Hiển thị các bài đăng có nhãn Hacking Tools. Hiển thị tất cả bài đăng
Hiển thị các bài đăng có nhãn Hacking Tools. Hiển thị tất cả bài đăng

Thứ Năm, 16 tháng 2, 2012

Wireshark win32 V.1.6.5

Wireshark is the world's foremost network protocol analyzer, and is the standard in many industries. It is the continuation of a project that started in 1998. Hundreds of developers around the world have contributed to it, and it is still under active development.

Key features:

- Deep inspection of hundreds of protocols, with more being added all the time

- Live capture and offline analysis

- Standard three-pane packet browser

- Multi-platform: Runs on Windows, Linux, OS X, Solaris, FreeBSD, NetBSD, and many others

- Captured network data can be browsed via a GUI, or via the TTY-mode TShark utility

- The most powerful display filters in the industry

- Rich VoIP analysis

- Read/write many different capture file formats: tcpdump (libpcap), Pcap NG, Catapult DCT2000, Cisco Secure IDS iplog, Microsoft Network Monitor, Network General Sniffer (compressed and uncompressed), Sniffer Pro, and NetXray, Network Instruments Observer, NetScreen snoop, Novell LANalyzer, RADCOM WAN/LAN Analyzer, Shomiti/Finisar Surveyor, Tektronix K12xx, Visual Networks Visual UpTime, WildPackets EtherPeek/TokenPeek/AiroPeek, and many others

- Capture files compressed with gzip can be decompressed on the fly

- Live data can be read from Ethernet, IEEE 802.11, PPP/HDLC, ATM, Bluetooth, USB, Token Ring, Frame Relay, FDDI, and others (depending on your platform)

- Decryption support for many protocols, including IPsec, ISAKMP, Kerberos, SNMPv3, SSL/TLS, WEP, and WPA/WPA2

- Coloring rules can be applied to the packet list for quick, intuitive analysis

- Output can be exported to XML, PostScript, CSV, or plain text

Soft-Go is not responsible for the content of Wireshark publisher's description. We encourage you to determine whether this product or your intended use is legal. We do not encourage or condone the use of any software in violation of applicable laws.

Any form of support or technical problems regarding Wireshark must be addressed to its developer/publisher. Please be aware that we do NOT provide Wireshark cracks, serial numbers, registration codes or any forms of pirated software downloads.

Download Wireshark win32 V.1.6.5

Chủ Nhật, 12 tháng 2, 2012

Nessus 4.4.1-i386

Nessus focuses on the developement of security checks for recent security holes. The security checks database is updated on a daily basis, and all the newest security checks are available here and can be retrieved with the command nessus-update-plugins.

An RSS feed of all the newest security checks allows you to monitor which plugins are added and when. Traditional network security scanners tend to focus on the services listening on the network - and only on these. Now that viruses and worms are propagating thanks to flaws in mail clients or web browsers, this conception of security is getting outdated.

Nessus 4.4 is the only security scanner out there which has the ability to detect the remote flaws of the hosts on your network, but their local flaws and missing patches as well - whether they are running Windows, Mac OS X or a Unix-like system.

Download Nessus 4.4.1-i386

Thứ Bảy, 11 tháng 2, 2012

Zed Attack Proxy (ZAP)

The Zed Attack Proxy (ZAP) is an easy to use integrated penetration testing tool for finding vulnerabilities in web applications.It is designed to be used by people with a wide range of security experience and as such is ideal for developers and functional testers who are new to penetration testing.ZAP provides automated scanners as well as a set of tools that allow you to find security vulnerabilities manually.

Some of ZAP's features:
Intercepting Proxy
Active scanner
Passive scanner
Brute Force scanner
Spider
Fuzzer
Port Scanner
Dynamic SSL certificates
API
Beanshell integration
ChangeLog

Download Zed Attack Proxy (ZAP)

Chủ Nhật, 23 tháng 10, 2011

Magic-PS v1.5 SE++

Magic PS v1.5 SE FINAL is a tool to hack yahoo messenger password. You can use it to get password for any yahoo messenger ID. Magic PS v1.5 is a Powerfull Password Sender for Yahoo! Messenger.

Magic PS v1.5 sends victim id %26 pass to your id. It work without any smtp and script
Working tested on Win98, Me, NT, 2000, XP and Vista-7 OSs.

MPS is a Powerfull Password Sender for
Yahoo! Messenger

MPS sends victim id & pass to your id

Work without any smtp and script ;)

Tested on Win98-Me-NT-2000-XP

Risk Risk Risk Risk!!!

After creating MPS (sender.exe) you should not run it !!!!!
MPS sender must be run on victim's system ok

Download Magic-PS v1.5 SE++

Thứ Bảy, 6 tháng 8, 2011

TeraBIT Virus Maker 2.8 SE

I am trying to learn how these viruses work, in particular trojan virus that most often appear this time I do not use notepad to create a script virus. I tried old software terabit virus maker. 2.8 SE for those interested please download here from it please you choose to download through which, a lot of choice.

This software can make a trojan type virus, some uses this software, for example:

     1. How to turn off the monitor
     2. no sound in the volume
     3. her own close IE in 10 minutes
     4. etc. (please try yourself)

And how to use it very easy:

1. Open the first terabit Virus Maker 2.8 SE

2. Choose how viruses work,

3. click the white box Fake error Message and type in the message that the virus for which you are directed to read the message.

4. Type the number of bytes that you want, the greater the bytes that you type, the greater the virus that you created

5. name of the virus prior to install

6. select the images that you want and name viruses

7. The virus then click Create, and then save the settings, exit,

Download TeraBIT Virus Maker 2.8 SE

Thứ Hai, 1 tháng 8, 2011

AirSnort 0.2.6 Wifi Hack

AirSnort is a wireless LAN (WLAN) tool which recovers encryption keys. AirSnort operates by passively monitoring transmissions, computing the encryption key when enough packets have been gathered. 802.11b, using the Wired Equivalent Protocol (WEP), is crippled with numerous security flaws. Most damning of these is the weakness described in " Weaknesses in the Key Scheduling Algorithm of RC4 " by Scott Fluhrer, Itsik Mantin and Adi Shamir. Adam Stubblefield was the first to implement this attack, but he has not made his software public. AirSnort, along with WEPCrack, which was released about the same time as AirSnort, are the first publicly available implementaions of this attack.

Download AirSnort 0.2.6 Wifi Hack

Aircrack 2.1 Wifi Hack

Aircrack-ng is an 802.11 WEP and WPA-PSK keys cracking program that can recover keys once enough data packets have been captured. It implements the standard FMS attack along with some optimizations like KoreK attacks, as well as the all-new PTW attack, thus making the attack much faster compared to other WEP cracking tools. In fact, Aircrack-ng is a set of tools for auditing wireless networks.

Download Aircrack.2.1 Wifi Hack

Chủ Nhật, 24 tháng 7, 2011

Real Spy Monitor.V.2.94

Real Spy Monitor - spy program, writes a log file of all user activity on the computer. Allows you to keep track of: pressed on the keyboard, run programs and opening documents received and sent messages to the Internet-pager AOL, ICQ, MSN, AIM, Yahoo Messenger, and makes periodic screen shots. All of this information the program can secretly send via FTP or e-mail. Real Spy Monitor runs in a half-hidden mode, you can see it in Task Manager, but on the desktop, it does not manifest itself.
What's New in Real Spy Monitor Build 2.94
New Updates:
1 Reduces CPU occupancy to lower than 15%
2 Fixes the bug when it can't be loaded when Windows Startup
3 Hides application name of itself in Windows2000/XP
4 Fixes the bug on "e-mail delivery"
5 Supports to spy the newest version of MSN Messenger 6.1
6 Optimizes the code to avoid Unknown error
7 Redesigns all the graphic user interface;
8 Redesigns html report, see the example [Keystrokes] [Websites]
9 Html report supports to view snapshots directly
10 Save the html report with snapshots to local disk directly
11 Redesigns Messenger HTML report
12 Fixes the bug on Messenger HTML report delivery
13 Supports to remove/restore icon from Desktop, Start Menu, Add/Remove Program
14 Start Real Spy Monitor click on Start, Run, typed in "realspy"
15 If administrator remove the icon, the program cannot be uninstalled without password.
16 Adds a warning to user that they are monitored on start up. The text can be changed in the control panel by the administrator.
17 Adds a "Test Now" button to test whether the SMTP Mail Host works or not.
18 Supports nearly all the available SMTP mail hosts.
19 Reduces CPU occupancy to lower than 5%
20 Improve the function of "File/Doc Access", you can record all the file-operation now, such as create, delete, update files or folders etc.
21 Supports to close the splash warning in ten seconds automatically
22 Supports to deliver logs via FTP now!
23 Rewrite the core code to avoid "RUN-TIME ERROR"
24 Improve the uninstall program.
25 Rewrite the setup program and reduce the size of it.
26 Supports to delete all the logs in system when you uninstall the program.
27 Hides installing path to avoid to be found.
28 Fix the bug "Run time error '75':Pacht/File access error" for win2000&winXP user under NTFS disk
29 Rewrite the core code to support Windows XP SP2
30 Optimizes the code for win98 to avoid setacl.ocx missing error
31 Names logs as "rsm@date.html" format to deliver via FTP
32 Rewrites the core code to avoid being scanned as virus or spyware mistakenly.
33 Supports to spy the newest version of MSN Messenger 7.0
34 Supports to spy the newest explorer version IE7

Download Real Spy Monitor.V.2.94

Thứ Bảy, 23 tháng 7, 2011

Cell Spy Pro v2

That means that in as little as 5 minutes you can be checking any phone you want. That's right. If you buy this, it will take about 2 minutes to process the order and in about 1 minute you will receive an E-Mail with the download link. Download takes about 10 seconds and installation onto your phone takes about 1 or 2 minutes. And instantly you will be reading your wife's SMS/text messages, listening to your kid's phone conversation, even knowing what your boss or your neighbor is saying. All of this is done in stealth mode. This means they will never know that you are doing this. And this works on ALL phones. Samsung, Motorola, Nokia, Ericsson, Blackberry, absolutely all of them. This will work in all countries, on all networks.
Please read this carefully
  • Works on all Bluetooth enabled Phones and other devices
  • Completely Stealth (No one knows but you)
  •  No Hidden Fees
  • Downloads immediately after ordering (No Waiting)
  • Installs in Minutes
  • Only product of it's kind available to the public
Download Cell Spy Pro v2

Wireless WEP Key Password Spy 1.1

This software will instantly recover all WEP keys and wireless network passwords that have been stored on your computer. To get started, click “Find Wireless WEP Keys”. It will then display the adapter GUID and all recovered information associated with it including the wireless network name (SSID), the encryption type (WEP 40, WEP 104, or WPA-PSK), and the WEP key associated with each network. At the bottom of the screen you can see the name of your current Ethernet adapter, the total Kb sent and received during the current Windows session, and the current down/up throughput.
Download Wireless WEP Key Password Spy 1.1

Thứ Bảy, 9 tháng 7, 2011

Necro Virus Maker 3.0

Many ways actually to create a virus. From start to learn about programming to support the manufacture of these viruses, studying the hole-hole an operating system until the last way that is most easy to use software specifically designed to make virus.that too if my friend would not try to be a virus maker.dont noughty ok..

Download Necro Virus Maker 3.0
Get password in file s4ndmotion

Virus Generator DBVG ver1.7

Same as the previous software, the software is also useful to make reference software virus.Ini is not allowed to take advantage for purposes other evil yes .. the author is not responsible for the negative impact that caused the software to users. (only for educational use only) directly to the scene just us:

Download Virus Generator DBVG ver1.7
Get password in file s4ndmotion

Virus Maker 1.0 Free

Virus Maker 1.0 is an application that can make virus extension.vbsor so called VBS Virus.Aplikasi is very easy to use because it uses a simple.Aplication interface is also not detected as a virus by antivirus outside as well as local because it uses a technique that does not exist by Virus Another maker is on Indonesia.Aplication Virus Maker does not damage the computer unless the file is generated or generated application is damaging the computer with the level of "Low".

 SPECIAL INSTRUCTIONS
  • Pray before using this application so that the target not angry with you.
  • Trepent after doing naughty friends who have become targets.
  • Relax computer-which means if there is damage.
  • The author is not responsible for the occurrence of errorswho performed the user.

The resulting virus application level of damage is not severe, because it uses simple techniques that can disable Regedit or Task Manager and other Windows tools essential.

Symptoms of this virus are:
- Create a file. txt with appropriate titles that users fill in when creating the virus.
- Create a duplicate file of the virus. vbs with the appropriate title
user input while creating a virus.
- Disable some important tools of Windows, such as Task Manager.
- Create a file autorun.inf on all drives (including flash disk).
- When opening the drive will be no warning that the Windows Hosts file
Script not found. This can be overcome by removing the string
regisry follows:

HKEY_CURRENT_USER \ Software \ Microsoft \ Windows \ CurrentVersion \ Explorer \ MountPoints2.

Delete files MountPoints2 the registry in Windows.

Download Virus Maker 1.0
Getpassword in file s4ndmotion

Thứ Tư, 6 tháng 7, 2011

BackTrack 4 R2 Release ISO

BackTrack is a very popular LiveDistro among observers of security, the focus provides a tool for testing the system and network penetration. It has a diagnostic feature to analyze and direct path from the CD without disturbing the embedded system. BackTrack distribution originated from the collaboration of two major security Whax and Auditor Security Collection combines the advantages of the two distributions into one complete solution Excellence BackTrack 4 R2 Release.


Excellence backtrack:
1. Can run Windows Executable
2. It has a myriad of tools for hackers, Wifi Hack and etc.
3. Very Efficient
4. With a backtrack, you can be considered as a 'hacker'
The most popular and recognized Linux distribution security. BackTrack is a Linux-based penetration testing of weapons that help security professionals in the ability to conduct environmental assessments in the original pure dedicated to hacking. Regardless if you make your primary operating system BackTrack, tau using your favorite thumbdrive, BackTrack has been adjusted to each packet, kernel configuration, scripts and patch solely for the purpose of penetration tester

BackTrack landscape evolution many years of development, penetration testing, and to help unprecedented from the security community. BackTrack originally started with the previous version called Linux distributions Whoppix life, IWHAX, and Auditor. When BackTrack is developed, it is designed to be all in one live cd be used on safety audit and are specifically made ​​to not leave remnants of itself on the laptop. He has expanded into a framework that penetration testing is the most widely adopted and used by the security community worldwide.

Download BackTrack 4 R2 Release ISO

Thứ Ba, 5 tháng 7, 2011

Wifi Slax Wireless Hacking

WEP is an encryption scheme, based on RC-4 cipher, which is available on all 802.11a, b and g wireless products. WEP uses a set of bits called a key to scramble information in the data frames as it leaves the access point or client adapter and the scrambled message and then decrypted by the recipient. Both sides must have the same WEP key, which usually total 64 or 128 bits long. A number of semi-random 24 bit is called the Initialization Vector (IV), is part of the key, so that 64 bit WEP key actually contains only 40 bits of the \ "strong \" encryption while a 128 bit key 104. IV is placed in encrypted frame \ 'header, and transmitted in plain text.

Traditionally, cracking WEP keys has been a slow and tedious process. The attacker must capture hundreds of thousands or millions of packets? a process that could take hours or even days, depending on the volume of traffic passing through the wireless network. After enough packets were captured, a WEP cracking program such as Aircrack would be used to find the WEP key.
Basic Directions:
1). Boot from cd
2). Getting the WEP key
3). Write
4). Reboot to windows
5). Connect using the WEP key

Create a buddy who want to hacking the login passwords for free hotspotan can, can use this software to get a username and password hacking hotspot pal who want to .... should not be abused this software ok.

Download Wifi Slax Wireless Hacking

Wzcook Hotspot Hacking

To my friend who want to try to break the password wireless,, ya .. I love the solution so that all can be hot pal spotan gratis.Cukup by using a very small size application called wzcook, then you can break down the Wireless network / hotspot you want . of course that has been paired with a password by pemiliknya.Adapaun wzcook how to use it, you just need a laptop that stores wzcook applications and wireless networks simply running mate certainly wzcook and will automatically search for wireless networks and password, after that you just use an access Wireless is for free ... good luck ..
Download Wzcook Hotspot Hacking
get password in file s4ndmotion

Chủ Nhật, 3 tháng 7, 2011

SpyBoss KeyLogger Pro 4.2.3 Full

SpyBoss KeyLogger Pro 4.2.3 pal certainly all familiar with the words keylogger which is one of the most prominent hackers weapon and of course 100% works well to record all keyboard activity on the victim's computer. With all the activity keylogger keyboard work will be recorded automatically with no known casualties so hackers can take over all the data about our own personal accounts such as facebook, email, banking and other accounts.


SpyBoss KeyLogger Pro 4.2.3 Features:

* Secretly Monitor with this feature is certainly shared by every software keylogger, which monitors all activities or activities performed by the keyboard to steal the victim's information secretly.
* Password Protection
* this feature allows you to give the password on this keylogger software so that no one else can access or launch this software.
* Stealth Mode
* here's the best feature of this software. With this feature, you can hide this software for no one knows if you're using this leading software.
* Encrypted Data Files
* all data that has been stored will be encrypted with a secure, so if someone finds your log files, they still will not be able to read it. The log file can only be read using this software.
* Email Log Files
* with this you can send the log files from anywhere on the computer that has installed this keylogger to your email address.
* Record Usernames And Passwords
* with this feature you can steal usernames and passwords of the victim when they open a site like facebook, email, twitter and other sites that use the login / sign-ins.

Download SpyBoss KeyLogger Pro 4.2.3
you can get password in file s4ndmotion

Award Keylogger 2.6

Award Keylogger allows you to monitor all users’ activity on any computers in real time and record each computer’s usage history. Award Keylogger makes it easy to view, in real time, the screenshots of the any computers, all typed keystrokes, visited Web sites, used programs. You can view a list of running processes and terminate undesirable ones.

Main Features:
* New! Run keylogger as a Windows service
* Easy-to-use, even for beginners
* Absolutely invisible/stealth mode
* Logs ***s and passwords typed in the every application
* Logs message typed in all instant messengers
* Visual surveillance, support screenshots view
* Slide show for screenshots
* Captures the contents behind the asterisks
* Captures mouse clicks
* Logs websites visited
* Captures AOL/AIM/Yahoo/ICQ chats
* Keyword Detection and Notification
* Records contents of password protected web pages, including Web Mail messages
* Logs Windows Clipboard
* Sends log by e-mail
* Uploads ALL logs into the separate folders by FTP
* Invisible for the firewall program
* Invisible in the Windows startup list
* Monitors all users of the PC
* User friendly HTML file format for emailed logs
* Invisible in Windows NT/2000/XP Task Manager and Windows 9.x/Me Task List
* Records Windows 9.x/Me/2000/XP/VISTA logon passwords
* Intercepts DOS-box and Java-chat keystrokes
* Supports international keyboards
* External log viewer
* Supports printing of the log
* Exports log to HTML

Download Award Keylogger 2.6

CheMax V.9.6

CheMax is one of the best offline cheat-base for PC games. The base is based on ChEaTs software and it is fully rewritten and updated. There are no hints or solutions in its base, only pure cheat codes, level codes and easter eggs. Current version of CheMax contains cheats for 5626 games!
This program is a great deceiver-base with codes, passwords for  more than 5395 games. That quantity is impressive, right? This  worth of shows that contain only contains deceptive CheMax useful information and only for PC gaming.
You can find almost every new and classic games here. And The bottom line is that this program is updated at least once a month. Ye can download an updated version of CheMax home page. It very page contains a huge collection of special utility for cheating in the game.

Download CheMax V.9.6

Thứ Sáu, 24 tháng 6, 2011

ProRat V.1.9 Special Edition

Is a backdoor trojan prorat class Rat, which has many functions spy. His name is a fusion of the English word professional, along with the acronym rat (Remote Administrator Tool). Created in Visual Basic, the program has more than 15 versions, one of the best programs to hack computers.Resources.Prorate allows attackers to perform malicious actions on the machines many of his victims.

These include:
* Keystrokes (Keylogger)
* Playing with Mariana adoleta Copelli
* Having a dog at home
* Steal passwords
* Full control over files
* Formatting drives
* Printer Control
* Open / close CD drive
* Hide taskbar, desktop and start button
* Take screenshots
* Show system information
* View webcam
* Listen to Mike
* Download and run files
And many other things, how to catch a mouse, keyboard, monitor ...
* View the work area of ​​the victim
* Format the computer and the victim among many many others.

Removal:
Most antivirus software can detect and remove prorat. However, you can compress and encrypt the executable, so it is not detected. A well known example is unzip the file using UPX infected and then protect it with Themida. However, several anti-virus programs already recognize this technique and still detect the server. You can remove the server (server) with a good antivirus boot or by going to task manager and canceling the process because the server is just going to run and type msconfig there you just go in and remove the boot server.

Download ProRat V.19 Full Password