GoldenEye is a brute-force hacking program and was written for web-masters to test the security of their own sites. This is an oldskool file, a lot of people are still looking for this.
It should not be use by others to hack sites – this would be illegal! Under no circumstances should the author or any other persons involved in its development or distribution be held liable for the misuse of the program.
Once again these old files and tutorials are meant for the purpose of learning, test them in your own lab, see how they work, see what they do then try and write something similar yourself.
GoldenEye works with different types of wordlists:
"username:password", "username [TAB] password" or single lists
GoldenEye executes its attempts simultaneously. The number of simultaneous attempts can be adjusted with the speed slider on the “access” tab. You can also adjust the speed limit. On the Options|Connections tab you’ll find a box to set the “top-speed”; select an apropiate value. Use lower values for slow internet connection!
If you get to much timed-out connections, lower the crack speed or increase the TTL (time to life). Timed-out connections will be automatically resumed if you check ‘Resume time-out connections automatically’ on the same tab.
Note: The program is tested with 70 simultaneous request. If you choose a higher value, do it on your own risk! If GoldenEye tells you something about buffer problems, lower the speed next time. I’ve encountered that other running programs may cause buffer problems.
GoldenEye logs the cracked sites. They are listed on the History|Access History tab. You can select and delete single entries or the whole list. Expired combinations will be automatically removed when you click the check for expired passwords button. Click on the ‘visit button’ or double click on the selected url to launch it in your browser.
The url box: if you don’t remember the members url you can
- search through the list
- or you type in a part off the url or a defined site name (see History|URL History) and click on the small button at the right end of the url-box.
- Change proxy after x attempts: GoldenEye changes the proxy automatically after x attempts if this options is checked.You have to use several proxies to use this feature. Add proxies on the Options|connections tab.GoldenEye changes the proxy randomly or in the order which is given by the proxy-list.
- Server Response: the standard values are ’200′ for ok and ’401′ for access denied (unauthorized). If the server you’re attacking gives other reply numbers you can change them. Note: You can’t use 404 or 500!
- Cookie: If the attacked server needs a cookie, check this option and enter the cookie string.
- Referer: If the attacked server needs the url of the refering site, enter it here.
Wordlist tools tab
- Remove dupes: New: If you’re using single lists for userID and password GoldenEye removes the dupes simultaneous.
- General wordlist options:
- Define a mininum and maximum length for the userID and password (standard settings 1-32)
- Convert the list: All passes will be converted ‘on-the-fly’.
- Wordlist style: If you want to use single lists: check this option.
- Wordlist manipulations: this tab appears after you’ve loaded a list and checked the ‘Extend list’ on “General wordlist”
“Common manipulations” are predefined manipulations.
On the “Advanced” tab you can choose your own prefixes, suffixes, etc. If you miss something, tell me!
- Server security test: It tests the attacked server for other security holes.
- Proxy test: tests the proxy-speed. The values are in milliseconds.
Your anti-virus software may find a Win32.Gen.Trojan or similar in this file, that’s normal for most hacking software. Darknet in no way implies that this software is safe and free of malware, use at your own risk.
You can download GoldenEye 1.0 here.
To avoid any network issues the zip file is passworded, the password is darknet123.
- EyeWitness – A Rapid Web Application Triage Tool
- wig – WebApp Information Gatherer – Identify CMS
- Capstone – Multi-platform, Multi-architecture Disassembly Framework
- lm2ntcrack – Microsoft Windows NT Hash Cracker (MD4 -LM)
- LCP – A Good FREE Alternative to L0phtcrack (LC5)
- Ophcrack 2.2 Password Cracker Released
Most Read in Hacking Tools:
- Top 15 Security/Hacking Tools & Utilities - 1,844,833 views
- Brutus Password Cracker – Download brutus-aet2.zip AET2 - 1,030,267 views
- wwwhack 1.9 – Download wwwhack19.zip Web Hacking Tool - 613,266 views