Friday, October 31, 2008

wwwhack 1.9 - Download Web Hacking Tool

WWWhack is a brute force utility that will try to crack web sites guarded by an web access password. This utility can use a word file or try all possible combinations, and by trial-and-error, will attempt to find a combination of username/password that is accepted by the web server.

This shows the weakness in securing sensitive areas of your web site by the web authentication method alone.

To use wwwhack 1.9 you need to set your system clock to the year 2000 or before as it expires in ‘2001′.

Once again this is an oldskool tool but a lot of people are still seeking it, for learning purposes I presume as there are better alternatives now like thc-hydra.


Goolag - GUI Tool for Google Hacking

recently released a GUI driven tool for Google Hacking called Goolag.

Google Dorks have been around for several years and have been researched most assiduously by Johnny I Hack Stuff.

If one searches the Web, one will find multiple collections of dorks, and also some applications - standalone and Web-based - offering certain “scanning” possibilities.

Nevertheless, gS is different from other applications released to date for the following reasons:

* There is no need for a special tool to use dorks other than a browser, but scanning hundreds of dorks ‘by hand’ is impossible.
* Goolag Scanner is focused on usability. It simplifies the use of myriad numbers of dorks to a few mouse clicks. No cryptic command line options and no knowledge of Google hacking are required to test one’s host.
* Goolag Scanner comes with its own dorks-database, but it is not limited to such.
* gS uses a very simple xml-document, which is readable and part of the distribution.


Thursday, October 30, 2008

Google cheat sheet


download as PDF

Monday, October 27, 2008

Best Hacking Tools -85in1-

Audio theme:
Sean Paul - Temperature

43.2MB Compress
29.7MB UnCompress
No pass

Main page:


Page 1:

MSN Chat Monitor And Sniffer
MSN Password Retriever
MSN Hacker DUC
Head **** HotMail HAck
HotMail Hacker XE Edition
HotMail HAck
HotMAil Hacker
MSN Passwords
MSN Flooder
MSN Sniffer
HotMail Hacker Gold
HotMail HAcker Final
Give me Ur Pass
HotMail Brute Forcer
MSN PAssword Finder
MSN Password Grabber
Hack MSN Password
Hack HotMAil Evolution
MAgic Password Sender
MSN Locker
HotMail Killer
Hot Freeze
HotMAil Hack !
Ice Cold Reload
HotMail Killer 2
Nuke MSN

PAge 2:

Yahoo Messenger Login Screen
MSN Messenger 7 Login Screen
MSN Messenger 5 Login Screen
MSN Messenger 4.6 Login Screen
HotMail Login Screen
Fake Web Pages 2
Fake Eeb Pages 1
AOL Killer
Fake Login HotMail
B-S Spy
Saria Fake Logins

Page 3:
Yahoo Password Retrieval
Yahoo Cracker
Yahoo Booster
Yahoo Hack!
Yahoo Password Stealer
S-H Yahoo Password Sender

Page 4:

NetWork Password Recovery
Net BIOS Name Scanner
FTP Password Hacker
Cable Modem Sniffer
Port Listening XP
Blue Port Scanner
www 2 IP
XP Killer
Sniff Password
Port Scanner
Fast Resolver
Domain Scan
Whois Domain
NetRes View
PHPbb Defacer
Angry IP Scanner
FTP Brute Forcer

PAge 5:

Hook Tool Box
Smart HAck UpLoader
Remote Anything
Post Sage
PHPbb Attacker

Page 6:

MSN Bomber Man
Ultimate Nick PopUpz
MSN 7 Universal Patcher
Emoticons Creator
MSN Picture Crawler
Anti Status Bomb
MSN Detector
Multi MSN Loader
Protect Lithium
Tray It!
MSN Block Checker
MSN Auto Responder
MSN Virus Cleaner
MSN Dondurucu



Sunday, October 26, 2008

Certified Ethical Hacker Lab 3.0 (Tools for exam preparation)

If you want to stop hackers from invading your network, first you've got to invade their minds.

The CEH Program certifies individuals in the specific network security discipline of Ethical hacking from a vendor-neutral perspective. The Certified Ethical hacker certification will fortify the application knowledge of security officers, auditors, security professionals, site administrators, and anyone who is concerned about the integrity of the network infrastructure. A Certified Ethical hacker is a skilled professional who understands and knows how to look for the weaknesses and vulnerabilities in target systems and uses the same knowledge and tools as a malicious hacker.

Also include: Certified Ethical Hacker V3.01

Friday, October 24, 2008

1 Click Activate & Genuine Windows XP & Vista

Activate & Genuine Windows XP & Vista
Here is a Cool Tool Click once To Activate Ur Xp or Vista Pack....and Use it Life Long..


Mobile Hack Tool 2.10 Ultimate

Mobile Hack Tool 2.10 Ultimate

With this Software you can hack mobilephones via bluetooth .You can read the sms,turn off the mobilephone,make it play videos or music and do many other things. It works on Sony Erricson, Nokia and Samsung.


Taking Down the web site !

In this tutorial I will show you how to take down websites via DDoS. For this tutorial we will be using one of the most effective and one of the least known tools called "Low Orbit Ion Cannon". Created by Anonymous members from, this program is one of the best for DDoS'ing, and I have successfully used it to DDoS websites. An internet connection as bad as mine (2,500 kb/s) was able to keep a site down for a day with this program running. Remember that this tool will work best with high internet speeds, and try not to go for impossible targets (like Google, Myspace,Yahoo). LOIC is used on a single computer

Step 1: Type the target URL in the URL box.
Step 2: Click lock on.
Step 3: Change the threads to 9001 for maximum efficiency.
Step 4: Click the big button "IMMA FIRIN MAH LAZAR!"

Feel free to tweak around with these settings and play around with the program to get the best performance. then minimize and go do whatever you need to do, the program will take care of the rest!


Wednesday, October 22, 2008

Google teaches us how to hack it !....

Here i have present a site which explain about google hacking in every flavor.
This site looks same like google product, you may check it out !

Sunday, October 19, 2008

All-In-One Ultra Hacker (2008)

This AIO is with viruses cos these are hacking tools and AV detect as viruses!
I think it's better to use deep freeze and than u can freeze ur pc when u use this tools and than u can unfreeze it when u don't use.

Includes :
  • AddrView.rar
  • AOL new.rar
  • AppToService.rar
  • Astaroth Joiner v2.rar
  • BankOfAmerica.rar
  • Cable Modem Sniffer.rar
  • CapKeys_DIGITAL.rar
  • CGI Founder
  • cports.rar
  • CreditCardGjenerator.rar
  • DDL Sites.rar
  • eBay.rar
  • egold.rar
  • E-mail Cracker.rar
  • ezDataBase_Defacer.rar
  • F.B.I - Binder.rar
  • FTP Brute Forcer.rar
  • ~Censored~ Mail Bomber 2.3.rar
  • G00B3RS_phpBB_exploit_pack.rar
  • Google_Hacker_1.2.rar
  • Hack FLASH
  • Hack MY
  • Hack Photoshop
  • Hook Tool Box.rar
  • Hotmail Email Hacker.rar
  • Hotmail HAcker Gold.rar
  • Hotmail
  • HotmailHack.rar
  • HSBC-US.rar
  • iecv.rar
  • IP2.rar
  • ipnetinfo.rar
  • Key Changer.rar
  • Legion NetBios Scanner
  • Mail Boomb_2.0
  • MooreR Port Scanner.rar
  • MSN Flooder 2.0.rar
  • MSN Messenger Account Cracker v2.0.rar
  • MSNLoader.rar
  • NET BIOS Scaner.rar
  • NetBIOS Name Scanner.rar
  • NetResView.rar
  • NFO Maker
  • nolimitcracker.rar
  • On-Off MSN.rar
  • OS Update Hack.rar
  • P0kes WormGen
  • PayPal.rar
  • PCAnyPass.rar
  • Php Nuke Hacker v11.0.rar
  • phpBB Annihilator.rar
  • phpbb attack.rar
  • phpbb bruteforcer.rar
  • PhpBB pass
  • phpBB_DoS.rar
  • phpbb_spammer.rar
  • phpBBAttacker.rar
  • phpBBcracker.rar
  • PhpBuGScan.rar
  • PHPfucker.rar
  • PhpNuke_bypass.rar
  • Ping & Nukes.rar
  • Port Listener XP.rar
  • procexp.rar
  • ProMo.rar
  • Pure phpBB Email harvester.rar
  • rainbowcrack-1.2-src
  • Remote Shut Down.rar
  • Server 2003 Keygen.rar
  • Server Killer.rar
  • Source Checker.rar
  • source codes.rar
  • SQLScan v1.0.rar
  • Stealth - HTTP Scanner v1.0 build
  • SuperScan4.rar
  • TinaSoft
  • traceroute.rar
  • UC.Forum Spam.rar
  • Ultra
  • USBank.rar
  • Visa
  • Warez Sites.rar
  • Web Cracker 2.0.rar
  • WebCracker 4.0.rar
  • whoistd.rar
  • Win XP Activator.rar
  • WindowHide.rar
  • Windows XP Corperate Keygen.rar
  • Windows XP KeyGen.rar
  • Windows XP Product Key Changer.rar
  • Windows XP Product Key Checker.rar
  • Windows XP Product Key Viewer.rar
  • WindowsAdminpasswordHack.rar
  • wwwhack.rar
  • xplizer.rar
  • Yahoo
  • yahooUltraCracker.rar


Saturday, October 18, 2008

AIO hacking pack v.1


Web HAcking Tools

Apache Hacking TooLz Directory:
Apache Chunked Scanner
Apache Hacker Tool v 2.0
Apache H4x0r Script

Remote File Inclusion And Remote Command Execution Directory :
IIS 5 Dav Scanner & Exploiter
PHP Attacker
PHP Injection Scanner & Exploiter
XML-RPC Scanner & Exploiter

Databases & SQL Injection & XSS TooLz Directory:
Casi 4.0
Mssql BruteForce TooL
SQL Ping 2
SQL Recon
SQL Vuln Scanner

PHP Shells:
rootshell v2.0
c99shell #16
Backdoor php v0.1
cmd (asp)
CyberEye (asp)
CyberSpy5 (asp)
Indexer (asp)
Ntdaddy (asp)
News Remote PHP Shell Injection
PHP Shell
nstview php shell


HackTheGame 1.20

In this game you play a hacker. When you first log in to your hacking console
you get an email from someone you don't know, who asks you to do a hack for him because he heard great things about you. If you succeed, your name will become more known, and you will get more hacking assignments.

The assignments get harder along the game. To help you in your hacking adventure, you have a full featured hacking toolbox. You have tools like: ping, portscan, telnet, virus uploader, password hacker, file destroyer, etc.

The operating system used in the game is a mix of *NUX and MS-DOS/Windows, which I called ChaOs. It has some nice features, like a local filesystem (you can add your own folders), and much more cool stuff.

Download HaCk The Game

Friday, October 17, 2008

Anti-Virus Softwares Collection 2008/09

ESET NOD32 AV and Smart Security 3.0.669

ESET NOD32 AV and Smart Security 3.0.669
Antivirus protection is spelled "NOD32." Built on the award-winning ThreatSense® engine, ESET NOD32 Antivirus software proactively detects and eliminates more viruses, trojans, worms, adware, spyware, phishing, rootkits and other Internet threats than any program available.
It's the ideal antivirus for Windows XP, and also runs smoothly on Windows legacy systems, MS-DOS, file servers, mail servers, and more.
No matter what your system, there is no better antivirus protection. ESET NOD32 Antivirus was awarded the "BEST Antivirus Solution" in 2007 and 2008 by AV-Comparatives...............

Download :

ESET Smart Security Business Edition 3.0.669

Download :

Ashampoo Security Pack 2

Ashampoo Security Pack 2
AntiSpyWare 2 Protects you against spyware, adware, browser hijackers, tracking cookies, dialers, worms, key loggers, Trojans and even rootkits.
AntiVirus Protects you against viruses, worms, Trojans and dialers. Monitors all critical system areas, memory, emails and files.

FireWall PRO Combines an industrial-strength firewall with child protection website blocking, stealth ports, traffic volume limiting, Internet accelerator, file wiper and more.
Magical Security 2 Military-grade encryption for the critical data on your hard disks, CDs and DVDs. Fully-integrated in Windows® Explorer.

Download :

Avira Premium Security Suite 8

Not everyone is so thorough regarding the security of their personal data on their PCs. During a time in which virus and hacker attacks are on the rise.Forged emails, known as phishing, trick unsuspecting computer users into revealing PINs for online banking. The damage caused by such attacks is immense.Not only is Avira virus protection ideal for handling such attacks, it is also very cost-eff ective. Test the German pioneer with over 20 years of experience in PC security!

Do you need secure and eff ective virus protection for your PC?

Avira AntiVir Premium reliably protects against all threats from viruses, worms, trojans, rootkits, phishing, adware, spyware, bots, and dangerous “drive-by” downloads.
Best detection rates and top-class security with several updates every day.

Do you surf on the Internet, make online purchases, communicate by email, or make bank transactions on your PC?
The Avira Security Suite reliably protects you from today’s soaring internet crime and wards off viruses, worms, Trojans, rootkits, spam, phishing, adware, spyware, and dialers.

Do you receive MMS, ring tones, fi lms or other fi les with your cell phone or smart phone?

Do you synchronize a PDA or cell phone with a PC?
Avira AntiVir Mobile protects you from the increasing number of viruses specially made for Symbian and Windows Mobile operating systems


Symantec AntiVirus Corporate Edition 10.2.1000.1 f

Symantec AntiVirus Corporate Edition for Vista provides protection against viruses and security risks for managed and unmanaged clients running on Windows Vista (32-bit and 64-bit editions). Symantec AntiVirus Corporate Edition combines industry-leading, real-time malware protection for enterprise workstations and network servers with graphical Web-based reporting and centralized management and administration capabilities. Side-effect repair keeps systems operational during security disruptions. Centralized configuration and deployment eases administrative burden and overhead. Integrated response content helps maximize system uptime.

In addition to providing comprehensive malware protection for every network tier in an integrated, easy-to-deploy solution, Symantec AntiVirus Enterprise Edition 10.2 now adds antivirus and anti-spyware client support for the Vista platform. In addition to offering adware and spyware protection for enterprise workstations and network servers, Symantec AntiVirus Enterprise Edition now includes Symantec Client Security 3.1, which provides proactive client protection from complex threats by integrating antivirus, anti-spyware, firewall and intrusion prevention technologies under a single console. Symantec AntiVirus Enterprise Edition also provides content filtering and spam prevention for the Internet gateway and Domino and Exchange environments.

Key Features and Benefits:

- Advanced, enterprise-wide virus protection and monitoring from a single management console
- NEW! Vista® client support
- Integrated Web-based graphical reporting
- Improved protection from spyware and adware, including:
- Spyware repair enhancements automatically block spyware installation
- Stealthed spyware detection and remediation
- Improved spyware repairs for invasive risks


BitDefender Total Security 2008

BitDefender Total Security 2008 provides the ultimate protection for your PCs, protecting you from virus, spam, spyware, identity theft and all other internet attacks. The integrated Firewall keeps you hidden from attackers, while protecting your WiFi. Parental Controls and our new Gamer Mode, are must for every family. In addition, System Tune-Up takes care of system maintenance to keep your PC running at top speed while Simple Back Up ensures your data is secure.


Avira AntiVir Personal Edition Classic

Avira AntiVir PersonalEdition Classic is a comprehensive, easy to use antivirus program, designed to offer reliable free of charge virus protection to home-users only. Avira offers:
1.Extensive Malware Recognition of viruses, Trojans, backdoor programs, worms, etc.
2.Automatic incremental updates of antivirus signatures, engine and entire software.
3.Permanent virus protection, with Virus Guard real time monitoring.
4.Install and configuration in just a couple of steps, setup to protect your PC in minutes.
5.Virus protection against known and unknown threats, using an advanced heuristic system.
6.Scheduler where you can set the scanner to make automatic virus scans or updates on your system.
7.Forum and phone support, Knowledge Base with virus descriptions available on web site.
8. Rootkit Detection and Removal. Version adds Rootkit Protection.


Eset NOD 32 Smart Security 3.0.645+key (67 year)

ESET Smart Security prevents, detects and removes malware such as adware, bots, rootkits, spyware, trojans, viruses, worms and other Internet threats you face on the job, at home and everywhere your computer goes.

* Stay Healthy: ESET Smart Security blocks more than 70% of new malware threats
* Fewer Email Threats: New spam blocker works to prevent annoying junkmail, scams and phishes from your inbox.
* Protect Your Privacy: Prevents, detects and disables spyware. We keep an eye out for
them to make sure they’re not keeping an eye on you.
* Increased Safety: Bidirectional firewall with intrusion detection features to protect both incoming and outgoing Internet connections.
* Lightweight: ESET Smart Security consumes far fewer resources than similar products,
which means your computer can spend more time working on other tasks.



Kaspersky Antivirus 6.0

Kaspersky Anti-Virus 6.0(KAV) combines traditional antivirus defense methods with the latest proactive technologies to provide solid and dependable protection against malicious programs.

This award-winning antivirus software includes protection against viruses, spyware, Trojans, worms and keyloggers and features our automated hourly updates. Kaspersky Lab has proven expertise in protecting against viruses, Internet worms, email worms, Trojans and other malicious programs.

* Rapid response to the newest threats
* Highest virus and spyware detection rates
* Accurate and thorough antivirus scanning
* Easy installation and configuration


AVG Anti-Virus Pro 8

This antivirus(AVG Anti-Virus Pro 8) program for your home or office computer is easy on system resources and simple to install and use. The fully automated update process will keep your computer protected at all times. Components include AVG Email Scanner, which checks your incoming and outgoing e-mail for viruses; AVG Resident Shield, which checks for viruses as files are opened, executed, and saved and will prevent you from opening or running an infected file; and AVG Virus Vault, a place where infected files are isolated so they cannot cause damage to your system.

link -1

AVG Antivirus Pro 8.0

AVG Antivirus Pro 8.0

Antivirus and antispyware protection for Windows from the world's most trusted security company. Use the Internet with confidence in your home or small office.

* Easy to download, install and use
* Protection against viruses, spyware, adware, worms and trojans
* Real-time security while you surf and chat online
* Top-quality protection that does not slow your system down
* Free support and service around the clock and across the globe
* Compatible with Windows Vista and Windows XP
Integrated protection
* Anti-Virus: protection against viruses, worms and trojans
* Anti-Spyware: protection against spyware, adware and identity-theft
* Anti-Rootkit: protection against hidden threats (rootkits)
* Web Shield & LinkScanner: protection against malicious websites

Download , Sr. No.

avast! 4.8.1201 Professional Edition

Avast! 4 Professional Edition is a collection of high-end technologies that work in perfect synergy, having one common goal: to give you the top grade protection against computer viruses. It represents an ideal solution for any Windows-based workstation. avast! 4 Professional Edition is a complete ICSA certified antivirus software for your company. It obtained VB100% awards in 2002/4 Virus Bulletin comparative reviews.
avast! scans for viruses, worms and Trojans: On Demand - with two User Interfaces, On Access, E-mail, during Boot Time, in File Explorer and Screen Saver. It maintains Virus Chest. Protects E-mail, HTTP, NNTP, ICQ, mIRC, Kazaa etc. True incremental updates based on iAVS technology updates twice a week virus definition file.
avast! Home/Professional now fully supports the 64-bit Windows and Vista platforms.

Download :

Quick Heal Total Security 2008 9.50

Quick Heal Total Security 2008 gives you complete protection from viruses, spywares, and hackers. It also helps you stay connected and communicate over the internet by preventing your system from threats over the Internet. With Quick Heal Total Security in your PC - Enjoy your freedom to work and play in the connected world. With Quick Heal Total Security 2008 in your PC, you can scan and clean mobile phone connected via Bluetooth or USB cable.

Quick Heal AntiVirus and AntiSpyware

Check Mark and VB100% certified engine
100% protection from all the viruses in-The-Wild
Daily automatic updates
Detects and removes complex Spywares and Trojans
Detects and removes latest adwares, dialers, bots and riskwares
DNAScan technology takes care of new unknown malwares even before the signature update is available

Quick Heal Firewall Professional 2.0
Easy configuration of security level
Detects all types of hacker attacks
Protects all types of network connectivity
Monitors all incoming connections automatically
Port stealth


Trend Micro PC-Cillin Internet Security Pro 2008 16.10

Trend Micro Internet Security Pro safeguards your online transactions, identity, and irreplaceable files with the most comprehensive protection available.
Get all the benefits of our proven Internet security plus enhanced identity theft protection, Wi-Fi validation, data theft protection, and system recovery.
Trend Micro Internet Security 2008 makes it easy to protect your home network, personal identity, and online activity.
It guards against present viruses, spyware, and identity theft as well as the web threats of tomorrow.
Confidently e-mail, shop, bank, or share photos online, knowing your privacy and files are well protected.

Key Features

* Anti-virus
* Anti-spyware
* Email safety scan
* Protection against rootkits
* Proactive intrusion blocking
* Anti-spam
* Two-way firewall
* Home network protection
* Website authentication
* Parental controls
* Data theft prevention
* Free phone, email, chat support (North America only)


McAfee Internet Security Suite 2007

McAfee Internet Security Suite with SiteAdvisor provides trusted PC and
Internet protection so your whole family can enjoy online activities such
as surfing the Web, shopping, banking, e-mailing and instant messaging.

Always on, always protecting and always updating, McAfee delivers a worry
free Internet experience because it guards both your identity and your PC
from viruses, spyware, e-mail and phishing scams, and hackers.

With its new automated backup feature, McAfee Internet Security Suite with
SiteAdvisor makes it easy to safeguard your most important photos, music,
and files. If anything is ever lost or corrupted, you can restore
and data with just one simple click!


Norton Internet Security 2008

With Norton Internet Security 2008 Stay protected from the latest online threats. Norton Internet Security 2008 runs quietly in the background to detect and block today's complex threats and to protect your identity when you buy, bank, or browse online. The friendly and efficient product design helps minimize confusing security alerts and system slowdowns that can get in the way of your online experience.

Norton Internet Security 2008
provides essential protection from viruses, hackers, spyware, spam and other privacy threats. A comprehensive set of security tools, Norton Internet Security helps keep you safe online as you surf and email, swap files, download programs, and chat. In addition to protecting against viruses and unwelcome intrusions from the Internet, NIS also allows you to automatically block annoying banner ads and pop-up windows, set up parental site blocking options for restricting access to specific Web sites, and selectively determine which, if any, Java applets and ActiveX controls should be allowed to download and execute on your computer. Enjoy the Internet with award-winning protection!


Thursday, October 16, 2008

USB Disk Security 5.1.0+Crack :

USB Disk Security provides 100% protection against any malicious programs trying to attack via USB drive. Compare USB Disk Security against other antivirus solutions, you will find out its highlights: USB Disk Security provides 100% protection against any threats via USB drive, however, the majority of other products are unable even to guarantee 90% protection. USB Disk Security is the best antivirus software to permanently protect offline computer without the need for signature updates, but other antivirus software should update signature database regularly, and they cannot effectively protect offline computer. This light and easy to use solution is 100% compatible with all software and doesn't slow down your computer at all. You pay USB Disk Security once and get it all, however, other antivirus products should be paid for updates every year.

Free download from Shareware Connection - USB Disk Security provides 100% protection against any malicious programs trying to attack via USB drive. It is the best solution to protect offline computer.


password cracking guide

The goal is to unify all of the good information found in various bits and pieces into 1 large document. This document is for people who want to learn to the how and why of password cracking. There is a lot of information being presented and you should READ IT ALL BEFORE you attempted doing anything documented here. I do my best to provide step by step instructions along with the reasons for doing it this way. Other times I will point to a particular website where you find the information. In those cases someone else has done what I attempting and did a good or great job and I didn’t want to steal their hard work. These instructions have several excerpts from a combination of posts from pureh@te, granger53, irongeek, PrairieFire, and stasik. I would also like to thank each of them and others for the help they have provided me on the BackTrack forum.

I had to compress the document so I could attach it. The document as it stands now is 56K. Please let me know if what I have is wrong, or if there is a better way to do something, or if I am missing something. I am planning on making enhancements as people make me aware of them.

Here is the table of contents
1 LM vs. NTLM
2 Dumping the SAM and cracking the password using BackTrack
2.1 Dumping the SAM from inside BackTrack
2.2 Dumping Cached Credentials from BackTrack
2.3 Cracking the LM hash using john the ripper
2.4 Cracking the LM hash using mdcrack
2.5 Cracking the NTLM hash using john the ripper
2.5.1 Cracking the NTLM hash using the results from cracking the LM hash using john the ripper
2.6 Cracking the NTLM hash using mdcrack
2.6.1 Cracking the NTLM hash using the results from cracking the LM hash using mdcrack
2.7 Cracking the LM hash using ophcrack
2.8 Cracking the NTLM hash using ophcrack
3 Dumping the SAM and cracking the password using applications in Windows
3.1 Dumping the SAM from windows
3.1.1 Dumping the SAM from windows using pwdump7
3.1.2 Dumping the SAM from windows using fgdump
3.2 Dumping Cached Credentials from windows
3.3 Cracking the LM hash using john the ripper
3.4 Cracking the LM hash using mdcrack
3.5 Cracking the NTLM hash using john the ripper
3.6 Cracking the NTLM hash using mdcrack
3.6.1 Cracking the NTLM hash using the results from cracking the LM hash using mdcrack
3.7 Cracking the LM hash using ophcrack (requires high speed internet access during install)
3.8 Cracking the NTLM hash using ophcrack
3.9 Cracking the LM and NTLM hash using Cain and Able
4 Cracking the LM and NTLM hashes using the ophcrack LiveCD
6 Active Directory
7 Resetting a forgotten password on a local user account (NOT A DOMAIN ACCOUNT)
8 Novell
9 Cracking Linux/Unix passwords using John the Ripper
10 Cracking equipment passwords using Hydra in BackTrack
11 Cracking equipment passwords using Brutus in windows
12 Cracking Oracle 11g (sha1)
13 Cracking Oracle passwords over the wire
14 Syskey
15 Wordlists aka Dictionary attack
15.1 Using John the Ripper to generate a wordlist
15.2 Configuring John the Ripper to use a wordlist
15.3 Using crunch to generate a wordlist
15.4 Using premade wordlists
15.5 Other wordlist generators
15.6 Manipulating your wordlist
16 Rainbow Tables
16.1 What are they?
16.2 Generating your own
16.2.1 rcrack - obsolete but works
16.2.2 rcracki - new but doesn't work
16.2.3 Generating a rainbow table
16.3 WEP cracking
16.4 WPA-PSK


P.S. Thank you everyone for your feedback. Keep it coming.

Changes from version 0.1
* Added a section on
* Added a section on using john the ripper with a custom character list
* Added Xploitz’s and pureh@te’s wordlists

Changes from version 0.2 - 200 downloads
* Added sections on using ophcrack
* Added sections on Cain and Able under windows
* Fixed a typo
* New html format

Changes from version 0.3 - 410 downloads
* Moved some content to where it should have been
* Added a section on crunch
* Fixed typos
* Fixed a whole lot of html issues
* Slightly rearranged things to flow better

Changes from version 0.4 - 877 downloads
* Added a section on cached credentials
* Expanded the Novell section
* Fixed typos
* Fixed a couple of html errors
* Moved some things around
* New utility to dump passwords

Changes from version 0.5
* added wpa pw-inspector command
* added a wordlist manipulation section
* added usage of fgdump
* added rcracki section
* added a sample hash.txt to play with
* john can be used for input to aircrack-ng
* moved a few things around for a better flow


Wednesday, October 15, 2008

Kaspersky Internet Security 2009+Latest Serial Key+Patch.rar

Most Popular Anti-Virus providing Total Protection.


* Protects from all types of malware and spyware
* Scans files, email messages and Internet traffic
* Protects instant messengers (ICQ, MSN)
* Updates automatically

Preventive Protection

* Proactive protection from unknown threats
* Scans OS and applications for vulnerabilities. New!
* Disables links to malware sites. New!

Identity Theft Protection

Disables links to phishing websites



Download: (torrent File)

Tuesday, October 14, 2008

IP and E-mail Tracking by Neo Trace Pro Full.....

Neo IP Trace Pro v3.25

NeoTrace features Super fast TraceRoute along with easy drag and drop operation. It has an informative display which shows trace history and many other things such as ping. NeoTrace also has local DNS and Whois cacheing and international WhoIs support. It creates reports in text, HTML or printed form and has configurable node labels with instant browser access to the nodes. Available continuous ping update is also available with this program as well as nearly 200 displayable country flags and meaningful sound effects for events. With NeoTrace you can pinpoint causes of network problems, test your net connection, identify who's network is causing trouble, explore Internet geography, and hunt down spammers. This program can also investigate domains and ISPs, who owns them, and where they are connected.

Download :

Monday, October 13, 2008

Ethical Hacking Resources..........

A very nice post in a thread by SpOonWiZaRd

Well, first up, you will have to read up on alot of things like: Forcing Attacks and Protocols

Get the right software and learn how to use them

Go to these sites and get the tools: (Get Cain & Abel) (Get lots of hacking tools) (More tools) (Submit hashes to them to crack)
Http:// (Binary to almost anything converter) (Lots of tutorials like (Site that gives you challenges) Practical (Same as Hellboundhackers) (Every tool or dictionary you will need) (Rainbowtables download) (Online cryptanalysis cracking site) (Get ophcrack and ophcrack tables) (Get brutus and lots lots lots of exploits) (Get more tools) (cracking site) (more ophcrack tables) (very good hacking site with lots of hacks) (for those long cracking hours) (exactly what it says) (alot of security tutorials) (Javascript read abouts) (very cool hacking downloads!) (all about hacking and the latest tools) (more toolz) (helps you find toolz easier than google) (basically anything you want, be it music or what ever!) (a very resourceful site given by XXXImmortalXXX) (Top 10 Password Crackers)

The Most Wanted Hacking Tools 2009

Dictionary tool:


Raptor3 [ belt sinicizes patch ]

The SuperDic_V3.2 registration version [ easy superior super dictionary production tool, function to be good ]


Decodes the tool: John the Ripper


Withdraws the password and processes the LOG files tool:

Z_nakeR2 [ very good log processing tool may process the many kinds of log documents ]



*Accessdiver (AD) by Jean Fages

*Sentry by Sentinel:

*Form@ (specifically for FORM sites) by SSS -

Caecus by Sentinel (For form sites that require an OCR [])

Ares by Gamoaa -


AuthForce by Zachary P. Landau

Entry by Sparkleware

Xavior By LithiumSoft

Web Password Checker (WPC) .1 For UNIX by g1soft
available @

Munga Bunga's http Brute Forcer by Munga Bunga

Wordlist Tools:

*Raptor 3 by Madmax -

Words Extractor

Lucifer by Rhino -

ALS_novice by Wolfman -

Z-leecher by Beda

S-Generator by Beda

S-WordlistTool by Beda

Proxy Tools:

*Proxyrama By Gaamoa -

*Charon by Rhino -

*Advanced Proxy Leecher (APL) by Sentinel-

Geowhere by Jean Fages (NOT-Freeware) -

Proxy List Filter -

AATools by Glocksoft

Proxy Bag

S-Proxy Tool by Beda

Exploiting Tools:

*Triton (Scanner) by Rhino -

*CMX IV by Xtremnet -

CCBill Local Cgi Exploiter By Ksoze-

IBT2 by wolfman:

Hephaestus's Ashen Spear by Wolfman:



Decrypting Tools:

*John The Ripper (JTR) -

MDcrack (MD5 Cracker) -

Distributed John The Ripper by Luis Parravicini

Cain and Abel by Massimiliano Montoro

Salt Grinder by Wolfman

Log Tools:

LogRip by Rhino -

Azarius by Rhino -

Zimapass Parser by Sentinel:

*C-Parse (ccbill.log parser) by Sentinel:

CCBill USI (CCBILL log parser that removes all dead account PRIOR to decrypting)

Accessdiver/Ares Parser by Sentinel:


Zspoof by wolfman -

Sploof by Jean Fages -

Final Spoof

Spooph by nast0

D-Spoof And Others (Russian Site, English Prog)

Mikho's Online Spoofer (web based spoofer)


Other Tools:


Scholar by Sentinel - (History checker)

Crackmate Gold by Xtremet (adultcheck gold pass verifier) -

Easy Binder

Easy Binder is a tool that combines (binds) unlimited files
(no matter their type) into a single standalone executable
(a Container). The Container (the final bound file) is a simple
compiled program that, when opened, will automatically launch the included files.

Easy Binder can run any type of file from the bound file without
affecting its direct functionality. For instance, if you bind an executable,
a text file and an image file, when the Container file is run, the executable
will be run too while the other files will be opened with the default image file viewer (IrfanView, Paint etc.) and text file viewer (Notepad, Wordpad etc.).

Easy Binder features:
# unlimited files can be bound (joined)
# can bind any file type that is needed by the executable for a properly run
# the icon of the Host file (final bound file) can be changed
# Its 100% Free..

* Easy (985.07 KB - downloaded 7 times.)

Sunday, October 12, 2008

Rapidsgare Download Manager 100% working with Proof !

JDownloader ---


If you download a lot of files from free file hosting sites like RapidShare and MegaUpload, but are tired of entering Captchas and waiting for your downloads to begin, jDownloader can help. jDownloader is a download manager that works with both sites, plus a few others. It lets you queue up a bunch of files which it will then proceed to download in the background. It can even read Captchas, which means you don't have to be near your computer when the downloads start.

The program does have a few quirks. First, jDownloader requires Java to run and you don't install it like a regular Windows application. Rather, you download and extract the contents of a ZIP file and then click the jDownloader.jar file to start the program.
Second, jDownloader's file menus are all in German. You can change the language to English, but you'll still find a few German words scattered around. In case you don't speak German, here's how to change the language:

1. Click the Extra button
2. Select Konfiguration
3. Select the Benutzeroberfl?che tab
4. Under Sprache, select English
5. Hit the Speichern und neu starten button to save and restart in English

Now you're almost ready to go. But before you can download any files you'll have to accept the terms of service for each site you want to download files from.

1. Click the Extra button
2. Select Configuration
3. Select the Hosts tab
4. Check the boxes next to any file hosting service you expect to use.

Saturday, October 11, 2008

Wireless Hacking Live-CD (FBI version){Must Have}

Hack a WLAN / Wireless Access Point

Hack a WLAN / Wireless Access Point

Live Cd For Wireless Hacking, Also Used By The Fbi
This version is for all systems except systems with the Intel B/G wireless cards (IPW2200).
- Live CD with all the tools you need to hack a WLAN / wireless Access point -
Linux Live-CD - OS runs from CD - 635 mb - .iso
- also used by the FBI …

WEP Hacking - The Next Generation

WEP is an encryption scheme, based on the RC-4 cipher, that is available on all 802.11a, b and g wireless products. WEP uses a set of bits called a key to scramble information in the data frames as it leaves the access point or client adapter and the scrambled message is then decrypted by the receiver.
Both sides must have the same WEP key, which is usually a total of 64 or 128 bits long. A semi-random 24 bit number called an Initialization Vector (IV), is part of the key, so a 64 bit WEP key actually contains only 40 bits of “strong” encryption while a 128 bit key has 104. The IV is placed in encrypted frame’s header, and is transmitted in plain text.
Traditionally, crac*ing WEP keys has been a slow and boring process. An attacker would have to capture hundreds of thousands or millions of packets—a process that could take hours or even days, depending on the volume of traffic passing over the wireless network. After enough packets were captured, a WEP crac*ing program such as Aircrac* would be used to find the WEP key.
Fast-forward to last summer, when the first of the latest generation of WEP cracking tools appeared. This current generation uses a combination of statistical techniques focused on unique IVs captured and brute-force dictionary attacks to break 128 bit WEP keys in minutes instead of hours. As Special Agent Bickers noted, “It doesn’t matter if you use 128 bit WEP keys, you are vulnerable!”
WEP is an encryption scheme, based on the RC-4 cipher, that is available on all 802.11a, b and g wireless products.
WEP uses a set of bits called a key to scramble information in the data frames as it leaves the access point or client adapter and the scrambled message is then decrypted by the receiver.
Both sides must have the same WEP key, which is usually a total of 64 or 128 bits long.
A semi-random 24 bit number called an Initialization Vector (IV), is part of the key, so a 64 bit WEP key actually contains only 40 bits of “strong” encryption while a 128 bit key has 104.
The IV is placed in encrypted frame’s header, and is transmitted in plain text.
Traditionally, cracking WEP keys has been a slow and boring process.
An attacker would have to capture hundreds of thousands or millions of packets a process that could take hours or even days, depending on the volume of traffic passing over the wireless network.
After enough packets were captured, a WEP cracking program such as Aircrack would be used to find the WEP key.
Fast-forward to last summer, when the first of the latest generation of WEP cracking tools appeared.
This current generation uses a combination of statistical techniques focused on unique IVs captured and brute-force dictionary attacks to break 128 bit WEP keys in minutes instead of hours.
Basic Directions:

1)Boot from cd
2)get the wep key
3)write it down
4)reboot into windows
5)connect using wep key.


This post was created by Slick Leech!

Friday, October 10, 2008

FBI Forensic Field Kit

This is the ultimate bootable Disk for the agent, (or wannabe agent).

Forensics Tools:

Sleuth Kit -Forensics Kit
Py-Flag - Forensics Browser
Autopsy - Forensics Browser for Sleuth Kit
dcfldd - DD Imaging Tool command line tool and also works with AIR
foremost - Data Carver command line tool
Air - Forensics Imaging GUI
md5deep - MD5 Hashing Program
netcat - Command Line
cryptcat - Command Line
qtparted - GUI Partitioning Tool
regviewer - Windows Registry Viewer
X-Ways WinTrace
X-Ways WinHex
X-Ways Forensics
R-Studio Emergency (Bootable Recovery media Maker)
R-Studio Network Edtion
R-Studio RS Agent
Net resident
Faces 3 Full (600 megs)
Encase 4.20

Field Kit Manuals

Incident response - Computer Forensics
Computer Crime investigation
Forensic Pathology
Internet Forensics
Forensic interpretation of Evidence
Windows Forensics
Computer Forensics -An Illustrated Dictionary
Computer Forensics - jumpstart

Additional programs on Boot DVD:

Gentoo Linux 2.6 Kernel - Opyimized for Forensics Use
Apache2 - Server
Mysql PHP4
Open Office
Gimp - Graphics Program
KSnapshot - Screen Capture Program
Gnome CD Master
K3b - CD Burner
XMMS - media player
Porthole - Gentoo Graphics Package Manager
Karchiver - GZIp GUI

Security Tools:
Etherape - GUI Network Traffic Monitor
Clamv - Anti Virus
snort - Command Line
John the Ripper - Command Line password cracker
rkhunter - Command Line
Ethereal - Network Traffic Analyzer
FWBuilder - GUI Firewall App
nessus - network scanner


Hacking with all basics...........


Use "Auditor" Remote Exploit or you could do it on whax but you'll need to down load a few extra bits and peices. Google search "Knoppix Remote Exploit", then download it, It's about 500+ mb....It's a CD live distro and it is probably better than Whax, just about...

[edited]or dwnld here:

How to decrypt SSL encrypted traffic using a MITMA

SSL MITM attacks
Another video tut of a different to the decryption one...

UUMmmmm.......................I think it's

ssh tunneling, with use of Nikto and mfscli exploits.. Might be wrong and can't be aresd to check it out though...But it's good...

A quick tut on making your trojans completely undetecable by hand, using Ollydbg (the pro way) LOL...good tut and it works....

Example code/trojans that he uses to practise on....

Right I've just relised this is in completely the wrong place....Unix-Linuix Systems is not for hacking tutorials.....never mind

128bit WEP cracking


Mad how easy it is!!

Basic introduction to the Nessus security scanner using Auditor Security Collection


Basic introduction network mapping using nmap
not expecting many of you to need this..


Cracking Syskey and the SAM on Windows Using Samdump2 and John


FTP Bruteforcing and the use of the raptor exploit (I think)


Autoscan + Metasploit


Argh, this reeks of script kiddie-ism :-/

This place isn't a repository for how-to guides, but we'll see what ComSec says, besides, these aren't anything new.

Do you even read what you post?

For the SSL Man in the Middle Attack, you don't need access to the victims computer. If you did, that wouldn't be very 'in the middle', now would it? You just need access to their network.

Honestly, it's nice, but it's so specific and contrived, that it won't work in most cases. You're issuing an invalid certificate, which some users would notice, and if you just sniff the traffic, you can't crack it easily.

Another thing, the 128bit cracking only works in high traffic areas, otherwise it isn't that easy. (7 GB of traffic on average) :-/

You could forcefully generate the traffic yourself but most routers detect this, and so do the network users when they repeatedly get disassociated with the AP.

Hacking Toolz 2008/09 Updated

Hello friends !

here i have updated some of new hacking tools with latest update !