"the practice of arbitrary imprisonments have been, in all ages, the favorite and most formidable instruments of tyranny." --Alexander Hamilton, Federalist #84
AirSnort is a wireless LAN (WLAN) tool which cracks encryption keys on 802.11b WEP networks. AirSnort operates by passively monitoring transmissions, computing the encryption key when enough packets have been gathered.
We all have questions, don't we. This article will help you get to the answers faster. And not look like the typical newbie who will just waste valuable time.
BFG is a modified hydra tool, which now supports generating passwords in brute-force mode, unlike the original hydra. Of course, full source code is provided, and it should compile on all systems where hydra itself compiles, which means all UNIX-based systems including Linux, BSD, Mac OS, Windows (cygwin), etc.
Here you will find All Things Perl:
Perl modules
Perl scripts
Perl binary distributions ("ports")
Perl source code
Perl recent arrivals
recent Perl modules
The coolest tool to hack all sorts of games, with powerful commands and friendly interface. Every game hacker must have this tool...
* very useful also in browser games
Chickenfoot is a Firefox extension that puts a programming environment in the browser's sidebar so you can write scripts to manipulate web pages and automate web browsing.
DemocraKey
It includes:
* Tor Browser – For anonymous web browsing without using an insecure anonymous proxy
* Clamwin Portable – To check the host computer for viruses, and to clean before surfing anonymously
* Thunderbird Portable – Send anonymous email or encrypted email with Enigmail and GnuPGP
* TrueCrypt – Create hidden volumes and encrypt your files so they are unreadable
Bloodshed Dev-C++ is a full-featured Integrated Development Environment (IDE) for the C/C++ programming language. It uses Mingw port of GCC (GNU Compiler Collection) as it\'s compiler. Dev-C++ can also be used in combination with Cygwin or any other GCC based compiler.
"Using DownloadHelper, you can easily save videos from most of the popular video sites" -Main Site
Lets you download videos from youtube, or almost any other video/music site in a flv format (that you can then convert after download) As simple as click and its downloaded!
Firekeeper is an Intrusion Detection and Prevention System for Firefox. It is able to detect, block and warn the user about malicious sites. Firekeeper uses flexible rules similar to Snort ones to describe browser based attack attempts. Rules can also be used to effectively filter different kinds of unwanted content.
Fossbytes is a leading source of technology news with a focus on Linux distro releases, security & hacking news, tutorials, tips and tricks, VPNs & more.
Geany is a lightweight, fast, and compatible GTK2 based IDE. It supports many languages including but not limited to (PHP, C, C++, Ruby, Python, Bash).
Google Hacks is a compilation of carefully crafted Google searches that expose novel functionality from Google\'s search and map services. For example, you can use it to view a timeline of your search results, view a map, search for music, search for books, and perform many other specific kinds of searches. You can also use this program to use google as a proxy.
A website with some very interesting, informative videos. They cover wired and wireless networks, setting up a VoIP, way to many things to list here. You gotta check it out!
I2P: Invisible Internet Project;
I2P is an anonymizing network, offering a simple layer that identity-sensitive applications can use to securely communicate. All data is wrapped with several layers of encryption, and the network is both distributed and dynamic, with no trusted parties.
Many applications are available that interface with I2P, including mail, peer-peer, IRC chat, and others.
Can be seen as an alternative for the Tor Project.
An enhanced interactive shell for the python language, which includes object introspection. Excellent for experimenting with code and getting things to work.
The most advanced
penetration testing
distribution, ever.
From the creators of
BackTrack comes Kali
Linux, the most
advanced and
versatile
penetration testing
distribution ever
created. We have a
whole set of amazing
features lined up in
our security
distribution, geared
at streamlining the
penetration testing
experience.
Kon-Boot is an application which will silently bypass the authentication process of Windows based operating systems. Without overwriting your old password! Easy to use and excellent for tech repairs, data recovery and security audits.
An excellent tutorial, tips, and hacker's site with anything from finding the right timer application to triple-booting operating systems. Has sections for Mac, Linux, and Windows, and Android operating systems.
Live Hacking CD is a new Linux distribution packed with tools and utilities for ethical hacking, penetration testing and countermeasure verification. Based on Ubuntu this ‘Live CD” runs directly from the CD and doesn’t require installation on your hard-drive. Once booted you can use the included tools to test, check, ethically hack and perform penetration tests on your own network to make sure that it is secure from outside intruders.
Video and music player that downloads torrents and converts files. Really useful. You can add websites directly to Miro like The Pirate Bay and Kickass torrents. Download them instantly.
Netcat is a featured networking utility which reads and writes data across network connections, using the TCP/IP protocol.
It is designed to be a reliable "back-end" tool that can be used directly or easily driven by other programs and scripts. At the same time, it is a feature-rich network debugging and exploration tool, since it can create almost any kind of connection you would need and has several interesting built-in capabilities.
It provides access to the following main features:
* Outbound and inbound connections, TCP or UDP, to or from any ports.
* Featured tunneling mode which allows also special tunneling such as UDP to TCP, with the possibility of specifying all network parameters (source port/interface, listening port/interface, and the remote host allowed to connect to the tunnel.
* Built-in port-scanning capabilities, with randomizer.
* Advanced usage options, such as buffered send-mode (one line every N seconds), and hexdump (to stderr or to a specified file) of trasmitted and received data.
* Optional RFC854 telnet codes parser and responder.
Nmap ("Network Mapper") is a free and open source (license) utility for network exploration or security auditing. Many systems and network administrators also find it useful for tasks such as network inventory, managing service upgrade schedules, and monitoring host or service uptime. Nmap uses raw IP packets in novel ways to determine what hosts are available on the network, what services (application name and version) those hosts are offering, what operating systems (and OS versions) they are running, what type of packet filters/firewalls are in use, and dozens of other characteristics. It was designed to rapidly scan large networks, but works fine against single hosts. Nmap runs on all major computer operating systems, and both console and graphical versions are available.
Nmap (\"Network Mapper\") is a free and open source (license) utility for network exploration or security auditing. Many systems and network administrators also find it useful for tasks such as network inventory, managing service upgrade schedules, and monitoring host or service uptime. Nmap uses raw IP packets in novel ways to determine what hosts are available on the network, what services (application name and version) those hosts are offering, what operating systems (and OS versions) they are running, what type of packet filters/firewalls are in use, and dozens of other characteristics. It was designed to rapidly scan large networks, but works fine against single hosts. Nmap runs on all major computer operating systems, and both console and graphical versions are available.
The OWASP Testing Guide includes a "best practice" penetration testing framework which users can implement in their own organizations and a "low level" penetration testing guide that describes techniques for testing most common web application and web service security issues.
Okteta is a simple editor for the raw data of files. This type of program is also called hex editor or binary editor. Now that KDE is cross platform, this program can not only be used on Linux, but on Windows and MacOSx as well!
Opera is a fast and secure web browser that features pop-up blocking, tabbed browsing, integrated searches, RSS, e-mail, and even IRC chat. A wide variety of add-ons ("widgets") are available from games, instant messaging, file sharing, media players, page source editor, cookie editor etc.
Why Opera?(by the author)
Speed up your surfing:
Get the fastest JavaScript engine ever
Browse more quickly on slow connections
See smooth animations and super-fast graphics
Make the most of your mouse
ake the Web easier:
Search right from the address field
Find your way back with a smart address field
Get suggestions as you search
Use any search engine from the browser
Quickly find what you need in any page
Multitask effectively with flexible tabs
Get a quick look inside your tabs
Get a better view of open webpages
Keep your spelling in check
Make reading easier on the eyes
Access favorite websites with one click
Have your data wherever you need it
Do more with unique Powerful features:
Stay in control of your downloads (Support for BitTorrent is also included)
Eliminate distractions with content blocking
Email with a powerful, efficient mail client
Customization:
Select from hundreds of skins
Use convenient and entertaining widgets
Share and remotely access files, music and photos
Peace of mind:
Rest assured with Opera's Web Threat Protection and Extended Validation
Keep an eye on security
Browse without leaving a trace
Stay up to date automatically
Control your cookies
Developer support:
Enjoy support for the latest standards(HTML5,CSS3)
Debug complex websites with Opera Dragonfly
Know where you are with Geolocation
PHP is a widely-used general-purpose scripting language that is especially suited for Web development and can be embedded into HTML. If you are new to PHP and want to get some idea of how it works, try the introductory tutorial. After that, check out the online manual, and the example archive sites and some of the other resources available in the links section.
Perl is a highly capable, feature-rich programming language with over 22 years of development.
Perl Features :
Powerful, stable, mature, portable.
Mission critical. High Quality Code.
Object-oriented, procedural and functional.
Easily extendible.
Text manipulation.
Unicode support.
Database integration.
C/C++ library interface.
Embeddable.
Open Source.
Ideal web programming language.
Web Frameworks.
Database integration.
Web modules(CPAN).
Duct-tape of the internet, and more...
Encryption capable.
Embed into Apache.
PicoCTF 2014 is aimed at High School students with a curiosity in hacking and security. While it does require SOME knowledge, it has a pretty good difficulty scale. *Note: Don't use FLASM or other flash hacks on this to pass the challenges, it just defeats the purpose of the challenge - and you won't learn anything*
A dynamic, open source programming language with a focus on simplicity and productivity. It has an elegant syntax that is natural to read and easy to write.
qlmap is an open
source penetration
testing tool that
automates the
process of
detecting and
exploiting SQL
injection flaws and
taking over of
database servers.
It comes with a
powerful detection
engine, many niche
features for the
ultimate
penetration tester
and a broad range
of switches lasting
from database
fingerprinting,
over data fetching
from the database,
to accessing the
underlying file
system and
executing commands
on the operating
system via out-of-
band connections.
SNORT® is an open source network intrusion prevention and detection system utilizing a rule-driven language, which combines the benefits of signature, protocol and anomaly based inspection methods. With millions of downloads to date, Snort is the most widely deployed intrusion detection and prevention technology worldwide and has become the de facto standard for the industry.
SnortSam is a plugin for Snort, an open-source light-weight Intrusion Detection System (IDS). The plugin allows for automated blocking of IP addresses on several firewalls.
Tizag was designed to teach beginner web programmers how to use HTML and CSS. We invite you to begin the tutorials right away. We have...
* A Beginner tutorial - For those just starting to learn to make web pages.
* HTML Tutorial - Begin your web designing with a solid background in HTML.
* CSS Tutorial - Check out the latest web design techniques available to you.
* PHP Tutorial - Understand what all the PHP hype is about with our tutorial.
* Web Host Guide - An overview of all the information you need to know about choosing and using a web host.
* CSS Reference - CSS Quick-Reference sheet. Each item of the reference also has an accompanying example.
* HTML Reference - HTML Tag Reference including attributes associated with each tag and accompanying examples.
This site is dedicated to all the researchers and reverse engineers interested in Reverse Code Engineering (RCE) techniques and practices and all things related.
You will be able to find a wide breadth of information retained on this site to help in your research ranging from; anti-debugging, virtual machines, unpacking, coding, disassembling, debugging, keygenning, cryptography and much, much more.
s a game development tool that has been designed to let you focus on creating amazing games.
over 500,000 game and private game producer use it so hey it must be good, why don,t you check it out.
Vim is a highly configurable text editor built to enable efficient text editing. It is an improved version of the vi editor distributed with most UNIX systems.
Vim is often called a "programmer's editor," and so useful for programming that many consider it an entire IDE. It's not just for programmers, though. Vim is perfect for all kinds of text editing, from composing email to editing configuration files.
VideoLAN (VLC) is a free and open source cross-platform multimedia player and framework that plays most multimedia files as well as DVDs, CDs, VCDs and various streaming protocols.
VirtualBox is a free general-purpose full virtualizer for x86 hardware. Targeted at server, desktop and embedded use, it is now the only professional-quality virtualization solution that is also Open Source Software.
At W3Schools you will find all the Web-building tutorials you need, from basic HTML and XHTML to advanced XML, SQL, Database, Multimedia and WAP, Totally Free. Great for people new to computer languages.
Web Application Attack and Audit Framework.
W3af is a great piece of software designed for testing web applications.
Written in Python.
Comes with over 100 plugins for brute-forcing, evasion, page discovery, exploit discovery and exploits. Extensible with Python.
Firefox add-on. This toolbar allows you to edit and view parts of a webpage in a user-friendly way, even when they are not normally so obvious. (Great for HTS)
WebGoat is a deliberately insecure J2EE web application maintained by OWASP designed to teach web application security lessons. In each lesson, users must demonstrate their understanding of a security issue by exploiting a real vulnerability in the WebGoat application. For example, in one of the lessons the user must use SQL injection to steal fake credit card numbers. The application is a realistic teaching environment, providing users with hints and code to further explain the lesson.
WinRAR is a Windows data compression tool that focuses on the RAR and ZIP data compression formats for all Windows users. Supports RAR, ZIP, CAB, ARJ, ...
If you want to learn about computer security from teh bottom up, this is for you.
The site provides online courses and additional material about for example x86 architecture, network forensics, malware dynamic analysis and many more.
Ophcrack is a free Windows password cracker based on rainbow tables. It is a very efficient implementation of rainbow tables done by the inventors of the method. It comes with a Graphical User Interface and runs on multiple platforms.
Features:
* » Runs on Windows, Linux/Unix, Mac OS X, ...
* » Cracks LM and NTLM hashes.
* » Free tables available for Windows XP and Vista.
* » Brute-force module for simple passwords.
* » LiveCD available to simplify the cracking.
* » Loads hashes from encrypted SAM recovered from a Windows partition, Vista included.
* » Free and open source software (GPL).
socat is a relay for bidirectional data transfer between two independent data
channels. Each of these data channels may be a file, pipe, device (serial line
etc. or a pseudo terminal), a socket (UNIX, IP4, IP6 - raw, UDP, TCP), an
SSL socket, proxy CONNECT connection, a file descriptor (stdin etc.), the GNU
line editor (readline), a program, or a combination of two of these.
These modes include generation of "listening" sockets, named pipes, and pseudo
terminals.
tl;dr a better netcat with more capability
HackThisSite is the collective work of the HackThisSite staff, licensed under a CC BY-NC license.
We ask that you inform us upon sharing or distributing.