Tag Archive | "network hacking tool"


27 February 2013 | 7,664 views

ARPwner – ARP & DNS Poisoning Attack Tool

ARPwner is a tool to do ARP poisoning and DNS poisoning attacks, with a simple GUI and a plugin system to do filtering of the information gathered, also has a implementation of sslstrip and is coded 100% in python and on Github, so you can modify according to your needs. This tool was released by [...]

Continue Reading


29 March 2011 | 10,603 views

T50 – Experimental Mixed Packet Injector & Network Stress Testing Tool

T50 Sukhoi PAK FA Mixed Packet Injector (f.k.a. F22 Raptor) is a tool designed to perform “Stress Testing”. It is a powerful and an unique packet injection tool, that is capable of the below: 1 – Send sequentially (i.e., ALMOST on the same time) the following protocols: ICMP: Internet Control Message Protocol IGMP: Internet Group [...]

Continue Reading


08 June 2010 | 8,041 views

Knock v1.3b – Subdomain Enumeration/Brute-Forcing Tool

Knock is a python script designed to enumerate sub-domains on a target domain through a wordlist. Usage

You can view a demo of the tool enumerating Facebook sub-domains on Youtube here: Facebook and Knock v.1.2 Knock works on Linux, Windows and MAC OSX with a python version 2.6.x (or minor). Requirements Python version 2.6.x [...]

Continue Reading


24 February 2010 | 6,358 views

keimpx – Open Source SMB Credential Scanner

keimpx is an open source tool, released under a modified version of Apache License 1.1. It can be used to quickly check for the usefulness of credentials across a network over SMB. Credentials can be: Combination of user / plain-text password. Combination of user / NTLM hash. Combination of user / NTLM logon session token. [...]

Continue Reading


03 July 2009 | 10,791 views

The Middler – User Session Cloning & MITM Tool

The Middler is a Man in the Middle tool to demonstrate protocol middling attacks. Led by Jay Beale, the project involves a team of authors including InGuardians agents Justin Searle and Matt Carpenter. The Middler is intended to man in the middle, or “middle” for short, every protocol for which we can create code. In [...]

Continue Reading


Popular Tags

computer-security · darknet · exploits · google · hacking · hacking-networks · hacking-websites · hacking-windows · hacking tool · Hacking Tools · Information-Security · information gathering · malware · microsoft · network-security · Network Hacking · Password Cracking · penetration-testing · Phishing · Privacy · Python · scammers · Security · Security Software · spam · spammers · sql-injection · trojan · trojans · virus · viruses · vulnerabilities · web-application-security · web-security · Web Hacking · windows · windows-security · Windows Hacking · worms · XSS ·