:
http://rapidshare.com/files/51554953...sk3.part01.rarhttp://rapidshare.com/files/51554983...sk3.part02.rarhttp://rapidshare.com/files/51554958...sk3.part03.rar
DISK 4:
http://rapidshare.com/files/51554994...isk4.part1.rarhttp://rapidshare.com/files/51554942...isk4.part2.rar
DISK 5:
http://rapidshare.com/files/51554977...isk5.part1.rarhttp://rapidshare.com/files/51554918...isk5.part2.rar
DISK 6:
http://rapidshare.com/files/51554992...isk6.part1.rarhttp://rapidshare.com/files/51554915...isk6.part2.rar
DISK 7:
http://rapidshare.com/files/51554960...isk7.part1.rarhttp://rapidshare.com/files/51554966...isk7.part2.rar
DISK 8:
http://rapidshare.com/files/51554979...isk8.part1.rarhttp://rapidshare.com/files/51554955...isk8.part2.rar
DISK 9:
http://rapidshare.com/files/51554984...isk9.part1.rarhttp://rapidshare.com/files/51554923...isk9.part2.rar
47> ( E )xploiter
downloadhttp://www.2shared.com/file/3230799/..._XPLOITER.html
Ocx Are Here...
http://www.2shared.com/file/2866856/600806d7/DzOCXShop.html
48> Evil MSN 3.0
PHP Code:
http://www.uploadfile.org./download.php?id=yyP9bifM9hbiSYyXICU7
49> Firewall Killer
http://rapidshare.com/files/10256957...iller.rar.htmlhttp://www.2shared.com/file/3068536/...allkiller.htmlhttp://www.snapdrive.net/qs/4a928186457f
http://www.turboupload.com/download/QyZymwGIp9sz/firewallkiller.rar
50> LAN Attacker
Killing any Computer Pc connection in Your Local Area Network with LanAttacker without a Admin know what happen and other many usefull tools inside it
http://rapidshare.com/files/124404683/LanAttacker.rar
51> Live CD for Wireless Hacking, Used by the FBI
WEP is an encryption scheme, based on the RC-4 cipher, that is available on all 802.11a, b and g wireless products. WEP uses a set of bits called a key to scramble information in the data frames as it leaves the access point or client adapter and the scrambled message is then decrypted by the receiver.
auditor-200605-02-no-ipw2100.iso
This version is for systems with the Intel B/G wireless cards (IPW2200) only. All other system should take the version below.
The md5sum of auditor-200605-02-no-ipw2100.iso is "70a5f3e47c191c055366b3b0a3fa2c90
Code:
http://ftp.rz.tu-braunschweig.de/pub/mirror/auditor/auditor-200605-02-no-ipw2100.iso
ftp://ftp.rz.tu-braunschweig.de/pub/mirror/auditor/auditor-200605-02-no-ipw2100.isohttp://mirror.switch.ch/ftp/mirror/auditor/auditor-200605-02-no-ipw2100.iso
ftp://mirror.switch.ch/mirror/auditor/auditor-200605-02-no-ipw2100.iso
\auditor-200605-02-ipw2100.iso
This version is for all systems except systems with the Intel B/G wireless cards (IPW2200).
The md5sum of auditor-200605-02-ipw2100.iso is "cdec4b975c1001ddc127a16a32ed1dd7"
Code:
http://ftp.rz.tu-braunschweig.de/pub/mirror/auditor/auditor-200605-02-ipw2100.iso
ftp://ftp.rz.tu-braunschweig.de/pub/mirror/auditor/auditor-200605-02-ipw2100.iso
http://mirror.switch.ch/ftp/mirror/auditor/auditor-200605-02-ipw2100.iso
ftp://mirror.switch.ch/mirror/auditor/auditor-200605-02-ipw2100.iso
52> MSN Messenger and Hotmail accounts cracker
http://rapidshare.com/files/67541185/MSN_Messenger_Account_Cracker_v2.zip
53> PRIAMOS - powerful SQL Injector & Scanner
You can search SQL Injection vulnerabilities and inject vulnerable string to get all Databases,
Tables and Column datas with injector module.
PRIAMOS is a powerful SQL Injector & Scanner, it allows you to search for SQL Injection vulnerabilities and execute the code injection using vulnerable strings to get all possible Databases, Table and Column data with the PRIAMOS SQL Injection Module.
You can view a demonstration via video here:
http://www.priamos-project.com/demo.htm
Download Here....:-
http://www.priamos-project.com/files/PRIAMOS.v1.0.zip
54> Rocket Port Scanner
http://www.2shared.com/file/3436253/4a03331/RocketPortScanner.html
55>Trojan New 2008 H-Ps Ver:1.0
http://www.2shared.com/file/3329138/bf68fa38/H-PS.html
Password: www.top4u.blogfa.com
56> UltraSurf v8.8 0 - Bypass All Internet Blocking Systems
If you are using browsers other than IE, You have to manually change the proxy settings .
Proxy settings as follows..
HTTP Proxy : 127.0.0.1 Port : 9666
LINK back .
Quote:
http://rapidshare.com/files/94646323...cking.2008.rar
57> xHacker Pro 3.0 -LEAKED- 100% Undetectable
Exterminator: That is a completely new way to totally STOP or UNINSTALL any antivirus or firewall software. Exterminator lets you do the same actions that the uninstaller do. Exterminator currently supports: Disable, Stop, Uninstall services, Terminate Process, Close Window, Delete File, Shell program, extract and run registry entry. Exterminator is a total solution, it currently supports McAfee 2007 and Norton 2006. But you can make your own Exterminator Actions File (XAF) and save them to use anytime, you can even bind XAF files to make a bigger one with support for more AVs and FWs. Exterminator is a really revolution in AV and FW killing methods.
Download :
http://www.zshare.net/download/3998782aaf20f8
url:http://sanjaypatel.weebly.com/hacking-tools.html
1> Hacker's Tool Set (45 Hacking Tools)
* IMC Grahams Trojan
* IMC Ice Dragon
* Myspace Password Cracker
* IMC Myspace Phisher
* Ultra Surf
* Rapid Share Account Gen
* MSN Nudge Madness
* Ice Reloaded MSN Freezer
* IMC Handbook
* BrutusAE2
* Lord PS
* Hoax Toolbox
* IMC Word List
* Blues Port Scanner
* Bandook RAT v1.35
* Project Satan 2.0
* EES binder v1.0
* File Injector v3
* Remote Desktop Spy v4.0
* Passive Terror v1.3 Final Edition
* Dyn-DL (Dynamic downloader)
* Silent Assassin v2.0
* Net Scan Tools v4.2
* Rocket v1.0
* NStealth HTTP Security Scanner v5.8
* Attack Toolkit v4.1 & source code included
* Legion NetBios Scanner v2.1
* Battle Pong
* TeraBIT Virus Maker v2.8
* p0kes WormGen 2.0
* JPS Virus Maker
* IRC Ban Protection
* IRC Mega Flooder
* FTP Brute Hacker
* RAR Password Cracker
* Vbulletin 3.6.5 Sql Injection Exploit
* IPB 2-2.1.5 Sql Injection Exploit
* IPB 2-2.1.7 Exploit
* Cain & Abel v4.9.3
* NetStumbler 0.4.0
* Cryptor 1.2
* VNC Crack
* Mutilate File Wiper 2.92
* Hamachi 0.9.9.9
* pbnj-1.0
Download:
http://rapidshare.com/files/34738681/IMC_Tool_Set.zip.html
2> password cracker 2008, AMAZING
http://rapidshare.com/files/107921330/Passwordcracker_2008.rar
3> Google Hacking Tools + Ebooks
http://www.megaupload.com/?d=JAB5QMVW
or
http://rapidshare.com/files/76347010/Googl...ls___Ebooks.zip
4> Rapidshare Toolkit New [2007]
Bypass 1 hour LImit
Credit card generator 2007 NEW
Grabber 1.4.7 C
no. 1 proxy
Rapiddown 5.9 SE Cracked NEW
RApidshare Downloder ( Download as premium)
Rapidshare Premium Accounts NEW
Rapidshare.com Hack (unlimited Downloads).
And Much more
CODE
Download Link :
http://www.orbitfiles.com/download/id1932215772.html
5> web hacking tools
Very RARE to get these...grab it..
Apache Hacking TooLz Directory:
Apache Chunked Scanner
Apache Hacker Tool v 2.0
Apache H4x0r Script
Remote File Inclusion And Remote Command Execution Directory :
IIS 5 Dav Scanner & Exploiter
PHP Attacker
PHP Injection Scanner & Exploiter
XML-RPC Scanner & Exploiter
Databases & SQL Injection & XSS TooLz Directory
Casi 4.0
ForceSQL
Mssql BruteForce TooL
SQL Ping 2
SQL Recon
SQL Vuln Scanner
SQL & XSS TooL
PHP Shells
**** v2.0
c99shell #16
Backdoor php v0.1
r57shell
ajan
casus15
cmd (asp)
CyberEye (asp)
CyberSpy5 (asp)
Indexer (asp)
Ntdaddy (asp)
News Remote PHP Shell Injection
PHP Shell
phpRemoteView
nstview php shell
CODE
Download:http://rapidshare.com/files/2447667/WebHacking_TooLz.rar
6> MorTal_TeaM_Yahoo_Virus_Psw
THIS IS TROJAN PROGRAM.. USE UR OWN RISK..
Server copy: C:\WINDOWS\system32\Svchost32.exe
Trojan Name: MorTal TeaM Yahoo Virus Psw
Port: 8888
Server size:116 KB
Client Size:276 KB
Coded In : Visual Basic
Author:E.M.I.N.E.M
http://rapidshare.com/files/74520088/MorTal_TeaM_Yahoo_Virus_Psw.rar
Send the server.exe file tour VICTIM and when he OPENS it in HIS PC u can control his PC wid the client.exe file
But first u have to connect to the VICTIM BY by ENtering IP address
7> Dem0nyc Trojan v1.1 96% UD
Download
http://www.2shared.com/file/3233025/4081c782/Dem0nyc_Trojan_by_Nytro.html
is missing an ocx file which should be kept at the extracted file and I have uploaded it to the following link:
http://www.fileflyer.com/view/GvrZ3BA
8> Core Impact 4.0!! (LEAKED!!) -- $2450 Program
This RAR has no password and comes with the General License Key..
IF the key does not work then change your computer date back to the year 2004 and you shall have working Core Impact 4.0!
Description
CORE IMPACT enables you to see your network from an attacker’s viewpoint by replicating real-world, remote and local attacks that …
* test servers and workstations for OS and services vulnerabilities
* gauge the effectiveness of IPS, IDS and other perimeter defenses
* validate vulnerability scanner results to distinguish real threats from false positives
Download
http://rapidshare.com/files/65488716/coreimpactv4.rar
ATTENSION :
DO NOT APPLY THE CRACK PROVIDED IN THE ARCHIVE.
Just change the system date to dd/September/2004
where dd is any date between 1-31...
9> LAN Atacker
http://rapidshare.com/files/124404683/LanAttacker.rar
10>Web cracker 2.0
Code:
WHAT IS WEB CRACKER? This program exploits a rather large hole in web site authentication methods. Password protected websites can be easily brute-force hacked, because there is no set limit on the number of time an incorrect password or User ID can be tried. Web Cracker was designed for Web Masters to test the vulnerability of their own sites. It SHOULD NOT be used by unauthorized persons to hack into web sites. Such use is ILLEGAL and could have SEVERE PENALTIES. Neither myself nor anyone involved with the development of Web Cracker will be liable for the misuse of this program. Use Web Cracker ONLY at your own risk, ONLY for lawful purposes, and ONLY on your own web site.
http://rapidshare.com/files/106919934/WC.rar
11> MSN Messenger and Hotmail accounts cracker
http://rs4.rapidshare.com/files/67541185/MSN_Messenger_Account_Cracker_v2.zip
12>GFI LANguard N.S.S. 8.0
scans your entire network, IP by IP, and provides information such as service pack level of the machine, missing security patches, open shares, open ports, services/applications active on the computer, key registry entries, weak passwords, users and groups, and more. Scan results are outputted to an HTML report, which can be customized/queried, enabling you to proactively secure your network - for example by shutting down unnecessary ports, closing shares, installing service packs and hotfixes, etc.
Download:
http://rapidshare.com/files/116914839/GFI_LANguard_Network_Security_Scanner__N.S.S.__8.0 _Build_20080326.rar
Password:
warezscene.org
13>Messenger Detect v2.75
Monitor and record all MSN chats, AOL (AIM) chat, Yahoo chat, and ICQ chat on your Local network automatically and secretly! It's the one for ALL!
Download:
http://rapidshare.com/files/123931045/MD275.www.sxforum.org.rar
Password:
www.sxforum.org
14> Google Hack v1.6
Important : Google is a pretty powerful search tool. You knew that. You can use it to find information, but you can also use it to find downloadable MP3s, books, videos, and other items. We're going to assume you're just looking for legally available downloads, but the truth of the matter is if someone's posted an MP3 (copyrighted or not) to their web page, Google can find it.
But who has the time to memorize all the search modifiers like "-inurlhtm|html|php) intitle:"index of" +"last modified" +"parent directory" +description +size +(.mp3|.wma|.ogg) ?" That's where Google Hacks comes in. This handy little app will let you search for dozens of file types, song lyrics, cached pages, fonts, and other little goodies hanging out on the web.
http://rapidshare.com/files/131123095/Google_Hack_v1.6.rar
15>Server Flooder
http://rs247.rapidshare.com/files/121345975/Ventrilo_Flooder.zip
16>Turkojan Crypter Free 90% [UD]
http://rapidshare.com/files/130682530/Turkojan_Crypter.rar.html
17>Rapidshare Solution Hack 2008 Edition
Rapidshare And Megaupload Search Plugin Maker
Rapidshare Anti Leech Decrypter 4.0
Rapidmule Rapidshare Downloader
BrutalDown Rapidshare Tips And Hints
Rapidshare/Megaupload Speeder
Rapidshare-The Way You Like It
Rapidshare Account Generator
Rapidshare Leeching
Unlimited Rapidshare With IE
Premium Account Checker
Rapidshare Links Decoder
Renew IP - Gigaset SE105
Rapidshare Time Resetter
RapidLeecher v4.5 Beta
Mac Rapid1.6a Beta11
Premium Accounts 115
RapidLeecher v4.4.87
Rapidshare Checker
Briefcase Leecha 1.83
Rapidshare Decoder
USDownloader 1.3.3
Get Rapidshare 6.0
Rapget v0.96 Beta
The Grabber v1.4.1
Link Grabber v3.1.4
MegaLeecher 1.0.4
Rapidget v1.0
RapidUp v1.1
Download:
http://rapidshare.com/files/74792915/RTools_2008.rar
18>AIO Wireless Hack Toolz
Includes::.
√ NetStumbler-0.4.0 : wireless access point identifier - listens for SSIDs and sends beacons as probes searching for access points.
√ Kismet-2005-08-R: wireless sniffer and monitor - passively monitors wireless traffic and sorts data to identify SSIDs, MAC addresses, channels and connection speeds.
√ Wellenreiter-v1.9: WLAN discovery tool - uses brute force to identify low traffic access points; hides your real MAC address; integrates with GPS.
√ WEPcrack 0.1.0: Unix based-pearl aplication encryption breaker - cracks 802.11 WEP encryption keys using the latest discovered weakness of RC4 key scheduling.
√ Airsnort-0.2.7e: encryption breaker - passively monitoring transmissions, computing the encryption key when enough packets have been gathered.
√ Wepwedgie-0.1.0-alpha: for toolkit that determines 802.11 WEP keystreams and injects traffic with known keystreams in order to crack WEP in minutes.
√ Hotspotter-0.4: Wireless client attacking t??l.
Most programs are open source, and very useful if you know what your doing.
Note:some of these programs render.useless
links to how to install are provided in the package, as there is support for windows there as well.
Download:
http://rapidshare.com/files/115666892/aioWHT.rar
19> Astalavista Security Toolbox DVD 2008 v5.0 | 3 GB
Astalavista’s Security Toolbox DVD is considered to be the largest and most comprehensive Information Security archive. As always we are committed to provide you with a resource for all of your security and hacking interests, in an interactive way! The Information found on the Security Toolbox DVD has been carefully selected, so that you will only browse through quality information and tools. No matter if you are a computer enthusiast, a computer geek, a newbie looking for information on “how to hack”, or an IT Security professional looking for quality and up to date information for offline use or just for convenience, we are sure that you will be satisfied, even delighted by the DVD!
Download:
http://www.filefactory.com/file/ed294c/n/AST_v5_0_pm_part01_rar
http://www.filefactory.com/file/8c1e13/n/AST_v5_0_pm_part02_rar
http://www.filefactory.com/file/77f53b/n/AST_v5_0_pm_part03_rar
http://www.filefactory.com/file/da23fd/n/AST_v5_0_pm_part04_rar
http://www.filefactory.com/file/68629d/n/AST_v5_0_pm_part05_rar
http://www.filefactory.com/file/9d8622/n/AST_v5_0_pm_part06_rar
http://www.filefactory.com/file/db3039/n/AST_v5_0_pm_part07_rar
http://www.filefactory.com/file/324b33/n/AST_v5_0_pm_part08_rar
http://www.filefactory.com/file/75cfc7/n/AST_v5_0_pm_part09_rar
http://www.filefactory.com/file/b7715f/n/AST_v5_0_pm_part10_rar
http://www.filefactory.com/file/a58c41/n/AST_v5_0_pm_part11_rar
http://www.filefactory.com/file/851c70/n/AST_v5_0_pm_part12_rar
http://www.filefactory.com/file/86ec66/n/AST_v5_0_pm_part13_rar
http://www.filefactory.com/file/9b5446/n/AST_v5_0_pm_part14_rar
http://www.filefactory.com/file/e5f7d8/n/AST_v5_0_pm_part15_rar
http://www.filefactory.com/file/83057d/n/AST_v5_0_pm_part16_rar
http://www.filefactory.com/file/df6441/n/AST_v5_0_pm_part17_rar
http://www.filefactory.com/file/eddf58/n/AST_v5_0_pm_part18_rar
http://www.filefactory.com/file/d19bad/n/AST_v5_0_pm_part19_rar
http://www.filefactory.com/file/ff101a/n/AST_v5_0_pm_part20_rar
http://www.filefactory.com/file/c0ec33/n/AST_v5_0_pm_part21_rar
http://www.filefactory.com/file/0356eb/n/AST_v5_0_pm_part22_rar
http://www.filefactory.com/file/3bd2a1/n/AST_v5_0_pm_part23_rar
http://www.filefactory.com/file/d5d3fe/n/AST_v5_0_pm_part24_rar
http://www.filefactory.com/file/bc1fe0/n/AST_v5_0_pm_part25_rar
http://www.filefactory.com/file/8ee799/n/AST_v5_0_pm_part26_rar
http://www.filefactory.com/file/1a6073/n/AST_v5_0_pm_part27_rar
http://www.filefactory.com/file/ba43fb/n/AST_v5_0_pm_part28_rar
http://www.filefactory.com/file/6fe0d2/n/AST_v5_0_pm_part29_rar
http://www.filefactory.com/file/bbbb26/n/AST_v5_0_pm_part30_rar
Password: www.ddlarea.com
20> Cain and Abel
The following appendices work to support these endeavors with the Cain and Abel application. Current versions of this application can be located at the author’s site at
CODE
www.oxid.it.
What you will need:
1. current version of Cain from
www.oxid.it
2. Windows 2000 or Windows XPSP1 configured workstation
Getting started:
Cain is an easy application to install and configure. However, there are several powerful tools that should only be configured after you fully understand both the capabilities and consequences to the application and the target network. After all, you can’t very well hack a network if you take it down. Proceed with caution.
you will need to know what you are trying to hack. This appendix assumes that you are trying to get the administrator’s username and password for the network. The focus of this appendix is on obtaining that information. The other appendices in this chapter deal with other capabilities of the application to gain access to a network. To this end we need to accomplish the following steps to get the admin account:
21> Leviathan Auditor 1.0
Leviathan is a network auditing and penetration tool which runs on and againist Microsoft machines. It dumps Users, Groups, Services, Shares, Transport devices and MAC addresses over port 139 or 445.
http://astalavista.com/media/directory/uploads/03df78ed60e9ff58d04c5403f05c01a9.zip
22> Inzider 1.2
Shows which processes listen at which ports, and can be useful for finding Back Orifice 2000 when it's hidden in another process. Before Inzider there was no other tool that could do this in Windows.
Inzider may in some cases cause Windows programs or the Windows operating system itself to crash. In rare cases this might cause permanent damage to your Windows installation.
Download Link
http://www.astalavista.com/media/directory/uploads/109b1161df18d5ff54c91dab455661d7.exe
23> Complete IIS Exploit Pack
Pack Includes
__________
Checkers
Sigle&mass Scanners
Exploits (perl,c,exe)
Tutorials and more..
DownloadLink:
http://rapidshare.com/files/107823269/h4cky0uIIS_PackedBy_ZaRoX.rar
24> Shell pack + some bonus toolz
sH3ll •••
-Antichat Shell v1.3
-Ayyildiz Tim -AYT- Shell v 2.1 Biz
-aZRaiLPhp v1.0
-c100
-CrystalShell v.1
-Cyber Shell (v 1.0)
-dC3 Security Crew Shell PRiV8
-Dive Shell 1.0 - Emperor Hacking Team
-DxShell.1.0
-ELMALISEKER Backd00r
-GFS web-shell ver 3.1.7 - PRiV8
-h4ntu shell [powered by tsoi]
-JspWebshell 1.2
-KAdot Universal Shell v0.1.6
-Liz0ziM Private Safe Mode Command Execuriton Bypass Exploit
-Macker's Private PHPShell
-Mysql interface v1.0
-MySQL Web Interface Version 0.8
-NIX REMOTE WEB-SHELL v.0.5 alpha Lite Public Version
-Perl Web Shell by RST-GHC
-Private-i3lue
-RedhatC99 [login=redhat-pass=root]
-****.v.1.0
-s72 Shell v1.1 Coding
-Safe0ver Shell -Safe Mod Bypass By Evilc0der
-Safe_Mode Bypass PHP 4.4.2 and PHP 5.1.2
-SimAttacker - Vrsion 1.0.0 - priv8 4 My friend
-SimShell 1.0 - Simorgh Security MGZ
-SnIpEr_SA Shell
-WinX Shell
-Worse Linux Shell
••• Vuln Scan •••
-GoogleRFI + MassInjector in Perl
-MaD-CW XSS & Remote File Inclusion Scanner [Win]
-PerlGroup Scanner RFI
-REMOTE FILE INCLUDE SCANNER SHELLBOT
-RFI Scan created by Ironfist
-Scanutil 1.1 by ToRNadO
-Shellbot with VulnScan m0d by AdvAnCeD
-RFI-SQL scanner
-VulnScan v6 + Spread + Defacing Tool v2
-VulnScan v7 -Final- By k1n9k0ng
-VulnScan v8 by PcW0rm [iTA by s[H]4g]
-VulnScan v9
-XeviL Perl Script 1.0 By ar3s
••• Oth3r t00lz •••
-BUNNY BOT Version 0.1
-ConnectBack Backdoor Shell vs 1.0 by LorD
-Flud2Mail (F2M) 0.1
-FTp brute forcer
-iMHaBiRLiGi PhpFtp V1.1
-LocalLinuxExploitFinder
-Mass Defacer And Log Eraser PRiV8
-Multi-thread FTP scanner v0.2.5 by Inode
-NetGaurd FTP Brute Force
-PHProxy
-RST MySQL tools
-scan - K. Script v0.3 Beta By DiVaBoY
-Simple FTP brute by ReZEN
-S l a v e Z e r o IRC B0t
-Stealth ShellBot Vers 0.2 by Thiago X
-inDEXER And ReaDer
CODE
http://rapidshare.com/files/23510214/Shell_s.rar.html
25>Windows Hacking Toolkit 2008
Windows Haking Tools software is specifically designed for Windows system. Information Security and Ehical Hacking course from Appin Knowledge Solutions is the first step to take for all aspiring Information Security professionals.
Here are some key features of “Information Security and Ethical Hacking Course”:
· Pioneer product in information Security and Ethical Hacking
· Presentations ranging from Introduction to Information Security and Ethical Hacking to Computer Forensics
· Interactive Live Information Security Videos
· Security and Ethical Hacking tools to provide hands on Practice
· Live simulation games to test the skills learned in a real life environment
· The course includes the latest Hacking attempts expected in the year 2006 to past case studies on intrusions done in the past
· More than 40 Security Videos and Demonstrations.
· Live Security / Hacking tools
· Simulation Security games.
· Understand the Windows operating System from Security Perspective.
· Tools to protect your self from Virus, Trojans, worms and other Hack attacks.
· Tools and firewalls to protect your computer and Network from Spy-wares.
· Methods and technology to secure your Internet
· Ways to trace forged emails
· Teaches you how to secure your e-mails
· Faculty with more than 20 years of experience at the core of the course
CODE
http://rapidshare.com/files/108300670/WindowsHackingTools.rar
26>Goolag Scanner
Goolag is a new hacking tool created by legendary hacker group"Cult of the Dead Cow" this tool is freeware and also open source, hacker can take action with this tool easily by using GOOGLE
http://tiny.hackgyan.net/goolag
27>Bypass ur internet provider monthly bandwith
Cable_Modem_Modification_Kit_V8.1
Cable Modem Hacking Guide With Pictures
CODE
http://rapidshare.com/files/91661160/Cable_Modem_Modification_Kit_V8.1.part07.rar
http://rapidshare.com/files/91659587/Cable_Modem_Modification_Kit_V8.1.part14.rar
http://rapidshare.com/files/91659569/Cable_Modem_Modification_Kit_V8.1.part12.rar
http://rapidshare.com/files/91659566/Cable_Modem_Modification_Kit_V8.1.part08.rar
http://rapidshare.com/files/91659564/Cable_Modem_Modification_Kit_V8.1.part17.rar
http://rapidshare.com/files/91659559/Cable_Modem_Modification_Kit_V8.1.part15.rar
http://rapidshare.com/files/91659555/Cable_Modem_Modification_Kit_V8.1.part06.rar
http://rapidshare.com/files/91659542/Cable_Modem_Modification_Kit_V8.1.part18.rar
http://rapidshare.com/files/91659538/Cable_Modem_Modification_Kit_V8.1.part02.rar
http://rapidshare.com/files/91659537/Cable_Modem_Modification_Kit_V8.1.part05.rar
http://rapidshare.com/files/91659523/Cable_Modem_Modification_Kit_V8.1.part04.rar
http://rapidshare.com/files/91659522/Cable_Modem_Modification_Kit_V8.1.part16.rar
http://rapidshare.com/files/91659516/Cable_Modem_Modification_Kit_V8.1.part09.rar
http://rapidshare.com/files/91659498/Cable_Modem_Modification_Kit_V8.1.part11.rar
http://rapidshare.com/files/91659491/Cable_Modem_Modification_Kit_V8.1.part10.rar
http://rapidshare.com/files/91659489/Cable_Modem_Modification_Kit_V8.1.part13.rar
http://rapidshare.com/files/91659486/Cable_Modem_Modification_Kit_V8.1.part03.rar
http://rapidshare.com/files/91659482/Cable_Modem_Modification_Kit_V8.1.part01.rar
Pass: rapidworld.i67.org
28> Ultra Hacker toolkit AIO
Wide useful collection of tools.
CODE
http://www.sendspace.com/file/fk433s
29>007 Spy Software v3.874
007 Spy Software is a stealthy computer monitoring software which allows you to secretly record all activities of computer users and automatically deliver logs to you via Email or FTP, including all areas of the system such as email sent, Web sites visited, every keystroke (including login/password of ICQ, MSN, AOL, AIM, and Yahoo Messenger or Webmail), file operations, online chat conversation, and take screen snapshot at set intervals just like a surveillance camera directly point at the computer monitor.
Distinct from ALL other spy products on the Internet, 007 can directly send logs to your email box without tweaking and tweaking the annoying SMTP configuration, even your own SMTP server is NOT required at all! Other great features include password protection, suspend on idle, monitoring schedule, HTML report, logs sorting and searching, as well as a solid stealth technology that prevents virus scanners and spyware detectors from detecting/disabling it. With this amazing spy tool you will be able to see exactly what people have been doing online and off-line just like you are looking at the computer monitor over their shoulders! Strongly Recommended!
CODE
http://rapidshare.com/files/59240619/007.Spy.Software.rar
30>Paros Proxy
A Java based web proxy for assessing web application vulnerability. It supports editing/viewing HTTP/HTTPS messages on-the-fly to change items such as cookies and form fields. It includes a web traffic recorder, web spider, hash calculator, and a scanner for testing common web application attacks such as SQL injection and cross-site scripting.
http://astalavista.com/media/directory/uploads/cf13699f2c667dd09e1fd86aa7306687.exe
31>Cool Injection Tools Pack
prjSiteHack.exe
Microsoft JET Database Engine error(Shop 1).exe
Microsoft OLE DB Provider for SQL Server error(Shop 2).exe
Microsoft OLE DB Provider for ODBC Drivers error(Shop 3).exe
Microsoft .NET Framework 2.0.exe
MozillaControl1.7.12.exe
Attacker.exe
autolink.exe
CheckCC.exe
checksql.exe
CVV2 Retriever.exe
ExploitSQL.exe
getLink.exe
GURLE.exe
JoinQuery.exe
Hack SQL 1.exe
Hack SQL 2.exe
VH@ Hacker Tools(Beta)
AKD- SQL INJECTION V2.5.exe
CC2Bank 1.3
Download:
CODE
http://rapidshare.com/files/105821816/Tool_Hack_Collection_2.0.exe
32>Firefox Add-Ons
1.Dark Firefox Theme
There are a few dark Firefox themes available but the one I've been using lately is NASA Night Launch.
You can install the theme from here :
CODE
https://addons.mozilla.org/en-US/firefox/addon/4908
Note: This is really awesome but only for the dark color lovers
---------------------------------------------------
2.FireBug - Website debugging tool
Firebug integrates with Firefox to put a wealth of development tools at your fingertips while you browse. You can edit,
debug, and monitor CSS, HTML, and JavaScript live in any web page...
CODE
https://addons.mozilla.org/en-US/firefox/addon/1843
--------------------------------------------------------
3.Ad N Edit Cookies - Cookie editor
Cookie Editor that allows you add and edit ession and saved...
CODE
https://addons.mozilla.org/en-US/firefox/addon/573
--------------------------------------------------------------
4.HackBar - Penetration testing tool
Simple security audit / Penetration test tool.
CODE
https://addons.mozilla.org/en-US/firefox/addon/3899
--------------------------------------------------------------
5.TorButton - Proxy button
Torbutton provides a button to securely and easily enable or disable the browser's use of Tor. It is currently the only addon
that will safely manage your Tor browsing to prevent IP address leakage, cookie leakage, and general privacy attacks.
CODE
https://addons.mozilla.org/en-US/firefox/addon/2275
------------------------------------------------------------------------
6.FoxyProxy - Proxy manager
FoxyProxy is an advanced proxy management tool that completely replaces Firefox's limited proxying capabilities. It offers
more features than SwitchProxy, ProxyButton, QuickProxy, xyzproxy, ProxyTex, TorButton, etc.
CODE
https://addons.mozilla.org/en-US/firefox/addon/2464
-----------------------------------------------------------------
7.Server Spy - Server software viewer
Server Spy indicates what brand of HTTP server (e.g. Apache, IIS, etc.) runs on the visited sites.
CODE
https://addons.mozilla.org/en-US/firefox/addon/2036
-------------------------------------------------------------------------
8.FlagFox - Website Information
Displays a country flag in the status bar depicting the location of the current website's server, and provides quick access
to detailed location and webserver information.
CODE
https://addons.mozilla.org/en-US/firefox/addon/5791
-----------------------------------------------------------------
9.Refspoof - Spoofing bar (not for FF3)
CODE
http://downloads.mozdev.org/refspoof/
-----------------------------------------------------------------
10. XSS-Me - XSS auditing plugin
CODE
http://www.securitycompass.com/exploit_me/xssme/xssme-0.2.1.xpi
=======================================================
11. SQL Inject-Me - SQL auditing plugin
CODE
http://www.securitycompass.com/exploit_me/sqlime/sqlime-0.2.xpi
=======================================================
12. Access-Me - Test for Access vulnerabilities
CODE
http://www.securitycompass.com/exploit_me/accessme/accessme-0.1.xpi
=======================================================
13. Hostipfox - show the site IP
CODE
http://www.hostip.info/firefox/hostipfox-0.4.3.5.xp
=======================================================
14. Leet Key - 1337 translator
CODE
https://addons.mozilla.org/en-US/firefox/addon/770
=======================================================
15. InfoRSS - 1337 RSS and ATOM reader
CODE
http://inforss.mozdev.org/installation.html
======================================================
16. Web Developer - Website development tools
Adds a menu and a toolbar with various web developer tools.
CODE
https://addons.mozilla.org/en-US/firefox/addon/60
33>Bios Utilities All-In-One
Contains:
01: Bios Agent v3.45
02: Magic Bios v2.0
03: BIOS Patcher v4.00 RC 7.1
04: Bios v1.35.1
05: BIOS Information Tool v1.1
06: CmosPwd v4.6
07: E-book: The BIOS Companiont
BIOS Patcher v4.00 RC 7.1
BIOS Patcher can find and fix errors in your system BIOS (only AWARD BIOS for now) and also it can add or open new features, i.e. some features that your BIOS has but they are closed by manufacturer of your motherboard. It scans rom file. If it finds any known errors it fixes the errors. If it finds any closed features it opens it.
Link:-
CODE
http://rapidshare.com/files/113739847/Bios_Utilities_All-In-One.rar
34>٠•All in one Fake Pages•٠·
Check out my collection of fake pages.. Just upload it on free hosting..
Included fake pages:
>AIM
>Ebay
>Gmail
>Hi5
>Hotmail
>My space
>Paypal
>Photobucket
>Rapidshare.com
>Runespace
>Yahoo!
CODE
http://rapidshare.com/files/107360228/fakes_.rar
35>BestCrypt 8.04.4
BestCrypt data encryption systems bring military strength encryption to the ordinary computer user without the complexities normally associated with strong data encryption.
BestCrypt creates and supports encrypted virtual disks and these disks are visible as regular disks with correspondent drive letters. The data stored on a BestCrypt disk is stored in the container file. A container is a file, so it is possible to backup a container, move or copy it to other disk (CD-ROM or network, for instance) and continue to access your encrypted data using BestCrypt.
CODE
http://astalavista.com/media/directory/upl...a593b7220a2.exe
36>Small Spamming Mail List
CODE
amalie@fampedersen.net
arishtfabrics@gmail.com
beccy@spanteladsl.net
bjarne@fampedersen.net
bjarnep@gmail.com
chanmo509@peoplepc.com
convallestefano@hotmail.com
convallestefano@liberamente.net
convallestefano@tin.it
convallestefano@tiscali.it
dieycari0812@verizon.net
enw@pmskenya.com
fantacalcio@email.it
fantacalciop.a.@katamail.com
fwyss@imocom.com.mx
g.s.ricciano@katamail.com
gian_dim@otenet.gr
homesales@spanteladsl.net
ignaciod@pvre.com
imocom@prodigy.net.mx
info@pvre.com
info@sanxoaquin.com
isaac@pvre.com
jan.arild.risan@nktv.no
jl@dabox.de
jtrume@dimaquin.com
jtrume@envapac.com.mx
jtrume@gmail.com
jtrume@hotmail.com
jtrume1@prodigy.net.mx
juancarlos@trujillomeza.com.mx
karina@fampedersen.net
kbr@imocom.com.mx
krille_ahlgren@telia.com
lenka-lapa@ya.ru
lesley@microsoft.com
lindavuxem@versatel.nl
lory__mel@hotmail.com
meister@lima-nfz.de
michael.white30@ntlworld.com
momofatt@hotmail.com
otros@imocom.com.mx
pemo@mail.dk
philpeb@columbus.rr.com
raveesh.jain@gmail.com
riccasrl@ospedaleragusa.it
rmoo4i8481@blueyonder.co.uk
robert.nadj@sbb.co.yu
ross_edwards@roadrunner.com
samirpaitod@yahoo.co.in
saqib@tsck.org.kw
sara@fampedersen.net
sbergm@dean.no
sebelius@mail.dk
snej1973@freenet.de
sousa162@sapo.pt
steconval@virgilio.it
t_hrysicos@exemail.com.au
tbgibbs@amerion.com
tgalvan@tampabay.rr.com
tgibbs@amerion.com
transcribe@alphabtech.com
tripodman@spanteladsl.net
tripodman@terra.es
unirea@katamail.com
uxem0001@zonnet.nl
ventas@sistemaspymes.com
virlogeux.jc@9online.fr
vmtm@imocom.com.mx
woelki-oliver@t-online.de
37>Nuclear RAT 2.1.0
Feature highlight:
- Unicode support, you can see folders, windows, text, in any world language, that Windows can support. Tested with korean, japanese, arabian, vietnamese, chinese, portuguese, spanish, russian, and more! (Check the screenshot)
- Very fast and secure listings (for windows, file manager, network manager, etc). Navigate through the remote computer HDD like if you were opening on your local computer! Use the "Go To" commands to reach the folder you want, perfectly fast. The same applies to the registry!
- Improved keylogger, you won't have problems with double accents (~~, ´´), get a smooth result from the keylogger, and easy to read text
- Network manager allows you to browse the other computers in the same LAN (that are already authenticated), upload, download and delete files from those other computers in LAN! No need for installing a server on another PC (just to browse the LAN shares)
- Hybrid support for both direct and reverse connection modes. You can receive connections on your client at the same time you connect to direct connection servers
- Huge list of possibilities for process injection, decide where to inject your server, where to install, startup methods, and have full control over your server creation. Inject to default browser, custom windows, start any type of program, inject to winsock enabled applications, inject to all applications, etc
- Multiple transfers at once (multi-threaded) or queue transfers system.
- Very powerful plugin system, where you may add anything your mind could think of. Add netlimiters, socks, encryption, rootkits, compression, password stealers, cd key stealers, offline keyloggers, anything!
- Support for very big files, up to 5 PB
- Intrinsic help system, clicking the "?" will help you understand certain functions from the program
- Multi language support for the client, see the program on your primary language (should be available soon)
- Filemanager with Quick Edit feature: edit plain text files without having to download them and upload again! Also, there's a new "Create New File" feature, makes you able to create new files quickly, without having to upload a new file!
- All transfers have "resume" feature, even network transfers. Resume folder downloads, uploads, downloads and network uploads and downloads
- Very fast IP scanner, use the remote machine to execute IP range scans for you
- Two other new revamped features: Connection Bouncer and Remote Service Reacher. Those improved functions will help you to reach the remote computer services that doesn't allow direct connections from WAN
CODE
http://tiny.hackgyan.net/NRC
38>18 in 1 password recovery
Package Includes :
1. Accent Office Password Recovery v2.31
2. Access Password Recover v1.01
3. Access Password Recovery Genie v1.80.20051008
4. Access Password Recovery Helper v1.60
5. Active Password Changer Pro v3.0.0280
6. Adult PDF Password Recovery v2.3.0
7. Advanced Instant Messengers Password Recovery v2.80
8. Advanced Office Password Recovery Pro v3.04
9. ElcomSoft Advanced Passsword Recovery Studio 2005
(All ElcomSoft password recovery tools in one package)
*Proactive Windows Security Explorer 1.0.0.1
*Advanced ZIP Password Recovery 3.54
*Advanced RAR Password Recovery 1.51
*Advanced Archive Password Recovery 2.20
*Advanced Office Password Recovery Professional 3.02
*Advanced Office Password Breaker 1.30
*Advanced PDF Password Recovery 1.48
*Advanced PDF Password Recovery Professional 2.20
*Advanced WP Office Password Recovery 1.20
*Advanced Lotus Password Recovery 2.0
*Advanced Intuit Password Recovery 1.33
*Advanced ACT Password Recovery 1.21
*Advanced Mailbox Password Recovery 1.7.0.198
*Advanced Instant Messengers Password Recovery 2.50
*Advanced Access Password Recovery 2.5
*Advanced VBA Password Recovery Professional 1.50
*Advanced Outlook Password Recovery 1.33
*Advanced Outlook Express Password Recovery 1.20
*Advanced IE Password Recovery 1.20
*Advanced EFS Data Recovery 2.10
*Advanced Windows Password Recovery 2.9.1.224
*Advanced Disk Catalog 1.51
*Advanced eBook Inscriber 1.0.0.1
*Advanced eBook Explorer 1.1
*Advanced eBook Processor 2.2
*Advanced Registry Tracer v1.67 SR2
10. Intelore Word Password Recovery v1.0E
11. Passware Kit Enterprise v7.5
12. Password Spyer 2k v2.5
13. Proactive System Password Recovery V4.1.3.455
14. RAR Password Cracker 4.12
15. SeePassword v2.05
16. Ultimate ZIP Cracker v7.3.1.5
17. Visual Zip Password Recovery v6.0
18. ZIP Password Finder v1
Download:
CODE
http://rapidshare.com/files/17752635/mrW.TuX.PassAIO.rar.html
39> RapidShare Database Searcher
Do you want to search rapidshare? Try this tool...
Info:
Welcome to the world's largest file search engine!
If you have ever searched for, sent or received any files online, you've probably heard of RapidShare - the world's premium site for uploading files. Literally millions of files are uploaded to RapidShare every day; from photos and movies, to music albums, to software packages. But there is only one one problem... RapidShare doesn't allow you to search their files. So if you are looking for something specific, you don't know where to go.
And here's our solution!
We have built a sophisticated software that locates RapidShare file links on the Web and allows you to search for them. Your only task is to enter your keywords, such as movie title, actress name, song or album title, and so on. Our software will browse through the Web looking for RapidShare links with your keywords in the title or description, and will present you a comprehensive list with results.
The whole RapidShare world - at your fingertips...
Our software allows you to search the 3.5 Petabytes (yes, that's 3,500,000,000,000,000 bytes!) of files that are stored on RapidShare servers. From now on, whatever file you want to find, you'll get it there.
CODE
http://rapidshare.com/files/83441695/Database-Searcher.rar
40> Virus Maker Tool
USE IT ON YOUR OWN RISK
Education Purpose Only
Download:
CODE
http://rapidshare.com/files/92232964/VB_ViMaker32_RC_03.rar
Password
QUOTE
Password: HANYA UNTUK PENDIDIKAN
41>Turkojan 4.0
Turkojan is a remote administration and spying tool for Microsoft Windows operating systems.
You can use Turkojan for manage computers,employee monitoring and child monitoring...
http://www.turkojan.com/sayac/click.php?id=10
42> Ardamax Keylogger VERSION 2.85
Ardamax Keylogger - invisible keystroke recorder with remote installation. Ardamax Keylogger is a keystroke recorder that captures user's activity and saves it to an encrypted log file. The log file can be viewed with the powerful Log Viewer. Use this tool to find out what is happening on your computer while you are away, maintain a backup of your typed data automatically or use it to monitor your kids. Also you can use it as a monitoring device for detecting unauthorised access. Logs can be automatically sent to your e-mail address, access to the keylogger is password protected. Besides, Ardamax Keylogger logs information about the Internet addresses the user has visited
CODE
http://rapidshare.com/files/70256706/ardamax.rar
43>Reh Team Keylogger v1.0 -95%UD
Virus Scan Result
CODE
McAfee ----->>> VB-BackDoor.a.gen
http://www.virustotal.com/ro/analisis/e5e985a78b92ead61e9845c861a81f70#
CODE
http://rapidshare.com/files/108559933/Reh_Team_Keylogger_v1.0.rar
44>Rapidshare Password Steal0r
Download:
CODE
http://rapidshare.com/files/114771308/Rapidshare_Password_Steal0r.rar
45>Trojan Remover!!
Trojan Remover aids in the removal of Malware - Trojan Horses, Worms, Adware, Spyware - when standard anti-virus software either fails to detect them or fails to effectively eliminate them. Standard antivirus programs are good at detecting this Malware, but not always so good at effectively removing it.
Trojan Remover is designed specifically to disable/remove Malware without the user having to manually edit system files or the Registry. The program also removes the additional system modifications some Malware carries out which are ignored by standard antivirus and trojan scanners.
http://rapidshare.com/files/109957631/Trojan_Remover_v6.6.9_Build_2525.rar
46>Certified Ethical Hacker Exam Preparation (FULL PACKAGE)
Specialized Solutions EC-Council Training Videos
The Certified Ethical Hacker Training Solution from Specialized Solutions explores the existence and the use of hacking tools and security systems across 21 topical domains. Within each domain, students are presented with several tools that a hacker can use, and which countermeasures are most effective against their use.
Quote:
DISK 1:
http://rapidshare.com/files/51554963...isk1.part1.rarhttp://rapidshare.com/files/51554967...isk1.part2.rar
DISK 2:
http://rapidshare.com/files/51554937...isk2.part1.rarhttp://rapidshare.com/files/51554940...isk2.part2.rar
DISK 3:
http://rapidshare.com/files/51554953...sk3.part01.rarhttp://rapidshare.com/files/51554983...sk3.part02.rarhttp://rapidshare.com/files/51554958...sk3.part03.rar
DISK 4:
http://rapidshare.com/files/51554994...isk4.part1.rarhttp://rapidshare.com/files/51554942...isk4.part2.rar
DISK 5:
http://rapidshare.com/files/51554977...isk5.part1.rarhttp://rapidshare.com/files/51554918...isk5.part2.rar
DISK 6:
http://rapidshare.com/files/51554992...isk6.part1.rarhttp://rapidshare.com/files/51554915...isk6.part2.rar
DISK 7:
http://rapidshare.com/files/51554960...isk7.part1.rarhttp://rapidshare.com/files/51554966...isk7.part2.rar
DISK 8:
http://rapidshare.com/files/51554979...isk8.part1.rarhttp://rapidshare.com/files/51554955...isk8.part2.rar
DISK 9:
http://rapidshare.com/files/51554984...isk9.part1.rarhttp://rapidshare.com/files/51554923...isk9.part2.rar
47> ( E )xploiter
downloadhttp://www.2shared.com/file/3230799/..._XPLOITER.html
Ocx Are Here...
http://www.2shared.com/file/2866856/600806d7/DzOCXShop.html
48> Evil MSN 3.0
PHP Code:
http://www.uploadfile.org./download.php?id=yyP9bifM9hbiSYyXICU7
49> Firewall Killer
http://rapidshare.com/files/10256957...iller.rar.htmlhttp://www.2shared.com/file/3068536/...allkiller.htmlhttp://www.snapdrive.net/qs/4a928186457f
http://www.turboupload.com/download/QyZymwGIp9sz/firewallkiller.rar
50> LAN Attacker
Killing any Computer Pc connection in Your Local Area Network with LanAttacker without a Admin know what happen and other many usefull tools inside it
http://rapidshare.com/files/124404683/LanAttacker.rar
51> Live CD for Wireless Hacking, Used by the FBI
WEP is an encryption scheme, based on the RC-4 cipher, that is available on all 802.11a, b and g wireless products. WEP uses a set of bits called a key to scramble information in the data frames as it leaves the access point or client adapter and the scrambled message is then decrypted by the receiver.
auditor-200605-02-no-ipw2100.iso
This version is for systems with the Intel B/G wireless cards (IPW2200) only. All other system should take the version below.
The md5sum of auditor-200605-02-no-ipw2100.iso is "70a5f3e47c191c055366b3b0a3fa2c90
Code:
http://ftp.rz.tu-braunschweig.de/pub/mirror/auditor/auditor-200605-02-no-ipw2100.iso
ftp://ftp.rz.tu-braunschweig.de/pub/mirror/auditor/auditor-200605-02-no-ipw2100.isohttp://mirror.switch.ch/ftp/mirror/auditor/auditor-200605-02-no-ipw2100.iso
ftp://mirror.switch.ch/mirror/auditor/auditor-200605-02-no-ipw2100.iso
\auditor-200605-02-ipw2100.iso
This version is for all systems except systems with the Intel B/G wireless cards (IPW2200).
The md5sum of auditor-200605-02-ipw2100.iso is "cdec4b975c1001ddc127a16a32ed1dd7"
Code:
http://ftp.rz.tu-braunschweig.de/pub/mirror/auditor/auditor-200605-02-ipw2100.iso
ftp://ftp.rz.tu-braunschweig.de/pub/mirror/auditor/auditor-200605-02-ipw2100.iso
http://mirror.switch.ch/ftp/mirror/auditor/auditor-200605-02-ipw2100.iso
ftp://mirror.switch.ch/mirror/auditor/auditor-200605-02-ipw2100.iso
52> MSN Messenger and Hotmail accounts cracker
http://rapidshare.com/files/67541185/MSN_Messenger_Account_Cracker_v2.zip
53> PRIAMOS - powerful SQL Injector & Scanner
You can search SQL Injection vulnerabilities and inject vulnerable string to get all Databases,
Tables and Column datas with injector module.
PRIAMOS is a powerful SQL Injector & Scanner, it allows you to search for SQL Injection vulnerabilities and execute the code injection using vulnerable strings to get all possible Databases, Table and Column data with the PRIAMOS SQL Injection Module.
You can view a demonstration via video here:
http://www.priamos-project.com/demo.htm
Download Here....:-
http://www.priamos-project.com/files/PRIAMOS.v1.0.zip
54> Rocket Port Scanner
http://www.2shared.com/file/3436253/4a03331/RocketPortScanner.html
55>Trojan New 2008 H-Ps Ver:1.0
http://www.2shared.com/file/3329138/bf68fa38/H-PS.html
Password: www.top4u.blogfa.com
56> UltraSurf v8.8 0 - Bypass All Internet Blocking Systems
If you are using browsers other than IE, You have to manually change the proxy settings .
Proxy settings as follows..
HTTP Proxy : 127.0.0.1 Port : 9666
LINK back .
Quote:
http://rapidshare.com/files/94646323...cking.2008.rar
57> xHacker Pro 3.0 -LEAKED- 100% Undetectable
Exterminator: That is a completely new way to totally STOP or UNINSTALL any antivirus or firewall software. Exterminator lets you do the same actions that the uninstaller do. Exterminator currently supports: Disable, Stop, Uninstall services, Terminate Process, Close Window, Delete File, Shell program, extract and run registry entry. Exterminator is a total solution, it currently supports McAfee 2007 and Norton 2006. But you can make your own Exterminator Actions File (XAF) and save them to use anytime, you can even bind XAF files to make a bigger one with support for more AVs and FWs. Exterminator is a really revolution in AV and FW killing methods.
Download :
http://www.zshare.net/download/3998782aaf20f8
url:http://sanjaypatel.weebly.com/hacking-tools.html
Saturday, September 6, 2008
GoldenEye (GoldEye) Password Cracker
GoldenEye (GoldEye) Password Cracker - Download goldeye.zip or goldeneye.zip
Darknet spilled these bits on December 29th 2006 @ 7:07 pm
GoldenEye is a brute-force hacking program and was written for web-masters to test the security of their own sites. This is an oldskool file, a lot of people are still looking for this.
It should not be use by others to hack sites - this would be illegal! Under no circumstances should the author or any other persons involved in its development or distribution be held liable for the misuse of the program.
Once again these old files and tutorials are meant for the purpose of learning, test them in your own lab, see how they work, see what they do then try and write something similar yourself.
Notes
GoldenEye works with different types of wordlists:
"username:password", "username [TAB] password" or single lists
GoldenEye executes its attempts simultaneously. The number of simultaneous attempts can be adjusted with the speed slider on the “access” tab. You can also adjust the speed limit. On the Options|Connections tab you’ll find a box to set the “top-speed”; select an apropiate value. Use lower values for slow internet connection!
If you get to much timed-out connections, lower the crack speed or increase the TTL (time to life). Timed-out connections will be automatically resumed if you check ‘Resume time-out connections automatically’ on the same tab.
Note: The program is tested with 70 simultaneous request. If you choose a higher value, do it on your own risk! If GoldenEye tells you something about buffer problems, lower the speed next time. I’ve encountered that other running programs may cause buffer problems.
GoldenEye logs the cracked sites. They are listed on the History|Access History tab. You can select and delete single entries or the whole list. Expired combinations will be automatically removed when you click the check for expired passwords button. Click on the ‘visit button’ or double click on the selected url to launch it in your browser.
Access tab
The url box: if you don’t remember the members url you can
search through the list
or you type in a part off the url or a defined site name (see History|URL History) and click on the small button at the right end of the url-box.
Options|Advanced tab:
Change proxy after x attempts: GoldenEye changes the proxy automatically after x attempts if this options is checked.You have to use several proxies to use this feature. Add proxies on the Options|connections tab.GoldenEye changes the proxy randomly or in the order which is given by the proxy-list.
Server Response: the standard values are ‘200′ for ok and ‘401′ for access denied (unauthorized). If the server you’re attacking gives other reply numbers you can change them. Note: You can’t use 404 or 500!
Cookie: If the attacked server needs a cookie, check this option and enter the cookie string.
Referer: If the attacked server needs the url of the refering site, enter it here.
Wordlist tools tab
Remove dupes: New: If you’re using single lists for userID and password GoldenEye removes the dupes simultaneous.
General wordlist options:
Define a mininum and maximum length for the userID and password (standard settings 1-32)
Convert the list: All passes will be converted ‘on-the-fly’.
Wordlist style: If you want to use single lists: check this option.
Wordlist manipulations: this tab appears after you’ve loaded a list and checked the ‘Extend list’ on “General wordlist”
“Common manipulations” are predefined manipulations.
On the “Advanced” tab you can choose your own prefixes, suffixes, etc. If you miss something, tell me!
Security check
Server security test: It tests the attacked server for other security holes.
Proxy test: tests the proxy-speed. The values are in milliseconds.
Your anti-virus software may find a Win32.Gen.Trojan or similar in this file, that’s normal for most hacking software. Darknet in no way implies that this software is safe and free of malware, use at your own risk.
You can download GoldenEye 1.0 here.
To avoid any network issues the zip file is passworded, the password is darknet123.
ShareThis
Tags: cracker, cracking, goldeneye, goldeneye-password-cracker, goldeye, Hacking Tools, Password Cracking, password-cracker, Web Hacking
Subscribe to Darknet RSS Feed
Stored in: Hacking Tools, Password Cracking, Web Hacking
Related Posts:
- LCP - A Good FREE Alternative to L0phtcrack (LC5)
- Password Cracking Wordlists and Tools for Brute Forcing
- Ophcrack 2.2 Password Cracker Released
- SIPVicious v0.2.3 - VoIP/SIP Auditing Toolkit
- Symantec Dumps L0phtcrack Password Cracker
- Medusa 1.4 - Parallel Password Cracker Released for Download
| 35,145 views |
11 comments
trackback this article
.mario December 30th, 2006 | 12:13 am
Hmmm, AntiVir says BDS/Delf.JM - what say you?
.mario December 30th, 2006 | 12:14 am
ah sorry - didn’t finish reading. nevermind
Marko_Catone January 10th, 2007 | 5:11 pm
It says I need a password for the encrypted file, (Goldeneye.rtf) How do I get one?
pzepf January 20th, 2007 | 2:29 am
how do i install this exactly. it keeps giving me errors on it. can you specify it. I install it and then try to move it to the folder i have and it keeps telling me that it will not run.
Stephene January 21st, 2007 | 12:22 am
how do u open it, i cant find it what buttons do u press
ollied January 21st, 2007 | 5:23 am
Sure i will hack to learn via doi, just wanna get fulltext journal thats all, Oh…sciencedirect never mind!!
Jack of trades January 26th, 2007 | 6:44 pm
Can’t get it to work, when I try to run it nothing happens. Any help please?
web master February 11th, 2007 | 2:01 am
every time i run goldeneye.exe it says that windows does not hav appropriate permission to open the file???see a problem?
god March 4th, 2007 | 3:42 am
you have to be an idiot to download this its a trojan virus that will f up your pc
Cobra May 2nd, 2007 | 10:24 am
Very handy for my project on security systems…
yourname July 15th, 2008 | 9:38 pm
How do I install this in ubuntu? When I try to run through WINE it get a
application error.
Exception TICMPException in module GoldenEye.exe at 00092B92. Unable to get ping handle.
url:http://www.darknet.org.uk/2006/12/goldeneye-goldeye-password-cracker-download-goldeyezip-or-goldeneyezip/
Darknet spilled these bits on December 29th 2006 @ 7:07 pm
GoldenEye is a brute-force hacking program and was written for web-masters to test the security of their own sites. This is an oldskool file, a lot of people are still looking for this.
It should not be use by others to hack sites - this would be illegal! Under no circumstances should the author or any other persons involved in its development or distribution be held liable for the misuse of the program.
Once again these old files and tutorials are meant for the purpose of learning, test them in your own lab, see how they work, see what they do then try and write something similar yourself.
Notes
GoldenEye works with different types of wordlists:
"username:password", "username [TAB] password" or single lists
GoldenEye executes its attempts simultaneously. The number of simultaneous attempts can be adjusted with the speed slider on the “access” tab. You can also adjust the speed limit. On the Options|Connections tab you’ll find a box to set the “top-speed”; select an apropiate value. Use lower values for slow internet connection!
If you get to much timed-out connections, lower the crack speed or increase the TTL (time to life). Timed-out connections will be automatically resumed if you check ‘Resume time-out connections automatically’ on the same tab.
Note: The program is tested with 70 simultaneous request. If you choose a higher value, do it on your own risk! If GoldenEye tells you something about buffer problems, lower the speed next time. I’ve encountered that other running programs may cause buffer problems.
GoldenEye logs the cracked sites. They are listed on the History|Access History tab. You can select and delete single entries or the whole list. Expired combinations will be automatically removed when you click the check for expired passwords button. Click on the ‘visit button’ or double click on the selected url to launch it in your browser.
Access tab
The url box: if you don’t remember the members url you can
search through the list
or you type in a part off the url or a defined site name (see History|URL History) and click on the small button at the right end of the url-box.
Options|Advanced tab:
Change proxy after x attempts: GoldenEye changes the proxy automatically after x attempts if this options is checked.You have to use several proxies to use this feature. Add proxies on the Options|connections tab.GoldenEye changes the proxy randomly or in the order which is given by the proxy-list.
Server Response: the standard values are ‘200′ for ok and ‘401′ for access denied (unauthorized). If the server you’re attacking gives other reply numbers you can change them. Note: You can’t use 404 or 500!
Cookie: If the attacked server needs a cookie, check this option and enter the cookie string.
Referer: If the attacked server needs the url of the refering site, enter it here.
Wordlist tools tab
Remove dupes: New: If you’re using single lists for userID and password GoldenEye removes the dupes simultaneous.
General wordlist options:
Define a mininum and maximum length for the userID and password (standard settings 1-32)
Convert the list: All passes will be converted ‘on-the-fly’.
Wordlist style: If you want to use single lists: check this option.
Wordlist manipulations: this tab appears after you’ve loaded a list and checked the ‘Extend list’ on “General wordlist”
“Common manipulations” are predefined manipulations.
On the “Advanced” tab you can choose your own prefixes, suffixes, etc. If you miss something, tell me!
Security check
Server security test: It tests the attacked server for other security holes.
Proxy test: tests the proxy-speed. The values are in milliseconds.
Your anti-virus software may find a Win32.Gen.Trojan or similar in this file, that’s normal for most hacking software. Darknet in no way implies that this software is safe and free of malware, use at your own risk.
You can download GoldenEye 1.0 here.
To avoid any network issues the zip file is passworded, the password is darknet123.
ShareThis
Tags: cracker, cracking, goldeneye, goldeneye-password-cracker, goldeye, Hacking Tools, Password Cracking, password-cracker, Web Hacking
Subscribe to Darknet RSS Feed
Stored in: Hacking Tools, Password Cracking, Web Hacking
Related Posts:
- LCP - A Good FREE Alternative to L0phtcrack (LC5)
- Password Cracking Wordlists and Tools for Brute Forcing
- Ophcrack 2.2 Password Cracker Released
- SIPVicious v0.2.3 - VoIP/SIP Auditing Toolkit
- Symantec Dumps L0phtcrack Password Cracker
- Medusa 1.4 - Parallel Password Cracker Released for Download
| 35,145 views |
11 comments
trackback this article
.mario December 30th, 2006 | 12:13 am
Hmmm, AntiVir says BDS/Delf.JM - what say you?
.mario December 30th, 2006 | 12:14 am
ah sorry - didn’t finish reading. nevermind
Marko_Catone January 10th, 2007 | 5:11 pm
It says I need a password for the encrypted file, (Goldeneye.rtf) How do I get one?
pzepf January 20th, 2007 | 2:29 am
how do i install this exactly. it keeps giving me errors on it. can you specify it. I install it and then try to move it to the folder i have and it keeps telling me that it will not run.
Stephene January 21st, 2007 | 12:22 am
how do u open it, i cant find it what buttons do u press
ollied January 21st, 2007 | 5:23 am
Sure i will hack to learn via doi, just wanna get fulltext journal thats all, Oh…sciencedirect never mind!!
Jack of trades January 26th, 2007 | 6:44 pm
Can’t get it to work, when I try to run it nothing happens. Any help please?
web master February 11th, 2007 | 2:01 am
every time i run goldeneye.exe it says that windows does not hav appropriate permission to open the file???see a problem?
god March 4th, 2007 | 3:42 am
you have to be an idiot to download this its a trojan virus that will f up your pc
Cobra May 2nd, 2007 | 10:24 am
Very handy for my project on security systems…
yourname July 15th, 2008 | 9:38 pm
How do I install this in ubuntu? When I try to run through WINE it get a
application error.
Exception TICMPException in module GoldenEye.exe at 00092B92. Unable to get ping handle.
url:http://www.darknet.org.uk/2006/12/goldeneye-goldeye-password-cracker-download-goldeyezip-or-goldeneyezip/
Subscribe to:
Posts (Atom)