Archive | Network Hacking




tcpxtract – Extract Files from Network Traffic AKA Carving

tcpxtract is a tool for extracting files from network traffic based on file signatures. Extracting files based on file type headers and footers (sometimes called “carving”) is an age old data recovery technique. Tools like Foremost employ this technique to recover files from arbitrary data streams. tcpxtract uses this technique specifically for the application of […]

Tags: , , , , , ,

Posted in: Forensics, Hacking Tools, Network Hacking | Add a Comment

ProxyFuzz – MITM Network Fuzzer in Python

ProxyFuzz is a man-in-the-middle non-deterministic network fuzzer written in Python. ProxyFuzz randomly changes (fuzzes) contents on the network traffic. It supports TCP and UDP protocols and can also be configured to fuzz only one side of the communication. ProxyFuzz is protocol agnostic so it can randomly fuzz any network communication. ProxyFuzz is a good tool […]

Tags: , , , , , , , , ,

Posted in: Hacking Tools, Network Hacking | Add a Comment

Fake NetBIOS Tool – Simulate Windows Hosts

Some cool free tools made by folks from the French Honeynet Project. FakeNetBIOS is a family of tools designed to simulate Windows hosts on a LAN. The individual tools are: FakeNetbiosDGM (NetBIOS Datagram) FakeNetbiosNS (NetBIOS Name Service) Each tool can be used as a standalone tool or as a honeyd responder or subsystem. FakeNetbiosDGM sends […]

Tags: , , , , , , , ,

Posted in: Hacking Tools, Network Hacking, Windows Hacking | Add a Comment

Trinity Rescue Kit – Free Recovery and Repair for Windows

Trinity Rescue Kit or TRK is a free live Linux distribution that aims specifically at recovery and repair operations on Windows machines, but is equally usable for Linux recovery issues. It is possible to boot TRK in three different ways: As a bootable CD which you can burn yourself from a downloadable isofile From a […]

Tags: , , , , , , ,

Posted in: Hacking Tools, Linux Hacking, Network Hacking | Add a Comment

stealth techniques – syn

Or half-open scanning technique is the first of three to come series about stealth scanning… The other two are Xmas/Fin/Null and idle/zombie scan techniques… Intro This is a series of three to come articles about stealth scanning, everything that I am going to present is hping oriented so if you want to learn this techniques […]

Tags: , , , , , , , , , , , , , , ,

Posted in: General Hacking, Hacking Tools, Linux Hacking, Network Hacking, Windows Hacking | Add a Comment

Sguil – Intuitive GUI for Network Security Monitoring with Snort

Sguil (pronounced sgweel) is probably best described as an aggregation system for network security monitoring tools. It ties your IDS alerts into a database of TCP/IP sessions, full content packet logs and other information. When you’ve identified an alert that needs more investigation, the sguil client provides you with seamless access to the data you […]

Tags: , , , , , , , , , , ,

Posted in: Countermeasures, Linux Hacking, Network Hacking, Security Software | Add a Comment

Technitium Free MAC Address Changer v4.5 Released

Technitium MAC Address Changer v4.5 has been released. Technitium MAC Address Changer allows you to change Media Access Control (MAC) Address of your Network Interface Card (NIC) irrespective to your NIC manufacturer or its driver. It has a very simple user interface and provides ample of information regarding each NIC in the machine. Every NIC […]

Tags: , , , , , , ,

Posted in: Hacking Tools, Network Hacking | Add a Comment

Foundstone Blast – TCP Network Service Stress Test Tool

Foundstone Blast v2.0 is a small, quick TCP service stress test tool. Blast does a good amount of work very quickly and can help spot potential weaknesses in your network servers. Features: /trial switch adds the ability to see how the buffer looks before sending it /v switch adds verbose option – off by default […]

Tags: , , , , , ,

Posted in: Hacking Tools, Network Hacking | Add a Comment

Nemesis – Packet Injection Suite

Nemesis is a command-line network packet crafting and injection utility for UNIX-like and Windows systems. Nemesis, is well suited for testing Network Intrusion Detection Systems, firewalls, IP stacks and a variety of other tasks. As a command-line driven utility, Nemesis is perfect for automation and scripting. Nemesis can natively craft and inject packets for: ARP […]

Tags: , , , , , ,

Posted in: Hacking Tools, Linux Hacking, Network Hacking, Windows Hacking | Add a Comment

Popular Tags

computer-security · darknet · exploits · fuzzing · google · hacking · hacking-networks · hacking-websites · hacking-windows · hacking tool · Hacking Tools · information gathering · malware · microsoft · network-security · Network Hacking · Password Cracking · penetration-testing · Phishing · Privacy · Python · scammers · Security · Security Software · spam · spammers · sql-injection · trojan · trojans · virus · viruses · vulnerabilities · web-application-security · web-security · Web Hacking · windows · windows-security · Windows Hacking · worms · XSS ·