Archive | Hacking Tools


02 August 2006 | 7,017 views

eEye Binary Diffing Suite (EBDS)

The eEye Binary Diffing Suite (EBDS) is a free and open source set of utilities for performing automated binary differential analysis. This becomes very useful for reverse engineering patches as well as program updates. The first tool is BDS, the Binary Diffing Starter from Andre Derek Protas. This tool helps reverse engineers with batch-analysis of [...]

Continue Reading


01 August 2006 | 13,648 views

SpikeSource Spike PHP Security Audit Tool

Spike is an Open Source tool based on the popular RATS C based auditing tool implemented for PHP. The tool Spike basically does static analysis of php code for security exploits, PHP5 and call-time pass-by-reference are currently required, but a PHP4 version is coming out this week. This tool is especially welcomed by Darknet as [...]

Continue Reading


28 July 2006 | 6,491 views

BASE 1.2.6 Released (Basic Analysis & Security Engine)

We are happy to announce that the 1.2.6 (christine) release of the Basic Analysis and Security Engine (BASE) is available. BASE is the Basic Analysis and Security Engine. It is based on the code from the Analysis Console for Intrusion Databases (ACID) project. This application provides a web front-end to query and analyze the alerts [...]

Continue Reading


25 July 2006 | 57,976 views

Hping 2 Fixed for Windows XP SP2 (Service Pack 2)

We are happy to announce that Hping 2 works with Windows XP again! Hping support on Windows was never that great. Darknet is indeed a great fan of Hping! Glad to see it has overcome the Raw sockets problems Windows XP SP2 brought about. hping is a command-line oriented TCP/IP packet assembler/analyzer. The interface is [...]

Continue Reading


21 July 2006 | 39,713 views

Freeware MAC Address Changer – Technitium v3.1

I saw a Freeware MAC Address Changing tool today which I thought I’d share with you all, as I used to use SMAC, a nice tool, until the guy started charging for it! Hopefully this one won’t go the same way. Technitium MAC Address Changer, which allows you to change Machine Access Control (MAC) Address [...]

Continue Reading


08 July 2006 | 13,928 views

WebScarab – Web Application Analysis – New Version

WebScarab is a framework for analysing applications that communicate using the HTTP and HTTPS protocols. It is written in Java, and is thus portable to many platforms. WebScarab has several modes of operation, implemented by a number of plugins. In its most common usage, WebScarab operates as an intercepting proxy, allowing the operator to review [...]

Continue Reading


04 July 2006 | 38,822 views

Absinthe Blind SQL Injection Tool/Software

Absinthe is a gui-based tool that automates the process of downloading the schema & contents of a database that is vulnerable to Blind SQL Injection. Absinthe does not aid in the discovery of SQL Injection holes. This tool will only speed up the process of data recovery. Features: Automated SQL Injection Supports MS SQL Server, [...]

Continue Reading


03 July 2006 | 10,985 views

Universal Hooker – An Ollydbg Plugin

The Universal Hooker is a tool to intercept execution of programs. It enables the user to intercept calls to API calls inside DLLs, and also arbitrary addresses within the executable file in memory. Why is it ‘Universal’? There are different ways of hooking functions in a program, for example, it can be done by setting [...]

Continue Reading


30 June 2006 | 10,287 views

ARP Scanning and Fingerprinting Tool – arp-scan

NTA-Monitor has released the arp-scan detection and fingerprinting tool under the open source (LGPL license) concept. It has been tested under various Linux based operating systems and seems to work fine. This will only compile on Linux systems. You will need a C compiler, the “make” utility and the appropriate system header files to compile [...]

Continue Reading


27 June 2006 | 16,210 views

sqlninja 0.1.0alpha – MS-SQL Injection Tool

sqlninja is a little toy that has been coded during a couple of pen-tests done lately and it is aimed to exploit SQL Injection vulnerabilities on web applications that use Microsoft SQL Server as their back-end. It borrows some ideas from similar tools like bobcat, but it is more targeted in providing a remote shell [...]

Continue Reading