ISIC – IP Stack Integrity & Stability Checker

ISIC is a suite of utilities to exercise the stability of an IP Stack and its component stacks (TCP, UDP, ICMP et. al.) It generates piles of pseudo random packets of the target protocol. The packets be given tendencies to conform to. Ie 50% of the packets generated can have IP Options. 25% of the […]

Tags: , , , , , , , ,

Posted in: Hacking Tools, Network Hacking, Programming | Add a Comment

Comprehensive SQL Injection Cheat Sheet

A reader e-mailed me a while ago about a fairly comprehensive SQL Injection ‘Cheat Sheet’ they had created and posted up. I compared it to the other ones I had bookmarked, and it was different enough to be worth posting. Currently only for MySQL and Microsoft SQL Server, some ORACLE and some PostgreSQL. Most of […]

Tags: , , , , , ,

Posted in: Database Hacking, Web Hacking | Add a Comment
Ubuntu Ultimate Edition

Ubuntu Ultimate Edition is Cool

Basically Ubuntu Ultimate Edition is Ubuntu Edgy Eft with a whole lot of software pre-added. Sadly the author had to removed Java, Flash and Acrobat reader due to licensing agreements. But don’t worry as there is a custom repository in the release which includes all of these and much more. SMP Support (dual core CPUS) […]

Tags: , , , , , ,

Posted in: General Hacking | Add a Comment

VoIP Security Testing Tools List from VoIPSA

The VoIP Security Alliance (VOIPSA) is pleased to announce the public release of its VoIP security tool list. Check it out at: http://www.voipsa.org/Resources/tools.php This VoIP Security Tool List provides categories, descriptions and links to current free and commercial VoIP security tools. This list was developed to address the current void of VoIP security testing resources […]

Tags: , , , , , , , , , ,

Posted in: Hacking Tools, Network Hacking | Add a Comment
Darknet Feed

Recent Down-time at Darknet

Apologies for the recent down-time at Darknet, the longest we’ve had so far I think. The disk-array crashed completely, hardware fault, so rebuilding and recovering the data from the bad disk, then restoring everything was a fairly long process. The site was back up quite early but the database inaccessible due to the taxing of […]

Tags: , , , , ,

Posted in: Site News | Add a Comment
Outpost Security Suite Pro

Outpost Security Suite PRO Review

Agnitum Outpost Security Suite Pro is a step up from their Agnitum Outpost Firewall PRO with a more wholistic look at security. The suite also includes pre-emptive threat protection, anti-spam protection and safe-surfing. The Software is fairly sizeable at around 36MB, you can download it here, for a 30 day free trial. As I’ve mentioned […]

Tags: , , , , , , , ,

Posted in: Advertorial, Countermeasures, Security Software | Add a Comment

GFI Free Endpoint Scanner – Online Portable Storage Device Scanning

Recently GFI launched a free, online portable storage device scanner called EndPointScan. http://www.endpointscan.com EndPointScan, is an industry-first, free online service that allows anyone to check what devices are or have been connected to computers on their network and by whom. Using this diagnostic tool, one can identify those areas where the use of portable storage […]

Tags: , , , , , , ,

Posted in: Advertorial, Countermeasures, Security Software | Add a Comment
leetupload.com

Hacker Files, Tools & Software Repository – leetupload.com

This site is dedicated as a repository for “hacking” programs for Windows and Linux. Please note that hacking means nothing but tweaking or cleverly resolving a problem. Use the programs as you wish, but this site or its provider are not responsible in terms of how you use these programs, (i.e. for educational purposes only). […]

Tags: , , , , ,

Posted in: Exploits/Vulnerabilities, Hacking Tools | Add a Comment
Scapy

Scapy – Interactive Network Packet Manipulation

Scapy is a powerful interactive packet manipulation program. It is able to forge or decode packets of a wide number of protocols, send them on the wire, capture them, match requests and replies, and much more. It can easily handle most classical tasks like scanning, tracerouting, probing, unit tests, attacks or network discovery (it can […]

Tags: , , , , , , ,

Posted in: Hacking Tools, Network Hacking | Add a Comment