Fake NetBIOS Tool – Simulate Windows Hosts

Some cool free tools made by folks from the French Honeynet Project. FakeNetBIOS is a family of tools designed to simulate Windows hosts on a LAN. The individual tools are: FakeNetbiosDGM (NetBIOS Datagram) FakeNetbiosNS (NetBIOS Name Service) Each tool can be used as a standalone tool or as a honeyd responder or subsystem. FakeNetbiosDGM sends […]

Tags: , , , , , , , ,

Posted in: Hacking Tools, Network Hacking, Windows Hacking | Add a Comment

Government Accountability Office Report Slams FBI Internal Security

Ah, FBI slammed again, it’s not the first time this has happened. Remember when a Consultant Breached FBI’s Computers? It also reminds me of when Homeland Security Scored an F for Internal Security AGAIN The Government Accountability Office, the federal government’s watchdog agency, Thursday released a report critical of the FBI’s internal network, asserting it […]

Tags: , , , , , ,

Posted in: General Hacking | Add a Comment

Trinity Rescue Kit – Free Recovery and Repair for Windows

Trinity Rescue Kit or TRK is a free live Linux distribution that aims specifically at recovery and repair operations on Windows machines, but is equally usable for Linux recovery issues. It is possible to boot TRK in three different ways: As a bootable CD which you can burn yourself from a downloadable isofile From a […]

Tags: , , , , , , ,

Posted in: Hacking Tools, Linux Hacking, Network Hacking | Add a Comment

Phrack 64 Released – It’s been a long time..

Finally a new Phrack! Phrack 64 has been released a while back at the end of May, and it’s been quite a wait. At the beginning in 1985, Phrack started as an anarchy magazine. You can learn from the first issues how to create your own bomb or how to seriously take advantage of the […]

Tags: , , , , , , ,

Posted in: General News | Add a Comment

Fuzzled – PERL Fuzzing Framework

There has been an explosion of fuzzing tools lately, quite a few we have mentioned here on Darknet. Someone else noticed this, and wondered where is the Perl framework to complete the family? With that in mind he spent the last few months working on something that should fill the gap – Fuzzled. Fuzzled is […]

Tags: , , , , , , , , ,

Posted in: Hacking Tools, Programming | Add a Comment

Darknet Videos

I was thinking that the darknet authors should create videos when they write about different tools… It should be fun to see presentations… and also would bring darknet more hits… I made a video for my previous article, and uploaded it to youtube: stealth techniques – syn …for better quality download it: here Is any […]

Tags: , , , , ,

Posted in: General News | Add a Comment

stealth techniques – syn

Or half-open scanning technique is the first of three to come series about stealth scanning… The other two are Xmas/Fin/Null and idle/zombie scan techniques… Intro This is a series of three to come articles about stealth scanning, everything that I am going to present is hping oriented so if you want to learn this techniques […]

Tags: , , , , , , , , , , , , , , ,

Posted in: General Hacking, Hacking Tools, Linux Hacking, Network Hacking, Windows Hacking | Add a Comment
PRIAMOS Project

Priamos Project – SQL Injector and Scanner

PRIAMOS is a powerful SQL Injector & Scanner You can search for SQL Injection vulnerabilities and inject vulnerable string to get all Database names, Tables and Column data with the injector module. You should only use PRIAMOS to test the security vulnerabilities of your own web applications (obviously). The first release of PRIAMOS contain only […]

Tags: , , , , , , , , , ,

Posted in: Database Hacking, Hacking Tools, Web Hacking | Add a Comment