In all large corporations, there is a pervasive fear that someone, somewhere is having fun with a computer on company time. Networks help alleviate that fear.
Bloodshed Dev-C++ is a full-featured Integrated Development Environment (IDE) for the C/C++ programming language. It uses Mingw port of GCC (GNU Compiler Collection) as it\'s compiler. Dev-C++ can also be used in combination with Cygwin or any other GCC based compiler.
I2P: Invisible Internet Project;
I2P is an anonymizing network, offering a simple layer that identity-sensitive applications can use to securely communicate. All data is wrapped with several layers of encryption, and the network is both distributed and dynamic, with no trusted parties.
Many applications are available that interface with I2P, including mail, peer-peer, IRC chat, and others.
Can be seen as an alternative for the Tor Project.
Video and music player that downloads torrents and converts files. Really useful. You can add websites directly to Miro like The Pirate Bay and Kickass torrents. Download them instantly.
Nmap (\"Network Mapper\") is a free and open source (license) utility for network exploration or security auditing. Many systems and network administrators also find it useful for tasks such as network inventory, managing service upgrade schedules, and monitoring host or service uptime. Nmap uses raw IP packets in novel ways to determine what hosts are available on the network, what services (application name and version) those hosts are offering, what operating systems (and OS versions) they are running, what type of packet filters/firewalls are in use, and dozens of other characteristics. It was designed to rapidly scan large networks, but works fine against single hosts. Nmap runs on all major computer operating systems, and both console and graphical versions are available.
A dynamic, open source programming language with a focus on simplicity and productivity. It has an elegant syntax that is natural to read and easy to write.
qlmap is an open
source penetration
testing tool that
automates the
process of
detecting and
exploiting SQL
injection flaws and
taking over of
database servers.
It comes with a
powerful detection
engine, many niche
features for the
ultimate
penetration tester
and a broad range
of switches lasting
from database
fingerprinting,
over data fetching
from the database,
to accessing the
underlying file
system and
executing commands
on the operating
system via out-of-
band connections.
VideoLAN (VLC) is a free and open source cross-platform multimedia player and framework that plays most multimedia files as well as DVDs, CDs, VCDs and various streaming protocols.
VirtualBox is a free general-purpose full virtualizer for x86 hardware. Targeted at server, desktop and embedded use, it is now the only professional-quality virtualization solution that is also Open Source Software.
WinRAR is a Windows data compression tool that focuses on the RAR and ZIP data compression formats for all Windows users. Supports RAR, ZIP, CAB, ARJ, ...
socat is a relay for bidirectional data transfer between two independent data
channels. Each of these data channels may be a file, pipe, device (serial line
etc. or a pseudo terminal), a socket (UNIX, IP4, IP6 - raw, UDP, TCP), an
SSL socket, proxy CONNECT connection, a file descriptor (stdin etc.), the GNU
line editor (readline), a program, or a combination of two of these.
These modes include generation of "listening" sockets, named pipes, and pseudo
terminals.
tl;dr a better netcat with more capability
HackThisSite is the collective work of the HackThisSite staff, licensed under a CC BY-NC license.
We ask that you inform us upon sharing or distributing.