In all large corporations, there is a pervasive fear that someone, somewhere is having fun with a computer on company time. Networks help alleviate that fear.
AutoHotkey is a free, open-source utility for Windows.
* Automate almost anything by sending keystrokes and mouse clicks.
* Create hotkeys for keyboard, joystick, and mouse. Virtually any key, button, or combination can become a hotkey.
* Expand abbreviations as you type them. For example, typing \"btw\" can automatically produce \"by the way\".
* Create custom data-entry forms, user interfaces, and menu bars.
* Remap keys and buttons on your keyboard, joystick, and mouse.
* Convert any script into an EXE file that can be run on computers that don\'t have AutoHotkey installed.
Bloodshed Dev-C++ is a full-featured Integrated Development Environment (IDE) for the C/C++ programming language. It uses Mingw port of GCC (GNU Compiler Collection) as it\'s compiler. Dev-C++ can also be used in combination with Cygwin or any other GCC based compiler.
With Dexpot you may
have separate
virtual desktops for
different
applications. One
desktop might
feature applications
for graphic design,
for example, and
another might
feature your
business
applications.
Switch between
virtual desktops in
order to keep track
of your open
windows. Using
Dexpot, you'll
considerably
increase your
workflow.
Firebug integrates with Firefox to put a wealth of web development tools at your fingertips while you browse. You can edit, debug, and monitor CSS, HTML, JavaScript, and network activity live in any web page.
Tamper data is a add on
for firefox that is used for hacking flash games(High scores)>
If you have trouble
using ti or don\'t know how to use it contact me at ryanb58@100wpd.com
The Hex Workshop Hex Editor by BreakPoint Software is a complete set of hexadecimal development tools for Microsoft Windows 2000 and later. Hex Workshop combines advanced binary editing and data interpretation with the ease and flexibility of a modern word processor. With the Hex Workshop, you can edit, cut, copy, paste, insert, fill and delete binary data. You can also work with data in its native structure and data types using our integrated structure view and smart bookmarks. Data editing is quick and easy with our extensive features that allow you to: jump to file or sector location, find or replace data, perform arithmetic and logical operations, binary compare files, generate checksums and digests, view character distributions and export data to RTF or HTML for publishing.
THC-Hydra - the best parallized login hacker: for Samba, FTP, POP3, IMAP, Telnet, HTTP Auth, LDAP, NNTP, MySQL, VNC, ICQ, Socks5, PCNFS, Cisco and more. Includes SSL support and is part of Nessus.
I2P: Invisible Internet Project;
I2P is an anonymizing network, offering a simple layer that identity-sensitive applications can use to securely communicate. All data is wrapped with several layers of encryption, and the network is both distributed and dynamic, with no trusted parties.
Many applications are available that interface with I2P, including mail, peer-peer, IRC chat, and others.
Can be seen as an alternative for the Tor Project.
MacroMaker allows you to create macros or recordings to automate most anything that you already do by hand. MacroMaker was written more for the use of people who regularly use computers and programmers rather than the casual PC user. Most anything you know how to do by hand can be translated into a macro or recording in MacroMaker. If you are having to perform repetitive tasks, this program will help you out tremendiously. The user can simulate a series of keystrokes, mouse events, play back previous recordings of keystrokes and mouse events or execute some built-in functions with just a keystroke. You can even store content from the clipboard in internal MacroMaker buffers for later use.
Video and music player that downloads torrents and converts files. Really useful. You can add websites directly to Miro like The Pirate Bay and Kickass torrents. Download them instantly.
Nmap (\"Network Mapper\") is a free and open source (license) utility for network exploration or security auditing. Many systems and network administrators also find it useful for tasks such as network inventory, managing service upgrade schedules, and monitoring host or service uptime. Nmap uses raw IP packets in novel ways to determine what hosts are available on the network, what services (application name and version) those hosts are offering, what operating systems (and OS versions) they are running, what type of packet filters/firewalls are in use, and dozens of other characteristics. It was designed to rapidly scan large networks, but works fine against single hosts. Nmap runs on all major computer operating systems, and both console and graphical versions are available.
The NoScript Firefox extension provides extra protection for Firefox, Flock, Seamonkey and others mozilla-based browsers: this free, open source add-on allows JavaScript and Java execution only for trusted domains of your choice (e.g. your home-banking web site). NoScript optionally blocks Flash and other potentially exploitable plugins too, and provides the most powerful Anti-XSS protection available in a browser.
<img src=\"http://software.informaction.com/data/wc06.jpg\">
Ever wondered which program has a particular file or directory open? Now you can find out. Process Explorer shows you information about which handles and DLLs processes have opened or loaded. The Process Explorer display consists of two sub-windows. The top window always shows a list of the currently active processes, including the names of their owning accounts, whereas the information displayed in the bottom window depends on the mode that Process Explorer is in: if it is in handle mode you\'ll see the handles that the process selected in the top window has opened; if Process Explorer is in DLL mode you\'ll see the DLLs and memory-mapped files that the process has loaded. Process Explorer also has a powerful search capability that will quickly show you which processes have particular handles opened or DLLs loaded.
PuTTY is a client program for the SSH, Telnet and Rlogin network protocols.
These protocols are all used to run a remote session on a computer, over a network. PuTTY implements the client end of that session: the end at which the session is displayed, rather than the end at which it runs.
In really simple terms: you run PuTTY on a Windows machine, and tell it to connect to (for example) a Unix machine. PuTTY opens a window. Then, anything you type into that window is sent straight to the Unix machine, and everything the Unix machine sends back is displayed in the window. So you can work on the Unix machine as if you were sitting at its console, while actually sitting somewhere else.
Python is a dynamic object-oriented programming language that can be used for many kinds of software development. It offers strong support for integration with other languages and tools, comes with extensive standard libraries, and can be learned in a few days. Many Python programmers report substantial productivity gains and feel the language encourages the development of higher quality, more maintainable code.
RocketDock is an
application launcher
developed by
PolyVector and
Skunkie of Punk
Labs.
RocketDock is able
to show live updates
of minimized windows
as in Mac OS X, and
in Windows Vista it
can show live
thumbnail updates on
the taskbar. It is
compatible with
MobyDock,
ObjectDock, RK
Launcher, and Y'z
Dock skins.
A dynamic, open source programming language with a focus on simplicity and productivity. It has an elegant syntax that is natural to read and easy to write.
qlmap is an open
source penetration
testing tool that
automates the
process of
detecting and
exploiting SQL
injection flaws and
taking over of
database servers.
It comes with a
powerful detection
engine, many niche
features for the
ultimate
penetration tester
and a broad range
of switches lasting
from database
fingerprinting,
over data fetching
from the database,
to accessing the
underlying file
system and
executing commands
on the operating
system via out-of-
band connections.
Tor is a toolset for a wide range of organizations and people that want to improve their safety and security on the Internet. Using Tor can help you anonymize web browsing and publishing, instant messaging, IRC, SSH, and other applications that use the TCP protocol. Tor also provides a platform on which software developers can build new applications with built-in anonymity, safety, and privacy features.
an encryption
program that is
very powerful. able
to create many
volumes. encrypt a
file or a whole
partition or disc.
easy to use. it is
free.
Windows/Mac/Linux
Turbo is a software "Turbo Switch". You may set the effective CPU speed anywhere from 1 to 100% of full speed. All programs will execute at the reduced CPU speed set by Turbo. Works with Win/9x and Win/NT. Freeware.
VideoLAN (VLC) is a free and open source cross-platform multimedia player and framework that plays most multimedia files as well as DVDs, CDs, VCDs and various streaming protocols.
VirtualBox is a free general-purpose full virtualizer for x86 hardware. Targeted at server, desktop and embedded use, it is now the only professional-quality virtualization solution that is also Open Source Software.
WinDirStat (WDS) is a disk usage statistics viewer and cleanup tool for Windows. It shows disk, file and directory sizes in a treelist as well as graphically in a treemap, much like KDirStat or SequoiaView.
WinRAR is a Windows data compression tool that focuses on the RAR and ZIP data compression formats for all Windows users. Supports RAR, ZIP, CAB, ARJ, ...
socat is a relay for bidirectional data transfer between two independent data
channels. Each of these data channels may be a file, pipe, device (serial line
etc. or a pseudo terminal), a socket (UNIX, IP4, IP6 - raw, UDP, TCP), an
SSL socket, proxy CONNECT connection, a file descriptor (stdin etc.), the GNU
line editor (readline), a program, or a combination of two of these.
These modes include generation of "listening" sockets, named pipes, and pseudo
terminals.
tl;dr a better netcat with more capability
HackThisSite is the collective work of the HackThisSite staff, licensed under a CC BY-NC license.
We ask that you inform us upon sharing or distributing.