Archive | Network Hacking




Nmap Port Scanner 4.50 Released for Download

At last a new major release of Nmap! If for some odd reason you don’t already know what Nmap is, it is a free and open source utility for network exploration or security auditing. Many systems and network administrators also find it useful for tasks such as network inventory, managing service upgrade schedules, and monitoring […]

Tags: , , , , , , , , , , , , , ,

Posted in: Hacking Tools, Network Hacking, Security Software | Add a Comment

scanrand – Download Stateless TCP Scanner with Syn Cookies

Scanrand is extremely quick and effective port scanner. It works by forking two distinct processes: One to send the initial queries One to receive responses and reconcile them from the above This makes it extremely fast. If you haven’t heard of the suite, Scanrand is one of the five tools in Paketto Keiretsu by Dan […]

Tags: , , , , , , , , , ,

Posted in: Hacking Tools, Network Hacking | Add a Comment

Technitium FREE MAC Address Changer v4.7 – Released for Download

The newest version of Technitium MAC Address Changer was released a while back, v4.7. There are some minor changes and it’s looking to be pretty polished for a free tool. Of course some might say “It’s just a registry entry? What’s the big deal?” Well this just makes it easier, especially when you are doing […]

Tags: , , , , , , ,

Posted in: Network Hacking, Security Software | Add a Comment

fwtest – Firewall Testing Toolkit

The firewall test suite fwtest is a security auditing tool made up of two parts: the test control application fwtest and optionally one or two helper processes named fwagent. The test control application fwtest starts up the python interpreter with the given test script. The test script controls the packet data flow between two virtual […]

Tags: , , , , , , ,

Posted in: Network Hacking, Security Software | Add a Comment

Chaosreader – Trace TCP/UDP Sessions from tcpdump

A freeware tool to trace TCP/UDP sessions and fetch application data from snoop or tcpdump logs. This is a type of “any-snarf” program, as it will fetch telnet sessions, FTP files, HTTP transfers (HTML, GIF, JPEG), SMTP emails and so on from the captured data inside network traffic logs. Similar to tcpflow which we mentioned […]

Tags: , , , , , , , ,

Posted in: Forensics, Hacking Tools, Network Hacking | Add a Comment

tcpflow – TCP Flow Recorder for Protocol Analysis and Debugging

tcpflow is a program that captures data transmitted as part of TCP connections (flows), and stores the data in a way that is convenient for protocol analysis or debugging. A program like ‘tcpdump’ shows a summary of packets seen on the wire, but usually doesn’t store the data that’s actually being transmitted. In contrast, tcpflow […]

Tags: , , , , , , ,

Posted in: Forensics, Network Hacking | Add a Comment

WifiZoo v1.2 – Gather Wifi Information Passively

WifiZoo is a tool to gather wifi information passively. Similar to dsniff but for wireless work, the author wanted to do something wifi-related somewhat helpful in wifi pentesting. Something of an extension of Ferret from Errata. It’s essentially a tool to get information from open wifi networks without joining any network, and covering all wifi […]

Tags: , , , , , , ,

Posted in: Hacking Tools, Network Hacking, Wireless Hacking | Add a Comment

httprint v301 – Web Server Fingerprinting Tool – Download

I was looking through my toolbox to see what else is useful and I came across this one, httprint – the only caveat is that it’s a little out of date. It still does a good job though. httprint is a web server fingerprinting tool. It relies on web server characteristics to accurately identify web […]

Tags: , , , , , , , , ,

Posted in: Hacking Tools, Network Hacking, Web Hacking | Add a Comment

LORCON (Loss Of Radio CONnectivity) 802.11 Packet Library

The LORCON packet injection library provides a high level interface to transmit IEEE 802.11 packets onto a wireless medium. Written for Linux systems, this architecture simplifies the development of 802.11 packet injection through an abstraction layer, making the development of auditing and assessment tools driver- independent. Using LORCON, developers can write tools that inject packets […]

Tags: , , , , , , , ,

Posted in: Network Hacking, Programming, Wireless Hacking | Add a Comment

IPAudit – Network Activity Monitor with Web Interface

IPAudit monitors network activity on a network by host, protocol and port. It listens to a network device in promiscuous mode, and records every connection between two ip addresses. A unique connection is determined by the ip addresses of the two machines, the protocol used between them, and the port numbers (if they are communicating […]

Tags: , , , , , , ,

Posted in: Hacking Tools, Network Hacking | Add a Comment

Popular Tags

computer-security · darknet · Database Hacking · exploits · fuzzing · google · hacking · hacking-networks · hacking-websites · hacking-windows · hacking tool · Hacking Tools · information gathering · malware · microsoft · network-security · Network Hacking · Password Cracking · penetration-testing · Phishing · Privacy · Python · scammers · Security · Security Software · spam · spammers · sql-injection · trojan · trojans · virus · viruses · vulnerabilities · web-application-security · web-security · Web Hacking · windows · windows-security · Windows Hacking · XSS ·