This site is dedicated as a repository for “hacking” programs for Windows and Linux. Please note that hacking means nothing but tweaking or cleverly resolving a problem. Use the programs as you wish, but this site or its provider are not responsible in terms of how you use these programs, (i.e. for educational purposes only).
The point of the site is to gather as much ‘hacking’ material, such as video/document tutorials, code, exploits, etc. into one large site before these valuable materials eventually dissipate into the ether.
If you wish to contribute to the project please do so a it’s certainly a good thing and we at Darknet fully support this kind of initiative.
You can browse the leetupload database here:
It’s always good to have centralised repositories to aid the rapid location of certain tools or exploits.
- Rowhammer – DDR3 Exploit – What You Need To Know
- Santoku Linux – Mobile Forensics, Malware Analysis, and App Security Testing LiveCD
- Google Expands Pwnium Year Round With Infinite Bounty
- BSQL Hacker – Automated SQL Injection Framework
- File Disclosure Browser – Tool To Explore .DS_Store Files
- VIPER Lab’s VAST Live Distro – VoIP Security Testing LiveCD
Most Read in Exploits/Vulnerabilities:
- Learn to use Metasploit – Tutorials, Docs & Videos - 229,617 views
- AJAX: Is your application secure enough? - 119,416 views
- eEye Launches 0-Day Exploit Tracker - 85,201 views