Cuser

Adsense

HACKING TOOLS

Top 15 Security/Hacking Tools & Utilities
1. Proxy Software

GPass

GPass is a highly advanced software that can encrypt your online data, hide your IP address, and sidestep content filtering and monitoring using a number of secure channels to connect to the Internet and break through the Internet blockade. GPass supports the online applications that you use the most, including Web browsers (e.g. Firefox), multimedia players, email, instant messengers, download managers, and so on.

Hopster

Bypass Firewall - Bypass Proxy - HTTP tunnel Chat with your friends using your favourite applications: MSN, AOL, Yahoo Messenger, ICQ, Miranda, Trillian, mIRC... Wherever your friends are, hopster will bypass a censoring firewall and take you right to your buddies.
Browse, Surf, Download & Chat Anonymously Hide your real IP address and protect yourself from nosy people and wannabe-hackers. With hopster, there's no way anyone will know where or who you are.

M Proxy

This provides proxy solutions, with which you can access the blocked websites and protect your online privacy. You can also get free proxy lists.

Proxy I

A server that sits between a client application, such as a Web browser, and a real server. It intercepts all requests to the real server to see if it can fulfill the requests itself. If not, it forwards the request to the real server.

Tor

Tor is free software and an open network that helps you defend against a form of networksurveillance that threatens personal freedom and privacy, confidential business activities and relationships, and state security known as traffic analysis. Tor protects you by bouncing your communications around a distributed network of relays run by volunteers all around the world: it prevents somebody watching your Internet connection from learning what sites you visit, and it prevents the sites you visit from learning your physical location. Tor works with many of your existing applications, including web browsers, instant messaging clients, remote login, and other applications based on the TCP protocol.



2. Scanners

GFI Lan Guard

GFI LANguard™ scans your network and ports to detect, assess and correct security vulnerabilities with minimal administrative effort. As an administrator, you have to deal separately with problems related to vulnerability issues, patch management and network auditing, at times using multiple products. However, with GFI LANguard these three cornerstones of vulnerability management are addressed in one package. This gives you a complete picture of your network set-up and help you to maintain a secure network state faster and more effectively. Vulnerability Management Patch Management Network Auditing

Nessus

The Nessus® is a vulnerability scanner for active scanners, featuring high-speed discovery, configuration auditing, asset profiling, sensitive data discovery and vulnerability analysis of your security posture. Nessus scanners can be distributed throughout an entire enterprise, inside DMZs and across physically separate networks.

Net Tools

Net Tools is a comprehensive set of host monitoring, network scanning, security, administration tools and much more, all with a highly intuitive user interface. It's an ideal tool for those who work in the network security, administration, training, internet forensics or law enforcement internet crimes fields.

NMAP

Nmap ("Network Mapper") is a free and open source utility for network exploration or security auditing. Many systems and network administrators also find it useful for tasks such as network inventory, managing service upgrade schedules, and monitoring host or service uptime. Nmap uses raw IP packets in novel ways to determine what hosts are available on the network, what services (application name and version) those hosts are offering, what operating systems (and OS versions) they are running, what type of packet filters/firewalls are in use, and dozens of other characteristics. It was designed to rapidly scan large networks, but works fine against single hosts. Nmap runs on all major computer operating systems, and official binary packages are available for Linux, Windows, and Mac OS X. In addition to the classic command-line Nmap executable, the Nmap suite includes an advanced GUI and results viewer (Zenmap), a flexible data transfer, redirection, and debugging tool (Ncat), and a utility for comparing scan results.





Email Attacks


1. Email Server

Email Tracker Pro

eMailTrackerPro helps wipe out SPAM email from your inbox and can trace any email to its true geographical location.

Neo Trace Pro

NeoTrace shows you how packets get from your computer to another computer on the Internet by displaying all nodes between your computer and the trace target.

Post Cast Server

PostCast Server is an SMTP mail server program that completely replaces your ISP's SMTP server. By making one small change in your e-mail program, you can start sending messages directly from your computer. With the help of Post Cast Server you can turn your Computer into a Email Server.

Surege Mail Server

SurgeMail is an advanced secure easy to manage and install high performance email server using fast browser based administration tools. Surgemail includes user and domain self administration. Surgemail is scalable to an unlimited number of users or domains. Surgemail's efficiency mean tens of thousands of users can be supported even on very modest hardware.

H Mail Server

hMailServer is a free e-mail server for Microsoft Windows. It's used by Internet service providers, companies, governments, schools and enthusiasts in all parts of the world. It supports the common e-mail protocols (IMAP, SMTP and POP3) and can easily be integrated with many existing web mail systems. It has flexible score-based spam protection and can attach to your virus scanner to scan all incoming and outgoing email.

Free SMTP

Free SMTP Server is a SMTP server program for Windows that lets you send email messages directly from your computer. It's very simple but very useful for laptop users traveling around the world and connecting their PCs to different Internet Service Providers in different countries. You can use it instead of ISP's SMTP server to increase your security and privacy. The email program you already use for sending and receiving messages can be connected to the server in a very easy way - by using the word "localhost" instead of your current SMTP host. Having done so, you can send messages in a usual manner. Free SMTP Server is very fast, while sending; it establishes dozens of SMTP connections, and gets the most out of your Internet connection.



2. Scripts

PHP Phishing Demo Script

This Script can be used for PHISHING and must solely be used for Educational Purpose only. For using this script, you will have to upload it on some Website.

PHP Fake Mail Script

This Script can be used for Sending Fake Mail and must solely be used for Educational Purpose only. For using this script, you will have to upload it on some Website.

PHP Email Bombing Script

This Script can be used for Sending Numerous Mails on a Single Click and must solely be used for Educational Purpose only. For using this script, you will have to upload it on some Website.



3. Tracing Tools

Email Tracker Pro

eMailTrackerPro helps wipe out SPAM email from your inbox and can trace any email to its true geographical location.

Neo Trace Pro

NeoTrace shows you how packets get from your computer to another computer on the Internet by displaying all nodes between your computer and the trace target.

Post Cast Server

PostCast Server is an SMTP mail server program that completely replaces your ISP's SMTP server. By making one small change in your e-mail program, you can start sending messages directly from your computer. With the help of Post Cast Server you can turn your Computer into a Email Server.

Surege Mail Server

SurgeMail is an advanced secure easy to manage and install high performance email server using fast browser based administration tools. Surgemail includes user and domain self administration. Surgemail is scalable to an unlimited number of users or domains. Surgemail's efficiency mean tens of thousands of users can be supported even on very modest hardware.

H Mail Server

hMailServer is a free e-mail server for Microsoft Windows. It's used by Internet service providers, companies, governments, schools and enthusiasts in all parts of the world. It supports the common e-mail protocols (IMAP, SMTP and POP3) and can easily be integrated with many existing web mail systems. It has flexible score-based spam protection and can attach to your virus scanner to scan all incoming and outgoing email.

Free SMTP

Free SMTP Server is a SMTP server program for Windows that lets you send email messages directly from your computer. It's very simple but very useful for laptop users traveling around the world and connecting their PCs to different Internet Service Providers in different countries. You can use it instead of ISP's SMTP server to increase your security and privacy. The email program you already use for sending and receiving messages can be connected to the server in a very easy way - by using the word "localhost" instead of your current SMTP host. Having done so, you can send messages in a usual manner. Free SMTP Server is very fast, while sending; it establishes dozens of SMTP connections, and gets the most out of your Internet connection.



System Hacking


1. Admin Password Cracker

Active Password Changer

Active Password Changer is designed for resetting local administrator and user passwords on Windows XP / VISTA / 2008 / 2003 / 2000 & Windows 7 systems in case an Administrator's password is forgotten or lost. You do not need to re-install and re-configure the operating system. Other Windows login security restrictions like 'Account is disabled', 'Password never expires', 'Disable Force Smart Card Login', 'Account is locked out ', 'User Must Change Password at Next Logon' and 'Logon Hours' can be changed or reset. With Active Password Changer you can log in as a particular user with a blank password.

Cain & Abel

Cain and Abel is a password recovery tool for Microsoft Operating Systems. It allows easy recovery of various kind of passwords by sniffing the network, cracking encrypted passwords using Dictionary, Brute-Force and Cryptanalysis attacks, recording VoIP conversations, decoding scrambled passwords, recovering wireless network keys, revealing password boxes, uncovering cached passwords and analyzing routing protocols. Its main purpose is the simplified recovery of passwords and credentials from various sources, however it also ships some "non standard" utilities for Microsoft Windows users.

Hiren’s Multi Boot Disk

Hiren's Multi BootCD is one of the most popular Boot CD-s. It contains dozens of diagnostic tools that would be useful to everyone in different situations. Contains a collection ofsoftware programs to work with partitions on the hard disk, making back up, measuring the productivity of your machine, for testing of memory, hard disk and other hardware, antivirus software with the latest virus definitions and dozens of others

Offline Password Cracker

Offline Password Cracker is an amazing password recovery tool but instead of actually recovering your Windows password like OPH Crack and similar tools do, it deletes it. Without a password, you're allowed unrestricted access to your Windows operating system.

OPH Crack

Ophcrack is a free Windows password cracker based on Rainbow Tables. It is a very efficient implementation of rainbow tables done by the inventors of the method. It comes with a Graphical User Interface and runs on multiple platforms.

Sam Inside

SAMInside is designated for the recovery of Windows NT, Windows 2000, Windows XP, Windows 2003, Windows Vista, Windows 7 user passwords.



2. Data Recovery Tools

Active Disk Image

Active@ Disk Image is software that makes an exact copy of any PC disks (HDD, SSD, USB, CD, DVD, Blu-ray etc.) and stores it into a folder. The disk images may be used for backups, PC upgrades or disk duplication purposes. In case of computer failure, a backup image may be used to recover your computer system or find & restore any necessary files from within an image.

B4win Backup

Easy to use Backup Freeware. Many features including spanned and Huge backups. KISS - Keeping It So Simple. This backup utility is reliable, and simple. Powerful arrangement of backup size - spanning disks, predefined disk size to suit CDR CDRW media etc. Can restore from a disk which has lost the directory reference (most ZIP programs cannot do this).

Easy Recovery Pro

EasyRecovery™ software products offer home users or businesses complete solutions for their data recovery, file repair and disk diagnostic needs.

Eraser

Eraser is an advanced security tool for Windows which allows you to completely remove sensitive data from your hard drive by overwriting it several times with carefully selected patterns.

Restoration

Restoration is an easy to use and straight forward tool to undelete files that were removed from the recycle bin or directly deleted from within Windows, and we were also able to recover photos from a Flash card that had been formatted. Upon start, you can scan for all files that may be recovered and also limit the results by entering a search term or extension. In addition, it also provides the option to wipe the found files beyond simple recovery. The program is small and standalone, it does not require installation and can also run from a Floppy disk. Restoration works with FAT and NTFS as well as digital cameras cards.

Win Backup

Win Backup Software makes it easier than ever before to secure your data by making regular backups. Not only will the Backup Software help you organize your backups and schedule automatic backups, it will also protect your data using the latest encryption techniques, compress data to save space, create detailed logs of all backup operations and more. Win Backup Software also features one of the most intuitive user interfaces you have ever seen, making even the most advanced features easily accessible to beginners and professionals alike.



3. Encryptors

StegoMagic

StegoMagic brings you a feature-based steganalytic method for music files, text files and images. StegoMagic can hide a message or file in many formats, such as WAV, TEXT, BMP 24 bit and BMP 256 colour files. There will be no change in file size of the carrier medium except when text file is the carrier medium. There will not be any perceptible distortion in the carrier file after hiding. Your file will seem exactly as the original, so it's almost impossible to detect hidden data. Your data is encrypted with a password using D.E.S. (for additional protection) and hidden in the carrier medium. The data to be hidden must be approximately 1/8th of carrier file size or less. No file size restriction for text file carrier files.

Encryptor

Encryptor is a password protected utility that allows you to send and receive encrypted emails to your friends and business acquaintances. Encrypt and send mail directly from the program. Saves email address's for quick responding. File size has been kept to a minimum (75 Kb) so you can easily send the program along with your encrypted message as an attachment to the recipient. Easy one button encrypt/decrypt process.

Image Hide

Hide your sensitive data in image files. This is great Stenography software, Now with better encryption (RC_4) and SHA hashed passwords, image file versioning, auto image create (fractals), save files to BMP or PNG format, Load in many different image formats.

PC Security

PC Security™ is the ultimate in computer security, offering multiple locking systems for the windows environment and internet. Lock files, monitor programs activities, even detect intruders! PC Security offers flexible and complete password protection, "Drag and Drop" support, plus many other handy features. All together, an incredible security package.

True Crypt

Free open-source disk encryption software for Windows 7/Vista/XP, Mac OS X, and Linux. Handle this tool very carefully else why you may loss your data.



4. Keyloggers

Actual Spy Keylogger

Actual Spy - is a keylogger which allows you to find out what other users do on your computer in your absence. It is designed for the hidden computer monitoring and the monitoring of the computer activity. Keylogger Actual Spy is capable of catching all keystrokes, capturing the screen, logging the programs being run and closed, monitoring the clipboard contents.

Ardamax Keylogger

Ardamax Keylogger is a keystroke recorder that captures user's activity and saves it to an encrypted log file. The log file can be viewed with the powerful Log Viewer. Use this tool to find out what is happening on your computer while you are away, maintain a backup of your typed data automatically or use it to monitor your kids. Also you can use it as a monitoring device for detecting unauthorised access. Logs can be automatically sent to your e-mail address, access to the keylogger is password protected. Besides, Ardamax Keylogger logs information about the Internet addresses the user has visited.

Ghost Keylogger

Ghost Keylogger invisibly captures all keystrokes to a logfile or optionally sends them to a predefined email address.

Golden Keylogger

If you have teenage son or daughter (some of us have both), then you know how crazy they are about chatting and instant messaging. We know that it's not all that innocent. TV news are packed with stories when strangers tried to take advantage of innocent children by using internet chats and IM (instant messaging). The problem is so big that FBI has a task force that works 24 hours a day 365 days a year. Another problem that recently got a lot of publicity is bullying and name-calling with instant messengers. While your kids may not be honest with you about who they are chatting with and what they discuss, you have the way to know exactly what's going on without invading your kids' privacy. How? Golden Keylogger!

Home Keylogger

Home Keylogger is intended for interception and recording in a file of everything that is entered from the keyboard. The program is able to work in the hidden mode and to emerge on pressing a combination of keys. Home Keylogger is able to present the recorded data in a neat way that is easy to read but at the same time fixing exactly every event that has been done. By constantly using this program you will save your time by preventing accidental data damage and loss that is frequently caused by the use of Internet. You can immediately restore the text which was typed yesterday, the day before yesterday, or one week ago. Home Keylogger will also help to recollect passwords that you have forgotten or to recover lost e-mail.

Invisible Keylogger

Invisible is a full featured pc and Internet activity monitoring software that enables you to record everything on your pc. This product is extremely stealth and packs a big punch.

KGB Keylogger

Imagine you are writing an e-mail message. Then you click a wrong button or your e-mail client hangs and you have to write the same text from scratch. Sounds familiar? With KGB Free Keylogger, you will never lose any of your text, whether it was typed in an e-mail client, a text editor, an on-line form or anywhere else. This free program logs everything you type. Get your passwords, registration keys and other info safely logged.

Invisible Keylogger

Software has enhanced feature to record keystroke activities in encrypted log file with option to mail the log report at your specified email address. Helps to provide full control on your PC and act as powerful surveillance utility for Home and Office usage.

Remote Keylogger

Powerful and easy to use Computer Keylogger is a Stealth Keylogger to monitor your PC being hidden while maintaining absolute secrecy in your absence.

Soft Central Keylogger

SC-KeyLog PRO is a powerful digital surveillance monitor that logs computer activity for later review. Our spy program allows you to secretly record computer user activities such as e-mails, chat conversations, visited web sites, clipboard usage and more in a protected logfile. SC-KeyLog PRO even captures Windows user logon passwords!

Stealth Keylogger

Keylogger Software efficiently monitors the entire typed keystrokes activities of external user performed on your PC or Laptops. Easy to use utility records each keyboard entries including composed emails, chat records, typed web url’s, passwords, text etc. Software has enhanced feature to record keystroke activities in encrypted log file with option to mail the log report at your specified email address. Helps to provide full control on your PC and act as powerful surveillance utility for Home and Office usage.

Winvestigator Keylogger

Winvestigator™ is a user monitoring program that starts on boot, and runs undetectable in Windows. It even takes pictures so you can really see what is going on! Although powerful, this program was designed to be easy to use. Offering a web page style interface and a thorough help resource. Winvestigator can send the log over email so you can monitor a computer without having to physically access it.



5. Password Recovery Tools

Asterisk Password Recovery

Reveals passwords hidden under password dialog boxes and web pages asterisks.

Chrome Password Recovery

It is a small password recovery tool that allows you to view the user names and passwords stored by Google Chrome Web browser. For each password entry, the following information is displayed: Origin URL, Action URL, User Name Field, Password Field, User Name, Password, and Created Time. You can select one or more items and then save them into text/html/xml file or copy them to the clipboard.

Dial Up Password Recovery

This utility enumerates all Dial-Up entries on your computer and reveals their logon details: User Name, Password and Domain. It works perfectly in the following operating systems: Windows 95, Windows 98, Windows ME, Windows NT, Windows 2000, and Windows XP. In Windows 2000 and Windows XP, the Dialupass utility can reveal the Dial-Up passwords only if you are logged on with administrator privileges.

E-mail Password Recovery

You've forgotten your Outlook PST password or Mail account passwords? Probably you have lost a note, where your password was written? Password Recovery Engine for Outlook can help you immediately. One click and you get your lost password back.

Firefox Password Recovery

Firefox Password Recovery presents itself as a handy tool enabling you to restore any cached passwords for such popular web browsers as Mozilla and Mozilla Firefox. The program will provide you with the list of website passwords straight after you start it. Firefox Password Recovery is very convenient as it provides all the passwords instantly, regardless to their length and complexity. You will certainly appreciate that the utility can both recover passwords typed in any language and easily restore multilingual passwords. Using this helpful utility you can immediately restore passwords for websites, requiring access passwords and even decrypt passwords protected with the User Master Password. The program interface is pretty simple and comes with such useful features as copying of the retrieved data to clipboard and saving it in a formatted text file, so you won’t lose it again. If you want to be sure that no one else uses Firefox Password Recovery while you are away you can set an access password and prevent any unauthorized program start.

Internet Explorer Password Recovery

Internet Explorer Password Recovery is a comprehensive solution for recovering all types of Internet Explorer saved passwords: cached credentials, FTP passwords, Internet Explorer AutoForm and AutoComplete fields, AutoComplete passwords, synchronization passwords, Identities, Content Advisor password. It's the first program in the world that can decrypt Internet Explorer passwords manually from registry binary files.

Messenger Password Recovery

Messenger Password Recovery is a password recovery tool that reveals the passwords of the instant messenger applications.

Network Password Recovery

When you connect to a network share on your LAN or to your .NET Passport account, Windows allows you to save your password in order to use it in each time that you connect the remote server. This utility recovers all network passwords stored on your system for the current logged-on user. It can also recover the passwords stored in Credentials file of external drive, as long as you know the last log-on password.

Powerpoint Password Recovery

PowerPoint Password Recovery is a program that allows recovery of lost or forgotten passwords required to open or modify password-protected Microsoft PowerPoint presentations. The program supports all versions of Microsoft PowerPoint, including 2007.

RAR, DOC, EXCEL, PDF Password Recovery

These are the programs those recover lost or forgotten passwords for Microsoft Word documents, Microsoft Excel Sheets, WinRar Archives, Adobe PDF Files. The program recovers all types of passwords, including instant recovery of document and template protection and passwords to modify. These programs instantly recover passwords for the read only permissions, editing and formatting restrictions, including instant recovery of passwords to open if weak encryption was used. The interface is simple and easy to understand, yet the functionality and the set of features are truly immense.

Remote Desktop Password Recovery

Remote Desktop Connections passwords are stored in *.rdp files, which are normally located in current user's 'My Documents' folder. When you select the manual mode, NPRW will automatically scan your disk searching for these files. If the program was unable to find a *.rdp file automatically, you can try locating it manually and entering path to it by hand.

VNC Password Recovery

VNC Password Recovery is a small Windows utility that recover the passwords stored by the VNC tool. It can recover 2 of passwords: password stored for the current logged-on user (HKEY_CURRENT_USER in the Registry), and password stored for the all users.

Wireless Password Recovery

Wireless Password Recovery recovers all wireless network security keys/passwords (WEP/WPA) stored in your computer by the 'Wireless Zero Configuration' service of Windows XP and by the 'WLAN AutoConfig' service of Windows Vista. It allows you to easily save all keys to text/html/xml file, or copy a single key to the clipboard.



6. Sticky Keys Backup

Sethc_Windows7

Sethc_Vista

Sethc_XP

Sethc is a process associated with Windows NT High Contrast Invocation and is part of Microsoft® Windows® Operating System. With default Windows settings, this process is run when the shift is pressed 5 times in sequence, to invoke the StickyKeys configuration window.



7. System Utilities

Ava Find

Search without delay. Sophisticated ranking shows what you want near the top. Scout Bot finds newly downloaded files automatically. You don't even have to enter a search!
Clean up Your Hard Drive Ava Find can show you all your files and folders by size, instantly. Ava Find takes the guesswork out of finding the biggest file or folder on your computer.

Registry Tweak

Registry Tweaker is a powerful and fully automated application for tweaking your Windows Registry. This tweaker is different from other tweakers, becouse you actually see which keys are modified, you can even add your own tweaks in database.

Resource Hacker

Resource HackerTM is a freeware utility to view, modify, rename, add, delete and extract resources in 32bit Windows executables and resource files (*.res). It incorporates an internal resource script compiler and decompiler and works on Win95, Win98, WinME, WinNT, Win2000 and WinXP operating systems.



8. Virtual Machine

Virtual Box

VirtualBox is a powerful x86 and AMD64/Intel64 virtualization product for enterprise as well as home use. Not only is VirtualBox an extremely feature rich, high performance product for enterprise customers, it is also the only professional solution that is freely available as Open Source Software under the terms of the GNU General Public License (GPL).

VMware Workstation

VMware Workstation is optimized for maximum performance when running on 32-bit and 64- bit Windows 7 PCs. Supports Flip 3D and Aero Peek to show live thumbnails of your virtual machines. Run legacy application with 3D graphics, faster performance, and tighter desktop integration better than Windows XP Mode. Get shared folders and drag and drop convenience.



Utilities


1. Creating a Pen Drive Bootable

Unet Boot

UNetbootin allows you to create bootable Live USB drives for Ubuntu, Fedora, and other Linux distributions without burning a CD. It runs on both Windows and Linux.

Win to Flash

WinToFlash starts a wizard that will help pull over the contents of a windows installation CD or DVD and prep the USB drive to become a bootable replacement for the optical drive. It can also do this with your LiveCD. You don't have to worry about scratches on the disc or misplacing your original media discs once you transfer their contents to the flash drive. The optical drive is quickly becoming a thing of the past, especially in office environments, as media is shifted to the cloud.

PE Builder

PE Builder is not a Microsoft product and does not create Microsoft Windows Preinstallation Environment ("Windows PE"). Using PE Builder does not grant you a license to Microsoft Windows PE or to use the Windows XP or Server 2003 binaries in a manner other than stated in the End-User License Agreement included in your version of Microsoft Windows XP or Windows Server 2003. Microsoft has not reviewed or tested PE Builder and does not endorse its use.



2. Remote Desktop

Bluetooth Remote Control

Use Phone Remote Control (previously Bluetooth Remote Control) both for buisness and pleasure! Give PowerPoint presentation and see the actual slides in the phone. Change songs that are currently being played on ITunes or Media Player, browse for artists, albums, change volume and much more..

EvilVNC

Evil-VNC is an vnc server injector as it's name it will install secretly an vnc server on remote host ,and run it automatikly after installation and you will be notified immediatly by server given u the remote ip and password for connection. Once the server installed It allows a person at a remote computer to assume control of another computer across a network, as if they were sitting in front of the other computer. In other words, sitting at your desk in Baltimore, you could use it to take control of your mother's PC in London and show her how to install and use some new software package by actually doing it yourself.

NetMaster

Net master is a tool for Remote Administration.

Remote Admin

Radmin (Remote Administrator) is a secure remote control software and remote access software which enables you to work on a remote computer in real time as if you were using its own keyboard and mouse.

Remote Administrator Control

With RAC (Remote Administrator Control) you can work without any limits on a remote computer with operation system Windows,as if working on your local computer. You can conduct remote administration and maintainenance of your computers, offer remote support and troubleshooting to your users.

Remotely Anywhere Network Console

Network Console is the perfect tool for system administrators to detect, control and deploy RemotelyAnywhere on computers they support. This application runs on the administrator’s PC and allows them to instantly remote control, access and configure any of the computers on the network that have RemotelyAnywhere or LogMeIn Pro installed.

Team Viewer

TeamViewer connects to any PC or server around the world within a few seconds. You can remote control your partner's PC as if you were sitting right in front of it.

Ultra VNC

UltraVNC is a powerful, easy to use and free software that can display the screen of another computer (via internet or network) on your own screen. The program allows you to use your mouse and keyboard to control the other PC remotely. It means that you can work on a remote computer, as if you were sitting in front of it, right from your current location.

VNC

VNC provides remote control software which lets you see and interact with desktop applications across any network.



3. Software

Smart Whois - Download

SmartWhois is a useful network information utility that allows you to look up all the available information about an IP address, hostname or domain, including country, state or province, city, name of the network provider, administrator and technical support contact information.

Adobe Reader - Download

Adobe Reader software is the global standard for electronic document sharing. It is the only PDF file viewer that can open and interact with all PDF documents. Use Adobe Reader to view, search, digitally sign, verify, print, and collaborate on Adobe PDF files.

Netcut - Download

NetCut is a solution that is helping you to admin your network based only on ARP protocol . It can execute several tasks as list IP-MAC table in seconds, turn off & on network on any computer on your LAN including any device like router or switcher. Also, NetCut can protected users from ARP SPOOF attacks.

Anti Netcut - Download

Anti Netcut 2Prevent Internet disconnection caused by netcut and similar programs,it get started in system start up. Enhanced anti spoofing. Who is using net cut capability.

Autoruns - Download

This utility, which has the most comprehensive knowledge of auto-starting locations of any startup monitor, shows you what programs are configured to run during system bootup or login, and shows you the entries in the order Windows processes them. These programs include ones in your startup folder, Run, RunOnce, and other Registry keys. You can configure Autoruns to show other locations, including Explorer shell extensions, toolbars, browser helper objects, Winlogon notifications, auto-start services, and much more. Autoruns goes way beyond the MSConfig utility bundled with Windows Me and XP.

Ccleaner - Download

CCleaner is a tool for cleaning your Windows PC. It protects your privacy online and makes your computer faster and more secure. Easy to use and a small, fast download.

Deep Freeze - Download

Deep Freeze makes computers indestructible and prevents against unwanted workstation changes—regardless of whether they are accidental or malicious. Deep Freeze is proven to reduce helpdesk support incidents and allows IT personnel to focus on more strategic IT needs.

Get User Info - Download

A tool to extract user info from a domain or computer.

Hide Window - Download

It is a utility that helps you to quickly hide a window of any application by using hotkeys or by clicking an icon in your tray. Moreover, you can specify groups of windows by their title text and set hotkeys for them. (For example, a group can comprise all windows that have 'Internet Explorer' in their title text.)

Java Run Time Environmnet - Download

JRE allows you to play online games, chat with people around the world, calculate your mortgage interest, and view images in 3D, just to name a few. It's also integral to the intranet applications and other e-business solutions that are the foundation of corporate computing.

Virtual Machine EHIS - Download

It’s a Virtual Machine created for Ethical Hacking & Information Security Workshop’s Student of VMWare Workstation.

Metasploit Framework - Download

Metasploit provides useful information and tools for penetration testers, security researchers, and IDS signature developers. This project was created to provide information on exploit techniques and to create a functional knowledgebase for exploit developers and security professionals. The tools and information on this site are provided for legal security research and testing purposes only.

Power ISO - Download

PowerISO is a powerful CD/DVD image file processing tool, which allows you to open, extract, create, edit, compress, encrypt, split and convert ISO files, and mount these files with internal virtual drive. It can process almost all CD-ROM image files including ISO and BIN.

Process Explorer - Download

The Process Explorer display consists of two sub-windows. The top window always shows a list of the currently active processes, including the names of their owning accounts, whereas the information displayed in the bottom window depends on the mode that Process Explorer is in: if it is in handle mode you'll see the handles that the process selected in the top window has opened; if Process Explorer is in DLL mode you'll see the DLLs and memory-mapped files that the process has loaded. Process Explorer also has a powerful search capability that will quickly show you which processes have particular handles opened or DLLs loaded.

LinkProcess Monitor - Download

Process Monitor is an advanced monitoring tool for Windows that shows real-time file system, Registry and process/thread activity. It combines the features of two legacy Sysinternals utilities, Filemon and Regmon, and adds an extensive list of enhancements including rich and nondestructive filtering, comprehensive event properties such session IDs and user names, reliable process information, full thread stacks with integrated symbol support for each operation, simultaneous logging to a file, and much more. Its uniquely powerful features will make Process Monitor a core utility in your system troubleshooting and malware hunting toolkit.

Streams - Download

The NTFS file system provides applications the ability to create alternate data streams of information. By default, all data is stored in a file's main unnamed data stream, but by using the syntax 'file:stream', you are able to read and write to alternates. Not all applications are written to access alternate streams, but you can demonstrate streams very simply. First, change to a directory on a NTFS drive from within a command prompt. Next, type 'echo hello > test:stream'. You've just created a stream named 'stream' that is associated with the file 'test'. Note that when you look at the size of test it is reported as 0, and the file looks empty when opened in any text editor. To see your stream enter 'more < test:stream' (the type command doesn't accept stream syntax so you have to use more)

Tweak - Download

Tweak add fun and functionality to the Windows experience. Its additional programs that developers work on after a product has been released.

Unlocker - Download

LinkUnlocker is the tool for unlocking resources from external dependencies.

WinPcap - Download

WinPcap is the industry-standard tool for link-layer network access in Windows environments: it allows applications to capture and transmit network packets bypassing the protocol stack, and has additional useful features, including kernel-level packet filtering, a network statistics engine and support for remote packet capture. WinPcap consists of a driver, that extends the operating system to provide low-level network access, and a library that is used to easily access the low-level network layers. This library also contains the Windows version of the well known libpcap Unix API.

WinRAR - Download

WinRar is the utility for creating Rar, Zip, etc Archives and Vice Verse.

ZoomIt - Download

ZoomIt is screen zoom and annotation tool for technical presentations that include application demonstrations. ZoomIt runs unobtrusively in the tray and activates with customizable hotkeys to zoom in on an area of the screen, move around while zoomed, and draw on the zoomed image.

4. Update Master Boot Record

Update Master Boot Record

Perform several Master Boot Record (MBR) tasks, like backing up, restoring, fixing the boot code in the MBR, etc. The utility should not be used for GUID Partition Table (GPT) disks. The utility now, by popular demand, also come in a x64-version running unde x64-editions of Windows and PE.



Trojans


1. Batch To Exe Converter

Bat to Exe Converter

Bat To Exe-Converter converts batch-script files to EXE files. Some features and differences to usual batch files: ghost applications; additional binaries, icons, version information; hidden source.



2. Joiners

Micro joiner

With MicroJoiner you can join (bind) more than one file into single one. And all files will be executed at once.

Hot Fusion

Hotfusion is a free file binder tool that can be used to bind files of all types into a single fused module for silent self-extraction. Below are some features of Hotfusion. Features and configurations: Binds files of all types; Sets user defined icon of fused module; Randomly renames files on extraction; Moves each bound file to its desired destination; Sequentially runs bound files on extraction; Randomize signature of fused module to prevent detection by antivirus; Silently registers bound libraries on extraction (dll, ocx); Adds bound files to startup using different methods; Silent self destruction; Saves fusion configuration.



3. TCP View

TCP View

TCPView is a Windows program that will show you detailed listings of all TCP and UDP endpoints on your system, including the local and remote addresses and state of TCP connections. On Windows Server 2008, Vista, and XP, TCPView also reports the name of the process that owns the endpoint. TCPView provides a more informative and conveniently presented subset of the Netstat program that ships with Windows. The TCPView download includes Tcpvcon, a command-line version with the same functionality.



4. Trojan Software

Beast

Beast is a Windows-based backdoor trojan horse more commonly known in the underground cracker community as a RAT (Remote Administration Tool). Beast was one of the first trojans to feature a 'reverse connection' to its victims and once established, it gave the attacker complete control over the infected computer.

Back Attack

Back Attack is a Windows Based Trojan horse, which can also be called as Remote Administration Tool.

Back Orifice

BackOrifice Trojan when installed on a Microsoft Windows system, this backdoor trojan horse program allows others to gain full access to the system through a network connection

Donald Dick

Backdoor Donald Dick 1.52 is a Trojan that opens up a backdoor program that, once installed on a system, permits unauthorized users to remotely extract passwords, edit the registry, log keystrokes, etc. Donald Dick runs from the server file "c:\WINDOWS\SYSTEM\pnpmgr.pci" over the ports 23476 and 23477 via TCP.

Girl Friend

The Girlfriend trojan horse is one of many trojan horse programs that attackers can use to access your computer system without your knowledge or consent.

Net Bus

The Netbus trojan is one of the most famous trojans around. Its authored by Carl-Frederik Neikter that is very similar to the "Back Orifice" trojan distributed by CdC. It allows ANYONE running the client portion to connect and control ANYONE running the server portion of it, with the same rights and privileges as the currently logged on user.

Snow Door

Snow Door is a trojan program with help of this hacker can gain access of Victim.

Sub Seven

Sub7 or Subseven Gold (also known as Backdoor-G and all of its variants) is the most well known Trojan backdoor application available. You can download the setup-file of Sub7 from anywhere.



Web Server As a Target


1. Script

PHP Remote Code Execution Script

This Script can be used for Sending PHP Remote Code Execution and must solely be used for Educational Purpose only. For using this script, you will have to upload it on some Website.



2. Vulnerability Scanners

Acunetix

Website security is possibly today's most overlooked aspect of securing the enterprise and should be a priority in any organization. Hackers are concentrating their efforts on web-based applications - shopping carts, forms, login pages, dynamic content, etc. Web applications are accessible 24 hours a day, 7 days a week and control valuable data since they often have direct access to backend data such as customer databases.

N Stalker

N-Stalker® was created in April 2000 by information security technology specialists, aiming at providing solutions to protect corporations and individuals against digital threats that affect information systems. Since then, our research & development laboratory has been working nonstop on security researches, producing web attack detection controls for the past years.



3. Web Ripper Software

Internet Download Manager

Internet Download Manager (IDM) is a tool to increase download speeds by up to 5 times, resume and schedule downloads. Comprehensive error recovery and resume capability will restart broken or interrupted downloads due to lost connections, network problems, computer shutdowns, or unexpected power outages Also you can rip any Website with the help if IDM.

Web Ripper

WebRipper is a free Internet scanner and downloader, which is easy to use, yet powerful and fast. Download massive amounts of images, videos, audio, executables or documents from any website in just a moment. No need to waste your time clicking the links and saving every file manually. WebRipper uses spider-technology to follow the links in all directions from the startaddress. It filters out the interesting files on the way, and adds them to the download-queue for fast downloading by the multi channel download-engine.

Black Widow

Internet scanning and downloading tool for the expert and the novice.



Wireless Hacking


1. Linux OS

Back Track

BackTrack is a Linux-based penetration testing arsenal that aids security professionals in the ability to perform assessments in a purely native environment dedicated to hacking. Regardless if you’re making BackTrack your primary operating system, booting from a LiveDVD, or using your favorite thumbdrive. Whether you’re hacking wireless, exploiting servers, performing a web application assessment, learning, or social-engineering a client, BackTrack is the one-stop-shop for all of your security needs.



2. Network Analyzer

Aircrack-NG

Aircrack-ng is an 802.11 WEP and WPA-PSK keys cracking program that can recover keys once enough data packets have been captured. It implements the standard FMS attack along with some optimizations like KoreK attacks, as well as the all-new PTW attack, thus making the attack much faster compared to other WEP cracking tools. In fact, Aircrack-ng is a set of tools for auditing wireless networks.

Net Stumbler

It’s a Wireless Networking Tool, can be used for Wireless Auditing Purpose.



3. Proxy Server

CC Proxy

Proxy Server CCProxy is easy-to-use and powerful Internet connection sharing software. CCProxy can support broadband, DSL, dial-up, optical fiber, satellite, ISDN and DDN connections, it helps you build your own proxy server and share Internet access within the LAN efficiently and easily. CC Proxy Server can act as an HTTP, mail, FTP, SOCKS, news and telnet proxy server. It features powerful account management functions, including Internet access control, bandwidth control, Internet web filtering, content filtering and time control. It also provides web caching, online access monitoring, access logging and bandwidth usage statistics functions.



Software Cracking


1. Debugger

Olly Debugger

OllyDbg is a 32-bit assembler level analysing debugger for Microsoft® Windows®. Emphasis on binary code analysis makes it particularly useful in cases where source is unavailable. OllyDbg is a shareware, but you can download and use it for free. It can help you in checking Assembly code of any software also you can make changes in that software.



2. Disassembler

Windows Disassembler (WinDASM)

It’s a Windows hosted multi-processor disassembler that offers so many features it is hard to describe them all. It can help you in checking Assembly code of any software.



3. Patch Creator

Code Fusion

It’s a utility which can help us in Creating Patch pf any sodtware.



4. Softwares

Perfect Keylogger

It logs the keystrokes from your keyboard and saves the data in a protected file.

PowerArchiver

PowerArchiver offers hundreds of features, yet remains easy to use, small and fast. Novice users will find a familiar interface complete with tutorial and detailed help, while more experienced users can take advantage of full Explorer integration, multiple encryption methods and advanced compression algorithms.

WinRAR

WinRAR is an archiving utility that completely supports RAR and ZIP archives and is able to unpack CAB, ARJ, LZH, TAR, GZ, ACE, UUE, BZ2, JAR, ISO, 7Z, Z archives. It consistently makes smaller archives than the competition, saving disk space and transmission costs.

1. Nmap

I think everyone has heard of this one, recently evolved into the 4.x series.
Nmap (Network Mapper) is a free open source utility for network exploration
or security auditing. It was designed to rapidly scan large networks, although
it works fine against single hosts. Nmap uses raw IP packets in novel ways to
determine what hosts are available on the network, what services (application
name and version) those hosts are offering, what operating systems (and OS
versions) they are running, what type of packet filters/firewalls are in use,
and dozens of other characteristics. Nmap runs on most types of computers and
both console and graphical versions are available. Nmap is free and open source.
Can be used by beginners (-sT) or by pros alike (packet_trace). A very
versatile tool, once you fully understand the results.


2. Nessus Remote Security Scanner

Recently went closed source, but is still essentially free. Works with a client-
server framework.
Nessus is the worlds most popular vulnerability scanner used in over 75,000
organizations world-wide. Many of the worlds largest organizations are
realizing significant cost savings by using Nessus to audit business-critical
enterprise devices and applications.

3. John the Ripper
Yes, JTR 1.7 was recently released!
John the Ripper is a fast password cracker, currently available for many
flavors of Unix (11 are officially supported, not counting different
architectures), DOS, Win32, BeOS, and OpenVMS. Its primary purpose is to detect
weak Unix passwords. Besides several crypt(3) password hash types most commonly
found on various Unix flavors, supported out of the box are Kerberos AFS and
Windows NT/2000/XP/2003 LM hashes, plus several more with contributed patches.
You can get JTR Here – http://www.openwall.com/john/

4. Nikto

Nikto is an Open Source (GPL) web server scanner which performs comprehensive
tests against web servers for multiple items, including over 3200 potentially
dangerous files/CGIs, versions on over 625 servers, and version specific
problems on over 230 servers. Scan items and plugins are frequently updated and
can be automatically updated (if desired).
Nikto is a good CGI scanner, there are some other tools that go well with Nikto
(focus on http fingerprinting or Google hacking/info gathering etc, another
article for just those).

5. SuperScan

Powerful TCP port scanner, pinger, resolver. SuperScan 4 is an update of the
highly popular Windows port scanning tool, SuperScan.
If you need an alternative for nmap on Windows with a decent interface, I
suggest you check this out, it’s pretty nice.

6. p0f

P0f v2 is a versatile passive OS fingerprinting tool. P0f can identify the
operating system on:
- machines that connect to your box (SYN mode),
- machines you connect to (SYN+ACK mode),
- machine you cannot connect to (RST+ mode),
- machines whose communications you can observe.
Basically it can fingerprint anything, just by listening, it doesn’t make ANY
active connections to the target machine.

7. Wireshark (Formely Ethereal)

Wireshark is a GTK+-based network protocol analyzer, or sniffer, that lets you
capture and interactively browse the contents of network frames. The goal of
the project is to create a commercial-quality analyzer for Unix and to give
Wireshark features that are missing from closed-source sniffers.
Works great on both Linux and Windows (with a GUI), easy to use and can
reconstruct TCP/IP Streams! Will do a tutorial on Wireshark later.
Get Wireshark Here –http://www.wireshark.org/

8. Yersinia

Yersinia is a network tool designed to take advantage of some weakeness in
different Layer 2 protocols. It pretends to be a solid framework for analyzing
and testing the deployed networks and systems. Currently, the following network
protocols are implemented: Spanning Tree Protocol (STP), Cisco Discovery
Protocol (CDP), Dynamic Trunking Protocol (DTP), Dynamic Host Configuration
Protocol (DHCP), Hot Standby Router Protocol (HSRP), IEEE 802.1q, Inter-Switch
Link Protocol (ISL), VLAN Trunking Protocol (VTP).
The best Layer 2 kit there is.
Get Yersinia Here – http://yersinia.sourceforge.net/

9. Eraser

Eraser is an advanced security tool (for Windows), which allows you to
completely remove sensitive data from your hard drive by overwriting it several
times with carefully selected patterns. Works with Windows 95, 98, ME, NT,
2000, XP and DOS. Eraser is Free software and its source code is released under
GNU General Public License.
An excellent tool for keeping your data really safe, if you’ve deleted it..make
sure it’s really gone, you don’t want it hanging around to bite you in the ass.

10. PuTTY

PuTTY is a free implementation of Telnet and SSH for Win32 and Unix platforms,
along with an xterm terminal emulator. A must have for any h4. 0r wanting to
telnet or SSH from Windows without having to use the crappy default MS command
line clients.

11. LCP

Main purpose of LCP program is user account passwords auditing and recovery in
Windows NT/2000/XP/2003. Accounts information import, Passwords recovery, Brute
force session distribution, Hashes computing.
A good free alternative to L0phtcrack.
LCP was briefly mentioned in our well read Rainbow Tables and RainbowCrack
article.
 
12. Cain and Abel

My personal favourite for password cracking of any kind.
Cain & Abel is a password recovery tool for Microsoft Operating Systems. It
allows easy recovery of various kind of passwords by sniffing the network,
cracking encrypted passwords using Dictionary, Brute-Force and Cryptanalysis
attacks, recording VoIP conversations, decoding scrambled passwords, revealing
password boxes, uncovering cached passwords and analyzing routing protocols.
The program does not exploit any software vulnerabilities or bugs that could
not be fixed with little effort.
Get Cain and Abel Here – http://www.oxid.it/cain.html
 
13. Kismet

Kismet is an 802.11 layer2 wireless network detector, sniffer, and intrusion
detection system. Kismet will work with any wireless card which supports raw
monitoring (rfmon) mode, and can sniff 802.11b, 802.11a, and 802.11g traffic.
A good wireless tool as long as your card supports rfmon (look for an orinocco
gold).

14. NetStumbler

Yes a decent wireless tool for Windows! Sadly not as powerful as it’s Linux
counterparts, but it’s easy to use and has a nice interface, good for the
basics of war-driving.
NetStumbler is a tool for Windows that allows you to detect Wireless Local Area
Networks (WLANs) using 802.11b, 802.11a and 802.11g. It has many uses:
Verify that your network is set up the way you intended.
Find locations with poor coverage in your WLAN.
Detect other networks that may be causing interference on your network.
Detect unauthorized rogue access points in your workplace.
Help aim directional antennas for long-haul WLAN links.
Use it recreationally for WarDriving.
Get NetStumbler Here –http://www.stumbler.net/
 
15. hping

To finish off, something a little more advanced if you want to test your TCP/IP
packet monkey skills.
hping is a command-line oriented TCP/IP packet assembler/analyzer. The
interface is inspired to the ping unix command, but hping isn’t only able to
send ICMP echo requests. It supports TCP, UDP, ICMP and RAW-IP protocols, has a
traceroute mode, the ability to send files between a covered channel, and many
other features.
Get hping Here – http://www.hping.org/


This post has been flagged by the HacknMod community as questionable content.
Please note hacknmod’s postings are for informational purposes only. HacknMod
does not condone illegal acts. Behave yourselves!




Related Posts Plugin for WordPress, Blogger...
x

Get Our Latest Posts Via Email - It's Free

Enter your email address:

Delivered by FeedBurner