Archive | Hacking Tools

Official release of SQL Power Injector 1.2 – Download Now!

SQL Power Injector is a graphical application created in .NET 1.1 that helps the penetrating tester to inject SQL commands on a web page. For now it is SQL Server, Oracle and MySQL compliant, but it is possible to use it with any existing DBMS when using the inline injection (Normal mode). Moreover this application […]

Tags: , , , , , ,

Posted in: Database Hacking, Hacking Tools, Web Hacking | Add a Comment

aircrack-ng – WEP and WPA-PSK Key Cracking Program

aircrack is an 802.11 WEP and WPA-PSK keys cracking program that can recover keys once enough data packets have been captured. It implements the standard FMS attack along with some optimizations like KoreK attacks, thus making the attack much faster compared to other WEP cracking tools. In fact, aircrack is a set of tools for […]

Tags: , , , , , , , , , ,

Posted in: Hacking Tools, Wireless Hacking | Add a Comment

httprint v301 – Web Server Fingerprinting Tool – Download

I was looking through my toolbox to see what else is useful and I came across this one, httprint – the only caveat is that it’s a little out of date. It still does a good job though. httprint is a web server fingerprinting tool. It relies on web server characteristics to accurately identify web […]

Tags: , , , , , , , , ,

Posted in: Hacking Tools, Network Hacking, Web Hacking | Add a Comment

aircrack-ptw – Fast WEP Cracking Tool for Wireless Hacking

WEP is a protocol for securing wireless LANs. WEP stands for “Wired Equivalent Privacy” which means it should provide the level of protection a wired LAN has. WEP therefore uses the RC4 stream to encrypt data which is transmitted over the air, using usually a single secret key (called the root key or WEP key) […]

Tags: , , , , , , , , , , ,

Posted in: Hacking Tools, Wireless Hacking | Add a Comment

IPAudit – Network Activity Monitor with Web Interface

IPAudit monitors network activity on a network by host, protocol and port. It listens to a network device in promiscuous mode, and records every connection between two ip addresses. A unique connection is determined by the ip addresses of the two machines, the protocol used between them, and the port numbers (if they are communicating […]

Tags: , , , , , , ,

Posted in: Hacking Tools, Network Hacking | Add a Comment

FLARE – Flash Decompiler to Extract ActionScript

Flare processes an SWF and extracts all scripts from it. The output is written to a single text file. Only ActionScript is extracted, no text or images. Flare is freeware. Windows, Mac OS X and Linux versions are available. The main purpose of decompiler is to help you recover your own lost source code. However, […]

Tags: , , , , , , ,

Posted in: Hacking Tools, Programming, Web Hacking | Add a Comment

PIRANA – Exploitation Framework for Email Content Filters

PIRANA is an exploitation framework that tests the security of a email content filter. By means of a vulnerability database, the content filter to be tested will be bombarded by various emails containing a malicious payload intended to compromise the computing platform. PIRANA’s goal is to test whether or not any vulnerability exists on the […]

Tags: , , , , , ,

Posted in: Exploits/Vulnerabilities, Hacking Tools, Network Hacking | Add a Comment

ServiceCapture – HTTP Traffic Capture for Debugging Flash

ServiceCapture runs on your pc and captures all HTTP traffic sent from your browser or IDE. It is designed to help Rich Internet Application(RIA) developers in the debugging, analysis, and testing of their applications. You can download the free trial below. After it is installed and running, visit the Macromedia Exchange with your web browser […]

Tags: , , , , , , , , , , ,

Posted in: Hacking Tools, Programming, Web Hacking | Add a Comment

Download pwdump6 and fgdump version 1.6.0 available now.

New versions of the excellent pwdump6 and fgdump have been released (1.6.0 for both!). For those that don’t know what pwdump or gfdump are.. pwdump6 is a password hash dumper for Windows 2000 and later systems. It is capable of dumping LanMan and NTLM hashes as well as password hash histories. It is based on […]

Tags: , , , , , , , ,

Posted in: Exploits/Vulnerabilities, Hacking Tools, Password Cracking, Windows Hacking | Add a Comment

FireCAT 1.1 Released – Turn Firefox into a Security Platform

FireCAT is a Firefox Framework Map collection of the most useful security oriented extensions. It can be used to turn your favorite browser (Firefox) into a powerful security framework. FireCAT comes from “Firefox Catalog of Auditing Toolbox” Changes for FireCAT 1.1 + Category Network Utililies – Added ffsniff to subcat “Sniffers” – Added CrossFTP to […]

Tags: , , , , , , , ,

Posted in: General Hacking, Hacking Tools | Add a Comment

Popular Tags

computer-security · darknet · exploits · fuzzing · google · hacking · hacking-networks · hacking-websites · hacking-windows · hacking tool · Hacking Tools · information gathering · malware · microsoft · network-security · Network Hacking · Password Cracking · penetration-testing · Phishing · Privacy · Python · scammers · Security · Security Software · spam · spammers · sql-injection · trojan · trojans · virus · viruses · vulnerabilities · web-application-security · web-security · Web Hacking · windows · windows-security · Windows Hacking · worms · XSS ·