Archive | Hacking Tools




VoIP Security Testing Tools List from VoIPSA

The VoIP Security Alliance (VOIPSA) is pleased to announce the public release of its VoIP security tool list. Check it out at: http://www.voipsa.org/Resources/tools.php This VoIP Security Tool List provides categories, descriptions and links to current free and commercial VoIP security tools. This list was developed to address the current void of VoIP security testing resources […]

Tags: , , , , , , , , , ,

Posted in: Hacking Tools, Network Hacking | Add a Comment

Hacker Files, Tools & Software Repository – leetupload.com

This site is dedicated as a repository for “hacking” programs for Windows and Linux. Please note that hacking means nothing but tweaking or cleverly resolving a problem. Use the programs as you wish, but this site or its provider are not responsible in terms of how you use these programs, (i.e. for educational purposes only). […]

Tags: , , , , ,

Posted in: Exploits/Vulnerabilities, Hacking Tools | Add a Comment

Scapy – Interactive Network Packet Manipulation

Scapy is a powerful interactive packet manipulation program. It is able to forge or decode packets of a wide number of protocols, send them on the wire, capture them, match requests and replies, and much more. It can easily handle most classical tasks like scanning, tracerouting, probing, unit tests, attacks or network discovery (it can […]

Tags: , , , , , , ,

Posted in: Hacking Tools, Network Hacking | Add a Comment

Techm4sters Releases ProTech Security Distribution

Techm4sters e-mailed us recently to let us know about their new security distro called ProTech, we haven’t had time to download it and test it yet but it certainly looks promising. – What is PROTECH? Protech is a very light live security distribution based on Ubuntu Linux. – Is this like Nubuntu? It is similar, […]

Tags: , , , , ,

Posted in: Hacking Tools, Linux Hacking | Add a Comment

LLTD – Link Layer Topology Discovery Protocol

Gomor released a LLTD (Link Layer Topology Discovery Protocol) implementation written in Perl (using Net::Frame framework). You may use this two modules to write fuzzers, or anything. You can find the modules here: Net Frame LLTD

Tags: , , , , , , , ,

Posted in: Hacking Tools, Network Hacking, Programming | Add a Comment

Damn Vulnerable Linux – DVL – IT-Security Attack and Defense

Damn Vulnerable Linux (DVL) is a Linux-based (modified Damn Small Linux) tool for IT-Security & IT-Anti-Security and Attack & Defense. It was initiated for training tasks during university lessons by the IITAC (International Institute for Training, Assessment, and Certification) and S²e – Secure Software Engineering in cooperation with the French Reverse Engineering Team. Damn Vulnerable […]

Tags: , , , , , ,

Posted in: Hacking Tools, Linux Hacking | Add a Comment

BackTrack v2.0 – Hackers LiveCD Finally Released

BackTrack is the result of the merging of the two innovative penetration testing live linux distributions Auditor security collection and Whax. By combining the best features from both distributions and putting continous development energy, the most complete and finest security testing live distro was born: BackTrack BackTrack v.2.0 is finally released, it’s been a long […]

Tags: , , , , , , , , , , ,

Posted in: Hacking Tools, Linux Hacking | Add a Comment

DNS Brute Force eXtract – WS-DNS-BFX

There is another option for DNS Brute Forcing which uses threads, so may be faster than TXDNS 2.0 which we posted about recently. What does it do? This program was written to extract valid hosts of a domain that deny zone transfers. The program supports: IPv4 => IP Address of 32 bits. IPv6 => IP […]

Tags: , , , , , , , ,

Posted in: Hacking Tools, Network Hacking | Add a Comment

SSA 1.5.1 – Security System Analyzer an OVAL Based Scanner

Open Vulnerability and Assessment Language (OVAL) is an international, information security, community standard to promote open and publicly available security content, and to standardize the transfer of this information across the entire spectrum of security tools and services. OVAL includes a language used to encode system details, and an assortment of content repositories held throughout […]

Tags: , , , , , , , , ,

Posted in: Hacking Tools, Security Software, Windows Hacking | Add a Comment

Metasploit Exploit Framework Version 3.0 Released

Finally it’s out of BETA, Metasploit Framework Version 3.0 has been released and it’s a lot more Windows friendly. The Metasploit Framework (“Metasploit”) is a development platform for creating security tools and exploits. Version 3.0 contains 177 exploits, 104 payloads, 17 encoders, and 3 nop modules. Additionally, 30 auxiliary modules are included that perform a […]

Tags: , , , , , , , , , ,

Posted in: Exploits/Vulnerabilities, Hacking Tools | Add a Comment

Popular Tags

computer-security · darknet · exploits · fuzzing · google · hacking · hacking-networks · hacking-websites · hacking-windows · hacking tool · Hacking Tools · information gathering · malware · microsoft · network-security · Network Hacking · Password Cracking · penetration-testing · Phishing · Privacy · Python · scammers · Security · Security Software · spam · spammers · sql-injection · trojan · trojans · virus · viruses · vulnerabilities · web-application-security · web-security · Web Hacking · windows · windows-security · Windows Hacking · worms · XSS ·