"Lying in a featherbed will bring you no fame, nor staying beneath the quilt, and he who uses up his life without achieving fame leaves no more vestige of himself on Earth than smoke in the air or foam upon the water." -Dante Alighieri
Advanced Process Termination (APT) is a tiny but powerful utility that provides 18 unique process attacks:
- 2 kernel-mode termination techniques
- 12 user-mode process termination techniques
- 2 suspension techniques
- 2 fatal crash techniques
This arsenal makes APT ideal for testing the resistance of software to termination attacks, testing the configuration of your own security programs, as well as allowing you to terminate stubborn software that simply refuses to die.
APT also has internal anti-hook capabilities which transparently enables it to bypass most user-mode hooks which may otherwise try to interfere with termination techniques.
aircrack is an 802.11 WEP and WPA-PSK keys cracking program that can recover keys once enough data packets have been captured. It implements the standard FMS attack along with some optimizations like KoreK attacks, thus making the attack much faster compared to other WEP cracking tools. In fact, aircrack is a set of tools for auditing wireless networks.
With AnalyzeIt you can inspect any file to find extra information about it. You can discover the real file type [based on the content of the file] and fully detailed extension information: Program and/or extension function, File classification, MIME type, specific characters, Program ID, General notes and the company [+link] of the software used to create that type of file
There is a special section for information about analyzed executables: ImageBase, EntryPoint, CheckSum, Import and Export table, PE Directories [Resource, Exceptions, Reloc, Debug Datas, Description, Global PTR, TLS table, Local Config, Bound Import] and PE Sections with specific info: Name, RVA-Relative Virtual Address, Virtual Size, RAW Offset-File offset, RAW Size, Characteristics.
It can also detect what packer/cryptor/compressor/compiler processed the executable.
There is also a function to detect the OEP [Original Entry Point]
AutoHotkey is a free, open-source utility for Windows.
* Automate almost anything by sending keystrokes and mouse clicks.
* Create hotkeys for keyboard, joystick, and mouse. Virtually any key, button, or combination can become a hotkey.
* Expand abbreviations as you type them. For example, typing \"btw\" can automatically produce \"by the way\".
* Create custom data-entry forms, user interfaces, and menu bars.
* Remap keys and buttons on your keyboard, joystick, and mouse.
* Convert any script into an EXE file that can be run on computers that don\'t have AutoHotkey installed.
Cheat Engine is an open source tool designed to help you with modifying single player games running under window so you can make them harder or easier depending on your preference(e.g: Find that 100hp is too easy, try playing a game with a max of 1 HP), but also contains other usefull tools to help debugging games and even normal applications.
It comes with a memory scanner to quickly scan for variables used within a game and allow you to change them, but it also comes with a debugger, disassembler, assembler, speedhack, trainer maker, direct 3D manipulation tools, system inspection tools and more.
Bloodshed Dev-C++ is a full-featured Integrated Development Environment (IDE) for the C/C++ programming language. It uses Mingw port of GCC (GNU Compiler Collection) as it\'s compiler. Dev-C++ can also be used in combination with Cygwin or any other GCC based compiler.
With Dexpot you may
virtual desktops for
for graphic design,
for example, and
virtual desktops in
order to keep track
of your open
Google Hacks is a compilation of carefully crafted Google searches that expose novel functionality from Google\'s search and map services. For example, you can use it to view a timeline of your search results, view a map, search for music, search for books, and perform many other specific kinds of searches. You can also use this program to use google as a proxy.
HIEW stands for "Hackers' View".
This is an awesome Hex-Editor with many useful functions like assembly code highlighting, detailed info on executables, hex- and assembly editing, string- or code-search, etc.
A "must have" for those, who are interested in applications.
by Kevin Beaver (Author), Stuart McClure (Foreword)
"This book is about hacking ethically - the science of testing your computers and network for security vulnerabilities and plugging the holes you find before..."
The Hex Workshop Hex Editor by BreakPoint Software is a complete set of hexadecimal development tools for Microsoft Windows 2000 and later. Hex Workshop combines advanced binary editing and data interpretation with the ease and flexibility of a modern word processor. With the Hex Workshop, you can edit, cut, copy, paste, insert, fill and delete binary data. You can also work with data in its native structure and data types using our integrated structure view and smart bookmarks. Data editing is quick and easy with our extensive features that allow you to: jump to file or sector location, find or replace data, perform arithmetic and logical operations, binary compare files, generate checksums and digests, view character distributions and export data to RTF or HTML for publishing.
I2P: Invisible Internet Project;
I2P is an anonymizing network, offering a simple layer that identity-sensitive applications can use to securely communicate. All data is wrapped with several layers of encryption, and the network is both distributed and dynamic, with no trusted parties.
Many applications are available that interface with I2P, including mail, peer-peer, IRC chat, and others.
Can be seen as an alternative for the Tor Project.
A popular and simple method for jailbreaking (AKA unlocking — more apps for your iDevice, special settings changes, making your iPhone into a wi-fi hotspot, etc.) one's iPhone, iPod Touch, and iPad. Just visit site on your iDevice and slide to jailbreak. Note that latest iOS versions aren't typically supported.
Kismet is an 802.11 layer2 wireless network detector, sniffer, and intrusion detection system. Kismet will work with any wireless card which supports raw monitoring (rfmon) mode, and can sniff 802.11b, 802.11a, and 802.11g traffic.
Kismet identifies networks by passively collecting packets and detecting standard named networks, detecting (and given time, decloaking) hidden networks, and infering the presence of nonbeaconing networks via data traffic.
Lepton\'s Crack is a generic password cracker, easily customizable with a simple plug-in system.
It can perform a dictionary-based (wordlist) attack, as well as a brute-force (incremental) password scan, including enumeration of a regular expression (useful if you know something about the password)
Currently the formats supported are: standard MD4 hash, standard MD5 hash, NT MD4/Unicode, Lotus Domino HTTP password (R4) and SHA-1.
Download link is in the directory listing linked at the bottom of the page.
An excellent tutorial, tips, and hacker's site with anything from finding the right timer application to triple-booting operating systems. Has sections for Mac, Linux, and Windows, and Android operating systems.
MacroMaker allows you to create macros or recordings to automate most anything that you already do by hand. MacroMaker was written more for the use of people who regularly use computers and programmers rather than the casual PC user. Most anything you know how to do by hand can be translated into a macro or recording in MacroMaker. If you are having to perform repetitive tasks, this program will help you out tremendiously. The user can simulate a series of keystrokes, mouse events, play back previous recordings of keystrokes and mouse events or execute some built-in functions with just a keystroke. You can even store content from the clipboard in internal MacroMaker buffers for later use.
Metasploit is an open-source exploit framework written for unix with mainly windows exploits. Nice tool to write and test your own + exploit into any pc/site with existing payloads. Also comes with online ROR version.
Nikto is an Open Source (GPL) web server scanner which performs comprehensive tests against web servers for multiple items, including over 3300 potentially dangerous files/CGIs, versions on over 625 servers, and version specific problems on over 230 servers. Scan items and plugins are frequently updated and can be automatically updated (if desired).
Nmap (\"Network Mapper\") is a free and open source (license) utility for network exploration or security auditing. Many systems and network administrators also find it useful for tasks such as network inventory, managing service upgrade schedules, and monitoring host or service uptime. Nmap uses raw IP packets in novel ways to determine what hosts are available on the network, what services (application name and version) those hosts are offering, what operating systems (and OS versions) they are running, what type of packet filters/firewalls are in use, and dozens of other characteristics. It was designed to rapidly scan large networks, but works fine against single hosts. Nmap runs on all major computer operating systems, and both console and graphical versions are available.
PortableApps.com provides a truly open platform that works with any hardware you like (USB flash drive, iPod, portable hard drive, etc). The entire platform is open source built around an open format that any hardware or software provider can use.
Ever wondered which program has a particular file or directory open? Now you can find out. Process Explorer shows you information about which handles and DLLs processes have opened or loaded. The Process Explorer display consists of two sub-windows. The top window always shows a list of the currently active processes, including the names of their owning accounts, whereas the information displayed in the bottom window depends on the mode that Process Explorer is in: if it is in handle mode you\'ll see the handles that the process selected in the top window has opened; if Process Explorer is in DLL mode you\'ll see the DLLs and memory-mapped files that the process has loaded. Process Explorer also has a powerful search capability that will quickly show you which processes have particular handles opened or DLLs loaded.
PuTTY is a client program for the SSH, Telnet and Rlogin network protocols.
These protocols are all used to run a remote session on a computer, over a network. PuTTY implements the client end of that session: the end at which the session is displayed, rather than the end at which it runs.
In really simple terms: you run PuTTY on a Windows machine, and tell it to connect to (for example) a Unix machine. PuTTY opens a window. Then, anything you type into that window is sent straight to the Unix machine, and everything the Unix machine sends back is displayed in the window. So you can work on the Unix machine as if you were sitting at its console, while actually sitting somewhere else.
Python is a dynamic object-oriented programming language that can be used for many kinds of software development. It offers strong support for integration with other languages and tools, comes with extensive standard libraries, and can be learned in a few days. Many Python programmers report substantial productivity gains and feel the language encourages the development of higher quality, more maintainable code.
This is a VERY useful Linux Slax live CD developed for Penetration Testing. All you need to do is burn the .iso image to a CD and boot to it after a restart on any computer. BT3 has a NICE collection of tools that can be used for hacking, windows password cracking,network mapping, and a bunch of other fun tools to mess around with. It also has KDE and Flux, so it has a very friendly GUI. Check it out!
RocketDock is an
Skunkie of Punk
RocketDock is able
to show live updates
of minimized windows
as in Mac OS X, and
in Windows Vista it
can show live
thumbnail updates on
the taskbar. It is
Launcher, and Y'z
S-Tools is a stenography tool that hides files in BMP, GIF, and WAV files. You open up a copy of S-Tools and drag pictures and sounds across to it. To hide files you just drag them over open sound/picture windows. You can hide multiple files in one sound/picture and your data is compressed before being encrypted then hidden. Multi-threaded operation means that you can have many hide/reveal operations going simultaneously without fear of them interfering with you or holding up your work. You can even close the original picture/sound with no ill effects to ongoing threads. Encryption services come courtesy of "cryptlib" by Peter Gutmann (and others).
The Sysinternals Troubleshooting Utilities have been rolled up into a single Suite of tools. This file contains the individual troubleshooting tools and help files. It does not contain non-troubleshooting tools like the BSOD Screen Saver or NotMyFault.
Tor is a toolset for a wide range of organizations and people that want to improve their safety and security on the Internet. Using Tor can help you anonymize web browsing and publishing, instant messaging, IRC, SSH, and other applications that use the TCP protocol. Tor also provides a platform on which software developers can build new applications with built-in anonymity, safety, and privacy features.
Tizag was designed to teach beginner web programmers how to use HTML and CSS. We invite you to begin the tutorials right away. We have...
* A Beginner tutorial - For those just starting to learn to make web pages.
* HTML Tutorial - Begin your web designing with a solid background in HTML.
* CSS Tutorial - Check out the latest web design techniques available to you.
* PHP Tutorial - Understand what all the PHP hype is about with our tutorial.
* Web Host Guide - An overview of all the information you need to know about choosing and using a web host.
* CSS Reference - CSS Quick-Reference sheet. Each item of the reference also has an accompanying example.
* HTML Reference - HTML Tag Reference including attributes associated with each tag and accompanying examples.
Turbo is a software "Turbo Switch". You may set the effective CPU speed anywhere from 1 to 100% of full speed. All programs will execute at the reduced CPU speed set by Turbo. Works with Win/9x and Win/NT. Freeware.
This site is dedicated to all the researchers and reverse engineers interested in Reverse Code Engineering (RCE) techniques and practices and all things related.
You will be able to find a wide breadth of information retained on this site to help in your research ranging from; anti-debugging, virtual machines, unpacking, coding, disassembling, debugging, keygenning, cryptography and much, much more.
VirtualBox is a free general-purpose full virtualizer for x86 hardware. Targeted at server, desktop and embedded use, it is now the only professional-quality virtualization solution that is also Open Source Software.
At W3Schools you will find all the Web-building tutorials you need, from basic HTML and XHTML to advanced XML, SQL, Database, Multimedia and WAP, Totally Free. Great for people new to computer languages.
WinDirStat (WDS) is a disk usage statistics viewer and cleanup tool for Windows. It shows disk, file and directory sizes in a treelist as well as graphically in a treemap, much like KDirStat or SequoiaView.
dsniff is a collection of tools for network auditing and penetration testing. dsniff, filesnarf, mailsnarf, msgsnarf, urlsnarf, and webspy passively monitor a network for interesting data (passwords, e-mail, files, etc.). arpspoof, dnsspoof, and macof facilitate the interception of network traffic normally unavailable to an attacker (e.g, due to layer-2 switching). sshmitm and webmitm implement active monkey-in-the-middle attacks against redirected SSH and HTTPS sessions by exploiting weak bindings in ad-hoc PKI.
meh if you don\'t know what that is...
FreeBSD® is an advanced operating system for x86 compatible (including Pentium® and Athlon™), amd64 compatible (including Opteron™, Athlon™64, and EM64T), UltraSPARC®, IA-64, PC-98 and ARM architectures. It is derived from BSD, the version of UNIX® developed at the University of California, Berkeley. It is developed and maintained by a large team of individuals. Additional platforms are in various stages of development.
socat is a relay for bidirectional data transfer between two independent data
channels. Each of these data channels may be a file, pipe, device (serial line
etc. or a pseudo terminal), a socket (UNIX, IP4, IP6 - raw, UDP, TCP), an
SSL socket, proxy CONNECT connection, a file descriptor (stdin etc.), the GNU
line editor (readline), a program, or a combination of two of these.
These modes include generation of "listening" sockets, named pipes, and pseudo
tl;dr a better netcat with more capability