Archive | Hacking Tools




PReplay – A pcap Network Traffic Replay Tool for Windows

There are not many good tools for replaying traffic, most people use WireShark (formely known as Ethereal) for capturing the traffic, but what happens if you want to take that capture and reply it over the wire? Someone has this problem so they decided to code their own solution, thankfully for us! There are quite […]

Tags: , , , , , , , , , , , , ,

Posted in: Hacking Tools, Network Hacking, Security Software, Windows Hacking | Add a Comment

A Collection of Web Backdoors & Shells – cmdasp cmdjsp jsp-reverse php-backdoor

Michael Daw has collected some WEB backdoors to exploit vulnerable file upload facilities and others. It’s a pretty useful library for a variety of situations, especially for those doing web application security audits and web app security. Understanding how these backdoors work can also help security administrators implement firewalling and security policies to mitigate obvious […]

Tags: , , , , , , , , , , ,

Posted in: Hacking Tools, Web Hacking | Add a Comment

ADTool – Active Directory Domain Listing Tool

ADtool is a neat tool to help you list all the machines that are part of an Active Directory driven domain or network. It is intended to help pentesters and admins in their day to day work, there are some other tools that can accomplish the work for listing domain servers, but unfortunately all other […]

Tags: , , , , , , , , ,

Posted in: Hacking Tools, Network Hacking, Windows Hacking | Add a Comment

LFT – Layer Four Traceroute and WhoB

LFT LFT, short for Layer Four Traceroute, is a sort of ‘traceroute’ that often works much faster (than the commonly-used Van Jacobson method) and goes through many configurations of packet-filters (firewalls). More importantly, LFT implements numerous other features including AS number lookups through several reliable sources, loose source routing, netblock name lookups, et al. What […]

Tags: , , , , , , ,

Posted in: Hacking Tools, Network Hacking | Add a Comment

Fierce Domain Scanner Released – Domain Reconnaissance Tool

Fierce domain scan was born out of personal frustration after performing a web application security audit. It is traditionally very difficult to discover large swaths of a corporate network that is non-contiguous. It’s terribly easy to run a scanner against an IP range, but if the IP ranges are nowhere near one another you can […]

Tags: , , , , , ,

Posted in: Hacking Tools, Web Hacking | Add a Comment

sqlmap – Automated Blind SQL Injection Tool

sqlmap is an automatic blind SQL injection tool, developed in python, capable of enumerating an entire remote database, performing an active database fingerprint and much more. The aim of this project is to implement a fully functional database mapper tool which takes advantages of web application programming security flaws which lead to SQL injection vulnerabilities. […]

Tags: , , , , , , ,

Posted in: Hacking Tools, Security Software, Web Hacking | Add a Comment

THC-Hydra – The Fast and Flexible Network Login Hacking Tool

THC-Hydra rocks, it’s pretty much the most up to date and currently developed password brute forcing tool around at the moment. It supports a LOT of services and protocols too. Number one of the biggest security holes are passwords, as every password security study shows. Hydra is a parallelized login cracker which supports numerous protocols […]

Tags: , , , , , , , ,

Posted in: Hacking Tools, Network Hacking, Password Cracking | Add a Comment

AccessDiver – Web Site Security Testing Tool

AccessDiver is a security tester for WEB sites. It incorporates a set of powerful features which help you find and organize failures and weaknesses from your web site. AccessDiver can detect security failures on your web pages. It has multiple efficient tools which will verify the robustness of your accounts and directories accurately. So, you […]

Tags: , , , , , , , , , , ,

Posted in: Hacking Tools, Web Hacking | Add a Comment

Caecus – Web Brute Forcing Tool with OCR Support

Caecus is a unique tool which can bruteforce some OCR form based protections. As far as we know at Darknet, this is the only publicly available OCR brute forcing tool. These scripts generates a digital image as an extra layer of security called OCR. Some versions of this script also use session id’s to keep […]

Tags: , , , , , ,

Posted in: Hacking Tools, Web Hacking | Add a Comment

Odysseus Win32 Proxy & Telemachus HTTP Transaction Analysis

Introducing a pair of tools that go well together and give you some good control for HTTP transaction analysis and looking at the security of web applications. Odysseus is a tool designed for testing the security of web applications. Odysseus is a proxy server, which acts as a man-in-the-middle during an HTTP session. A typical […]

Tags: , , , , , , , , , ,

Posted in: Hacking Tools, Network Hacking, Web Hacking | Add a Comment

Popular Tags

computer-security · darknet · exploits · fuzzing · google · hacking · hacking-networks · hacking-websites · hacking-windows · hacking tool · Hacking Tools · information gathering · malware · microsoft · network-security · Network Hacking · Password Cracking · penetration-testing · Phishing · Privacy · Python · scammers · Security · Security Software · spam · spammers · sql-injection · trojan · trojans · virus · viruses · vulnerabilities · web-application-security · web-security · Web Hacking · windows · windows-security · Windows Hacking · worms · XSS ·