The big lie of computer security is that security improves by imposing complex passwords on users. In real life, people write down anything they can't remember. Security is increased by designing for the way humans actually behave. -Jakob Nielsen
ARP cache poisoning tool written python using the Scapy packet library.
Can poison using either ARP requests or ARP replies.
It can also flood ARP tables and has a quick command for enabling ip-forwarding.
Advanced SystemCare Free (formerly Advanced WindowsCare Personal) has a one-click approach to help protect, repair, clean, and optimize your PC. With over 35 MILLION downloads since 2006, this fantastic, award-winning free registry cleaner and system optimizer is a "must-have" tool to speed up your slow computer. 100% safe with no adware, spyware, or viruses; a PC maintenance program that’s incredibly easy to use.
AirSnort is a wireless LAN (WLAN) tool which cracks encryption keys on 802.11b WEP networks. AirSnort operates by passively monitoring transmissions, computing the encryption key when enough packets have been gathered.
AutoHotkey is a free, open-source utility for Windows.
* Automate almost anything by sending keystrokes and mouse clicks.
* Create hotkeys for keyboard, joystick, and mouse. Virtually any key, button, or combination can become a hotkey.
* Expand abbreviations as you type them. For example, typing \"btw\" can automatically produce \"by the way\".
* Create custom data-entry forms, user interfaces, and menu bars.
* Remap keys and buttons on your keyboard, joystick, and mouse.
* Convert any script into an EXE file that can be run on computers that don\'t have AutoHotkey installed.
A VERY useful automation program. I've used it for all of the scripts I have ever made and I would like to see it put on the list. The program even has a very helpful forum to learn how to use the program effectively.
BFG is a modified hydra tool, which now supports generating passwords in brute-force mode, unlike the original hydra. Of course, full source code is provided, and it should compile on all systems where hydra itself compiles, which means all UNIX-based systems including Linux, BSD, Mac OS, Windows (cygwin), etc.
Clearing all your files is just a click away. Also choose what you want to keep and what you want to get rid of. CCleaner also has a useful tool to check system problems.
Cain & Abel is a password recovery tool for Microsoft Operating Systems. It allows easy recovery of various kind of passwords by sniffing the network, cracking encrypted passwords using Dictionary, Brute-Force and Cryptanalysis attacks, recording VoIP conversations, decoding scrambled passwords, recovering wireless network keys, revealing password boxes, uncovering cached passwords and analyzing routing protocols. The program does not exploit any software vulnerabilities or bugs that could not be fixed with little effort. It covers some security aspects/weakness present in protocol's standards, authentication methods and caching mechanisms; its main purpose is the simplified recovery of passwords and credentials from various sources, however it also ships some "non standard" utilities for Microsoft Windows users.
Cain & Abel has been developed in the hope that it will be useful for network administrators, teachers, security consultants/professionals, forensic staff, security software vendors, professional penetration tester and everyone else that plans to use it for ethical reasons. The author will not help or support any illegal activity done with this program. Be warned that there is the possibility that you will cause damages and/or loss of data using this software and that in no events shall the author be liable for such damages or loss of data. Please carefully read the License Agreement included in the program before using it.
The coolest tool to hack all sorts of games, with powerful commands and friendly interface. Every game hacker must have this tool...
* very useful also in browser games
Chickenfoot is a Firefox extension that puts a programming environment in the browser's sidebar so you can write scripts to manipulate web pages and automate web browsing.
Capsa Network Analyzer, a network traffic
analyzer ( Packet Sniffer ) for Windows, which
can be used to sniffer all traffics on a
network, and monitor, troubleshoot and diagnose
their network.
Colasoft Packet Builder enables creating custom network packets; users can use this tool to check their network protection against attacks and intruders. Colasoft Packet Builder includes a very powerful editing feature. Besides common HEX editing raw data, it features a Decoding Editor allowing users to edit specific protocol field values much easier.
Users are also able to edit decoding information in two editors - Decode Editor and Hex Editor. Users can select one from the provided templates Ethernet Packet, ARP Packet, IP Packet, TCP Packet and UDP Packet, and change the parameters in the decoder editor, hexadecimal editor or ASCII editor to create a packet. Any changes will be immediately displayed in the other two windows. In addition to building packets, Colasoft Packet Builder also supports saving packets to packet files and sending packets to network.
DemocraKey
It includes:
* Tor Browser – For anonymous web browsing without using an insecure anonymous proxy
* Clamwin Portable – To check the host computer for viruses, and to clean before surfing anonymously
* Thunderbird Portable – Send anonymous email or encrypted email with Enigmail and GnuPGP
* TrueCrypt – Create hidden volumes and encrypt your files so they are unreadable
Bloodshed Dev-C++ is a full-featured Integrated Development Environment (IDE) for the C/C++ programming language. It uses Mingw port of GCC (GNU Compiler Collection) as it\'s compiler. Dev-C++ can also be used in combination with Cygwin or any other GCC based compiler.
With Dexpot you may
have separate
virtual desktops for
different
applications. One
desktop might
feature applications
for graphic design,
for example, and
another might
feature your
business
applications.
Switch between
virtual desktops in
order to keep track
of your open
windows. Using
Dexpot, you'll
considerably
increase your
workflow.
"Using DownloadHelper, you can easily save videos from most of the popular video sites" -Main Site
Lets you download videos from youtube, or almost any other video/music site in a flv format (that you can then convert after download) As simple as click and its downloaded!
Elite Keylogger is a very powerful yet easy-to-use covert surveillance tool. Elite Keylogger offers several main types of logs available, such as keystrokes log, screenshots log, Internet activity log, applications history, clipboard log, E-mail history, passwords log and printer monitor. You can configure these logs in a way most preferable for you.
FireGPG is a Firefox extension under MPL which brings an interface to encrypt, decrypt, sign or verify the signature of text in any web page using GnuPG.
Firebug integrates with Firefox to put a wealth of web development tools at your fingertips while you browse. You can edit, debug, and monitor CSS, HTML, JavaScript, and network activity live in any web page.
Tamper data is a add on
for firefox that is used for hacking flash games(High scores)>
If you have trouble
using ti or don\'t know how to use it contact me at ryanb58@100wpd.com
The GNU Compiler Collection includes front ends for C, C++, Objective-C, Fortran, Java, and Ada, as well as libraries for these languages (libstdc++, libgcj,...).
Geany is a lightweight, fast, and compatible GTK2 based IDE. It supports many languages including but not limited to (PHP, C, C++, Ruby, Python, Bash).
Google Earth combines the power of Google Search with satellite imagery, maps, terrain and 3D buildings to put the world's geographic information at your fingertips.
The Hex Workshop Hex Editor by BreakPoint Software is a complete set of hexadecimal development tools for Microsoft Windows 2000 and later. Hex Workshop combines advanced binary editing and data interpretation with the ease and flexibility of a modern word processor. With the Hex Workshop, you can edit, cut, copy, paste, insert, fill and delete binary data. You can also work with data in its native structure and data types using our integrated structure view and smart bookmarks. Data editing is quick and easy with our extensive features that allow you to: jump to file or sector location, find or replace data, perform arithmetic and logical operations, binary compare files, generate checksums and digests, view character distributions and export data to RTF or HTML for publishing.
THC-Hydra - the best parallized login hacker: for Samba, FTP, POP3, IMAP, Telnet, HTTP Auth, LDAP, NNTP, MySQL, VNC, ICQ, Socks5, PCNFS, Cisco and more. Includes SSL support and is part of Nessus.
I2P: Invisible Internet Project;
I2P is an anonymizing network, offering a simple layer that identity-sensitive applications can use to securely communicate. All data is wrapped with several layers of encryption, and the network is both distributed and dynamic, with no trusted parties.
Many applications are available that interface with I2P, including mail, peer-peer, IRC chat, and others.
Can be seen as an alternative for the Tor Project.
An enhanced interactive shell for the python language, which includes object introspection. Excellent for experimenting with code and getting things to work.
John the Ripper is a fast password cracker, currently available for many flavors of Unix (11 are officially supported, not counting different architectures), Windows, DOS, BeOS, and OpenVMS. Its primary purpose is to detect weak Unix passwords. Besides several crypt(3) password hash types most commonly found on various Unix flavors, supported out of the box are Kerberos AFS and Windows NT/2000/XP/2003 LM hashes, plus several more with contributed patches.
The most advanced
penetration testing
distribution, ever.
From the creators of
BackTrack comes Kali
Linux, the most
advanced and
versatile
penetration testing
distribution ever
created. We have a
whole set of amazing
features lined up in
our security
distribution, geared
at streamlining the
penetration testing
experience.
L0phtCrack 6 is packed with powerful features such as scheduling, hash extraction from 64 bit Windows versions, multiprocessor algorithms, and networks monitoring and decoding. Yet it is still the easiest to use password auditing and recovery software available.
mass cracking md5 hashes just one click.
https://www.virustotal.com/en/file/64d6db9c9646a69955a51c9b1ab27a00841087c32ddfc5a26849992afeb1950e/analysis/1404143100/
requirement:
.NET Framework
Internet Connection
Author: Anon?M ID
Greets: Indonesian Fighter Cyber
MacroMaker allows you to create macros or recordings to automate most anything that you already do by hand. MacroMaker was written more for the use of people who regularly use computers and programmers rather than the casual PC user. Most anything you know how to do by hand can be translated into a macro or recording in MacroMaker. If you are having to perform repetitive tasks, this program will help you out tremendiously. The user can simulate a series of keystrokes, mouse events, play back previous recordings of keystrokes and mouse events or execute some built-in functions with just a keystroke. You can even store content from the clipboard in internal MacroMaker buffers for later use.
Video and music player that downloads torrents and converts files. Really useful. You can add websites directly to Miro like The Pirate Bay and Kickass torrents. Download them instantly.
Netcat is a featured networking utility which reads and writes data across network connections, using the TCP/IP protocol.
It is designed to be a reliable "back-end" tool that can be used directly or easily driven by other programs and scripts. At the same time, it is a feature-rich network debugging and exploration tool, since it can create almost any kind of connection you would need and has several interesting built-in capabilities.
It provides access to the following main features:
* Outbound and inbound connections, TCP or UDP, to or from any ports.
* Featured tunneling mode which allows also special tunneling such as UDP to TCP, with the possibility of specifying all network parameters (source port/interface, listening port/interface, and the remote host allowed to connect to the tunnel.
* Built-in port-scanning capabilities, with randomizer.
* Advanced usage options, such as buffered send-mode (one line every N seconds), and hexdump (to stderr or to a specified file) of trasmitted and received data.
* Optional RFC854 telnet codes parser and responder.
Nmap ("Network Mapper") is a free and open source (license) utility for network exploration or security auditing. Many systems and network administrators also find it useful for tasks such as network inventory, managing service upgrade schedules, and monitoring host or service uptime. Nmap uses raw IP packets in novel ways to determine what hosts are available on the network, what services (application name and version) those hosts are offering, what operating systems (and OS versions) they are running, what type of packet filters/firewalls are in use, and dozens of other characteristics. It was designed to rapidly scan large networks, but works fine against single hosts. Nmap runs on all major computer operating systems, and both console and graphical versions are available.
Nmap (\"Network Mapper\") is a free and open source (license) utility for network exploration or security auditing. Many systems and network administrators also find it useful for tasks such as network inventory, managing service upgrade schedules, and monitoring host or service uptime. Nmap uses raw IP packets in novel ways to determine what hosts are available on the network, what services (application name and version) those hosts are offering, what operating systems (and OS versions) they are running, what type of packet filters/firewalls are in use, and dozens of other characteristics. It was designed to rapidly scan large networks, but works fine against single hosts. Nmap runs on all major computer operating systems, and both console and graphical versions are available.
The NoScript Firefox extension provides extra protection for Firefox, Flock, Seamonkey and others mozilla-based browsers: this free, open source add-on allows JavaScript and Java execution only for trusted domains of your choice (e.g. your home-banking web site). NoScript optionally blocks Flash and other potentially exploitable plugins too, and provides the most powerful Anti-XSS protection available in a browser.
<img src=\"http://software.informaction.com/data/wc06.jpg\">
Notepad++ is a free source code editor (and Notepad replacement), which supports several programming languages, running under the MS Windows environment.
Object Dock ,is a program that enables users to organize their shortcuts, programs and running tasks into an attractive and fun animated Dock. Have Fun!!!
Okteta is a simple editor for the raw data of files. This type of program is also called hex editor or binary editor. Now that KDE is cross platform, this program can not only be used on Linux, but on Windows and MacOSx as well!
OllyDbg is a 32-bit assembler level analysing debugger for Microsoft® Windows®. Emphasis on binary code analysis makes it particularly useful in cases where source is unavailable.
Opera is a fast and secure web browser that features pop-up blocking, tabbed browsing, integrated searches, RSS, e-mail, and even IRC chat. A wide variety of add-ons ("widgets") are available from games, instant messaging, file sharing, media players, page source editor, cookie editor etc.
Why Opera?(by the author)
Speed up your surfing:
Get the fastest JavaScript engine ever
Browse more quickly on slow connections
See smooth animations and super-fast graphics
Make the most of your mouse
ake the Web easier:
Search right from the address field
Find your way back with a smart address field
Get suggestions as you search
Use any search engine from the browser
Quickly find what you need in any page
Multitask effectively with flexible tabs
Get a quick look inside your tabs
Get a better view of open webpages
Keep your spelling in check
Make reading easier on the eyes
Access favorite websites with one click
Have your data wherever you need it
Do more with unique Powerful features:
Stay in control of your downloads (Support for BitTorrent is also included)
Eliminate distractions with content blocking
Email with a powerful, efficient mail client
Customization:
Select from hundreds of skins
Use convenient and entertaining widgets
Share and remotely access files, music and photos
Peace of mind:
Rest assured with Opera's Web Threat Protection and Extended Validation
Keep an eye on security
Browse without leaving a trace
Stay up to date automatically
Control your cookies
Developer support:
Enjoy support for the latest standards(HTML5,CSS3)
Debug complex websites with Opera Dragonfly
Know where you are with Geolocation
Perl is a highly capable, feature-rich programming language with over 22 years of development.
Perl Features :
Powerful, stable, mature, portable.
Mission critical. High Quality Code.
Object-oriented, procedural and functional.
Easily extendible.
Text manipulation.
Unicode support.
Database integration.
C/C++ library interface.
Embeddable.
Open Source.
Ideal web programming language.
Web Frameworks.
Database integration.
Web modules(CPAN).
Duct-tape of the internet, and more...
Encryption capable.
Embed into Apache.
Ever wondered which program has a particular file or directory open? Now you can find out. Process Explorer shows you information about which handles and DLLs processes have opened or loaded. The Process Explorer display consists of two sub-windows. The top window always shows a list of the currently active processes, including the names of their owning accounts, whereas the information displayed in the bottom window depends on the mode that Process Explorer is in: if it is in handle mode you\'ll see the handles that the process selected in the top window has opened; if Process Explorer is in DLL mode you\'ll see the DLLs and memory-mapped files that the process has loaded. Process Explorer also has a powerful search capability that will quickly show you which processes have particular handles opened or DLLs loaded.
Process Hacker is a tool for viewing and manipulating processes and their threads, modules, memory and handles, and viewing and editing services. It can also read/write process memory and search through process memory using literal bytes or regular expressions.
It can view the command line and current directory of a process, view/edit its DEP status, and even DRM-protect and unprotect it.
It can run programs as another user or as SYSTEM, LOCAL SERVICE or NETWORK SERVICE if you have administator privileges. This is achieved using a helper program which is installed as a system service (similar to PsExec).
It loads symbols from various libraries automatically and uses them when displaying the call stacks of threads (just like Process Explorer). It also has a disassembler derived from OllyDbg's which can be accessed when viewing PE files' exports.
It can bypass most kernel-mode hooks and user-mode hooks on ZwOpenProcess, ZwOpenThread and ZwOpenProcessToken.
PuTTY is a client program for the SSH, Telnet and Rlogin network protocols.
These protocols are all used to run a remote session on a computer, over a network. PuTTY implements the client end of that session: the end at which the session is displayed, rather than the end at which it runs.
In really simple terms: you run PuTTY on a Windows machine, and tell it to connect to (for example) a Unix machine. PuTTY opens a window. Then, anything you type into that window is sent straight to the Unix machine, and everything the Unix machine sends back is displayed in the window. So you can work on the Unix machine as if you were sitting at its console, while actually sitting somewhere else.
Python is a dynamic object-oriented programming language that can be used for many kinds of software development. It offers strong support for integration with other languages and tools, comes with extensive standard libraries, and can be learned in a few days. Many Python programmers report substantial productivity gains and feel the language encourages the development of higher quality, more maintainable code.
RocketDock is an
application launcher
developed by
PolyVector and
Skunkie of Punk
Labs.
RocketDock is able
to show live updates
of minimized windows
as in Mac OS X, and
in Windows Vista it
can show live
thumbnail updates on
the taskbar. It is
compatible with
MobyDock,
ObjectDock, RK
Launcher, and Y'z
Dock skins.
A dynamic, open source programming language with a focus on simplicity and productivity. It has an elegant syntax that is natural to read and easy to write.
qlmap is an open
source penetration
testing tool that
automates the
process of
detecting and
exploiting SQL
injection flaws and
taking over of
database servers.
It comes with a
powerful detection
engine, many niche
features for the
ultimate
penetration tester
and a broad range
of switches lasting
from database
fingerprinting,
over data fetching
from the database,
to accessing the
underlying file
system and
executing commands
on the operating
system via out-of-
band connections.
SNORT® is an open source network intrusion prevention and detection system utilizing a rule-driven language, which combines the benefits of signature, protocol and anomaly based inspection methods. With millions of downloads to date, Snort is the most widely deployed intrusion detection and prevention technology worldwide and has become the de facto standard for the industry.
SnortSam is a plugin for Snort, an open-source light-weight Intrusion Detection System (IDS). The plugin allows for automated blocking of IP addresses on several firewalls.
Tor is a toolset for a wide range of organizations and people that want to improve their safety and security on the Internet. Using Tor can help you anonymize web browsing and publishing, instant messaging, IRC, SSH, and other applications that use the TCP protocol. Tor also provides a platform on which software developers can build new applications with built-in anonymity, safety, and privacy features.
an encryption
program that is
very powerful. able
to create many
volumes. encrypt a
file or a whole
partition or disc.
easy to use. it is
free.
Windows/Mac/Linux
Turbo is a software "Turbo Switch". You may set the effective CPU speed anywhere from 1 to 100% of full speed. All programs will execute at the reduced CPU speed set by Turbo. Works with Win/9x and Win/NT. Freeware.
Unlocker is a tool
that can trace and
"unlock" the locking
protection commonly
used in system
files. However, its
main use is to
terminate the
processes that are
using a certain
file, or force the
processes to stop
using the file, so
the user can safely
delete, rename or
move the file. It is
written by the
French programmer
Cedrick 'Nitch'
Collomb.
VB Decompiler is
decompiler for
programs (EXE, DLL
or OCX) written in
Visual Basic 5.0 and
6.0 and disassembler
for programs written
on .NET technology.
Vim is a highly configurable text editor built to enable efficient text editing. It is an improved version of the vi editor distributed with most UNIX systems.
Vim is often called a "programmer's editor," and so useful for programming that many consider it an entire IDE. It's not just for programmers, though. Vim is perfect for all kinds of text editing, from composing email to editing configuration files.
VideoLAN (VLC) is a free and open source cross-platform multimedia player and framework that plays most multimedia files as well as DVDs, CDs, VCDs and various streaming protocols.
VirtualBox is a free general-purpose full virtualizer for x86 hardware. Targeted at server, desktop and embedded use, it is now the only professional-quality virtualization solution that is also Open Source Software.
Web Application Attack and Audit Framework.
W3af is a great piece of software designed for testing web applications.
Written in Python.
Comes with over 100 plugins for brute-forcing, evasion, page discovery, exploit discovery and exploits. Extensible with Python.
Firefox add-on. This toolbar allows you to edit and view parts of a webpage in a user-friendly way, even when they are not normally so obvious. (Great for HTS)
WinDirStat (WDS) is a disk usage statistics viewer and cleanup tool for Windows. It shows disk, file and directory sizes in a treelist as well as graphically in a treemap, much like KDirStat or SequoiaView.
WinRAR is a Windows data compression tool that focuses on the RAR and ZIP data compression formats for all Windows users. Supports RAR, ZIP, CAB, ARJ, ...
Ophcrack is a free Windows password cracker based on rainbow tables. It is a very efficient implementation of rainbow tables done by the inventors of the method. It comes with a Graphical User Interface and runs on multiple platforms.
Features:
* » Runs on Windows, Linux/Unix, Mac OS X, ...
* » Cracks LM and NTLM hashes.
* » Free tables available for Windows XP and Vista.
* » Brute-force module for simple passwords.
* » LiveCD available to simplify the cracking.
* » Loads hashes from encrypted SAM recovered from a Windows partition, Vista included.
* » Free and open source software (GPL).
socat is a relay for bidirectional data transfer between two independent data
channels. Each of these data channels may be a file, pipe, device (serial line
etc. or a pseudo terminal), a socket (UNIX, IP4, IP6 - raw, UDP, TCP), an
SSL socket, proxy CONNECT connection, a file descriptor (stdin etc.), the GNU
line editor (readline), a program, or a combination of two of these.
These modes include generation of "listening" sockets, named pipes, and pseudo
terminals.
tl;dr a better netcat with more capability
HackThisSite is the collective work of the HackThisSite staff, licensed under a CC BY-NC license.
We ask that you inform us upon sharing or distributing.