Hack Tools List
Hack Tools List
Backdoor: Intrude computer and control the computer with client program.
Crack tool: Crack passwords of systems or applications, crack the serial numbers.
Disassembler: Disassemble the program with it. If you have a executable file, you can look the source code of this
file with it.
DoS tool: Make computer stop to respond to any request with these tools, so other people can not access the
computer.
Document: Documents about hacker, cracker, etc.
E-mail tool: Destroy the computer system using these tools, the tools are all related to e-mail. It includes several
tools about e-mail, for example, email bomber, tool to find someone's email address, etc.
Editor: Edit or modify your program with them.
Encryption & decryption tool: Encrypt files of almost any type using many strong cryptography algorithms.
Executable file tool: Manipulate executable files with these tools, bind some executable files, split one executable
file, etc. So, for example, you can add one executable file to another one.
Icq tool: Destroy the computer system using these tools, the tools are all related to icq. All programs in it work with
icq. With the tools, you can many things, for example, recovering icq's password, shareing your files, and encrypting
your icq messages, and so on.
Keylogger: Record keystrokes when the program is running, so you can get some useful information, for example,
password.
MISC: Examine source code for security holes, hack games, and other interesting tools for both linux and windows.
Packet forging: Modify the data packet on network at will.
Phreak tool: Test the paging transmitters and systems, and so on, it includes box and wardialier.
Scanner: Acquire the system information, for example, open ports, OS, and so on.
Sniffer: Intercept and capture the data on network.
Snoop tool: Show information of your system. For example, it can show IP address of your computer, or it can show
SCSI and ATAPI devices in your system, and so on.
Source code: Source code of many tools.
Spoof: Bypass an HTTP proxy, keep your connection active, creates fake credit card numbers, ip spoof, etc.
Virus: Source code of virus and executable virus.
Backdoor
Crack tool
1. AMI BIOS & AMI WIN BIOS password cracker: A command-line utility.
2. AMI Crack: Crack the Ami BIOS.
3. AMI Decoder: Crack the password of ami bios.
4. ARJ Cracker: Cracks Password Protected ARJ Files.
5. AW: Crack the password of bios.
6. AWARD BIOS password cracker: A command-line utility to generate matching password or to reset one.
7. Accent Office Password Recovery: Recover lost or forgotten passwords to open Microsoft Office documents.
8. Adv Office 2000 Password Recovery (pro): Crack the password.
9. Adv Office 2000 Password Recovery (std): Crack the password.
10. Advanced Archive Password Recovery: Crack the password of archive.
11. Advanced Excel 2000 Password Recovery: A program to recover lost or forgotten passwords to
files/documents created in Microsoft Excel.
12. Advanced NT Security Explorer: An application for Windows NT/2000/XP system administrators for finding
holes in system security.
13. Advanced Office Password Breaker: Decrypt Word and Excel files.
14. Advanced Office XP Password Recovery Professional: Recover passwords for the files created in Microsoft
Office applications.
15. Advanced Outlook Express Password Recovery: Crack the outlook express password.
16. Advanced PDF Password Recovery Pro: Crack the PDF password.
17. Advanced Word 2000 Password Recovery: Crack the password of word 2000.
18. Advanced ZIP Password Recovery: Crack the password of zip.
19. Ami BIOS cracker: Crack password of ami bios.
20. BIOS / CMOS tools: Crack the password of bios and cmos.
21. CmosPwd: Recover your cmos password.
22. CryptoExplorer for Borland Paradox: Recover Borland Paradox passwords.
23. Dictionary: Used by cracker to crack the password.
24. Dictionary Maker: Makes Dictionary Files password Crackers.
25. Excel Key: Recover all types of passwords for *.xls files.
26. FBRUTE: Crack unix password.
27. FileMaker Key: Recover passwords for FileMaker databases.
28. Hades cracker: Crack the password.
29. John The Ripper: Crack unix password.
30. Kill CMOS ver 1.00: Crack the password of cmos.
31. L0phtCrack 2.01: Recover passwords for Windows NT.
32. LILOPwd: Display lilo password with it.
33. Lilo crack: Crack password of lilo.
34. Linux crack: Crack password on linux.
35. Lotus 1-2-3 Password Recovery Key: 1-2-3 Key is a program to recover passwords for Lotus 1-2-3 documents.
36. Lotus Word Pro Password Recovery Key: Recover Lotus Word Pro Password.
37. Mac crack: Crack password on Mac.
38. Mail Password Recovery: Recover forgotten password from ANY POP3 client.
39. MailPassword: Recover lost password of e-mail.
40. MakePwl: Create the pwl files.
41. NTFS driver: Access ntfs partition files from MSDOS and change password.
42. NtPassword: Find holes in system security.
43. Office Key: Recover many types of passwords for MS Office files.
44. PGP Crack: Crack the PGP.
45. PWLCRACK: Crack the PWL files.
46. PalmCrack 1.1: The password testing tool for the Palm Computing Platform.
47. Paradox Password Recovery Key: Recover passwords for Paradox Database.
48. Passware Kit: Recover the password.
49. Password Recovery Tools: Recover some passwords.
50. Password tools: tools for crack password.
51. Peachtree Key: Recover passwords for Peachtree Complete Accounting company files.
52. PwlTools: Recover login password.
53. Quicken Password Recovery Key: Quicken Key is a program to recover passwords for Quicken (.QDF) files.
54. Register: Register the software.
55. RemPass Ver 2.6: Crack password of bios.
56. SERIALS 2000: Crack the register code.
57. Serial number: Used by cracker to crack s/n.
58. THC-CUPASS: Crack password of user on a WindowsNT/W2K server.
59. THC-PrintDates: Crack password using date.
60. Ultimate ZIP Cracker: crack zip files.
61. Unix password crackers: Crack passwords for unix.
62. WPC: WINDOWS PASSWORD CRACKERS.
63. Windows XP / 2000 / NT Key: Reset your Windows XP / 2000 / NT security.
64. Windows crack: Crack password on windows.
65. Windows password crackers: Crack password on windows.
66. Word Key: Recover all types of passwords for *.doc files.
67. Word List: Word dictionary.
68. WordPerfect Password Recovery Key: Recover passwords for WordPerfect Document files.
69. Wzippwd: Creates valid Serial number for Winzip.
70. iMesh Password Recovery: Recover a password installed in the iMesh Client.
71. variation tool: Prepare the word list used by cracker to crack password.
Disassembler
1. ASMGEN: A program to generate cross-referenced assembly language code from any executable file.
2. Bubble Chamber: Disassemble executable files.
3. DoDi's Visual Basic Tools: DoDi is a VB kit.
4. PROVIEW: Analyze and view system.
DoS tool
1. Apache DoS Evasive Maneuvers Module: The Apache DoS Evasive Maneuvers Module is a replacement
module for mod_access that provides functionality for fighting off DoS attacks. It does this by rejecting rapidly
repeated requests for the same URL from the same addresses using an internal hash table on a per-child basis.
2. Black: Bomb someone's computer with it.
3. IGMP Nuker: Bomb other's computer with this popular tool.
4. Windows DoS kit: Attack computer systems with this useful tools.
5. pagebomb: Bomb windows pager with this tool.
6. windows95/98 patch: Patch you system in order to avoid attack by hackers.
Document
E-mail tool
Editor
1. HEXCALIBUR: Examining, modify or otherwise manipulate disk files in their raw, or binary format.
2. HEXpert for Windows: Edit windows multi-format binary files.
3. Hex Editor: Edit your binary file with it.
4. Hex Workshop: Edit, insert, delete, cut, copy, and paste hex to your files.
5. Hex edit: Edit your raw files.
6. HexCmp: HexCmp is a visual binary file compare application and easy to use hex editor. It can help you with to
compare two files as a binary raw quickly and easily.
7. HexEditorShareware: User friendly & efficient hexadecimal editor, featuring: unlimitted undo/redo, copy/paste,
search/replace, print, jump to offset, etc. It can edit and truncate files of unlimitted size in 4 different modes: HEX,
BIN, DEC & ANSI. It contains base converter and hex calculator tools.
8. Hexplorer: Hexplorer is a hexadecimal file editor that offers many features.
9. Hiew: Dump NE-executable file and dump LE/LX-executable file.
1. Bound File Detector & Remover: Detect Bound file with this tool.
2. Exe file tool: Manage the exe files with these tools.
3. Fusion: Enable static, virtual or dynamic linking, with sophisticated version control when using dynamic linking.
4. Multi Binder: Bind an unlimited number of files, of any EXE/BAT type.
5. Newjoiner: Avoid av detection.
6. PEBundle: Allow for DLLs or other files to be "bundled" with an executable file.
7. Topo: Scan all sections in order to find large 'usable' areas.
8. WinSplit: Split and join files with this tool.
9. inPEct: Bind 2 executables in one.
10. inPEct source code: Bind 2 executables in one.
Icq tool
Keylogger
MISC
Packet forging
1. Netcat: Reading and writing data utility across network connections using TCP or UDP protocol.
2. Netcat for unix: Netcat is a simple Unix utility which reads and writes data across network connections, using
TCP or UDP protocol.
3. Packet_Forging: Include 21 files that are all used to create and send arbitrary packets on ethernet networks.
4. Packet_tool: Having other five packing tools as tcpkill, packetx1, msmh, LibnetNT, arpinject in the kit.
5. Pksnd102: Packing 16 files as Winpkt, Pktsend, Ndis3pkt, Dump, Dumy, Dis_pkt9 in it, among which are packed
or executable files and source files of packet driver programs.
6. Raw IP Packet Capture/Creation Utility: Allow you free reign to directly forge the packet in any way you so
desire.
7. Snot: Use snort rules files as its source of packet information.
8. Winject: Inject packet for Windows 9x, also called drugs for Windows.
Phreak tool
Scanner
1. 7th Dimension Port Scanner: Scan your port address more easily.
2. AB Complete Ping: Allow you to ping one or more IP addresses, to scan a network for shared resources and to
scan a computer for open ports.
3. Advanced Net Tools Free: Trace routes and scan ports using it.
4. Angry IP Scanner: Scan IP very easily and rapidly!.
5. Dave's Port Sniffer: Detect FTP, HTTP, POP, SMTP, TELNET and FINGER deamons running on any TCP host
machine.
6. DeadBolt: Monitor holes in Windows and alert you when it detects suspicious activity, giving you the power to
stop viruses dead in their tracks!.
7. IPScanner: Get IP address and computer names.
8. JMap Port Scanner: JMap is a Java network portscanner, a security tool to identify open ports on any host or
network subnet.
9. Linux-Vuln-source: Carry the two scanner as Rnmap and VLAD 's system security kit!.
10. MacAnalysis: Audit suite for your Macintosh to perform and help implement a security standard for your
computer/network by performing some work.
11. Mpscan: mpscan is a parallel network scanner that checks for open ports.
12. Nessus: Scan security of computer.
13. NessusWX: NessusWX is a client program for Nessus security scanner which is designed specially for
Windows platform.
14. NetBIOS Security Kit(unix): Perform various security checks on remote servers running NetBIOS file sharing
services.
15. Netmon: Monitor network connections.
16. Nmap: Explore or security audit network on Linux or Unix.
17. Port Invader: Scan a range or list of IP addresses to verify if there are open or closed ports.
18. Port Scan Attack Detector: Port Scan Attack Detector (psad) is a program written in Perl that is designed to
work with Linux firewalling code (iptables in the 2.4.x kernels, and ipchains in the 2.2.x kernels) to detect port scans.
19. Port Scanner: Scan a group of IP address looking for the presence of specific incoming TCP/IP ports.
20. Portscan SMS Alert: Alert you when probed scandlogd logs information to syslog and invokes this shell script.
21. Scanner: Collect 84 tools and misc to scan.
22. SkPortScan ActiveX Control: Integrate port-scanning capabilities into your applications with this ActiveX
control.
23. THC-HappyBrowser: Check an NT-Server/Webserver for known vulnerabilities.
24. THC-Probe: Scan compilation for Linux.
25. THC-Scan: Automate tone, carrier, vmb scanning.
26. Ultima Port Scanner: Scan local and remote ports.
27. WhereIsIP: Find the geographic location of chat room members, ICQ members, and more.
28. WifiScanner: WifiScanner is an analyzer and detector of 802.11b stations and access points.
29. WinNessus: Scan security of computer.
30. Windows_Trojan_Scanner: Collect 6 little tools scanning whole networks to find well known Trojans.
31. Windows_port_scanner: Collect 9 Port Scanner running on Windows.
32. XSharez scanner: Scan, search and get specific resources for you.
Sniffer
1. Blackbox for AOL: Monitor application for America Online, AIM, ICQ, and Yahoo Messenger.
2. Colasoft Application Protocol Sniffer & Analyzer: It is a TCP/IP Network Sniffer & Analyzer program based
on Windows system.
3. Ethereal0914: Analyze network protocol freely for Win32.
4. Golden Eye: Monitor your computer with it.
5. InternetPeriscope: Monitor your computer's ports using this program.
6. Libpcap062: Needed for capturing packet to you as the packet capture library, the latest release of Libpcap.
7. Linux_sniff_source: Contain 18 sniffer tools on Linux and some source files.
8. LittleBrother: Allow supervisors to accurately manage and measure Internet and network resource usage.
9. NetProb32 Network Analyzer: Analyze, Monitor Traffic, and Generator Packet program.
10. PacketX: Integrate winpcap packet capture functionality with VB or any other programming environment
supporting Microsoft ActiveX technology.
11. Phenoelit's own security sniffer: Open a network interface for all packets and not only for these packets, which
are send to this interface.
12. ProBot: Monitor your computer using log.
13. ProBot SE: Monitor your computer with it.
14. Proxy Workbench: It is a unique proxy server ideal for developers, trainers and security experts that displays its
data in real-time.
15. Snarp: Allow the host to sniff the data from the wire.
16. Sniff-em: Base on a competively priced, performance minded Windows as a Network analyzer.
17. Sniffers: Having 34 files in it and among that are 28 sniffer tools and some source codes.
18. Socket Workbench: Designed to analyze socket communications.
19. Stealth Activity Recorder: Use newly and easily internet enabled tool for monitoring home and business PCs.
20. Tcpdump362: Capture and dumper program pretty much for the original protocol packet.
21. Win Sniffer: Win Sniffer captures passwords on LAN.
22. Windows_sniff: Facilitate the capture and visualization of network traffic kit of 5 tools and 1 source code files.
23. Winpcap: Capture and send raw data from a network card, the free Packet Capture Architecture for Windows!.
Snoop tool
Source code
Spoof
Virus
Backdoor
1. Back Orifice
This program includes 7 other programs. They are antigen2k.zip, B1bogui.zip, bo2k.zip, bo2k_src.zip, bo2kss.zip,
bof.exe and src1.41.zip.
Type: Shareware
2. Backdoor kit
There are hundreds of backdoor program. There are many classic program about backdoor.
4. Backdoor source
There are several source code of backdoor program. It includes the KIS(server and client) program.
5. Minigift
It consists of two parts. One is server program, it runs on the victim's computer and send the information. The other is
client part, it runs on the hacker's computer and receives the message that the server sends.
6. Net spy
NetSpy will run in the background so the remote computer user will not know know it is being used, which can be
useful for keeping track of what is getting done by other computers in your office. Capture a screen shot, automated
dialup, manage shared resources are just a few of the other functions of this power packed program. If you are looking
for remote computer software, this is the only one you will need. This version of NetSpy requires Windows 95,
Windows 98, or Windows NT 4.0 or later.
Type: Shareware
Version: 3.0
7. Trojan
There are many trojan programs in this file. Also there are many anti-trojan programs in the file.
Crack tool
1. AMI BIOS & AMI WIN BIOS password cracker
Algorithm: proprietary Weakness: storing a key along with data Possible attacks: password decryption
Version: 2.02
2. AMI Crack
It is a tool to crack the password of ami bios.
3. AMI Decoder
It can crack password of bios!
4. ARJ Cracker
It can recover the password of arj file.
5. AW
It can crack password of bios!
21. CmosPwd
It can find the password stored in cmos, which are used to access bios or start the computer.
Version: 4.3
26. FBRUTE
It is a unix password leacher/cracker.
32. LILOPwd
It can dump lilo password. The lilo password is stored in map file in clear text, so the program is very small.
Version: 1.2
39. MailPassword
Virtually all e-mail clients use password caching because it's very inconvenient to enter a password every time you get
your mail. This means it is very easy to find out a password. The universal solution lies in POP3 server imitation. E-
mail client will tell the password during the transaction. MailPassword uses this method to recover lost passwords.
40. MakePwl
Using MakePWL you can automate PWL files creation. This can be useful for system administrators who need to pre-
configure multiple computers. MakePWL supports traditional GUI interface as well as command line and OLE
Automation.
Type: Demo
Version: MakePwl v1.2(released on 4/13/2003 )
45. PWLCRACK
Password cracker for Windows 95 - Shows all info in the PWL file - GOOD!
52. PwlTools
Using PwlTools you can view PWL files, recover lost login passwords, explore protected storage and much, much
more. A lot of security tools are included into this package. It's a "must be seen" program for administrators and
security specialists.
Version:6.65
58. THC-CUPASS
CUPASS uses techniques to guess the password of ANY user on a WindowsNT/W2K server or domain. CUPASS uses
a flaw in the implementation of Microsofts NetUserChangePassword API to guess/change the users password. This
release is the proof of concept code for the THC paper "CUPASS and the NetUserChangePassword Problem".
Version: 1.0
59. THC-PrintDates
Small program that generates date combinates in order to crack passwords via dicitionary cracking.
Version: 1.2
62. WPC
A zip with John the ripper 1.6;Cracker Jack 1.4 ;Brute 1.1 ;Killer Cracker 9.5 ;Xit 2.0 ;Guess ;Hotmail hacker
;Nuklear Crax 1.0 ;NT Crack 2.0 ;Star Cracker ;Claymore 1.0 ;
Type: Freeware
69. Wzippwd
This program creates serial number for winzip.
Disassembler
1. ASMGEN
This program will generate 8086/87/88 assembly code text that is compatible with the IBM Personal Computer Macro
Assembler from any executable diskette file up to 65,535 bytes. The output can be routed to the console or a diskette
file. A reference list may be generated separately or embedded at the appropiate instruction counter address in the
assembly code.(ASMGEN is a simple disassembler which has been available since the early 80's. Recently ASMGEN
2.1 itself has been disassembled, improved and corrected, and reassembled as ASMGEN 3.0.)
2. Bubble Chamber
The Input File is the program (.COM or .EXE) that you wish to disassemble. The input file must be in the default
directory. The Output File is created in the default directory. This file will hold the assembly language source code
created by the Bubble Chamber.
3. DoDi's Visual Basic Tools
These tools shall help develop programs with Microsoft's Visual Basic 3.0 (VB). They group around a project
management system, with extensions for the optimisation of programs.
4. PROVIEW
PROVIEW is a menu driven program used to analyze, view and edit the basic components of a system, including the
system memory, system interrupts, device drivers, and installed disk drive sectors and file contents. PROVIEW will
allow you to view system elements in HEX, ASCII or disassembled code format. Full searching and editing functions
are included.
DoS tool
2. Black
It is a bomb for hackers. You can use it to destroy the victim's computer.
3. IGMP Nuker
It is a very famous bomber. It is fit for attacking Windows98 operation system.
Version: 1.0
6. windows95/98 patch
There are six executable programs. You can use them to patch your windows operation system to avoid attack by
hackers. In these files, there is a program named nn21.exe, it is tool to find the sources of attempted denial of service
attacks.
Document
E-mail tool
1. Anonymous emailer
This is the first and only anonymous mailer for Window95. Cant do any damage but the person you send to will never
know who sent it.
2. Bomber
It is another e-mail bomber. You can use it to bomb other's e-mail box.
4. Extreme mailer
It is a cool mail bombing program brought to you by the cool people at extreme.
5. Fake Mailer
Fake Mailer is a powerful anonymous mailer that allows you to send fake emails from any email address. This means
you can change your name in an email so that it looks like the email came from somewhere or someone else. This
program uses the anonymous email engine found at the sendfakemail.com site and does not require a SMTP mail
server. You can spoof any email address and send it to anyone you like. You can also send attachments and HTML
emails.
Type: Freeware
Version: 1.51
6. Haktek
It is a hacker tool on windows. It includes e-mail bomber, port scanner, ping, scanner, anti-email bomber, and so on. It
is a great hack tool.
7. KaBoom!
Well, this is KaBoom! v3.0, the mail bomber for Windows 3.x and Win95.
Version: 3.0
8. Mail Bomb
It is also a e-mail bomber. You can use it to bomb your victim's e-mail box of course.
Version: 8.1
10. Phasma 3k
You can send anonymous emails and bomb other's e-mail box. As the same time, you can appoint arbitrary e-mail
address and IP address.
Version: 3.0
11. Quick Fyre
The author wrote QuickFyre mainly as a further development of OMENz. QuickFyre uses virtually exactly the same
technique as OMENz, but it has been added in more display information, so that you'll be able to tell exactly what is
going on.
Editor
1. HEXCALIBUR
Hexcalibur is a high quality editor designed expressly for examining, modifying, or otherwise manipulating disk files
in their raw, or binary, format. You may examine and change any part of a file using either hexadecimal characters (4-
bit characters) or standard ASCII characters. Hexcalibur is especially useful for examining and editing files that
standard ASCII editors either will not read or will read but display in a format that is not terribly useful.
Version: 1.02
3. Hex Editor
HexEditor is a binary file editor, whose advanced features will strongly simplify the editing process. Features: 1.
Loads files up to 2 GB in a couple of seconds! 2. Multi-document, multi-window interface. 3. Full Undo support. (The
only limit is your hard disk free space). 4. Autorestore feature that helps you restore opened files after system failure.
5. Powerful Find feature. 6. Drag&drop and other shell integration features. 7. Goto (or jump) feature that allows you
to move to any absolute or relative location in the file. 8. Fill feature that can fill tens of Megabytes with undo
support! 9. Expanding (inserting several parts) files, deleting parts of files etc. with full undo support.
Type: Freeware
Version: 2.0
4. Hex Workshop
Hex Workshop is a file and disk editor which allows you to edit, insert, delete, cut, copy, and paste hex. Additional
features include: goto, find, replace, file compare, and checksum calculation. New with this version is the ability to
launch Hex Workshop from the Windows 95 Right Mouse Context Menu, the File Manager, and as a Drag and Drop
Target. With Hex Workshop you also get a Base Converter, for converting between hex, decimal, and binary, and a
Hex Calculator (supporting +,-,*,/,&,|,<<,>>,^,~).
Type: Shareware $20
Version: 4.10
5. Hex edit
It is another hex editor beside the above one.
Type: Trial
Version:II
6. HexCmp
HexCmp features:- HexCmp allow quickly and easy compare two files as binary raw.- HexCmp is easy hex editor
which allow you modify files in hex mode. - HexCmp has synchronous file scrolling and cursor scrolling. - HexCmp
allow navigation through different or equal blocks of files. - HexCmp has "Info Panel", which show file infomation
and cursor point value as char, byte, word and dword. - HexCmp has search function, which allow you find as hex
string, such char string.
Type: Demo
Version: 1.2.5.66
7. HexEditorShareware
Type: Demo
Version: II 2.1
8. Hexplorer
Hexplorer is a hexadecimal file editor that offers many features, including 5 color schemes to interpret bytes visually,
unlimited Undo operation, find and replace function, pixel viewer, structure viewer and more.It also allows you to
export data to C or Assembler, calculates checksums, CRC values, finds patterns and more.
Type:Freeware
Version: 2.02
9. Hiew
There are several programs in this package. Among these files, Nedump.exe can dump NE-executable file, while
Lxdump.exe can dump LE/LX-executable file.
Version: 5.01
1. Cryptonite Pro
Cryptonite Pro uses a superfast 64 bit encryption algorithm. Not only does it encrypt files, but it offers the user the
option of protecting the archive with an encrypted password as well. Unlike other programs which require a password
to encrypt each file, you can now encrypt an entire document or image directory with a single string password!"
Type: Shareware $30
Version: 1.2
2. EasyFP
EasyFP is a windows shell extension. Compression is an optional function when encrypting. EasyFP is integrated into
windows explorer. So you can encrypt or decrypt files or folders when you browse in the windows explorer. Just right-
click on any files or folders, select encrypt menu and give a password to protect them. For version 2.0, a new feature
is added. By monitoring file system operations, after a file is encrypted, it can't be opened, renamed and deleted until
it is decrypted. And you don't worry your important files will be deleted by a mistake or by other applications. This
new feature is enabled in Windows95/98, Windows 2000, Windows Me, Windows XP, but not in WinNT 4.0."
Type: Shareware
Version: 2.0
5. Encryptonite
Encryptonite is a Java application. It requires Microsoft Virtual Machine and Windows 95/98/2000/NT. Your most text
files can be encrypted and decrypted using it.
Type: Freeware
Version: 1.0 beta
6. Faena MyID
Faena MyID is a super-high-security user ID and password-keeping program. Encrypt your usernames and passwords.
Even if a hacker gets your password file, without your PIN in your mind, nobody can decrypt the data. Supports
multiuser if you are using Windows NT4/2000/Xp. Transfer your ID password lists between home and work by e-
mail, using Export/Import function. AutoHide to tasktray. This update features minor enhancements and bug fixes.
Type: Free to try $9.00
Version: 3.0
7. HTML Encrypt
HTML Encrypt v1 is a easy to use HTML/Script encryption program. HTML Encrypt 1.0 can encrypt ANYTHING
you give it and decrypt it perfectly! HTML Encrypt has been tested with JavaScript, VBScript, HTML, and Active X
Controls. HTML Encrypt uses JavaScript to encrypt so HTML Encrypt is very flexible as well!" News :Multiple File
Encryption Option to leave Meta Tags in Clear Text Option to leave Scripting in Clear Text Option to leave Style tags
in Clear Text Option to disable Right Click Easy Update Checking
Type: Shareware
Version: 2.0
10. NetMangler
NetMangler can be used with Outlook, Eudora, Lotus Notes, as well as web based email like Hotmail and Yahoo. You
can also use it with Chat systems like ICQ. This version has full product functionality using Blowfish encryption.
Type: Shareware
Version: 1.01
11. PC-Encrypt
It provides the highest level of protection through the use of the proven Blowfish algorithm, and PC-Encrypt will
work with most email clients. It has the option to automatically erase the original file after encryption, the ability to
employ secure multiple passbooks, and the ability to automatically encrypt all the files in a folder.
Type: Shareware $29
Version: 4.45
14. WebPassword
WebPassword is a program which protects your web pages with password. Once you have password-protected your
page, no one unauthorized person will be able to view its content without having a correct password, either in browser
or as an original HTML source. In a Web browser, the content of a password-protected page may be viewed only after
a valid password is entered. In a text viewer, the content of an encoded page appears as a block of JavaScript data in
an HTML page.
16. WinSafe
The algorithms include Blowfish, CAST, SAFER-SK128, Twofish and more. The password is encrypted firstly, then
hashed, special encryption interfaces for different type of files are provided, too. And create self-decrypting
executables.
Type: Shareware $25
Version: 1.1
3. Fusion
Fusion is a unique utility that allows any Win 32 exe, ocx, dll or screensaver to have it's dependencies directly injected
into it's code - including ocxs. Fusion enables static, virtual or dynamic linking, with sophisticated version control
when using dynamic linking. Version control gives your module the ability to check the required dependencies on a
target PC and utilises the fused version using the selected preset conditions. Fusion even compresses and encodes your
module and dependencies, resulting in a significantly smaller footprint. Imagine a VB program requiring no runtime?
Fusion makes this possible!
Type: Shareware
Version: 1.0
4. Multi Binder
For your convenience, there are three versions of the Multi-Binder program in this package.
Version: Their versions are v1.2, v1.2.1, and v1.3.
5. Newjoiner
Newjoiner is a modification by stoner of Blade's Joiner to avoid av detection.
6. PEBundle
PEBundle is a revolutionary tool that allows for DLLs or other files to be "bundled" with an executable, therefore
removing the requirement to distribute the bundled files separately from the application. With two operational modes,
one that uses advanced techniques to resolve dependencies on a bundled DLL in memory, and another that writes the
bundled file(s) to disk, PEBundle is a great tool to optimize software distributions.
Version: 1.0
7. Topo
Earlier version only scan executable PE sections looking for zero padded areas. These objects are safer from the point
of view of run-time overwriting. In order to increase the chance to find large 'usable' areas this v1.2 allow scanning all
sections.
Version: 1.2
8. WinSplit
This is a very simple but nonetheless handy tool to split and join files. It is very small (47Kb!) and thus fits on every
floppy disk. SPLIT: Select a file, enter a valid package size and click on "Split". Example: Say you have a large file
(3MB) that you want to transport on a floppy, just select the file and enter a packe size of 1400 Kb. The output will be
2 files of 1400 Kb each and one of 200 Kb. JOIN: Select the first file of a packages which has the file type "*.1".
Click on "Join", and the original file will be restored from the little pieces.
Type : Shareware
Version: 6.21
9. inPEct
inPEct is a program that allows you to bind 2 executables in one. So, you can get some inoffensive joke proggy and
insert a bad trojan/worm in it. When someone executes it, it opens joke program in foreground and a bad Thing in
background...
Version: 1.0
Icq tool
2. Aquila
From http://www.winsite.com/: Aquila is a freeware program to recover login and password information (stored
locally). It can be used to recover cached passwords, hidden password (from password boxes), dial-up passwords and
ICQ 99b-2000b passwords. ICQ Support: It can reveal passwords from ICQ 99b-2000b dat files. Windows Cache:
Windows 9x/ME stores some passwords in cache. Aquila also can show those cached passwords. Dial-up passwords:
If you enabled to save dial-up passwords, you can reveal those passwords with just one click. Password boxes: Aquila
can also used to reveal passwords from screen (passwords that are shown as '****' ). So you can reveal your Outlook
Express Mail password, PalTalk login password etc... Passwords are recovered instantly, multilingual passwor ds are
supported.
Type: Freeware
Version: 1.3
3. Auth bypass 99
Add people in ICQ99 with the program, and do not need authorization any more.
4. ICQ Document
There are two documents about ICQ. One is about "The ICQ Security Tutorial", and the other is about "Removing the
ads in 2001 and More".
5. ICQ FORCE
It is a ICQ account cracker. It use brute-force method to guess the password. Of course, I think there should be a
password dictionary.
6. ICQ MachineGun
ICQ MachineGun v1.0b is the ICQ spamer/bomber. The messages send through the ICQ server to any
(Online/Offline) users. It's may be a normal or uin messages.
Type: Freeware
Version: 1.0b
7. ICQ kit
There are 100 ICQ tools in this file. You can use these tools to complete various attacks by ICQ. At the same time, you
can protect your computer better.
8. ICQr Information
ICQr Information is able to read and reveal personal information, such as nickname, address, birthday and much
more. As it's THE ONLY KNOWN program that can display passwords of all supported ICQ versions*, it can be used
to get back your own lost password! With this freeware tool, you will be able to control your employees and to find
out what they do not want you to know!
You can also use ICQr Information to find already deleted friends, because the DAT file is NOT "cleaned" up after
removing somebody from your contact list.
You can export the gathered information into a multiplatform HTML file and save the contact list to a textfile. ICQr
Information allows to select those elements you want to export.
Type: Shareware
Version: 1.5
9. SecureICQ
SecureICQ is an addon program for ICQ that allows users to encrypt messages they send and to decrypt encrypted
messages they receive. To exchange messages with SecureICQ, both users on the sending and receiving ends must
have the program installed and running. SecureICQ features include automatic send after encrypt and automatic
decrypt of incoming messages. It uses a simpler encryption algorithm than PGP or RSA that is still effective against
most eavesdroppers. SecureICQ does not require the exchange of keys, and produces small enough messages to be
sent through the ICQ server (important for users behind firewalls).
Type: Freeware
Version: 1.0
Keylogger
1. G2kBIOSspoof
G2kBIOSspoof is a Windows keystroke logger aimed at stealing a bios password. QuickBASIC source included. You
can run this little program to get someone else' BIOS password. Just run it full screen, it writes all keystrokes to a file
called kpwd.txt.
2. HookThis
When you fired up HookThis, you get a WM_CHAR- message for every key pressed (any valid ASCII-key ([ENTER]
+ [BACKSPACE] sends a WM_KEYDOWN - message)) anywhere in Windows. Remember to unset the hook when
close your application.
Type: Freeware
3. Hooker
Trojan part is written on MS Visual C++ 5.0. And you can build smth really good based on Hooker. Hooker can be
executed on any Win32 platform with minimum set of DLLs.
Version: 2.4
4. KeyGhost
KeyGhost records up to 2,000,000 keystrokes. It can be installed even when your machine is off by clipping it on, and
can be recorded on your computer or retrieved.
Version: 1.00
5. KeySpy
KeySpy is invisible spy software. Highly efficient and discreet, KeySpy uses an engine that is only 84k in size.
6. KeyTrap
KeyTrap will log your keyboard scancodes to a logfile for later conversion to ASCII characters. Keytrap installs as a
TSR, remaining in memory untill the computer is turned off. Keytrap can't work in windows.
Version: 3.0
7. Keycopy
Keycopy can be used in Wordperfect 5.0, Multimate, Norton Editor. Its each keystroke be writed to it's system buffer
until 200 in memory, then copy to a file with data and time stamp. The file's address can be default or specified by
you.
Type: Shareware $20
Version: 1.01
8. Keylog
Keylog is a kit of five tools. Its Keylog25 has KEYLOG!.EXE as a Windows 3.x/95 version 2.5 recording keystrokes,
advanced KeyLog. The Amecisco Invisible KeyLogger Stealth v1.2 for Windows 95/98 README records every
keystroke entered from the keyboard. Keylog5 is another keylogger. Keylog95 is a WINDOWS95 version of
keylogwn.exe, KEYLOGWN.EXE is a WINDOWS version 1.5 and records all ascii keystrokes to an ascii file on
C:\dos\logx.
12. Phantom2
Phantom2 is the successor to Phantom. It fixed a number of bugs and a wealth of new features. It has been tested
under MS-DOS 5.0 and on 386-class machines.
Type: Shareware $20
Version: 1.1
13. Playback!
Playback differs greatly from most macro programs in that Playback replays your keystrokes at the same rate you
typed them in. You can also use the included Menu program to playback your keystrokes using a point and select
menu.
Type: Shareware $26
Version: 1.9c
14. SKInNT
Invisible Stealth Keyboard Interceptor 5.0 saves your time of logon and user's name. It Intercepts the text of mouse
click or under edit and captures your windows activity, allows protect SKInNT Configuration Utility with logon
password.
Type: Shareware $69
Version: 5.0
15. Skin
SKInNT 5.0 DEMO is Stealth Keyboard Interceptor 5.0 for Windows NT/2000 DEMO. Stealth Keyboard Interceptor
Auto Sender SKIn98AS v1.0 (buid 247) is shareware. The Skin5 Pro is for Windows 95/98/ME. Stealth Keyboard
Interceptor v5.0 (SKIn) is a general-purpose security program for Windows 95/98/ME that tracks and reports all
activity of monitored user on your PC.
16. Slog
It has two slog tools: SlogPro and SlogCore. The Use of StealthLogger 1.6x Demo, StealthLogger Core Demo or
Probot 1.x Demo Version allows the system administrators to monitor computer usage with proper warning in
advance.
Version: 1.6x Demo
MISC
1. Game Hack
Game Wizard 32 is an innovative and versatile program which will allow the user to participate more intelligently in
computer games applying it into any program or game. CrackAid removes the annoyance of having to dig out your
manual/code-wheel/key diskette everytime you want to play a game.
2. HeadStrong WebClicker
WebClicker uses public proxies to create artificial banner ad clicks. Emulates complete browser HTTP transfer and
can be used for banner/link exchanges and toplists as well.
Type: Shareware (Function Limited) $23.78
Version: 2.56
3. Linux_misc
Linux_misc has five different members. TCFS gives integration between the encryption service and the file system,
SILC as a protocol provides secure conferencing services in the Internet over insecure channel, Distributed DNS
Flooder v0.1b Powerful attack against DNS servers, Saint Jude LKM is a Linux Kernel Module for improper privilege
transitions, FreeVSD facilitates true Linux Virtual Servers within a 'chroot' environment.
4. Login?Monitor
Login Monitor monitors idle times for logins and kicks users off after they are idle for a set amount of time. It is
useful for people who forget to log out of machines they connect to remotely.
Type: Shareware
Version:0.1
5. Quick Socket
Quick Socket allows an open connection between a client/server arrangement on any port. It is a great tool for an
Administrator. Quick Socket can also scan and log any open port found, useful for checking security on an IP or DNS.
Type: Shareware $29
Version: 1.2
6. Shutdown 2000
Only with one easy click, Shutdown 2000 will shut down, Reboot, Log off, Force restart or terminate the current
program on the machine. Its application terminatation can not be used on Windows 2000.
7. Strict Login
Strict Login is small utility to set a password before starting Windows, so unwanted users cannot get into your
computer. It will ask for a password before Windows starts. Only if you know the password you can start Windows,
otherwise you can't start it. Strict Login is very stable and cannot crash. So when the Strict Login program is loaded,
nobody can bypass this and windows can't be started. Strict Login can even alarm you when only someone tried to
access your computer, but didn't know the password and turned your computer off! This zip with 2 setup one used in
2k the other in xp system.
Type: Freeware
Version: Updated 04-22-2003
8. Windows_misc
The kit includes 19 files, each is a little tool kit. For example, WebClicker uses public proxies to load & click the
banners, Advanced Password Generator is a Windows based application designed to generate passwords of any length
or character content, Outlook Header Exp creates and sends the code needed to exploit the Date buffer overflow
exploit in the OutLook, and so on.
Packet forging
1. Netcat
Netcat 1.10 for NT is the tcp/ip "Swiss Army knife" that never made it into any of the resource kits, With Netcat you
get to see the full HTTP header so you can see which web server a particular site is running, Netcat can also function
as a server, by listening for inbound connections on arbitrary ports and then doing the same reading and writingand it
can run in the background without a console window, restart as a single-threaded server to handle a new connection.
Vesion: 1.10
3. Packet_Forging
Among these tools, pakemon shares IDS components based on the open source model, pdump prints out the headers
of packets on a network interface that match the boolean expression, SendIP is a commandline tool to allow sending
arbitrary IP packets, Stunnel allows you to encrypt arbitrary TCP connections inside SSL available on both Unix and
Windows, Zodiac is a portable, extensible and multithreaded DNS tool, AICMPSEND is an ICMP sender flooding and
spoofing ICMP, GASP (Generator and Analyzer System for Protocols) provides an extremely detailed packet
description language, Send Packet tests how your network responds to specific packet content, Socket Script primarily
creates networking-oriented programs, USI++ sends modified/spoofed packets over the network.
4. Packet_tool
They are PacketX 1.0 Freeware Version , TCPkill executable program, MSML.EXE and LibnetNT programs,
executable arpinject progam. Installation of the LibnetNT package requires the preinstallation of the Winpcap
Network Drivers, in your program implementing LibnetNT in two ways, link to it at compile time or use the libnet
DLL with the LoadLibrary() and GetProcAddress() functions.
5. Pksnd102
DIS_PKT provides an Ethernet or a Token Ring Packet Driver interface to programs built to operate over Packet
Drivers, talks to NDIS (3Com/Microsoft) instead of to a lan board directly and shares the board with NDIS users.
Pktsend provides interface to network packet driver and MAC level communication for ethernet networks. Winpkt
provides a Packet Driver interface between Windows 3 Enhanced mode applications and a real Packet Driver.
Ndis3pkt.386 is a Windows VxD provides a packet driver interface.
8. Winject
The most exciting new features of version 0.94b is the lowlevel IP Changer and Global IP. It tries to change your IP
without redialing your ISP, but only free IP. The MagicID must be correct/"in sync" when you try to change your IP.
The new Global IP thing makes it easy to change the IP in all the 100 packets.
Version: 0.95b
Phreak tool
1. Auto Dial
MS-DOS based war dialer utility.
Platforms: DOS
Type: Freeware
2. Blue Dial
BlueDial was developed to make it easy creating and using different frequency settings for dialing and so on. In the
beginning, BlueDial was just a batch file, which copied sample files together and played them. Then the development
went on and it was getting more powerful. Now, BlueDial is written in Borland C using Assembler routines and it's
one of the most powerful and comfortable dialer programs on the PC, and it's well known, too.
Version: 6.2
3. Boxtone
A program which can create some phone tones.
Version: 1.00
4. CATCALL
If you have ever been the innocent victim of a prank, practical joke, received the "Short end of the stick" or simply felt
someone needed their "Just Deserts" - CATCALL is for you, The underdog. Now from the comfort of your own home
you can extract your vengeance. Simply a few clicks at the old keyboard transforms your PC in to a state of the art
"Punishment Processor" which can deal out a sentence from mildly annoying to downright galling. CATCALL allows
the user to Harass up to 15 Persons simultaneously each with their own personal harassment factor.
Version: 3.4
5. CHaoS DeViCe
It calls random pagers, puts in a phone number, hangs up, and goes all over again. It is a quite annoying little thing...
Once you run "chaos.exe", it is pretty self explanitary from there... If you still cant figure it out... Well, dont use it, and
dont be a retard and mail me asking for instructions...
Version: 1.0
6. CPhreak
It is the first fone phreaking utility that will work on ANY sound card supported by Windows, as long as you have
Windows. I have a GRAVIS and the Sound Blaster emulation is not exact enough to work with many programs such
as BlueBeep or BlueDial. So, have fun... It is a twelve year old red box(the author is only 12 years old), and can work
anyway on older centrals.
7. Dialing Demon
It is another wardialer.
Version: 1.05
8. Grim Scanner
USE THE MODEM SETUP FILES PROVIDED, THIS PROGRAM WORKS BEST WITH AN 'OLD' AVATEX 2400
MODEM, DUE TO THE ROMS, IT CAN SEARCH FOR DIAL TONES AND CARRIERS IN THE SAME CALL,
ALL OTHER MODEMS ARE RESTRICTED TO ONE OR THE OTHER. THE SCANNING CAN BE SENT TO A
FILE OR PRINTER, IN OTHER WORDS, YOU CAN SEND IT ANYWHERE YOU LIKE(EXCEPT UP YOUR
ASS...). THE SCANNER WILL SCAN ANY NUMBERS YOU WISH, JUST ENTER THE PREFIX AND THE
STARTING NUMBER.
9. No Carrier
It is a new scanning program. It's basically self-explanatory and you can use it. If you do not know how to use it,
please see the file Carrier.doc in this package.
10. POCSAG Decoder
PD together with a receiver or scanner, allows the off-air decoding of POCSAG paging signals at 512, 1200 or 2400
bits/second. This makes it extremely useful for the testing of paging transmitters and systems. Decoding of both
numeric and alphanumeric pager data is supported, as is the hex dumping of raw POCSAG codewords.
Type: Shareware
Version: 2.00
11. Pageit
Of cource you realize the effect of the first option, put in your enemy's phone # and they will recieve a billion calls
"Did you page me?". And Option 2 requires a file of phone #'s... I like to put in local Police, Fire and Ambulance
phone #'s because usually they look like normal phone numbers and not 911... The program searches your numbers.lst
file for a random phone #, pages your enemy and puts in that #... WOO HOO, we're having phun now, eh? They call
the number and are REALLY embarrassed when they call the Police Dept. and ask if they paged him... heh...
Version: 2.2
12. PhoneTag
PhoneTag checks for STARTTIME every second while it's running. If the current time is greater than the starttime,
and there's a dialing list, it will begin dialing. Once it passes the STOPTIME it will stop. The program will auto-retry
Busy signals after it finishes dialing the list, or the Busy-signal-list gets full(>@5000 entries). You can set the # of
retries in SETUP. Also, these #'s are cycled to make sure that they don't just re-dial the same # right after each other.
Version: 1.3
15. TC Dialer
DTMF dialer for X Windows. Requires soundcard.
Platforms: Linux
Type: Freeware
Version :1.0
16. THC-SCAN
You can easily and nearly automated scan phone-number areas with your modem. You can find very interesting stuff
... Note that in some countries of the US and maybe other states too, scanning is ILLEGAL! Check your law before
starting (or maybe not - it's up to you).
Version 2.00
19. ToneLoc
ToneLoc is short for Tone Locator, and is a bit of a wild thing. What it does is simple: it dials numbers, looking for
some kind of tone. It can also look for carriers like an ordinary wardialer.
Version: 1.10
Scanner
2. AB Complete Ping
The software can notify you by e-mail if the IP address is or is not responding. It can play an wave file on notifying.
You can ping only once or you can ping at fixed time intervals. You can insert the starting and ending IP address and
this software will ping all the addresses between.
Type: Shareware
Version: 3.00
3. Advanced Net Tools Free
TraceRoute tells you how many hops (routers) are between your PC and another destination. It will also show you the
slowest connection point. Network Scanner can scan any class A, B or C network for any list of open ports. Network
Scanner takes advantage of multi-threading. You can use many threads to scan at the same time for quick results. You
can save your port list to a text file. You can also save your list of found connections to a text file. ARP Configuration
allows you to add/remove ARP entries and view the ARP table all from a Windows GUI. Route Configuration allows
you to add/remove Routing entries and view the route trable all from a Windows GUI. Adapter Configuration allows
you to view all adapters and add remove IP addresses of individual adapters using a Windows GUI. Port Scanner can
scan any computer for a list, or range of open ports. Set your speed of finding open ports by setting the timeout
variable. Ping Utility allows you to change the size of the packets, the timeout, and the number of packets to ping.
Advanced DNS Utility shows you extended information on a given hostname or IP address. You can also lookup the
mail exchange servers, or domain name servers for a specific domain. Query types available: A,ANY,NS,MX,SOA.
Share Scanner allows you to view your network node shares. Command Test, a utility for connecting to an open port
and testing commands. Works like a telnet client but you can send 1 line at a time. IP Availability allows you to see
what IP addresses are available on a subnet. Plugins, allows you to create links on your ANT menu to any external
application.
Type: Freeware
Version: 2.7
4. Angry IP Scanner
Get IP addresses and computer names in your network and scan ports on remote computers. Excellent utility for
networking. NetBios Scan, TCP scan, ping scan are supported. This great utlity shows your connections to see which
ports are used by your applications. For further information on what this program can do for you please see
WHATSNEW.txt after installation."
Type: Freeware
Version: 2.18
6. DeadBolt
Even viruses that have not even been discovered or are not known to exist can be detected by DeadBolt. Even if you
have the most current Anti-Virus available, your machine could be infected by an undiscovered virus that is collecting
passwords, banking and finincial data, or other confidential information! DeadBolt maintains a backup copy of vital
system registry entries and configuration files.
Type: Shareware
Version: 1.0
7. IPScanner
Get IP addresses and computer names in your network and also scan a special port on remote computers. A handy
powerful utility for networking. You may also scan a range of IP through Dial - Up networking.
Type: Free to try
Version: 1.2
9. Linux-Vuln-source
Remote Nmap (Rnmap) package contains both client and server programs written entirely in Python, Server does user
authentication and uses excellent Nmap scanner to do actual scanning. VLAD the Scanner is an open-source security
scanner that checks for the SANS Top Ten security vulnerabilities commonly found to be the source of a system
compromise and it requires several Perl modules to run.
10. MacAnalysis
MacAnalysis makes a full security check of network protocols, open services, port scans, vulnerable CGI scripts and
much more. It maintains a secure network by running security audits for the MacOS! This will scan your Macintosh,
Unix, Windows, and Hardware for any vulnerable security holes.
Version: 2.1b
11. Mpscan
It uses select() to increase its speed and was designed for rapidly scanning large networks, but also works with a single
IP. Platforms: Linux, POSIX
Type : Shareware
Version:0.1.0
12. Nessus
It can scan remote computers. It can recover all used ports and test their security. Based on the test, it can tell you
whether there is a weakness.
Type: Freeware
Version: 1.2
13. NessusWX
NessusWX has Windows look'n'feel and, in addition, some features that in my opinion was missed in standard Nessus
client for Windows.
Please read the disclaimer before downloading / using NessusWX.
Type: Shareware
Version:1.44
15. Netmon
Netmon displays information pertaining to the IP, TCP, UDP and ICMP protocols. It is a graphical conversion of the
"netstat" utility shipped with Windows£¬It's main purpose is viewing connections made using TCP and UDP
protocols from or to your computer.
Type: Freeware
Version: 1.60
16. Nmap
It was designed to rapidly scan large networks, although it works fine against single hosts. Nmap uses raw IP packets
in novel ways to determine what hosts are available on the network, what services (ports) they are offering, what
operating system (and OS version) they are running, what type of packet filters/firewalls are in use, and dozens of
other characteristics. Nmap runs on most types of computers, and both console and graphical versions are available.
Type: Freeware
Version: 2.54
21. Scanner
The typical members are: ipEye, a TCP port scanner for Windows 2000 that can do SYN, FIN, Null and Xmas scans,
Nessus, plugin-capable security scanner, NScan, Fast and flexible portscanner for Windows by Necrosoft with
numerous features, Frontdoor, a backdoor/trojan scanner for windows and scans all known backdoors/trojans, Server
Robot, check what a specific host is running with one easy click, CGI Scanner v3 checks for exploits and scripts,
cerberus webscan is console-based exploit scanner, BO Ping is network scanner for the infamous Back Orifice trojan.
23. THC-HappyBrowser
HAPPY BROWSER (HB) is THC's first windows-based tool. The intention behind HAPPY BROWSER is to develop
a free and easy to use security tool on Windows/Wine. In the final release, the HB will be able to look for the most
common security related vulnerabilities on NT-Servers (including Win95/98/2000), and give the user a lot of useful
hints for exploiting or fixing them.
Version: 0.9
24. THC-Probe
The ultimate host scanner compilation features nmap, snmpscan, netbios auditing tool and super-cool vh shell script.
Version: 4.1
25. THC-Scan
THC-Scan v2.0 now is working under DOS, Win95/98/NT and all DOS emulators (UNiX) on all 80x86 processors.
ODBC databank support, completely automated tone, carrier, vmb scanning, large palette of analysing tools added.
THC-Scan twice as good as Toneloc.
Version: 2.0
27. WhereIsIP
You may use WhereIsIP to find where a member of a chat room or e-mail sender is from, or where the Web site you
visited is stored. Simply provide an IP address or a domain name, and WhereIsIP will do a quick search in the world
Internet IP registries or Domain Name Whois Dababase, It will then tell you exact information about the target,
including country, address, net name, domain name, and its registrant details.
Type: Shareware $19.50
Version: 2.20
28. WifiScanner
It can listen alternatively on all the 14 channels, write packet information in real time, can search access points and
associated client stations, and can generate a graphic of the architecture using GraphViz. All network traffic can be
saved in the libpcap format for post analysis. It works under Linux with a PrismII or CISCO card and with the linux-
wlan, hostap, or Aironet driver
Version:0.9.1
29. WinNessus
It can scan remote computers. It can recover all used ports and test their security. Based on the test, it can tell you
whether there is a weakness. It is the Windows version of Nessus.
Type: Freeware
Version: 1.0.9
30. Windows_Trojan_Scanner
Trojan Scanners are AssSniffer sniffing IP's over any messaging service and checking for common Trojans AIM ICQ
Yahoo! Messenger MSN Messenger IRC, Crazy TrojanScanner scanning whole C class IP ranges for a huge list of
Backdoors/Trojans, Boping for the original and infamous Back Orifice trojan, FireWall checking C classes for
common Backdoor Ports, TSB21 keeping your channel clean and your OWN network clean, and IpSweeper scanning
whole A,B,C class IP ranges for common Backdoors.
31. Windows_port_scanner
The members are RPC tools, Stealth 1.0b29, Port scanner coded in VB, Sh Sec Scanner2.05 that analyze IP of
networks including functions and attacks on host, Winfingerprint v0.1.0 as advanced remote windows OS detection,
Advanced Administrative Tools as a multithreaded network explorer, Shadow Scan Cgi checker able to scan whole
subnets for common cgi flaws/misconfigurations.
3. Ethereal0914
Ethereal allows you to examine data from a live network or from a capture file on disk. It has rich display filter
language and the ability to view the reconstructed stream of a TCP session. You can interactively browse the capture
data, viewing summary and detail information for each packet.
Type: Freeware
Version: 0.9.14
4. Golden Eye
Have you ever wondered what your children doing on the Internet? Who they talk to and what pictures they see? Are
you suspecting your husband or wife is cheating on you? who they email ? what movies they see? who they chat with
? Do you want do know what your employees are doing during work hours? Golden Eye is designed to monitor and
record all the activity on your computer. with its bulit-in spy components, It can record keystroke, visited websites,
window titles,and screenshot. Golden Eye works like a surveillance camera pointed directly at your computer monitor,
monitoring and recording anything anybody does on your computer, and storing this in a secure area for your later
review. With the full detail and searchable Interactive report and Html report provide by Golden Eye, you can easily
know how your computer is being used or what is being done on your computer.
Type: Free to try $29.95
Version: 3.01
5. InternetPeriscope
InternetPeriscope monitors your Web, SMTP, POP, and DNS Servers. Its Intrusion Detection System (IDS) alerts you
to hackers attempting to break in to your system, and gives you the name, address, and email of the hacker's ISP.
InternetPeriscope includes many other tools that enable you to perform security audits, do wildcard domain name
searches, and much more.
Type: Free to try $87.50
Version: 1.1
6. Libpcap062
After depression you will get 81 files of Libpcap, including the executable, source codes, and liberary of files under
Linux and AIX 4.x, where you should use DLPI instead of BPF.
Version: 0.6.2
7. Linux_sniff_source
Excellent tools are Passlogd logging traffic on the UDP syslog port, Maxty is a small kernel-space tty sniffer, Ettercap
is a network sniffer/interceptor/logger for switched LANs, Angst is an active packet sniffer based on libpcap and
libnet, Antiroute listens on ports used in UDP-based route tracking and determines the IP address, Snort is a libpcap-
based packet sniffer/logger, Aps (Advanced Packet Sniffer) is a small tool for analyzing network traffic, exdump is a
packet watcher, dumper, and logger, etc.
8. LittleBrother
It tells you who uses the Internet, which sites each user visits, when each user is accessing the Internet, the duration of
each user's stay on the site, what the user does at each site, and which users play games or spend time in chat rooms.
Also, LittleBrother can estimate the bandwidth wasted by unproductive use of the Internet/network.
Type: Demo
Version: 3.0
10. PacketX
PacketX is an ActiveX class library and PacketX uses winpcap libraries to capture (and optionally filter) network
packets. In addition to standard capture mode you can collect network statistics and send raw packets. All captured
packets or statistics are encapsulated inside wrapper class and returned to client as events.
Type: Shareware
Version: 1.2
11. Phenoelit's own security sniffer
PHoss is a sniffer. PHoss is designed to know some protocols which use (or may use) clear text passwords. Log on
your Linux box as root and start PHoss, and the use is simple. PHoss supports HTTP, FTP, IMAP4, LDAP, Telnet.
Type: Freeware
12. ProBot
ProBot is a full-featured workstation monitoring tool. It allows administrators to keep track of all activity occurring on
a computer. In addition to keystrokes and mouse clicks, it detects access to applications, folders and files on connected
drives. It also watches over keylogging in NT console windows. ProBot is very suitable for monitoring Internet
activity because it enables you view all of the Web site URLs visited by a subject (along with submitted HTTP POST
data). ProBot is capable of running transparently on a target system. The program is designed to use minimal system
resources, so it shouldn't interfere with normal computing.
Type: Free to try $29.95
Version: 2.2
13. ProBot SE
ProBot SE is a powerful workstation monitoring and keylogging suite. This software generates the detailed event log
that is kept securely in binary files. These files may be later referred by the system administrator or computer owner
for the exact reconstruction of the computer usage. ProBot SE is invisible both in Windows 9x/ME Ctrl+Alt+Del List
and Windows NT process list. It also features a kernel level keylogger and stealth technology.
Type: Free to try $40.00
Version: 2.4
15. Snarp
The program is called Snarp because is uses an ARP poisoning attack to cause a host to redirect traffic to the attacking
machine running Snarp. Snarp is written only for IP networks. A future version of Snarp will also include an ICMP
redirect attack to still provide the functionality of rerouting traffic even if static ARP entries are used.
Type: Freeware
Version: 0.9f
16. Sniff-em
Sniff-em is a revolutionary new network management tool designed from the ground up with ease and functionality in
mind. Sniff-em puts your Network adapter into listening mode, capturing and decodes every Data stream that travels
through your Network (WAN,LAN,PAN etc), it decodes a lot of protocols among others
TCP,UDP,ICMP,IGMP,PAP,PPP.
Version: 1.01
17. Sniffers
In the kit, antisniff detects people monitoring(sniffing) the local network's traffic, ASniffer is windows sniffer, dsniff is
a collection of tools for network auditing and penetration testing, Natas directs download, THC-Parasite allows you to
sniff traffic on a switched network by using either ARP Spoofing or MAC Flooding, sersniff is a simple program to
tunnel/sniff between 2 serial ports, synsniff, as the name would imply, is a simple program which watches for the first
part of a TCP connection (the SYN packet) and logs it. Optionally, synsniff can detect FIN (end of session) packets
with no corrosponding SYN, tcpsniff prints out the headers in any packets read off the wire, krnsniff is a kernel based
sniffer module, etc.
20. Tcpdump362
Tcpdump362 is packet capture tool, and libpcap is its library. These tools, originally developed by LBL, are now
being developed and maintained at www.tcpdump.org. This is the latest version of the tcpdump program.
Version: 3.6.2
21. Win Sniffer
Win Sniffer captures passwords on LAN. It capture ftp, http, telnet, icq, pop3, imap and other passwords.
Version: 1.22
22. Windows_sniff
The kit has 5 packet sniffers as ScoopLM001 capturing LM/NTLM authentication information on the network,
WinDumP95, WinDump NT, WinDump2000 with WinDump source. WinDump is the porting to the Windows
platform of TCPDump, the most used network analyzer for UNIX. And Windows NT TCP/IP sniffer complete with
GPL C source code (requires MS SDK & SDK to rebuild).
23. Winpcap
WinPcap is an architecture for packet capture and network analysis for the Win32 platforms. It includes a kernel-level
packet filter, a low-level dynamic link library (packet.dll), and a high-level and system-independent library. The
packet filter is a device driver that adds to Windows 95, Windows 98, Windows ME, Windows NT and Windows
2000.
Snoop tool
1. ID
ID runs under Windows 95/98, and NT 3.51/4/5 (Not Win32s or WinCE). Operating through the ASPI (Advanced
SCSI Programming Interface), ID.EXE shows the SCSI and ATAPI devices in your system, detailing their SCSI ID's,
device type, manufacturer, description, internal revision number, and whether the media is fixed in place or
removable.
2. IDScenter
Configuration and management of the IDS can be done using IDScenter. Main features are: - Snort configuration
wizard (variables, preprocessor plugins, output plugins, rulesets) - Alert notification via e-mail, sound or only visual
notification- Alert file monitoring (up to 10 files) MySQL alert detection - Log rotation (compressed archiving of log
files) - AutoBlock (using NetworkICE BlackICE Defender you can block attackers IP's that Snort logged) - Integrated
log viewer (supports text files, XML and HTML/webpages) - Program execution if an attack was detected - Test
configuration feature: fast testing of your IDS configuration, and more .
Type : Shareware
Version 1.1 rc3a
3. IPQuery
IPQuery provides you with a quick-and-dirty way to view your host name and IP address, if they are currently
assigned. It has worked on all of the systems.
Type: Freeware
Version: 1.6
4. NetroSnooper
You can use NetroSnooper to scan webarchives for unlinked files, then gives you a sequential list of unlinked files and
offers you the option to download them. For Netrosnooper to work properly, archived files need to be indexed.
Type: Demo
Version: 1.0
5. Network Inventory
Alchemy Network Inventory is an advanced, powerful, and feature rich asset management and tracking system that
answers the question of cost of ownership by providing a detailed and comprehensive software and hardware
inventory of your desktop and networked p.c.'s. More info-DEK Software International
Type: Freeware
Version: 2.9.7 (26 Jul 2003)
6. Quadsoft's IP Tool
Quadsoft's IP Tool will float in a little box on top of all your open windows like ICQ does if you wish it to. You can
copy straight to the clipboard by right clicking the ip address or by clicking copy. Minimizes to the System tray so it's
always handy. It can remember the last known state so when your PC reboots it starts minimized or how ever it was,
the floating window also starts in the same place as before.
Type: Shareware $7
Version: 1.0
7. ShellSPY
You can also terminate the task via shellspy. This new feature is designed to track and monitor your system it comes in
handy if you have a virus. Shellspy will record when it runs and date and time stamps it.. You can also run Shellspy in
the background ('Hidden'). Only one feature disabled clear the archive data.
Type: Shareware
8. SocksChain
Utilite for connecting through chain of SOCKS-proxies. Allows to hide Real IP-address of client.
Type : Shareware
Version :2.2
Source code
1. APG
APG, the automated Password Generator is a set of tools for random password generation including a standalone
password generator, an RFC972 password generation server, and a Perl client for the password generation server. It
generates some random words of required type and prints them to standard output. The advantages are built-in
password quality checking system and built-in ANSI X9.17 Random Number Generator.
2. ARP Monitor
ARP Monitor is a simple program to monitor arp requests and replies in a given network segment. If you would like to
monitor your network bus, or entire network ( if you dont use a switch or something like that ), just do a
ifconfig PROMISC, to set the promiscuous mode of your network interface, and arpmonitor will automagically get all
the traffic.
Version: 0.04
3. Asm
The tools are Dial-Up Password Stealer v1.0 as an assembly-coded (TASM50) trojan that will steal Dial-Up
passwords from Windows' password cache, inPEct is a program that allows you to bind 2 executables in one. Msmh is
another hack tools in assemble languages, and there are some source and executable files in the kit.
4. Backdoor
There are sourcodes of 711, Lame enabling remote administration with "lame" as password, Donald Dick Trojan,
NetTrash in VB, making a Trojan with Internet Auto-Update Support, Senna Spy hidden Ftp Server, K2psf, K2tv and
Xtcp in C, Secret Sercive Server/Client in Delphi, RemBomb as some nice kind of trojan, etc.
5. Blue Beep
This source code is complete and compileable. Blue Beep is a little blueboxing tool, getting you into boxing in the
first place.
Version: 1.00
6. C_SOURCE
Among them, MIME64 is an encoding described in RFC1341 as MIME base64, and its purpose is to encode binary
files into ASCII so that they may be passed through e-mail gates. KILTAR10 is automatic file-package also know as
Binding Files. With EXEDAT, you can easily create an archive, insert numberous files, compress them (or not) and
link the archive to your .exe file. Algomath is a portable Arithmetic C Library.
7. Emailcrk
This file contains a summary of what you will find in each of the files that make up your emailcrk application,
emailcrk.h, emailcrk.cpp, emailcrk.rc, res\emailcrk.ico, res\emailcrk.rc2, emailcrk.clw. It is Microsoft Foundation
Class Library.
8. Findhost
It is a little software writen in Microsoft Visual C++ 5.0. AppWizard has created this findhost application for you. It is
a Microsoft Foundation Class Library as the emailcrk, too.
9. Harvester
Harvester-1.5 is a Python script that allows you to monitor remote web pages and FTP directories, watching for new
packages and downloading them when needed.
Version: 1.5
10. IgmpNuke
IgmpNuke is DoS against Win98 boxes using fragemnted IGMP packets. It is writen in Pure Delphi 3.
11. Jail Chroot Project
Jail is a chrooted environment using bash. Its main use is to put it as shell for any user you want to be chrooted. Their
primary goals is to be simple, clean, and highly portable.
vERSION: 1.9
12. Keylogger_SRC
ALL 12 files of source are obtained after decompression. The Keylogger is a tool of monitoring computer activity to
steal key information. These programs are writen in Delphi.
13. Misc_src
They are various Mac as Flish2 source, Multiport source, Nailmail source, Oyabun source, Profane source, Traffic
source. And some other source of Complete ASM Source to the Aspack unpacker, Txtcode, Pandora v4 in VC
attacking and cracking Novell Netware servers, Exe-Binder15 in Delphi.
15. Nutcracker
Nutcracker will report any disabled accounts, as well as accounts with no passwords. It will crack either '/etc/passwd'
or '/etc/shadow' files, and can use any dictionary file available. A simple dictionary of around 2400 words is included,
as well as a sample '/etc/passwd' file. This tool was written for administrators to test and improve their own system's
security.
Version: 1.9
16. PgpIcq
PGP-ICQ is a plug-in application for the most popular instant messenger software in the world - Mirabilis' ICQ. It
allows you to encrypt your ICQ messages using the power of the world's best encryption software PGP.
Version: 0.95
17. Portscanner
There are the source of Portscanner looking for the presence of specific incoming TCP/IP ports.
Version: 0.1
19. ShareDecryption
The tool and its source are in the compressed file. ShareDecryption is writen in Delphi.
20. VB_SOURCE
They are Ultra Lempel-Ziv (ULZ) engine 1.3 (in VB), VB implementation of the RijnDael, an implementation of the
AES encryption candidate Twofish, Streaming RC4 Encryption, Crypto Api serving as a wrapper for the Microsoft
CryptoAPI (Base CSP) and the Zlib compression dll, Show Lan, Pws.keylogger, Icq client supporting Version 5 Icq
Protocol, Http dowmload, Telnet client and server application, TFPTSamples demostrating how to transfer files using
the Winsock Ocx Control like TFTP, etc.
21. Wnuke4
Do not forget the DEFINEs if you compile under Delphi2. If you are looking for nuking code the main module
(wnuke4.dpr) contains all you need (also check out winsock.pas).
Version: 4.0
22. Zebedee
Zebedee is a simple program to establish an encrypted, compressed "tunnel" for TCP/IP or UDP data transfer between
two systems. This allows traffic such as telnet, ftp and X to be protected from snooping as well as potentially gaining
performance over low-bandwidth networks from compression.
Type: Freeware
Version: 2.2.2
Spoof
1. Credit probe
It can be seen as a typical spoofer program by faking others' credit card, old though and not much good.
2. HTTPort
This tool allows your software to use any of the Internet services based on TCP/IP while being under proxy and blocks
your local network administrator from logging your activity. With HTTPort you may use the following software (just
a sample list, not limited to !) from behind an HTTP proxy: e-mail, IRC, ICQ, news, FTP, AIM, any SOCKS capable
software, etc.
Type: Freeware
Version: 3.SNF1
3. IP Spoofer
There are 16 files in it, they are some spoofer tools by spoof username, IP address, etc. For example, Calamus TCP/IP
spoofer makes any telnet, ftp, http, irc or icq connection anonymous, and Calamus IP spoofer v2.0, better support for
IP spoofing and makes your IRC, Mail, News, Telnet or web connection anonymous by spoofing your computer.
4. Ircgspoofer
Using it you can play with your friends on IRC and make fake connections with any IP addy you prefer.
5. Pinger
This is a 'Stay Alive' utility you can use to keep your connection active. Your ISP can't sniff this pinger and then find a
way to ignore you. The program can run either in the system tray, or as a small screen that generates an insult
whenever it pings an unused IP.
Type: Freeware
Version: 2001
Virus
1. Virus_exe
The kit includes Winnux, Winnt, Win32, ssiwg, PHP, Godwill16. Among these files, PHP is the first virus written in
PHP, Winux is a non_memory resident virus as the Winnt, Win32 on different OS, Godwill can use GodMessaGe IV
to inject files by viewing, Win32 generates infects the current directory, the ssiwg is the first Internet Worm Generator.
2. Virus_source
Source codes are about 7son isseventh son of a seventh son v4, acme compagnion virus, Olympic Aid(s) '94, Alameda
virus (floppy only), Ambulance car virus, assassin virus, stormbringer's batch file virus, black knight anti-virus-virus,
pc carbuncle virus, career of evil virus, decom virus, deicide virus, gold-bug virus, vote(shithead virus), ultimate
mutation engine 93a virus, swedish warrior virus, etc.