Monday 31 August 2015

How hack LAN in Cyber Cafe

Friends i am very much interested in hacking.
Well its soo easy trick to hack system.
I am providing you steps to hack others system:

1)Click on Start.
2)Go to all programs>accessories.
3)Right click on command promt and then click properties.
4)Click on Find target.
5)Now you entered in system 32.
6)Now search this file "ddeshare" without quotes.
7)Double click on Ddeshare.
8)Now go to shares and then click "trusted shares".
9)You will be seeing many terminals (computers)connected to lan.
10)Just double click on any of the system you want to hack.
This is you can hack others system which is connected to lan..
I dont know whether this tricks works in your college or not.
Why because few colleges will be using high security alerts.

Well i can successfully hack others system.
Hopefully i found few information about hacking lan.
First of all we have to hack system administration password.
This can be done only by braking (PDC)Primary domain controller.
PDC can be brake only when we are able to hack First system. And then take sam db to break administration password.
Better to use tool from your system that enables you to use IPC connections to send executable files.
Here i am giving you trick to hack admin password:

first of all you have to scan the range for open 139, 445,3389,6129..
139,145 -->ipc hacking...
3389 --->remote desktop connetion(Best way for hacking :) )
6129 ----->It means that there is ranning dameware server.......

We can also hack admin password by using telnet hacking.

This trick is good enough for cracking administration password...

--A Balck Hack: post

Friday 28 August 2015

All About Movie Tags (what Is A Dvdrip, Cam Etc.)

Original Sources

CAM - A cam is a theater rip usually done with a digital video camera. A mini tripod is sometimes used, but a lot of the time this wont be possible, so the camera make shake. Also seating placement isn't always idle, and it might be filmed from an angle. If cropped properly, this is hard to tell unless there's text on the screen, but a lot of times these are left with triangular borders on the top and bottom of the screen. Sound is taken from the onboard microphone of the camera,and especially in comedies, laughter can often be heard during the film. Due to these factors picture and sound quality are usually quite poor, but sometimes we're lucky, and the theater will be fairly empty and a fairly clear signal will be heard.

TELESYNC (TS) - A telesync is the same spec as a CAM except it uses an external audio source (most likely an audio jack in the chair for hard of hearing people). A direct audio source does not ensure a good quality audio source, as a lot of background noise can interfere. A lot of the times a telesync is filmed in an empty cinema or from the projection booth with a professional camera, giving a better picture quality. Quality ranges drastically, check the sample before downloading the full release. A high percentage of Telesyncs are CAMs that have been mislabeled.

TELECINE (TC) - A telecine machine copies the film digitally from the reels. Sound and picture
should be very good, but due to the equipment involved and cost telecines are fairly uncommon. Generally the film will be in correct aspect ratio, although 4:3 telecines have existed. A great example is the JURASSIC PARK 3 TC done last year.  TC should not be confused with TimeCode , which is a visible counter on screen throughout the film.

SCREENER (SCR) -A pre VHS tape, sent to rental stores, and various other places for promotional use. A screener is supplied on a VHS tape, and is usually in a 4:3 (full screen) a/r, although letterboxed screeners are sometimes found. The main draw back is a "ticker" (a message that scrolls past at the bottom of the screen, with the copyright and anti-copy telephone number). Also, if the tape contains any serial numbers, or any other markings that could lead to the source of the tape, these will have to be blocked, usually with a black mark over the section. This is sometimes only for a few seconds, but unfortunately on some copies this will last for the entire film, and some can be quite big. Depending on the equipment used, screener quality can range from excellent if done from a MASTER copy, to very poor if done on an old VHS recorder thru poor capture equipment on a copied tape. Most screeners are transferred to VCD, but a few attempts at SVCD have occurred, some looking better than others.

DVD-SCREENER (DVDscr) -Same premise as a screener, but transferred off a DVD. Usually letterbox , but without the extras that a DVD retail would contain. The ticker is not usually in the black bars, and will disrupt the viewing. If the ripper has any skill, a DVDscr should be very good. Usually transferred to SVCD or DivX/XviD.

DVDRip - A copy of the final released DVD. If possible this is released PRE retail (for example, Star Wars episode 2) again, should be excellent quality. DVDrips are  released in SVCD and DivX/XviD.

VHSRip -Transferred off a retail VHS, mainly skating/sports videos and XXX releases.

TVRip -TV episode that is either from Network (capped using digital cable/satellite boxes are preferable) or PRE-AIR from satellite feeds sending the program around to networks a few days earlier (do not contain "dogs" but sometimes have flickers etc) Some programs such as WWF Raw Is War contain extra parts, and the "dark matches" and camera/commentary tests are included on the rips. PDTV is capped from a digital TV PCI card, generally giving the best results, and groups tend to release in SVCD for these. VCD/SVCD/DivX/XviD rips are all supported by the TV scene.

WORKPRINT (WP) -A workprint is a copy of the film that has not been finished. It can be missing scenes, music, and quality can range from excellent to very poor. Some WPs are very different from the final print (Men In Black is missing all the aliens, and has actors in their places) and others can contain extra scenes (Jay and Silent Bob) . WPs can be nice additions to the collection once a good quality final has been obtained.

DivX Re-Enc -A DivX re-enc is a film that has been taken from its original VCD source, and re-encoded into a small DivX file. Most commonly found on file sharers, these are usually labeled something like Film.Name.Group(1of2) etc. Common groups are SMR and TND. These aren't really worth downloading, unless you're that unsure about a film u only want a 200mb copy of it. Generally avoid.

Watermarks -A lot of films come from Asian Silvers/PDVD (see below) and these are tagged by the people responsible. Usually with a letter/initials or a little logo, generally in one of the corners. Most famous are the "Z" "A" and "Globe" watermarks.

Asian Silvers / PDVD - These are films put out by eastern bootleggers, and these are usually bought by some groups to put out as their own. Silvers are very cheap and easily available in a lot of countries, and its easy to put out a release, which is why there are so many in the scene at the moment, mainly from smaller groups who don't last more than a few releases. PDVDs are the same thing pressed onto a DVD. They have removable subtitles, and the quality is usually better than the silvers. These are ripped like a normal DVD, but usually released as VCD.

Formats

VCD - VCD is an mpeg1 based format, with a constant bitrate of 1150kbit at a resolution of 352x240 (NTCS). VCDs are generally used for lower quality transfers (CAM/TS/TC/Screener(VHS)/TVrip(analogue) in order to make smaller file sizes, and fit as much on a single disc as possible. Both VCDs and SVCDs are timed in minutes, rather than MB, so when looking at an mpeg, it may appear larger than thedisc capacity, and in reality u can fit 74min on a CDR74.

SVCD - SVCD is an mpeg2 based (same as DVD) which allows variable bit-rates of up to 2500kbits at a resolution of 480x480 (NTSC) which is then decompressed into a 4:3 aspect ratio when played back. Due to the variable bit-rate, the length you can fit on a single CDR is not fixed, but generally between 35-60 Mins are the most common. To get a better SVCD encode using variable bit-rates, it is important to use multiple "passes". this takes a lot longer, but the results are far clearer.

XVCD/XSVCD -These are basically VCD/SVCD that don't obey the "rules". They are both capable of much higher resolutions and bit-rates, but it all depends on the player to whether the disc can be played. X(S)VCD are total non-standards, and are usually for home-ripping by people who don't intend to release them.

DivX / XviD -DivX is a format designed for multimedia platforms. It uses two codecs, one low motion, one high motion. most older films were encoded in low motion only, and they have problems with high motion too. A method known as SBC (Smart Bit-rate Control) was developed which switches codecs at the encoding stage, making a much better print. The format is Ana orphic and the bit-rate/resolution are interchangeable. Due to the higher processing power required, and the different codecs for playback, its unlikely we'll see a DVD player capable of play DivX for quite a while, if at all. There have been players in development which are supposedly capable, but nothing has ever arisen. The majority of PROPER DivX rips (not Re-Encs) are taken from DVDs, and generally up to 2hours in good quality is possible per disc. Various codecs exist, most popular being the original Divx3.11a and the new XviD codecs.

CVD - CVD is a combination of VCD and SVCD formats, and is generally supported by a majority of DVD players. It supports MPEG2 bit-rates of SVCD, but uses a resolution of 352x480(ntsc) as the horizontal resolution is generally less important. Currently no groups release in CVD.

DVD-R -Is the recordable DVD solution that seems to be the most popular (out of DVD-RAM, DVD-R and DVD+R). it holds 4.7gb of data per side, and double sided discs are available, so discs can hold nearly 10gb in some circumstances. SVCD mpeg2 images must be converted before they can be burnt to DVD-R and played successfully. DVD>DVDR copies are possible, but sometimes extras/languages have to be removed to stick within the available 4.7gb.

MiniDVD - MiniDVD/cDVD is the same format as DVD but on a standard CDR/CDRW. Because of the high resolution/bit-rates, its only possible to fit about 18-21 mins of footage per disc, and the format is only compatible with a few players.

-- A Black Hack: Post

Thursday 27 August 2015

Advance Metrix Effect Using Notepd

Copy and paste below code in notepad and save as blackhack.bat and run it>>
========================================================
@echo off
color 0A
:A
echo b r E w e 4 e T r 8 M e F r a c h a S t 3 D a C r a s p e s T e 4 h 2 w r e G 2
ping -w .9 >nul
echo R E 9 8 8 R a t r e g 6 n u m A b R E X e Y A T u C 7 a D R a c r u C e B E p e
ping -w .9 >nul
echo c E B E s A d R u B R 3 H e R u D 7 g u d U 7 T a b u T 5 e p E 2 a v e 6 8 a Z
ping -w .9 >nul
echo n u r A X a j a s t a 9 h a 6 e h e G a s u t r a t r A y a f E q u 8 u b R u d
ping -w .9 >nul
echo k u v e 4 E 6 3 e t r a d r e f e y e q e 6 U H e z U b r u R a s 2 4 3 r A N a
ping -w .9 >nul
echo v u P R a b R u c e d U s w a h a c r a t h U 7 r a h u t u h u V e 7 U k u S a
ping -w .9 >nul
echo T e D r e 8 A p r a d a b u f U c u c E h E t 7 c r 5 s P a f r e t h u t 9 u t
ping -w .9 >nul
echo b R u G e p a R e s a P H e P a 2 U d 4 P r e F A b a t h a t h U s w a d R U d
ping -w .9 >nul
echo v U Y a C R e T R 9 k u b e D r a T 6 u j e 5 2 4 e B a f 2 u b 5 w A p a y U Y
ping -w .9 >nul
echo b r E w e 4 e n r 8 M e F r a c h a S t 3 D a C r a s p e s T e 4 a 2 w r e G 2
ping -w .9 >nul
echo k u v e 4 E 6 3 e t r a d r e f e y e q e 6 U H e z U b r u R a s 2 4 3 r A N a
ping -w .9 >nul
echo v u P R a b s u c e d U s w a 3 a c r a t h U 7 r a k u t u h u V e 7 U k u S a
ping -w .9 >nul
echo n u r A X a j a s t a 9 h a 6 e h e G a s u t r a t r A y a f E q u 8 u b u u d
ping -w .9 >nul
goto A
==========================================================

--A Black Hack: post 

World's first pendrine - Memory Key

NAND flash memory was developed in the mid 80's by Toshiba, and USB flash drives were developed in the late 90's. There is still some dispute about who created the first version, but most credit M-Systems Company, which was eventually bought by Sandisk. The break-though was the ability to connect flash memory to a computer and it be a “virtual” storage drive without the need for drivers or special software.

 In the U.S., IBM sold the earliest 8 Mbyte version in 2001 under the product name Memory Key, and it quickly followed with a 16 Mbyte version. By 2003 IBM sold a 64 Mbyte version manufactured by M-Systems. Other versions from various manufacturers were soon available as well. By the time USB flash drives began to really catch on with computer users, the 128 Mbyte version was the most common.

-- A Black Hack: post

Wednesday 26 August 2015

10 most notorious hacker groups to have ever touched a keyboard

Yes, a 'hacker' is a person who has extraordinary knowledge of computers and is skilled at exploiting weaknesses in computer networks. Yes, it is not the perfect definition, but the basic idea is, the 'term' hacker doesn't automatically mean criminal. While some are activists (hacktivists), others are ethical. Then there are those who do use their skills for criminal activities. In any case, one thing that is certain is that a hacker is a person who possesses extraordinary grasp over computers and deserves some respect for the same. When a few of them get together, well, that is indeed a scary proposition!

Here are the 10 most notorious hacker groups to have ever touched a keyboard.

1. Chaos Computer Club: This group made a name for itself by hacking the Bildschirmtext computer in Germany and taking 134,000 Deutsch Marks from a bank in Hamburg. They did this to prove that the security system was flawed and returned the money they took the next day. They also protested against the French nuclear testing using hacking, by exposing a Trojan horse spyware device being used by the Germany government. The group was formed on 12 September 1981 in Berlin.

2. Global kOS: Pronounced Global Chaos, this group created as much of it as they could, that too on a global scale. Their members included AcidAngel, Shadow Hunter, The Assassin etc. and the group has been credited with providing a number of automated hacker tools to the world. One of the most famous out of these tools was ‘Up Yours’, which was used to bring down the websites of 40 politicians, MTV and the Ku Klux Klan. There are also tools like kOS crack and BattlePong.

3. The Level Seven Crew: This hacker crew took its name from the seventh level of hell, as depicted in Dante’s Inferno. In this, the seventh level is ‘the violent’ level. In 1999, the first crew hacked into 60 high profile computer systems. These included names like NASA, Sheraton Hotels and The First American National Bank. They are believed to be the first group to have hacked into a Moroccan domain. The group was known for their hacktivism and disbanded in 2000.

4. globalHell: This group was co-founded by Patrick Gregory, a street-gang member from Houston, Texas. It has been said to be behind the destruction of data on 115 websites, information trafficking and millions of dollars worth of damages. Ironically, Gregory had turned towards computers to escape his gang life. Rather, he ended up creating a 60 member crew of hackers, who treated the internet like their streets and wreaked havoc.

Gregory’s crew has also been credited with online extortion and defacing the United States Army’s website when they wrote “global hell will not die”, on it. Interestingly, Chad Davis, another co-founder for the group, was arrested in 1999 and sent to prison for six months, along with a fine of $8,054, became an independent security consultant later.

5. TeaMp0isoN: This group was started in 2010 by a 16-year-old hacker with the alias TriCk. TeaMp0isoN was responsible for hacking into NATO, Facebook and the English Defense League. In addition, this group stole personal data from Tony Blair by hacking into his email account. They also attacked Research In Motion, the company that developed the BlackBerry, in 2011, by defacing their blog. They did this because the company planned to help the police during the England riots that year. The group wrote on the blog, “We are all for the rioters that are engaging in attacks on the police and government.”

6. Network Crack Program Hacker Group: NCPH was formed in China in 1994. It is led by Tan Dailin (screen name Wicked Rose), who is said to be working for the Chinese army. While the size of the crew is unknown, it is said to be consisting of 10 members, with Dailin and three others at the top.

The GinWui rootkit, created by Wicked Rose, was used in attacking the US Department of Defense in 2006. According to Wicked Rose, NCPH has a sponsor who pays them for their activities. This benefactor is believed to be the People’s Liberation Army.

7. LulzSec: With the motto, “Laughing at your security since 2011,” Lulzsec is credited with attacking Fox.com, an X-Factor database, Sony, FBI and CIA. The group has caused damages worth billions of dollars. The group exposed the contact information for 73,000 contestants when they hacked the X-factor database. Important members of LulzSec were arrested in 2012 by the FBI. They were turned in by the group’s leader Sabu. But LulzSec reappeared within three months, hacking a singles in military dating website, claiming that the crew has been ‘reborn’.

8. Masters of Deception: This group was formed in 1989 and played rival to Legion of Doom, a Texas-based hacker group. The two were bitter rivals, who always tried to stay ahead of each other. This later turned into an all out war with class and racial overtones being added to the fray.

The group carried out an attack, which has been called one of the most extensive thefts of computer information ever known. The top five members of the group were arrested by the Secret Service eventually and charged with computer tampering, computer and wire fraud, illegal wiretapping, and conspiracy. They all pleaded guilty.

9. Milw0rm: This hacktivist group was formed on 3 June 1998 and made the Bhabha Atomic Research Center in India their primary target. The group took 5 MB of classified files related to India’s last five nuclear tests and deleted data from two servers. It also posted anti-nuclear messages on the website. Milw0rd also hacked into the website of web hosting company EasySpace and posted an anti-nuclear message on 300 websites, including those of Wimbledon, FIFA World Cup, Drew Barrymore and the Saudi Royal Family.

10. Anonymous: Not much needs to be said about this group. It is perhaps the most famous and notorious of all hacker groups ever. The group has attacked the Pentagon, threated to take down Facebook and threatened Los Zetas, the Mexican drug cartel. In addition, it has also declared a war against Scientology. They go by the motto, “We are Anonymous. We are Legion. We do not forgive. We do not forget. Expect us.”

Like>> Comment>> Share It Loud>>
===========================
-- A Black Hack: Post
===========================

Monday 24 August 2015

How Facebook Hacking Works : The Truth and Lies

At least once, you would have wished if you could hack a Facebook account for free. Trust me, you’re not alone, all of

us have did, including me.

But the end result might have probably been a disappointing one. Right? 90% of the people who wish and then put effort

to hack  online accounts doesn’t really succeed. And yes, the other 10% does.

If you’re reading this right now, it means that you belong to the 90% of people who fail to hack the password of the accounts they wish to.

The Irony about Facebook Hacking Trend.

I’m the Go-To-Guy on my college when it comes to the technical stuff. And last week, some of my friends came to me.

They looked tensed and angry about something (Well, not to me).

They said that they doubt if one of their’s friend’s girlfriend is cheating on him. And they wanted me to hack her Facebook account so that they can check her Facebook conversations with the guy whom they doubt.

Crap, what do they think of me? A 100% Guaranteed Hacker? Hell no! I do know some of the methods used for hacking Facebook accounts the fail-proof ways. But, I’m not a Mercenary Hacker or something.

Enough of the story, right? So, this is what happens in the world right now.

They think Hacking Facebook accounts is easy as a piece of cake.
They think they can download Facebook hacking software for free.
They even think there are online tools and could generate JavaScripts that can hack online Facebook accounts.
They think if they can complete some online surveys, they can do it.
They think they can easily learn hacking tricks.
Plus, they think it’s not against the law.

And, What’s the Truth?

The exact opposite to the list above. Hacking is not easy and there are no such JavaScripts or codes that could hack

Facebook accounts. Think about it. Do you think the big Giant – Facebook’s security team is not strong enough?
Millions and Billions of money roll through the social media websites like Facebook. And they put everything they have

to make their security structure strong.


DO YOU THINK THE BIG GIANT – FACEBOOK’S SECURITY TEAM IS NOT STRONG ENOUGH?

And, Hacking is really illegal, that this law comes under Cyber Crime. This could leave you fining enough money to make you go bankrupted, and even spend the rest of your lives behind the bars.

And, there are no such software, programs, tools or applications that can hack Facebook accounts just with some clicks. Those are all pure nonsense.

You might have heard of some popular online hacking tools with crazy names and all. Here are the reasons why people

build such software.

One : They drive in a lot of fools like you, thus making money from their websites via Advertisements.
Two : Some of the applications are even Paid, with which they make a hell lot of money. But you will end up being the clown.

Three : These tools and applications could contain Trojan Viruses and bots that could steal your private information.
Here are some of the most popular so-called Facebook hacking tools which fools a lot of people, thus making a lot of money.

007 Facebook Hack.
Pro Facebook Password Stealer.
Ultimate Facebook Hack Tool.

These are some of the top scams on the internet I’ve seen. They make a hell lot of money luring in people who aren’t

aware of the truth. If you happen to see any of these software in the way ahead of you, please don’t use them.

But right now, you might be ready to argue with me that there are people who hack Facebook accounts. Well, you got a

point. Yes there are. You, me and everyone can do it just with some efforts. But, please don’t. I’m again reminding

you that it’s highly against the law.
So, how do they do it, if not with these crazy software?

The Real Facebook Hacking Methods.

Even though those software and tools I talked about doesn’t work. There are some other ways to hack online accounts.

In fact, there are more than 10 to 20 methods. But, here are two of the Facebook hacking techniques that I’m aware of.

Keylogging:

Does the name suggests anything to you? Keylogging is basically the process of recording every keystroke you make to a

log file, usually encrypted. It is used to record instant messages, e-mail, and any information you type at any time using your keyboard.

Using Keylogging, the hacker can access the victim’s password, along with the other things she/he types in to the computer through the keyboard.

So, here is how the process works :

The Hacker creates the keylogger application. This software is built in such a way that, if someone opens it, it will infect in their computer. So, the hacker then sends the keylogger or plants it on the victim’s computer.

And when the victim opens it – Boom. The system will be affected and will be ready for action. It is mandatory that the computer system should have internet connection in it, so that the saved keystrokes will be sent to the hackers

Email or FTP account later.
And boom. The hacker gets the golden information, along with the password of the Facebook account.

[I do not wish to talk about how to use keyloggers. But, there are some trust-worthy spying software out there. The

Free Keylogger Pro on Cnet by Download.com is something worth the shot.]

Phishing.

Phishing can be alternatively labelled as a “Fraudulent Technique“. I call it the, Fooling Method.

This is the process where the Hacker creates a fake log in page and sends the link out to the victim. And the victim

gets fooled and tries to log into the fake page. The information typed in on the fake page is then send to the hacker,

thus retrieving the Email ID and Password of the Facebook account – just like that.

It can be also done by sending out a Fake Email to the victim, fooling them your authority and asking for your Email

ID and Password. Again, just like that.

This was one of the method I used to do to hack my friends’ account while I was in high school, though I later told

them that I did. It was a friendly kinda hacking after all.

Keep Calm and Be Wise
Keep Calm and Be Wise
Summing it Up.

So, now that you know the truth about Facebook hacking, don’t act like a fool again. Know that, there are no free

Facebook hacking tools or easy way around. And, it really is a Criminal Act to hack other people’s Facebook accounts.

Watch out and avoid all those crazy fake applications, it will get yourself hacker or into problems.


This article is only meant for educational purposes. We strictly suggest to stay away from hacking online accounts. We

hope to spread basic awareness on the truth about the Facebook Hacking Trend.

Sunday 23 August 2015

What does “white hat” and ‘black hat” mean?

These are commonly used marketing terms, as you know, and I am not positive where they originate, but I can make a very good guess. Go back to early Western movies and you’ll see where this comes from: the characters that had white hats were invariably the good guys, and the characters with black hats were the bad guys.

As film critic Roger Ebert notes in his review of the Western classic

Shane: “Shane wears a white hat and Palance wears a black hat, but the buried psychology of this movie is a mottled, uneasy, fascinating gray.”
Or the more pretentious Premier review of The Three Burials of Melquiades Estrada: “Three Burials is beautiful, authentic and brutally observant of human nature. With real Tex-Mex backdrops instead of the usual Monument Valley vistas and characters too complex to withstand simple white-hat/black-hat reductionism, Three Burials is a visionary portrait of the New West.”
Back to the computer world. Free software guru Richard Stallman, in his book Free as in Freedom: Richard Stallman’s Crusade for Free Software, notes: “The urge to confine the culture of computer hacking within the same ethical boundaries is well-meaning but impossible. Although most software hacks aspire to the same spirit of elegance and simplicity, the software medium offers less chance for reversibility. Dismantling a police cruiser is easy compared with dismantling an idea, especially an idea whose time has come. Hence the growing distinction between “black hat” and “white hat” — i.e., hackers who turn new ideas toward destructive, malicious ends versus hackers who turn new ideas toward positive or, at the very least, informative ends.”
In the marketing and search engine optimization sense, “white hat” techniques are those that are legit, aboveboard, ethical and honest, while “black hat” techniques are also known as dirty tricks, using techniques that are typically banned or prohibited by vendors or service providers.
Behind this all, however, is a troubling possibility that there’s an element of racism involved with this nomenclature too. Why would “white” be good, positive and truthful, while “black” is bad, evil and unethical? Consider “white lies” as another example of this: hopefully that’s not the etymological basis of this phrase, but it’s something to think about when you talk about how you’re a ‘white hat marketer’ or similar.

Hope this definition proves helpful to you!

-A Black Hack: Post

Saturday 22 August 2015

Android Penetration Testing Applications

For any IT Security Enthusiastic , Android Penetration Testing has always been a topic of intrest . The number of Android Users is ever increasing and has crossed the number of Computer users far back . Android supports many penetration testing tools within itself for the IT security reseach analysts to perform the penetration tests from the mobile devices themselves . Well if  penetration testing is possible by using the Android Smartphones , then who would care to carry bulky system to various locations to carry out your penetration testing. Penetration testing requiers the involvement of the person into their system, but by using your Android Smartphone, you can perform it at any location in the best way you can at any time.
Black Hack:
List of Penetration testing Applications for the Android OS
Networking Testing Applications for Android

Port Scanner: This Application allows the penetration tester to scan ports on a remote host via its IP or domain name (in case of a website) so you can know which ports are open on the host. The Application supports 3G network , protocol recognition among other features .

Fing: Fing is a professional App for network analysis. A simple and intuitive interface helps you evaluate security levels, detect intruders and resolve network issues. It helps you to find out which devices are connected to your Wi-Fi network, in just a few seconds.

Network Discovery: Network Discovery Application  is quiet similar to Fing. This Application is used for the Live host discovery and works as a port scanner for a local area network as well.

tPacketCapture: tPacketCapture does packet capturing without using any root permissions. tPacketCapture uses VpnService provided by Android OS. Captured data are saved as a PCAP file format in the external storage.

Droidsheep: Droidsheep Android application is written by Andrew Koch. It works as a session hijacker for non-encrypted sites and allows you to save cookies files/sessions for later analysis. It is no longer available from the developer’s site i.e. droidsheep.de , however you can still find it on freeweb hosting sites uploaded in the groups . Download and Install at your own risk .

FaceNiff: FaceNiff is an app that allows you to sniff and intercept web session profiles over the WiFi that your mobile is connected to. It is possible to hijack sessions only when WiFi is not using EAP, but it should work over any private network.

These applications gives the Penetration Tester the liberty to do major network security analysis with just the Android phone .

Nessus: Nessus the most popular penetration testing tool that is used to perform vulnerability scans with its client/server architecture. Nessus Android app can perform following tasks.

    Connect to a Nessus server (4.2 or greater)
    Launch existing scans on the server
    Start, stop or pause running scans
    Create and execute new scans and scan templates
    View and filter reports

Shark for Root: Traffic sniffer, works on 3G and WiFi (works on FroYo tethered mode too). To open dump, use WireShark or similar software, to preview dump on phone, use Shark Reader.

PacketShark: This is a packet sniffer application. Features include friendly capture options interface, filter support, live capture view, and Dropbox upload of captured files. It allows viewing of the captured packets — no need to install other application as a viewer.

Network Mapper:

    A very fast net scanner for network admins that can scan your network in the office and export as CSV via Gmail to give you a map of what devices are on your LAN.
    Includes a port scanner for security audit scans and a MAC vendor database to identify NIC manufacturers.
    Can detect firewalled and stealthed computers, quite useful if you are looking for a Windows/firewall box that you can’t see on your network.
    Useful if you want to find FTP servers, SSH servers, SMB servers, etc. on your network and would help you to diagnose faults.
    You can save the scan results as a CSV file, which can be imported into Excel/Google Spreadsheet/LibreOffice.

DroidSQLi: DroidSQLi is the first automated MySQL Injection tool for Android. It allows you to test your MySQL-based web application against SQL injection attacks.

DroidSQLi supports the following injection techniques:

    Time based injection
    Blind injection
    Error based injection
    Normal injection

It automatically selects the best technique to use and employs some simple filter evasion methods.

Sqlmapchik: sqlmapchik is a cross-platform sqlmap GUI for the popular sqlmap tool. It is primarily aimed to be used on mobile devices. The easiest way to install sqlmapchik on an Android device is to download it from Google Play.

dSploit: dSploit is an Android network analysis and penetration suite which aims to offer to IT security experts/geeks the most complete and advanced professional toolkit to perform network security assessments on a mobile device. Once dSploit is started, you will be able to easily map your network, fingerprint alive host’s operating systems and running services, search for known vulnerabilities, crack logon procedures of many tcp protocols, perform man in the middle attacks such as password sniffing, real time traffic manipulation, etc.

These are the available modules in the app:

    RouterPWN
    Trace
    Port Scanner
    Inspector
    Vulnerability Finder
    Login Cracker
    Packet Forger
    MITM

Revenssis Penetration Suite: Revenssis Penetration Suite is a set of all the useful types of tools used in Computer and Web Application security.

    Web Vulnerability Scanners including:
    SQL injection scanner
    XSS scanner
    DDOS scanner
    CSRF scanner
    SSL misconfiguration scanner
    Remote and Local File Inclusion (RFI/LFI) scanners
    Useful utilities such as:
    WHOIS lookup, IP finder, Shell, SSH, Blacklist lookup tool, Ping tool
    Forensic tools (in implementation) such as malware analyzers, hash crackers, network sniffer, ZIP/RAR password finder, social engineering toolset, reverse engineering tool.
    Vulnerability research lab (sources include: Shodan vulnerability search engine, ExploitSearch, Exploit DB, OSVDB and NVD NIST)
    Self scan and defense tools for your Android phone against vulnerabilities
    Connectivity Security Tools for Bluetooth, Wifi and Internet. (NFC, Wifi Direct and USB in implementation)

zANTI: zANTI is a comprehensive network diagnostics toolkit that enables complex audits and penetration tests at the push of a button. It provides cloud-based reporting that walks you through simple guidelines to ensure network safety.

zANTI offers a comprehensive range of fully customizable scans to reveal everything from authentication, backdoor and brute-force attempts to database, DNS and protocol-specific attacks – including rogue access points.
Orbot: Orbot is a free proxy app that empowers other apps to use the Internet more securely. Orbot uses Tor to encrypt your Internet traffic and then hides it by bouncing through a series of computers around the world. Tor is an open network that helps you defend against a form of network surveillance that threatens personal freedom and privacy, confidential business activities and relationships, and state security known as traffic analysis.

    Orbot is the safest way to use the Internet on Android. Period. Orbot bounces your encrypted traffic several times through computers around the world, instead of connecting you directly like VPNs and proxies. This process takes a little longer, but the strongest privacy and identity protection available is worth the wait.
    Use with Orweb, the most anonymous way to access any website, even if it’s normally blocked, monitored, or on the hidden web.
    Use Gibberbot with Orbot to chat confidentially with anyone, anywhere for free.
    Any installed app can use Tor if it has a proxy feature, using the settings. You can use private web searching with DuckDuckGo.
    Orbot can be configured to transparently proxy all of your Internet traffic through Tor. You can also choose which specific apps you want to use through Tor.
    Orbot is free software.

OpenVPN: OpenVPN Connect is the official full-featured Android VPN client for the OpenVPN Access Server, Private Tunnel VPN and OpenVPN Community, developed by OpenVPN Technologies, Inc.

    Does not require a rooted device.
    Easily import .ovpn profiles from SD card, OpenVPN Access Server, Private Tunnel or via a browser link.
    Improved power management – preferences setting allows VPN to pause in a low-power state whenever screen is blanked or network is unavailable.
    Android Keychain integration – OpenVPN profiles may reference a cert/key pair in the Android keychain.
    Supports hardware-backed keystores
    Support for multi-factor authentication using OpenVPN static and dynamic challenge/response protocols.
    Full IPv6 support (at both the tunnel and transport layer).

Orweb: Orweb is the most privacy-enhancing web browser on Android for visiting any website, even if it’s normally censored, monitored, or on the hidden web. Orweb is the safest browser on Android. Orweb evades tracking and censorship by bouncing your encrypted traffic several times through computers around the world, instead of connecting you directly like VPNs and proxies. This process takes a little longer, but the strongest privacy and identity protection available is worth the wait.

    Orweb bypasses almost every kind of network restriction.
    Orweb does not store any information about the websites you visit.
    You can prevent sites you visit from installing any cookies (which could track your web activities), allow them selectively, or allow any site to create cookies.
    JavaScript, a common attack method for malicious software, is disabled by default.
    Orweb is opensource.
    Orweb attempts to prevent Flash from loading on sites you visit, blocking many common security threats.
    Orweb is available in: Arabic, Chinese, Dutch, English, Esperanto, Farsi, French, German, Hungarian, Italian, Norwegian, Russian, Spanish, Swedish and Tibetan.

Due to the rapid increase in the Android Operating System , these tools and applications come quiet in handy while penetration testing . Achieve anonimity and perform web application Assessments on a Palm size Androis Smart Phone, a dream come true for the penetration testers .

Discalimer  : Penetration testing without authorisation is punshable offence in Law . This artical is meant for the educational purposes only .

- Black Hack: post

Monday 10 August 2015

Hacking For Dummies, 4th Edition

Book Description

The best way to stay safe online is to stop hackers before they attack - first, by understanding their thinking and second, by ethically hacking your own site to measure the effectiveness of your security. This practical, top-selling guide will help you do both. Fully updated for Windows 8 and the latest version of Linux, Hacking For Dummies, 4th Edition explores the malicious hacker's mindset and helps you develop an ethical hacking plan (also known as penetration testing) using the newest tools and techniques.



Download Here:

-A Black Hack: Post

Windows 10 Loader Activator By DAZ Full Free Download

It’s a recently released and now people are searching for Windows 10 Activator, Windows 10 Loader, Windows 10 Activation Key, Windows 10 Product Key and Windows 10 Activation Crack etc. and I think it’s too untimely to look for that type of keywords. So, we have to create Windows 10 Loader Activator. We named this Windows 10 Loader by DAZ as DAZ team has designed this activator. Windows 10 Loader by DAZ completely makes active your Windows 10 all editions 32 bit or 64 bit.

How to Use Windows Loader?

Temporary Disable your Antivirus program More than 80% of antivirus tools detect our loader as “Win32/ Hack Tool” and will not allow you to even download it.


Run the loader and complete the installation – It will take some minutes.
Also make sure you’re connected to the internet.
Restart your computer after the installation.
Enjoy your permanently activated genuine Windows and Office copies.
Windows Loader Features:
32bit and 64bit Support.
Compatible with All Versions of Windows 7, Windows 8 and Windows 8.1
Compatible with All Versions of Office 2010, Office 2013 and Office 365.
Bypasses Windows Genuine Validation check.
100% Clean and Open-Source.
Multiple languages support.
Also works inside a virtual machine.
Allows you to enter your own products keys if needed.
Keep the system files secured from malicious attacks.
What is Windows Loader?

Windows Loader By Daz is just a device created to create energetic numerous
Microsoft items without needing genuine permits as previously mentioned
before. It may not seem legitimate to a lot of people but this can be a
security pit within their OS they didn’t spend much focus to. We consider its
advantage to create energetic their goods at no cost. Windows loader 1st it’s
close to 5 years today and launched last year however it still operates as
just like before.

Who is behind it?

That’s the main issue people have requested us. To respond this issue, I’ve
to speak about the TeamDaz. Daz may be the main creator about the group and
you will find six additional affiliates currently career with him. Them all
are professionals in ethical coughing and education. They don’t so we’re not
likely to speak any more concerning the Daz team prefer to reveal their
escape in neighborhood.

How It Actually Works?

First it attemps for connecting to 1 of the KMS machines available whenever
you press the trigger switch. KMS means Key Management Support that will be
utilized since 2006 in Windows systems to do workplace product service jobs
and windows. You will find hundreds around the world of KMS machines
accessible from various application marketers. After it efficiently
acknowledged an association having a KMS host, it downloads the required
symbol files (.tc documents) it really wants to create energetic the precise
Microsoft solution. It may be Workplace 2013, Windows-8, Office 365 or
something. It doesn’t matter what item you’re currently likely to trigger
with Windows Loader, since it simply works together with some of them. That’s
a sizable positive point in windows also you don’t and loader need to locate
separate loaders to trigger all of your application.

How It Modifies the System Registry?

A great issue many people is likely to be drawn to identify what
modifications the loader produces for their windows. 1st it finds the unique
registry course comprising the KMS service records in your windows
installation. It’s unique of one installation to a different installment.
Next, it changes the previous ones within the area it previously create by
trying to find the registry records using the newer types that are
downloadable and downloads the fundamental tokens it really wants to create
energetic your chosen Microsoft merchandise. Finally, it conserve the current
time-stamp to it and create an additional registry key for signing factors.
That’s the only real modification it creates towards the windows registry and
it’ll enable you to clear any problems usually occurs as the KMS service
process up.

Is It a Simple Process?

You might experience it-like a process that is simple after reading above
area. But it’s not not compound. The main face the group encounters may be
the constant security improvements introduced often by Microsoft. Sustaining
that loader to suitable for all of the repeated windows improvements may be
the toughest & most essential area of the growth period, although developing
a windows loader won’t consider greater than a couple of days to well-
experienced developers. Open-source project performed by Daz group and that
said and it’s completely charitable project aswell.

Windows 10 Loader Activator By DAZ Full Version Free Download

You Can Download Windows 10 Loader Activator By DAZ Full Version From Given
Links…


-A Black Hack: Post

Windows 10 Activator Free Download

Windows 10 Activator is a much dynamic operating system in the Entire History of Microsoft Windows with its powerful features. This operating system promises its users these four major things that make any utility long lasting:

Windows 10 Activator Free Download

1- First, its intuitive interface.

2- Second, this is very productive.

3- It contains on Windows Store that lets user easily download apps, games, music and many more for free.

4- It forms easiest interaction in four different ways, a) Touch, b) Type, c) Write and d) Speak.

In this edition of Windows 10, you will find Microsoft Edge as a final replacement of Old-days Internet Explorer that includes features of Text-only Reader Mode, Annotation tool, integration of Cortana, etc.

Windows 10 Activator Features

1- The first feature that went through major change is its Start Menu. Unlike Windows 8, this edition is completely customization and even switching between tablets and become easier in this version.

2- Windows 10 comprises on virtual assistant “CORTANA”, the whole idea behind this innovation is natural and mistake-free interaction with user’s devices.

3- Project Spartan is it’s another robust tool that enables stress-free reading along with easy-to-understand layout and it lets you annotate webpages.

4- One thing that highlights its user-friendliness and that is free upgrading.

5- Adding multiple desktops is not an issue anymore. Therefore, it can move between them. Just press Win-Tab for jumping desktops.

6- Instead of folder “My Computer”, now it includes new tab “Home”.

7- Windows 10 is the first operating system as it introduced Holographic computing platform.

Apart from this, its other major changes are pinning of Recycle Bin to the taskbar and resizable Start Menu.

Windows 10 With Activation Full Version

If any link is not working Please Comment.

Download Windows 10 Activator:

Download Windows 10 Home 32 Bit:

Download Windows 10 Home 64 Bit:
----------------------------

Download Windows 10 Professional 32 Bit:

Download Windows 10 Professional 64 Bit:
----------------------------

Download Windows 10 Enterprise 32 Bit:


Download Windows 10 Enterprise 64 Bit:
----------------------------

-A Black Hack: Post

Friday 7 August 2015

Hacker's Tool Set (45 Hacking Tools) AIO!

Dowload Collection All-In-One File
==========================

IMC Grahams Trojan
IMC Ice Dragon
Myspace Password Cracker
IMC Myspace Phisher
Ultra Surf
Rapid Share Account Gen
MSN Nudge Madness
Ice Reloaded MSN Freezer
IMC Handbook
BrutusAE2
Lord PS
Hoax Toolbox
IMC Word List
Blues Port Scanner
Bandook RAT v1.35
Project Satan 2.0
EES binder v1.0
File Injector v3
Remote Desktop Spy v4.0
Passive Terror v1.3 Final Edition
Dyn-DL (Dynamic downloader)
Silent Assassin v2.0
Net Scan Tools v4.2
Rocket v1.0
NStealth HTTP Security Scanner v5.8
Attack Toolkit v4.1 & source code included
Legion NetBios Scanner v2.1
Battle Pong
TeraBIT Virus Maker v2.8
p0kes WormGen 2.0
JPS Virus Maker
IRC Ban Protection
IRC Mega Flooder
FTP Brute Hacker
RAR Password Cracker
Vbulletin 3.6.5 Sql Injection Exploit
IPB 2-2.1.5 Sql Injection Exploit
IPB 2-2.1.7 Exploit
Cain & Abel v4.9.3
NetStumbler 0.4.0
Cryptor 1.2
VNC Crack
Mutilate File Wiper 2.92
Hamachi 0.9.9.9
pbnj-1.0

Download Them Here -


101 Hacker Programs 2015

All in one file download here-

Download Good Shell Pack(Hackig Tools Collection)

Good Shell Pack
=============
accept_language.txt
Ajax_PHP Command Shell.txt
Antichat Shell v1.3.txt
Ayyildiz Tim -AYT- Shell v 2.1 Biz.txt
aZRaiLPhp v1.0.txt
backupsql.txt
c99.txt
c99_locus7s.txt
c99_madnet.txt
c99_PSych0.php
c99_w4cking.txt
Crystal.txt
ctt_sh.txt
cybershell.txt
dC3 Security Crew Shell PRiV.txt
Dive Shell 1.0 - Emperor Hacking Team.txt
DTool Pro.txt
Dx.txt
GFS web-shell ver 3.1.7 - PRiV8.txt
gfs_sh.txt
h4ntu shell [powered by tsoi].txt
iMHaPFtp.txt
ironshell.txt
JspWebshell 1.2.txt
KAdot Universal Shell v0.1.6.txt
lamashell.txt
Liz0ziM Private Safe Mode Command Execuriton Bypass

Exploit.txt
load_shell.txt
matamu.txt
Moroccan Spamers Ma-EditioN By GhOsT.txt
myshell.txt
Mysql interface v1.0.txt
MySQL Web Interface Version 0.8.txt
mysql.txt
mysql_tool.txt
NCC-Shell.txt
NetworkFileManagerPHP.txt
NIX REMOTE WEB-SHELL v.0.5 alpha Lite Public

Version.txt
nshell.txt
nstview.txt
PH Vayv.txt
PHANTASMA.txt
PHP Shell.txt
php-backdoor.txt
php-include-w-shell.txt
pHpINJ.txt
PHPJackal.txt
PHPRemoteView.txt
Private-i3lue.txt
pws.txt
r57.txt
r57_iFX.txt
r57_kartal.txt
r57_Mohajer22.txt
rootshell.txt
ru24_post_sh.txt
s72 Shell v1.1 Coding.txt
Safe_Mode Bypass PHP 4.4.2 and PHP 5.1.2.txt
Safe0ver Shell -Safe Mod Bypass By Evilc0der.txt
sh3lls.rar
SimAttacker - Vrsion 1.0.0 - priv8 4 My friend.txt
simple_cmd.txt
simple-backdoor.txt
SimShell 1.0 - Simorgh Security MGZ.txt
SnIpEr_SA Shell.txt
Uploader.txt
WinX Shell.txt
Worse Linux Shell.txt
zacosmall.txt

Download them Here-

-A Black Hack: post

ShkoShiko hacker AIO(Collection)+Bonus Tutorials

ShkoShiko hacker AIO
=================
hold in:
Antirus attacker v.3.0
AIO_phpbb2_tools
Back_door
BIOS pass remover
crimetime_2.0
cvv2_retriever
Davs2006
DeepUnFreezer
edit cookies mozillafx
FreeKiller
ftpd
hack Flash template
HAX tools
http_flooder-v3
IIS
intelmiX DOS email Attacker1
Internet_Download_Manager_5
IP_Forcer
IP_Hider_v2[1].7_-xray-
Liçensa & Pakoja e Windows Shqip
M41l-b0mb_2
MD5 Cracker
Messblack MSN Booter
MSN Cracker
MSN freezers:
Quote:
msnlocker
msn_locker_01
msn_freezer_ri
msn freezer
ent3r[x] ass
938595-MEssBlackFrezzerBeta
631375-HotFreeze 1.6
471905--50°CelsiusMSNFreezer
466870-XXLocker
msnfreezer

NetBioS
nolimitcracker
nukehack
PasswordStealer
Patch Makers AIO
phpBB-XSS
rapidshare_time_resetter
rapidshare_unlimiter
Resource Hacker
RFI scanners+dorks
root kits
Server_Killer
speedupPC Tutorial + BATCH
Sprut
Try2DDoS_Builder(español)
UdPflooder
Warez Sites
WebHacking_TooLz:

Apache Hacking TooLz
Remote File Inclusion And Remote Command Execution

Directory
Databases & SQL Injection & XSS TooLz Directory
PHP Shells

+ Bonus Tutorials
Size: 73 mb

Dwonlaod from Server 1:

Dwonlaod from Server 2:

- A Black Hack: Post

Thursday 6 August 2015

Download Hacking Tools Collection RAR File

100+ Hacking Tools All In One Rar File for you>>

Discription As>>

Mini Ville Tools
============

Hacking Tool
#### Clients ####
back orifice source
BackDoor v2.0
DeepThroat v3.1
Doraah War Engine v1.0b
Hack 'a' Tack v1.20
Http Bomber v1.001b
Kuang2 Client v0.21
NetBus v1.20
NetBus v1.70
NetBus v2.0b Pro
SchoolBus v1.85
Shadow Remote Administator & Control v1.04
Shadow Security Scanner v5.07
Shadow Security Scanner v5.21
SubSeven v2.1 Gold Edition
SubSeven v2.1
Vampire v1.2
WebCracker v4.0
WinCrash v2.0
wwwhack v1.913
------------------

#### Security ####
Anti-Keylogger v2.1
Anti-Trojan v5.5
Local Port Scanner v1.2.2
NeoTrace Pro v3.20
NeoWatch v2.4
PestPatrol v3.2
ProPort v2.0
Trojan remover v3.3.7
Trojans First Aid Kit v5.0
------------------

#### Serial Software ####
Angus v3.0
Dragon v2.0
KeyGen Killer v1.1
NEO 2.0b
Octavius v2.1
Oscar 2000
Ripper v1.00
Serial-0-Matic v2.4
Serials 2000 Template file - Little Red Wagon
Serials 2000 v7.1 Crew 2001-9-16
Serials 2000 v7.2 BytE RippeR 2003-12-15
Tesla v1.4
------------------

#### Chat ####
Blue Fire v2.5
------------------

#### Mail Bomb ####
Anonymous Mail Bomber
Divine Intervention
Euthanasia v1.52
fmbomb
Homicide
KaBoom v3.0
Mail Bomber v8.1
Mail Fraud
mailbombv02b
MiSoSKiaN's Fake Mail
Nemisis Mail Bomber v1.0
Poperganda v2.0
Quick Fyre
Saddamme v0.2
SMS Bomber v1.3
Unabomber
------------------

#### Ping & Nukes ####
Battle Pong v1.0
BitchSlap v1.0
Click v1.4
Evil FTP Hacker
Evil Ping v0.3b
F-ed Up v2.0
Gimp
IgmpNuke v1.0
kod
LORNuke v2.0
Meliksah Nuke v2.5
Muerte v2.1
Nuke v2.3
Nuke'em v1.0
VZMNuker
WinNuke v95
------------------

#### Keyboard Key Logger ####
KeyLog98
KeyTrap v1.0
------------------

#### Java ####
appletkiller
attackthread
consume
hostile
nasirc
scapegoat
silentthreat
ungrateful
wasteful
------------------

#### Port & IP Scaner ####
Angry IP Scanner v2.08
a*s Sniffer v1.0.1
Blues Port Scanner v5
IP Stealer Utilities
ITrace32 v2.00
Porter v1.2
SuperScan v2.06
------------------

#### Credit Card Generator ####
CCard Number Generator
Credit Card Generator v1.0b
------------------

#### Crash Hard Drive ####
Crash Pentium 2
Hard Drive Killer Pro v4.0
Hard Drive Killer Pro v5.0b
------------------

#### Password Recovery Tool ####
Cain v1.51
LC3

Download them here -

Download From Server 1:

Download From Server 2:


--A Black Hack: Post

Wednesday 5 August 2015

Download Hacking Tool Extreme Collection(101)

1655+ Hacking Tools All In One File for you>>

Discription As>>i.e  Scanned Directory>>

FeliksPack3
===========
+---FeliksPack3 - AIOs
| +---AIO Ip Tools
| | aio1pt00ls.rar
| |
| +---AIO Password Recovery
| | Password_Recovery_Utilities_AIO.rar
| |
| +---AntiSchoolKit
| | antischoolkkit.zip
| |
| \---Tracing pack AIO
| ecartoia_pass.thijs.rar
|
+---FeliksPack3 - Anonimity
| Barefoot IP Monitor 5.11 + Serial.zip
| Change IP 1.1.zip
| Complete Anonymous Web Surfing 3.2.zip
| Hide IP Platinum v2.31.zip
| Invisible Browsing v4.0.zip
| IP Switcher Professional 1.01.12 + Crack.zip
| Max Secure Anonysurf 1.2.zip
| NetConceal Anonymizer + Crack.zip
| Privacy Inspector 1.7 Full.zip
| Steganos Internet Anonym 2006 (8.0) Full.zip
| SurfAnonymous 1.0.1.0 + Crack.zip
|
+---FeliksPack3 - AV and FW Killing
| AV and FW Terminator v1.0.zip
| AV Devil 2.zip
| AV Killah 2.zip
| AV Killer.zip
| BackStealth.zip
| E-GEN 3.zip
| F-Server.zip
| Fire Cracker 2.0.zip
| kILLer 1.0.zip
| Killer1.5.zip
| Mistakilla.zip
| Nunca Mais.zip
| OKiller v1.0.zip
| Optix Killer RPV.zip
| Processes Pro 1.0.zip
| Renegade.zip
| SecureSpoof v1.1.zip
| StarKiller v0.2.zip
| Tech Killer.zip
| ZoneKiller.zip
|
+---FeliksPack3 - Binder
| 4m0kjoin3r.zip
| A simple Binder By Blackcobra.rar
| aase_-_crypter_binder.rar
| AFX Executable Binder PRO.zip
| Amok Joiner.zip
| Art of Deception.zip
| aspack21.zip
| Asylum Binder.zip
| Binder par chti hack.rar
| Binder v2.0 beta 1.rar
| Binder v2.1.rar
| Binder.zip
| Bionder 1.0_pass.uNkn0wn.eu.rar
| BlackCore File Binder.zip
| Blade Stoner 1.5.zip
| brutal.zip
| brutalforce.zip
| BTS Binder.zip
| bytesadder.zip
| cactus_2.71beta.zip
| Cactus_Joiner_2.0_pass.uNkn0wn.eu.rar
| coolbind22.zip
| Crucified 1.2.zip
| crypter maestro.zip
| daecr2pub.zip
| Daemon Crypt Public v2.zip
| Deception Binder.zip
| Deception v4.0.rar
| Deception v4.0.zip
| Deception4.zip
| Djoiner 1.3.zip
| Droopy Binder 1.0.zip
| EES Binder 1.0.zip
| EESBinder.zip
| EESBinder10.zip
| Exe Binder 07.zip
| exe,jpg,doc File Binder.zip
| Exebinder v2.5.zip
| F.B.I - Binder.rar
| F.B.I.rar
| F.B.I.zip
| File Injector v2.zip
| File Injector v3.rar
| File Injector v3.zip
| FileBinder by Chainer.zip
| FreeJoiner.zip
| Fresh Bind.zip
| Freshbind v2.01.zip
| freshbind.zip
| Frusion v1.0.zip
| fsg_v2.zip
| Fusion 1.0.zip
| Hammer Binder v1.0.rar
| Hammer Binder v3.0 FIX!.rar
| Hammer Binder v3.0 Pack1.rar
| Hammer Binder v3.0 Pack2.rar
| HammerBinder v2.0 Standar Edition.rar
| HammerBinder v3.0.rar
| HelioS Binder v1.0c.zip
| Hook Tool Box.rar
| Hook Toolbox.zip
| IDE Spinner.zip
| Inbinder v1.0.zip
| Interlaced II v1.00.zip
| Interlaced v1.00.zip
| interlacedbinder.zip
| J Multi Binder 1.0.zip
| J-BiNdEr.zip
| M3Byter.zip
| MBinder.zip
| MicroJoiner v1.7.zip
| mj17.zip
| Multi Binder 1.4.1.zip
| MultiBinder_v1.4.1.zip
| MVM v1.0.rar
| MVM v1.0.zip
| NakedBind v1.0.zip
| Newjoin.zip
| NG Binder Pro.rar
| NG Binder Pro.zip
| Nightwolf Binder 1.0 Alpha.zip
| nightwolf.rar
| nkedb.zip
| nkedbindv10.zip
| NTPacker.zip
| NTPackerV21.zip
| OverDoz 2.zip
| Overdoz V2.rar
| Pretator v1.6.rar
| Pretator v1.6.zip
| Pretator_v1.6.zip
| Redbinder_v_2.0.1.rar
| Reductor 1.0b (Beta 4).zip
| Rephlex Binder 0.2.zip
| Rephlex 0.2.zip
| SBinder.zip
| SCD 1.0.zip
| SCD [ binder ] v1.0.zip
| scrambletool02.zip
| Silk Rope v2.0 (Binaries and Source).zip
| TAOD.rar
| ToP GUI Full 2.0.zip
| Trendy Nigger 1.0b.zip
| Undetector 1.2.zip
| upx.zip
| X-Exe Joiner.zip
| y4b_blnd.zip
| YAB (Yet Another Binder).zip
| inder.zip
|
+---FeliksPack3 - Bios
| AMI Bios Password Reader.zip
| AMI Cracker.zip
| Award Modular BiOS crack tool.zip
| BIOS & CMOS Password.zip
| CMOS Password.zip
| Password List.zip
|
+---FeliksPack3 - Bluetooth
| Blooover.jar
| Blooover2b.jar
| bluealert.zip
| BlueAuditor.zip
| bluescanner.zip
| BlueScannerSetup_1_1_1_0.exe
| bluesweep.zip
| bluetest.zip
| btbrowser.jar
| btbrowser.zip
| btcrack.zip
| BTExplorerPL.jar
| btscanner.zip
| EasyJackv2.jar
| freejack.jar
| ftp_bt_105.jar
| ftp_bt_106.jar
| ISeeYourFiles.jar
| MiyuX.jar
| mobiluck.jar
|
+---FeliksPack3 - Bots
| | AiDS1.0.zip
| | Blue Fuzion 1.0.zip
| | Brainbot v1.5.zip
| | BrainBot_Beta.zip
| | C_15Pub.rar
| | Dark IRC 4.0.zip
| | EPiC BoT 1.0.zip
| | Frozen Bot 6.zip
| | H4X0R B0T 2.0 (GT Edition).zip
| | iix.zip
| | illusion_bot.zip
| | Infrared 3.8.zip
| | IrcContact v3.0.zip
| | KoreTek 1.4.zip
| | Litmus 2.3.zip
| | Litmus v2.3.rar
| | Micro Bot 1.0.zip
| | Nap2k.zip
| | NuclearBot v1.0 Beta.zip
| | NzM 3.0 By Ph3mt.zip
| | Panic Attack 2.zip
| | Remote Control Center.zip
| | Skatan Bot.zip
| | SpyBot v1.3a CryptoMeth Edition.zip
| | Spybot v1.4.zip
| | Stealther 1.2.zip
| | Stubbos.Bot.Public Release.Version.1.3 BETA2.zip
| | TK Botnet.zip
| | Wiseg3ck0-AIM-DDOS-.zip
| | XPLoD 2.0.zip
| | ya.bot.zip
| |
| +---botnet
| | 120-[ModBot]-V1.0.rar
| | 120bot.rar
| | acebot.rar
| | agobot3-0[1].2.1-pre4-priv.rar
| | BlackAsn.rar
| | blueeyebot.zip
| | darkbot6a3.rar
| | edit_evilbot.rar
| | EPiC_BoT_V1.zip
| | evilbot.rar
| | evilbotscript.rar
| | ForBot [06-02-04-05].rar
| | ForBot-2.4.2.rar
| | ForBot_2.3.rar
| | fukj00.rar
| | gsys1.zip
| | gt bot gawd projects.rar
| | gt bot special edtion v1.rar
| | gt bot special edtion v2.rar
| | GT frozen bot II final.rar
| | H-Bot M0d 3.0 M0dd3d by TH & Sculay.rar
| | happybot.v2.0b.zip
| | htmlinfectbot.rar
| | icebot.zip
| | jbot.rar
| | jrbot.rar
| | litmus.rar
| | litmus2-bot.rar
| | litmus2-config.zip
| | microbot.rar
| | NzM [MoD].rar
| | nzmlite.rar
| | Ozel - Rx - Source.rar
| | panicAttack.rar
| | phat-bot_current.rar
| | Phatbot-gh3tt0Bot.rar
| | Phatbot-stoney.rar
| | phatbot_alpha1.rar
| | phatbot_ghetto.v.0.5.rar
| | Phatbot_src-(stoney).rar
| | Phatbot_src.rar
| | Q8Bot.rar
| | r00fuzV1.1a.rar
| | rbot 0.3.3 public.rar
| | rbot vnc spread.rar
| | rbot-0.3.2-fix1-public.rar
| | rbot.priv.alpha1.by.S.rar
| | rbot032public.rar
| | rBot1-SXT.rar
| | rbotoharra.rar
| | rBot_060104_RxBot_v0.7.8.pk_Isass_VG_Pr1v8.rar
| | rBot_dimensionfix_v.4.3.rar
| | rBot_DoS_ResilienT_7252004.rar
| | rBoT_oTh3R-dImeNsIoN_4.4x.rar
| | RepMini.NETAPI.PRIV.rar
| | reptile.03.asn.pnp.netapi.rar
| | reverb.rar
| | reverse.rar
| | Rose.rar
| | Rose_2008.rar
| | rouge-bots_xdcc.rar
| | RX-120-MYSQL-V2.rar
| | rx-asn-2-re-worked v3.rar
| | rx-asn-2-re-worked_v2.rar
| | Rx-MP.rar
| | rx066pl.zip
| | rxbot 0.6.5 pk.lsass.rar
| | rxbot 0.6.5 pk.rar
| | rxBot v0.7.7 Sass.rar
| | Rxbot-ak-0.7-Modded.by.Uncanny.rar
| | rxbot-EcLiPsE1.1.priv.rar
| | rxbot-IFS1.1.priv.rar
| | RXBOT-RevengE2005pnp.rar
| | rxBot0.6.6b-priv+stable-CoKeHeAd.rar
| | rxBot0.6.6d-priv+stable-CoKeHeAd.rar
| | rxbot06.5.rar
| | rxBot0[1].6.6b.rar
| | rxbot6.6.rar
| | rxbot_0.6.5_pk.lsass.rar
| | rxBOT_Fix_0wn4g3.rar
| | rxBot_v0.7.8_iis5ssl+lsass_private.rar
| | rXSass6.6(fixed).rar
| | Rx_0.6.Dev.rar
| | Rx_Dev.rar
| | Safety-Lab.Shadow.Security.Scanner.v7.86.178.Cracked-ARN.rar
| | Scan_BL.zip
| | sd bot with fake xdcc by Synco.zip
| | sdbot-b0rg-by-okasvi.rar
| | sdbot04b.zip
| | sdbot05a.zip
| | sdbot05b-AE.zip
| | sdbot05b-ago.rar
| | SDbot05b-getadm.rar
| | sdbot05b.zip
| | sdbot_syn_secure.zip
| | SDBot_with_NB spreader.rar
| | Sec.Sim_v2.2.0.rar
| | SkuZ [VNC-AIM].rar
| | SnRxBot.rar
| | spybot1.1 full mods.zip
| | spybot1.2a full mods.zip
| | spybot1.2b_beta full mods.zip
| | spybot1.3 full mods.zip
| | spybot1.4 full mods.zip
| | spybot1.4.zip
| | spybot2nd.rar
| | st_able_rx-1[1].01b.rar
| | Urxbot 1.2 [PRIV-INTERNAL].rar
| | Urxbot Lsass2.rar
| | Urxbot-stable-DoNtTrIp.rar
| | urxbot1.1-priv.rar
| | urxbot1.2-priv.rar
| | urxbot_lsass-ftpd_modgbuilds.rar
| | w32_netapi.ra
| | wisdom-modded.rar
| | XPLoD2.0.rar
| | xtbot mod by Sisco.rar
| | xTBot.0.0.2-priver.rar
| | xtbotv2 by Sisco.rar
| | xxx.rar
| | zunker.rar
| |
| \---Sources
| Agobot3-0.2.1 Pre4 Private.zip
| AIM Spread.zip
| aIRCBot 1.0.zip
| AkBot 0.4.1.zip
| bBot 0.5 (Private).zip
| CRX RealmBot (VNC exploit and RFI).zip
| Cyberbot 2.2 - Stable.zip
| DamN Spreader X v0.1b.zip
| Darkbot.tar.gz
| Dopebot.zip
| DSNX BoT 0.4b.zip
| ForBot (RealVNC,NetAPI,MS ASN).zip
| G-SyS Final.zip
| Ghost Bot 0.60.zip
| HDbot 0.2.zip
| Hellbot 3.zip
| HHB Public.zip
| IRC Bot in VB.zip
| ISpread v1.1 - Bot Worm.zip
| Jarbot Private.zip
| KBot.zip
| Kelvir PHP.zip
| Leechbot r1.5b Private.zip
| Leechbot Version 4.zip
| mBot.zip
| Microbot.zip
| Mostrix.zip
| NEW Bot.zip
| Ninja Bot (Puplic).zip
| NITE AIM.zip
| NLX0x1FE 3.2 (Private).zip
| NuRx.zip
| NZMlite.zip
| Omega II.zip
| pBot.zip
| Phatbot-stoney.zip
| Pinger - Backdoor DDoS Tool Bot (VB Sources Included).zip
| Q8Bot.zip
| RacerX90.zip
| RegaBot.zip
| Reverb.zip
| Ruffbot 2.0.zip
| Rxbot 7.6.zip
| SBX 0x00.zip
| sdbot05b.zip
| SDX.amk.0x00.zip
| Shellbot 1.0.zip
| SiX Bot.zip
| SkuZ-Netapi-VNC-IM.zip
| Spybot 1.2c.zip
| SpyBot v1.3 modded.zip
| SpyBot v1.3a CryptoMeth Edition.zip
| Spybot v1.4.zip
| Stubbos Bot 1.3 BETA2.zip
| sxBot.zip
| SYM-VNC-NETAP 3.0.4 ASN.PIABOT.zip
| tGspy-NT.zip
| Txbot.zip
| Undetected Module.zip
| uNkNoWnBoT Project.zip
| UnNamed Bot 1.2 Public.zip
| Urx Special Edition Ultra.zip
| X-Bot.zip
| XDCC Bot.rar
| xFFTSx 2.0.zip
| xTBot.0.0.2 Private.zip
| Zbot pre.zip
| Zonk Bot.zip
|
+---FeliksPack3 - Bruteforce
| 1-Attack Tool kit.zip
| 1-CrackWhore2.0.zip
| Apache_Scanner.zip
| brutus.zip
| Brutus_2006_Setup.zip
| CGIScan.zip
| Crackftp.zip
| E-mail Cracker.rar
| E-mail Cracker.zip
| FTP Brute Forcer.rar
| ftpbr.zip
| ftpbrut.zip
| hackersutility.zip
| phpbb bruteforcer.rar
| PhpBB pass extractor.zip
| phpBBcracker.rar
| Pop_crack.zip
| ShadowScan.zip
| voideye.zip
| Webcrack.zip
| WebCrackv4.0.zip
| wwwh4ckv1946.zip
| wwwhack.zip
|
+---FeliksPack3 - Decrypters
| Access Driver.zip
| Brutus-AEt2.zip
| Cain and Abel 4.2.zip
| FileZilla PWDump 0.1.zip
| ForceSQL.zip
| John The Ripper 1.7.1 Win.zip
| KMd5 1.03b.zip
| LC3.zip
| MailForce2.4.zip
| MD5 (Linux).zip
| MD5 Backup (Linux).tar.gz
| MD5 GUI.zip
| MD5 Toolbox 1.0.zip
| MD5brute 1.0.zip
| Passware 5.0 + Serial.zip
| POP3 BruteForcer.zip
| Sam Decrypt.zip
| Unsecurev1.2.zip
| VNCrack (Linux) 1.21.tar
| VNCrack (Win32) 1.21.zip
|
+---FeliksPack3 - eBooks and tutorials
| All my Warez and Hacker Links.zip
| Beginners Hacking Guide.zip
| Big C++ eBook Pack.ZIP
| bluetooth-hacking.pdf
| Dangerous Google - Searching For Secrets.pdf
| Fejlesztes mobil eszkozokre.ppt
| Hackerland.zip
| Hackers handbook.zip
| HackersBlackBook.zip
| HackersGuide.zip
| Hacking into computer systems - a beginners guide.zip
| How to Crack a Game and tools.zip
| How To Crack Any Type Of CD Protection.zip
| How To Crack With Softice.zip
| Learn Web Design.rar
| Mobil rendszerek programnyelvei.doc
| Phant0m_-_Hackers'_Guide_Vol_1.rar
| Phant0m_-_Hackers'_Guide_Vol_2.rar
| teach-yourself-perl5-in-21-days.zip
| TeachyourselfCin21days.zip
| TeachyourselfCplusplusin21days.zip
| TeachYourselfJavain21Days.zip
| TeachYourselfShellProgrammingin24Hours.zip
| The Little Black Book of Computer Virus.zip
| visual_basic_6_black_book.zip
| Web publishing - professional reference edition.zip
| Webmasters.Guide.To.The.Wireless.Internet.pdf
|
+---FeliksPack3 - FelikPicks
| Proagent_2.1.9_SE.zip
| Spytector 1.3.1 Full.zip
| Undetector 1.2.zip
| xploit_1.4.5_rat.zip
|
+---FeliksPack3 - Google
| Alt-Google.rar
| DaGoogler.zip
| Extreme Searching Guide.txt
| Google Hacker 1.2.zip
| Googlek 0.7.rar
| googler.zip
| google_hacker.zip
| GooLink.rar
| GooLink.zip
| SimpleGoogle_bin.rar
| t3chn0bra1n_z_Googler.zip
|
+---FeliksPack3 - Keyloggers
| | 1-elitekeylogger.zip
| | 5-BFK (Best Free Keylogger).zip
| | 5-power spy.zip
| | Activity Keylogger v1.0.zip
| | Advanced Invisible Keylogger 1.5 Full.zip
| | Aplus.zip
| | Ardamax.Keylogger.v2.8.rar
| | ardamaxl.zip
| | Barok 1.0.zip
| | bfk.zip
| | Chota.zip
| | Computer Spy.zip
| | Curiosity.zip
| | CYBERSHOK 1.0 Private.zip
| | Demon-Ps 2.3.zip
| | DK2Full.zip
| | egf1.0b.zip
| | ehks 2.2.zip
| | ehks.zip
| | Elite Keylogger 1.0.zip
| | elitek3yl0gg3r10.zip
| | EliteKeylogger v1.0.zip
| | elitekeylogger1.0.zip
| | EliteLog_1.7.rar
| | ESK.zip
| | EyeSpy.zip
| | Fearless Key Spy 2.0.zip
| | Fearless KeySpy v2.0.zip
| | fks20.zip
| | fks_2.0.zip.zip
| | FKWP v1.5.zip
| | FSK 2.0.zip
| | GloG.rar
| | Golden eye 2005.zip
| | goldeneye2005setup.zip
| | HermanAgent.zip
| | IKlogger0.1.rar
| | IKlogger0.1.rar.zip
| | k3yl0g3r.zip
| | KeyLog 1.1.zip
| | KeyLog 2.5.zip
| | keylogerSpy2006.zip
| | Keylogger.zip
| | KGB KeySpy 2.0 Private Xmas Edition.zip
| | KGB KeySpy Full.zip
| | LogIT v1.0.rar
| | LttLogger v1.0.rar
| | LttLogger v2.0.rar
| | Metakodix Stealth Keylogger 1.1.0 Cracked.zip
| | MSGate 0.1.zip
| | PasswordLogger.zip
| | Phantom 2.zip
| | Phoenix.zip
| | Pinch 3.zip
| | Power Spy 5.5.2.zip
| | powerspy.zip
| | Project Satan 1.1.zip
| | ProjectSatan20.zip
| | Radar Spy v1.0.zip
| | Radar.zip
| | Recon v1.0.zip
| | Recon v1.2.zip
| | Recon v2.0.zip
| | RemoteLogger v1.0.zip
| | rpkeylogger-0.1.zip
| | SC keylogger V3.2 Full.zip
| | SC-KeyLog 2.zip
| | Skat's.zip
| | SKL 0.1.zip
| | SKL v0.1.zip
| | skl01.zip
| | skl0g.zip
| | SKLEditor1.0.zip
| | Spy.zip
| | Spytector 1.3.1 Full.zip
| | Tong KeyLogger.zip
| | WickeD_Keylogger 1.0.1.zip
| | YSK KeyLog.zip
| |
| \---Installables
| golden Keylog.zip
| install_akl.exe
| i_bpk2003.exe
| i_bpk_lite.exe
| keylogger-king-pro33.exe
| keylogger.exe
| kidlogger.exe
| SC keylogger V3.2 Full.zip
| sc-keylogprodemo.exe
| stealthkeylogger.exe
| Sys_Keylog.exe
|
+---FeliksPack3 - Links
| bg2.jpg
| the_feliks_links.html
|
+---FeliksPack3 - Misc
| | CeedoInstaller.exe
| | pebuilder3110a.exe
| | Resource Hacker 3.4.0.79.zip
| |
| \---PuNkToOl 1.0
| PuNkToOl 1.0.exe
|
+---FeliksPack3 - MSN
| 2-A-IMessengerPasswoRd.zip
| HotFreeze 1.6.zip
| icecold_reloaded freezer.zip
| MesDiscoveryLive_110155.zip
| MSN Messenger Account Cracker v2.0.zip
| MSN Monitor & Sniffer.zip
| msnexte3.zip
| mspass.zip
| NetPass.zip
| nudgemadness.zip
| WWH Flooder 2.0.zip
|
+---FeliksPack3 - Nukers
| b4ttl3p0ng.zip
| fortune.zip
| inf3rn0_nk.zip
| meliskah25.zip
| nuk3it.zip
| PM2.zip
| RocketV1_0.zip
| Sphinx20.zip
| Superkod.zip
| Winsmurf.zip
|
+---FeliksPack3 - Packers and Crypters
| | !Epack.zip
| | BIP.rar
| | CryptX 1.0.zip
| | DalKrypt 1.0.zip
| | EXEFog.zip
| | FakeNinja - PrivateRelase.zip
| | fEaRz Crypter v1.0.zip
| | ICrypt 1.0.rar
| | nakedpack.zip
| | nme_1.1.rar
| | UC-v1.0PUB.rar
| | UnDo_Crypter.zip
| | unkOwn Crypter 1.0.zip
| |
| \---stolen from mytools.110mb.com
| AREA 51 Cryptor.zip
| ASPack 2.12.zip
| AZProtect.zip
| Cexe (NT Only).zip
| Diet.zip
| Enigma Protector 1.16.zip
| ExE Evil v1.0.zip
| exe32pack.zip
| EXESmasher 1.0.zip
| FSG v1.33.zip
| FSG v2.0.zip
| ICrypt 1.0.zip
| IProtect.zip
| Krypton v0.3.zip
| Lzexe1.00a.zip
| Mew 11 SE v1.2.zip
| MoleBox 2.6.1.zip
| Morphine v1.5.zip
| Morphine v1.6.zip
| Morphine v1.7.zip
| Morphine v1.9.zip
| Mr. Undectetable.zip
| NeoLite v2.0.zip
| nPack 1.1.300.zip
| NsPack v3.4 Full Cracked.zip
| NT Packer.zip
| Pack 1.0.zip
| Packman 1.0.zip
| PECompact v2.64 Full.zip
| PEncrypt 4.0.zip
| PEPack 1.0.zip
| Petite 2.2.zip
| Pex 0.99.zip
| Phantom.zip
| PKLite32 1.0.zip
| Private EXE Protector 2.0.zip
| RAT Packer.zip
| RLPack 1.16 Basic Edition.zip
| RLPack 1.17 Personal Edition.zip
| Scramble Tool v0.2.2 rc1.zip
| SDC 1.2.zip
| shrnkEXE.zip
| Stud v1.0 Crypter.zip
| tElock 0.98.zip
| Underground Crypter 1.0.zip
| UPX Crypt.zip
| UPX v1.08w.zip
| UPX v1.24w.zip
| UPX v1.25w.zip
| UPX˙v2.02w.zip
| Wind Of Crypt 1.0.zip
| WinLite.zip
| WWPACK 3.05.zip
| Yoda's Crypter v1.3.zip
|
+---FeliksPack3 - Passwd crackers
| 2-Advanced archive password recovery.zip
| 3-A-PDF-PRP.ZIP
| 3-AOfficePasswordRecovery.zip
| 3-PDF Password Remover v2.2.zip
| apocalypso.zip
| hydra-4.6-src.tar.tar
| john-17w.zip
| md5_cracker.rar
| mdcrack-1.2.tar.tar
| rainbowcrack-1.2-win.zip
| Ultra Zip Password Cracker.zip
|
+---FeliksPack3 - PHP Shells
| 0x333openssh-3.6.1p2.tar.gz
| 0x333openssh-3.7.1p2.tar.gz
| 2005.rar
| 23.php Shells.rar
| 23_diffrent_shells.rar
| 55k7-SWCS.rar
| admin-ad.asp
| adore-0.39b4.tgz
| Babyface.rar
| BackDooR (fr).rar
| BDoor.rar
| bind shell.txt
| binder2.rar
| borg.asp.txt
| byshell063.rar
| byshell064.rar
| byshell067beta2&src.rar
| c100.rar
| c99last.tar.gz
| c99shell.php
| cgitelnet.tar.gz
| chkrootkit-043.tar.gz
| cmd.rar
| darkspy105_en.rar
| Defacing Tool Pro v2.5.rar
| door.rar
| down.rar
| eBayId.rar
| Eternity.rar
| evilspy.rar
| evilspy2.rar
| He4Hook215b6.zip
| hkdoor1.0.rar
| hkshell_v1.0.rar
| httpdoor.rar
| hxdef084.zip
| hxdef100.zip
| hxdef100r.zip
| HYTop2005.rar
| HYTop2006.rar
| ibf_dbbackup.sql.gz
| icmpdoor.rar
| icyfox007v1.10.rar
| ironscanner.rar
| lrk5.src.tar.gz
| MDir.vbs
| Mithril v1.40.rar
| Mithril v1.45.rar
| NetCat_New_fixed_version.rar
| nstviewshell.rar
| packetdoor_src.zip
| PHP Backdoor v1.rar
| phpdoor.rar
| phpdoor2.0.rar
| PhpShell.php
| phpspy_2005.rar
| phpspy_2006.rar
| PHP_BackDoor_v1.5.rar
| php_files_thief.rar
| PHP_Shell_v1.7.rar
| PortLessNew.zip
| r57shell.rar
| remview_2003_04_22.zip
| rknt.zip
| root.c
| safe mode bypass coded by preddy.txt
| saphpshell.rar
| scripts 2 exe.rar
| sendip15.rar
| shells.rar
| simple.p
| Simple_PHP_BackDooR.rar
| sinar0.1.tar.tar
| sk-1.3a.tar.gz
| sk-1.3b.tar.gz
| skeeve1.0.tar.tar
| SSH RFI.txt
| ssh.rar
| tcp_backdoor.c.gz
| uay_source.rar
| usr.php
| vanquish-0.2.0.zip
| VipshellSrc.rar
| W4-c99.php
| wbc-v1.tar.gz
| WebAdmin.rar
| Webadmin2X.rar
| webshell.php
| webshellv001.rar
| webshellv005.rar
| winshell50src.zip
| wx-01.tar.gz
| wx.tar.tar
| x-door[F321].rar
| xIShell_218.zip
| xssshellv039.zip
| ZXshell2.0.rar
| _root_040.zip
|
+---FeliksPack3 - PWD Stealers
| Demon PS 2.3.zip
| HermanAgent 1.0.zip
| Hosein PS 1.6.zip
| JPS 1.8.zip
| Lord PS.zip
| MSN PassSender.zip
| PassSpy 1.0.zip
| ProAgent v2.0.zip
| PSPV K-Stealth III.zip
| RePass2.1.zip
| S-H Yahoo Password Sender 1.1.zip
|
+---FeliksPack3 - R00tk1ts
| 9xRX.zip
| advanced_loader.zip
| AFX Rootkit 2005 FIX.zip
| afxrk2k4.zip
| AFXRootkit2005.zip
| Agony.zip
| Basic Rootkit.zip
| basic_loader.zip
| Boot Root.zip
| Chazv2.rar
| eeyebootroot.zip
| Eternity.rar
| FUTo Enhanced.zip
| Hacker Defender.zip
| He 4 Hook.zip
| He4Hook215b6.zip
| HideProcessHookMDL.zip
| hxdef.zip
| klister-0.4.zip
| Klog 1.0.zip
| Logoner.zip
| Morphine.zip
| NT illusion.zip
| NT Rootkit.zip
| patchfinder_w2k_2.11.zip
| rk_044.zip
| RK_SRC_040.2.zip
| SInAR-0.1.tar.gz
| SysEnterHook.zip
| vanquish-0.2.1.zip
| Vanquish.zip
| vice.zip
| w32root.zip
| Windows XP RootKit.zip
| WinEggDrop Shell Eternity Version.zip
| winkit.zip
| WinLogon Hijack 0.3-src.zip
| winlogonhijack-v0.3-src.rar
|
+---FeliksPack3 - Rapid
| Rapid.rar
|
+---FeliksPack3 - ReMade
| +---AC
| | \---ACStripper
| | ACRebuilder.exe
| | ACStripper.exe
| |
| +---AS
| | +---ASPackDie
| | | ASPackDie.exe
| | | ForceLibrary.dll
| | |
| | \---AStripper
| | Engine.sys
| | Stripper X.exe
| |
| +---DBPE
| | \---DBPE Unpacker
| | DBPE Unpacker.exe
| |
| +---FSG
| | \---UnFSG
| | FSG Dumper.exe
| | UnFSG.exe
| |
| +---MEW
| | \---UnMEW
| | UnMEW.exe
| |
| +---PE
| | +---PESpin
| | | PESpin.EXE
| | |
| | +---UnPECompact
| | | Realign.dll
| | | rebIT.dll
| | | UnPECompact 2.EXE
| | | UnPECompact.exe
| | |
| | \---unPEncrypt
| | unPEncrypt.exe
| |
| +---PEiD
| | | external.txt
| | | IDToText.Ini
| | | PEiD.exe
| | | userdb.txt
| | |
| | +---plugins
| | | AddSig.DLL
| | | ExtOverlay.dll
| | | FC.DLL
| | | FixCrc.dll
| | | GenOEP.dll
| | | IDToText.DLL
| | | ImpREC.dll
| | | kanal.dll
| | | Morphine.dll
| | | PackUPX.dll
| | | PEiDBundle.DLL
| | | pluzina1.dll
| | | pluzina2.dll
| | | pluzina3.dll
| | | pluzina4.dll
| | | RebuildPE.dll
| | | ResView.dll
| | | SecTool.dll
| | | undef.dll
| | | unfsg_v133.dll
| | | unupolyx.dll
| | | unupx.dll
| | | UnUPX5h17.dll
| | | XNResourceEditor_Plugin.DLL
| | | ypp.DLL
| | | ZDRx.dll
| | |
| | \---pluginsdk
| | defs.h
| | null.c
| | NULL.dll
| |
| +---Protection ID
| | Protection_ID.exe
| |
| +---Resource Hacker
| | Dialogs.def
| | ResHacker.cnt
| | ResHacker.exe
| | ResHacker.ini
| |
| \---Restorator2007
| Restorator2007.exe
| Restorator2007.txt
|
+---FeliksPack3 - Scanners
| 1-SuperScan 2.06.zip
| 1-SuperScan 4.zip
| 134_superscan4.zip
| 7th Sphere 1.2 Basic.zip
| Angry IP Scanner v2.08.zip
| angryipscan.zip
| aolip.zip
| AWSPS 4.61.zip
| Bitch in Threads.zip
| bitchinthreads.zip
| blue.zip
| Blues Port Scanner 5.zip
| bluesprtscn.zip
| CGI Founder v1.043.zip
| cgis4.zip
| CGISscan.zip
| Domain Scan.zip
| domainscanv1_0or.zip
| IP Grabber 3.zip
| IP Stealer Utilities.zip
| ITrace32 v2.00.zip
| lanspy.zip
| Legion NetBios Scanner v2.1.zip
| MooreR Port Scanner.rar
| NeoTrace 3.5.zip
| neotrc325.zip
| NetBIOS Name Scanner.rar
| netscantools4or.zip
| Nmap 4.01 (Win32).zip
| nmap-4.03.tar.bz2
| nts.zip
| Port Racer 2.0.zip
| Port Scanner.zip
| ProPort.zip
| Stealth - HTTP Scanner v1.0 build 23.zip
| sup3rsc4n.zip
| super.zip
| SuperScan 4.0.zip
| superscan4.zip
| TCP View.zip
| Trojan Hunter.zip
| TrojanHunter15.zip
| wasp.zip
|
+---FeliksPack3 - THE NET TOOLS 4.5!!
| NetTools4.5.74.zip
|
+---FeliksPack3 - Trojanz
| 0ptixv133.zip
| Amiboide Uploader 2.0.zip
| Amitis 1.4.3.zip
| Anal Rape 1.0.zip
| Assasin v2.0.zip
| Assasinv20.zip
| Atentator1.0.zip
| Ayo spy.zip
| Backdoor 2.02.zip
| BAD R.A.T 1.6.zip
| bandook_v135.zip
| Beast 2.07.zip
| Beast v2.07 06-08-2004.zip
| beast_206.zip
| beast_207.zip
| Bersek 1.1.zip
| Bifrost 1.2.1.zip
| bionet4-0-5.zip
| Bitfrost1.2.1.zip
| blueeye10b.zip
| BO2K 1.1.5.zip
| Bo2k.zip
| c-i-a-1-2-3.zip
| C-One.zip
| CFRATBETA.zip
| Char0n.zip
| CIA v1.23 PublicBeta 1.zip
| CIA v1.3.zip
| ColdFusion v1.2.rar
| Complete Control 2.0.zip
| cyberneticv162fix.zip
| cyberneticv162fix_rat.rar
| CyberPaky 1.8 Gold.zip
| Cyn 2.1.zip
| c_yn_21.zip
| d33Pthr04t.zip
| Destruction Designs 1.3.0.3 Beta.zip
| Digital Upload Trojan.zip
| elfRAT 1.2.zip
| Erazer Lite 0.3.zip
| Evilotus 1.3.zip
| Fearless Trojan 1.5.zip
| Flux V1.01 Pack.zip
| FuraX 1.0.zip
| furax_10b3.zip
| ggt23.rar
| Greek hackers rat v1.0.zip
| gupt2.zip
| Guptachar 2.0.zip
| Hackz.rar
| Hav-Rat1.3.0.zip
| HavRat 1.3.1.zip
| HelioS Trojan v3.1.zip
| hRat 1.0.zip
| Hue 1b.zip
| illusion.zip
| Institution2004 v0.4.zip
| InVasion 1.0.1.zip
| invasion1.1.zip
| Kryptonic Ghost 1.3.zip
| Latinus14(subseven gui).zip
| Leviathan10.zip
| Lithium v1.03.zip
| LogansSourcecode.zip
| m0sck3r.zip
| Mind Control v.5.0.zip
| mofotro 1.1.zip
| MofoTro1.7beta.zip
| n0kn0k72.zip
| n3t_d3v15.zip
| Net-Devil 1.5.zip
| NetAngel 1.0.zip
| NetBotAtt14En.zip
| NetDevil v1.5.zip
| NetShadow PublicBeta1.zip
| Nuclear RAT v1.0 PublicBeta 9.zip
| Nuclear Uploader v1.2.zip
| NuclearRatBeta9.zip
| older_trojans.zip
| Omerta13.zip
| Optix v1.33.rar
| OptixLite v0.5.zip
| OptixPro v1.32.zip
| Outbreak 0.3.0 Public Beta.rar
| Phantoms remote File Manager.zip
| PI2[1].3.0.ZIP
| PoisonIvy2.2.0.rar
| Proagent_2.1.9_SE.zip
| ProRat v1.9 FIX2.zip
| ProRat v1.9.zip
| ProRatv19.zip
| Prorat_ProCracker v1.9.exe
| ProRat_SE_Fx18.rar
| PsyRAT 1.0.zip
| RaZoR.zip
| remotedesktopspysetup4.zip
| RLPacker.rar
| S-H_Yahoo_Pass_Sender_1.1.zip
| senna spyworm generator.zip
| ShadowRAT Development Release 5.zip
| sharK v0.6.rar
| sharK_2.1_pass.shark-project.net.rar
| SilentSpy.zip
| SimpleTrojan.zip
| SkD RAT 2.0.zip
| skd2.zip
| SkDRAT2.zip
| Slh 4.0.rar
| Spirit 4.0 Beta 1.zip
| SpyOne 1.0.zip
| Sub7 2.2.zip
| sub7.zip
| sub7_21gold.zip
| Tequila Bandita v1.2F.rar
| TGA_backdoor_SP2_v2.0.zip
| th33fle_1_0.zip
| The Punisher Trojan.rar
| Theef v2.10.zip
| theef_210.zip
| Traffix_1.0_BETA_.rar
| Tranzhva 1.0.zip
| undetec33.zip
| UnDetected_3.3.rar
| Unicorn.zip
| Voice Spy.zip
| Vortex.zip
| Webcrack.zip
| wwwhack.zip
| X-BkDr 2.2.0.zip
| xHackerbasic2.1.zip
| xploit 1.4.5.zip
| xploit_1.4.5_rat.zip
| XZTOO.zip
| X_Rat_3.3.rar
| Y3K12.zip
| y3krat2k5rc10.zip
| Yet Another Trojan 1.3.zip
| You_Make_Me_Sick_Trojan.rar
| Yuri 1.2.zip
| Yuri_V12.zip
| Z-Dem0n 1.26.zip
| Zer0 Tolerance 1.9.zip
|
+---FeliksPack3 - Viruses
| | 6000_Viruses.rar
| |
| +---Binary
| | Access IV.zip
| | Agent.zip
| | Aids C.zip
| | Anthrax.zip
| | Antipascal.zip
| | BBook.zip
| | Blackjack32.zip
| | Caligula.zip
| | Civil War 2.8.zip
| | Damn!.zip
| | FoolsGold.zip
| | Groovie.zip
| | Hate97.zip
| | HD Killer.zip
| | labv14.zip
| | MDL.zip
| | NS.zip
| | Omega.zip
| | One.zip
| | OVCT.zip
| | Papaa.zip
| | Papab.zip
| | Parasite.zip
| | PSD 2000.zip
| | Shiver.zip
| | sic-vir.zip
| | Skimppy.zip
| | Smile.zip
| | Stupid.zip
| | Sugar 2.zip
| | Sugar.zip
| | Tequila.zip
| | Uruguay.zip
| | Ver1.zip
| | vir-v.zip
| | Vir61.zip
| | vircr20.zip
| | virfac.zip
| | virii-3.zip
| | vKit 1.0.zip
| | Win32.SKA.zip
| | win98vir.zip
| | WordBug.zip
| | WordSick.zip
| |
| +---Constructors
| | Access Macro Generator.zip
| | Acid Flowing Trojan Generator.zip
| | Advanced Batch Mutator.zip
| | Advanced Steam Trojan Generator 1.1.zip
| | Alchemic Life Generator.zip
| | ANSI Bomb Constructor.zip
| | Ansi Bomb Kit.zip
| | Biohazard's Worms Generator.zip
| | Biological Warefare Virus Creation Kit.zip
| | Byte Virus Generator v1.7 (DBVG).zip
| | Byte Virus Generator.zip
| | C++ Worm Generator.zip
| | CcT's Malware Construction Kit.zip
| | CM's Batch Virus Generator.zip
| | CM's Evil Tool (XP) Prank File Generator v1.0.zip
| | CVEX Virus Maker.zip
| | Dav's Media Files Worm Kit.zip
| | Dav's Virus Builder.zip
| | Deinonychus Virus Generator.zip
| | Dirty Nazi Virus Generator.zip
| | Dr.VBS Virus Maker.zip
| | Duke's Simple Virus Cloner Tool.zip
| | Easy Virus Maker.zip
| | Ejecutor Virus Creator.zip
| | Elektronny Pisatel Virusow.zip
| | Evil Tool.zip
| | EVX.zip
| | Falckon Encrypter.zip
| | G2 Phalcon Skism's.ZIP
| | Hell P2P Worm Generator (Fixed).zip
| | Instant Virus Production Kit.zip
| | JPS Virus Maker 2.0.zip
| | JPS Virus Maker.zip
| | Kids Worm Generator.zip
| | LineZer0 Macro Engine.zip
| | Looper Generator.zip
| | Macro Virus Development Kit.zip
| | Mass Destruction Library.zip
| | Mcft Visual Basic Script Worm Editor v9.0.zip
| | Mcft Visual Basic Script Worm Editor.zip
| | Mister Spock - Virusgenerator Version.zip
| | MSH Virus Kit.zip
| | Newborn Worm Generator 0.9.zip
| | Next Generation Virus Construktion Kit 0.45b.zip
| | Nowhere Utilities.zip
| | Nuke GenVirus.zip
| | Nuke Randomic Life Generator.zip
| | Pass Steal Trojan Gen.zip
| | PetiK Script Worm and Virus Generator.zip
| | Pokes WormGen 2.zip
| | Purgatory Companion Virus Kit.zip
| | Rajaat's Tiny Flexible Mutator.zip
| | Razorblade's Batch Virus Generator 1.1.zip
| | Satan's Apocalypse Virus Generator 1.0 by Z6.zip
| | Satanic Brain Virus Tool's.zip
| | SkamWerks Labs.zip
| | Special Format Generator v2.0 (BATCH Trojan Maker).zip
| | TeraBIT VirMaker 2.8.zip
| | The Czybik Gen Creation Kit 1.2.zip
| | The Fabulous Jany Batch Maker.zip
| | The Shinny Batch Trojan Generator 1.0b.zip
| | The Simple WinScript Virus Kit.zip
| | The Super Appending Batch VCK.zip
| | The Virus Wizard.zip
| | The WalruS Macro Virus Engine 1.21.zip
| | The WalruS Macro Virus Generator 1.0.zip
| | Time Bomb Generator.zip
| | Trojan Horse Construction Kit 2.0.zip
| | TSR Time Bomb Creator.zip
| | Uber Worm Generator (UWG).zip
| | Uber Worm Generator.zip
| | VBS Worms Generator 2.zip
| | VC.zip
| | Viral Matrix (VMG1.0).zip
| | Viral Matrix 1.0.zip
| | Virus Creation Laboratory.zip
| | Virus Researcher's Toolkit.zip
| | Win Script Virus Kit.zip
| | Windows Scripting Host Worm Constructor v1.0.zip
| | Windows Virus Creation Kit.ZIP
| | Worm Irc Script Kit.zip
| | XVGL 0.02b.zip
| | Zed's Word Macro Virus Constructor.zip
| |
| \---Sources
| VIRS-19.ZIP
| VIRS-AD.ZIP
| VIRS-EH.ZIP
| VIRS-IL.ZIP
| VIRS-MP.ZIP
| VIRS-QU.ZIP
| VIRS-VZ.ZIP
|
+---FeliksPack3 - Vista
| +---OEM BIOS Emulation Toolkit
| | | DIFxAPI.dll
| | | OEMTool.exe
| | | pkeys.txt
| | | readme.txt
| | | royal.inf
| | | royal.sys
| | |
| | \---CERTS
| | Acer.xrm-ms
| | ASUS.xrm-ms
| | Hewlett-Packard.xrm-ms
| | Lenovo.xrm-ms
| |
| +---Vista Activation Crack
| | pkeyconfig.xrm-ms
| | tokens.dat
| | Vista Activation Crack.txt
| |
| +---Vista Activator
| | | Install.exe
| | | TimerStop64.sys
| | |
| | \---Old
| | TimerStop.sys
| | Vista Test Crack.exe
| |
| +---Vista Activator 2007
| | Vista Activator 2007.exe
| |
| +---Vista Automated Activation Crack v3.0
| | KEYs.txt
| | Vista Automated Activation Crack v3.0.exe
| |
| +---Vista Final Crack
| | | Vista Final Crack.txt
| | |
| | \---Windows
| | +---ServiceProfiles
| | | \---NetworkService
| | | \---AppData
| | | \---Roaming
| | | \---Mcft
| | | \---SoftwareLicensing
| | | tokens.dat
| | |
| | \---System32
| | \---Licensing
| | \---pkeyconfig
| | pkeyconfig.xrm-ms
| |
| +---VISTA KEYS
| | VISTA KEYS.txt
| |
| +---Vista Loader
| | Vista Loader.exe
| |
| +---Windows Vista Activation 1.3
| | Windows.Vista.Activation.Installer.1.3.exe
| |
| +---Windows Vista Activator
| | Windows Vista Activator.exe
| | Windows Vista KEY.txt
| |
| +---Windows Vista Activator 2
| | Windows Vista Activator 2.EXE
| |
| +---Windows Vista StopTime Crack
| | 1.bat
| | 2.bat
| | check.bat
| | Readme.txt
| | Windows Vista Crack.exe
| |
| +---x64 x32 Fix
| | \---Windows
| | +---ServiceProfiles
| | | \---NetworkService
| | | \---AppData
| | | \---Roaming
| | | \---Mcft
| | | \---SoftwareLicensing
| | | tokens.dat
| | |
| | \---System32
| | \---Licensing
| | \---pkeyconfig
| | pkeyconfig.xrm-ms
| |
| \---XP
| | Key Finder.exe
| | OS Update Hack.exe
| | Random Serial Numbers.exe
| | RemoveWGA.exe
| | Reset.exe
| | Server 2003.exe
| | TweakNT.exe
| | WGA Fix.exe
| | Win 4 iN 1.exe
| | Win 95-2000.exe
| | Win XP Activator.exe
| | Windows 2003 & XP Anti Product Activation Crack 1.1.exe
| | Windows Xp Genuiner.exe
| | Windows XP KeyGen.exe
| | Windows XP Product ID Changer.exe
| | Windows XP-NET-2003 Product Key Changer.exe
| | WinXP Activation 1.1.exe
| | WinXP Corp. Key Changer 2.exe
| | WinXP_Validate_keys.exe
| | Xp Genuiner.reg
| | XP Password Manager.exe
| | XPPID.exe
| | xpy.exe
| |
| +---Windows Admin Password Hack
| | README.txt
| | Windows Admin Password Hack.iso
| |
| \---Windows Update Fix
| Corp Windows Update Fix.reg
| regupdate.vbe
|
+---FeliksPack3 - Vulnerabilty
| 950_sploit.rar
| CGI Founder.zip
| Cgi Scanner 4.zip
| LanSpy.zip
| Libwhisker 2.3.zip
| Nikto.zip
| NStealth HTTP Security Scanner 5.8 Free.zip
| Retina - For Windows NT.zip
| Shadow Security Scanner 7.84.zip
| THC-Amap Version 5.2.zip
| VoidEYE CGI Scanner.zip
| Vulnerabilityes Scanners & Exploiters Pack v1.10.zip
| vulnerabilty.rar
| Web Check.zip
|
+---FeliksPack3 - WebDownloaders
| Aphex Web DL 0.5 Lite.zip
| Atmaca Downloader 2.0.zip
| Blackcobra Downloader.zip
| Blind Downloader 1.1.zip
| BlxDl'er v2.zip
| BugsPrey 0.13.zip
| Cacheton Webdl 1.0.zip
| Code Injection Downloader.zip
| Cryptic Downloader.zip
| crypticdlr.zip
| D-WEB 1.0.zip
| D3S WebDownloader v1.0c.zip
| Downloader DARK.zip
| dwc.zip
| DWTC.zip
| Dyn-dl.zip
| Dyn-Dv1.zip
| Dynamic Downloader 1.0.zip
| Fearless Downloader.zip
| Fearless Web Downloader 1.2.zip
| Fearless Web Downloader 2.0.zip
| fedownloader_20.zip
| Follow the Reaper Downloader.zip
| ftrdl.zip
| FWB Web Downloader 1.0.zip
| fwebd10.zip
| Ghost Radmin 2.1.zip
| GIN! Downloader.zip
| GodWill.zip
| Hookbyter Final.zip
| hookbyter.zip
| ItalianFWB Downloader.zip
| KAOS WebDL v1.0.zip
| KaoTan 2.zip
| Lan Stealth Downloader.zip
| Mafia Downloader v1.0.zip
| Mind Controller.zip
| Noesis 1.1 Tiny.zip
| Passive Terror 1.3.zip
| Passive Terror v1.3 Final Edition.zip
| PRV-Downloader.zip
| pURE 0.9b.zip
| Sandesa 1.1.zip
| SelfSoft Downloader 2.0.zip
| Silent Assasin V2.0 Beta.zip
| silentassasinv20beta.zip
| SIS-Downloader v1.1.zip
| skddownloader.zip
| Smoke Downloader v1.1.zip
| SMW 1.4.3.zip
| Toxic Webdl 1.1.zip
| toxic11.zip
| TROLL Downloader 1.0.zip
| troll.zip
| U.R.B Downloader.zip
| Veritas Downloader v1.0.zip
| Wormito (Beta).zip
| YAW (Yet Another Webdownloader) v.0.1.zip
|
+---FeliksPack3 - Wireless
| | abappwd.zip
| | aerosol.zip
| | AIO Wireless Hack Toolz.exe
| | aircrack-ng-0.5.tar.gz
| | aircrack.zip
| | aircrackng.zip
| | aircrackpack.zip
| | aire.zip
| | airsnort.zip
| | aptools.zip
| | asleap.zip
| | cowpatty.zip
| | EasyWifiRadar.zip
| | Hotspotter-0.4.tar.gz
| | kismet-2005-08-R1.tar.tar
| | kismet-2006-04-R1.tar.gz
| | netstumbler.zip
| | Wellenreiter-v1.9.tar.gz
| | weplab.zip
| | wepwedgie-alpha-0.1.0.tar.gz
| | wireshark-setup-0.99.5.zip
| |
| +---Client evaluation tools
| | hotspotter-0.4.tar.gz
| | karma-0.4.tar.gz
| | rogue_squadron-0.1.bin
| | tool-probemapper0.5-tar.bz2
| |
| +---Misc
| | Admin-guid.pdf
| | advanced-guide.pdf
| | AIO.Wireless.Hack.Toolz.txt
| | AIO.Wireless.Hack.Toolz_1.txt
| | airpwn-0.50c.tar.gz
| | airsnarf-0.2.tar.gz
| | airsnort-0.2.7e.tar.gz
| | ap-utils-1.5.tar.bz2
| | aphopper-0.3.tar.gz
| | applewepkey.txt
| | aptools-unix-gtk-0.1.0.tar.gz
| | Bash-Beginners-Guide.pdf
| | gpsd-2.31.tar.gz
| | gpsdrive-2.10pre2.tar.gz
| | Hotspotter-0.4.tar.gz
| | kismet-2005-08-R1.tar.tar
| | macfld.txt
| | netstumblerinstaller_0_4_0.tar.rar
| | ori.11b.we14-2.mos
| | Wellenreiter-v1.9.tar.gz
| | WEPCrack-0.1.0.tar.gz
| | wepwedgie-alpha-0.1.0.tar.gz
| | wifi2eth.txt
| |
| +---RF signal strength monitoring
| | wavemon-current.tar.gz
| | wpm-0.00.tgz
| | wscan1.00.tar.gz
| | wscan_1.0_arm.ipk
| | xnetworkstrength-0.4.2.tar.gz
| |
| +---Wireless custom frame generation
| | airjack-v0.6.6b-alpha.tar.bz2
| | airjack26-0.1a.tar.bz2
| | chopchop-0.1.zip
| | fakeap-0.3.2.tar.gz
| | fata_jack.txt
| | file2air-0.1.tar.bz2
| | libradiate-beta-0.02.tar.gz
| | libwlan-0.1.tar.gz
| | omerta_source.txt
| | void11-0.2.0.tar.bz2
| | wifitap.tgz
| | wnet.tgz
| |
| +---Wireless Network Discovery, Mapping and Traffic Analysis
| | airfart-v0.2.1.tar.gz
| | airtraf-1.1.tar.gz
| | aphunter.tgz
| | apradar-0.52.tar.gz
| | bsd-airtools-v0.2.tgz
| | ClassicStumbler.img.sit.hqx
| | gtkskan-0.2.tgz
| | istumbler-96.tgz
| | KisMACR65.zip
| | kismet-2005-08-R1.tar.gz
| | Mognet-1.16.tar.gz
| | monitoring-2_6-2.diff.bz2
| | perlskan-0.1.tar.gz
| | prismdump_20001122.tgz
| | prismstumbler-0.7.3.tar.bz2
| | ssidsniff-0.42.tar.gz
| | wardrive-2.3.tar.gz
| | wavestumbler-1.2.0.tar.gz
| | Wellenreiter-v1.9.tar.gz
| | wi-find-0.2.1.tar.bz2
| | WifiScanner-1.0.2.tar.gz
| | wispy-tools-2006-01-R1.tar.gz
| | wistumbler-current.tar.gz
| | wlan-scan-0.0.1.tgz
| |
| +---Wireless-specific encryption cracking
| | aircrack-2.41.tgz
| | airsnort-0.2.7e.tar.gz
| | asleap-1.4.tgz
| | attacker.tgz
| | bsd-airtools-v0.2.tgz
| | cowpatty-2.0.tgz
| | leap.tgz
| | LucentRegCrypto-0.3.zip
| | thc-leapcracker-0.1.tar.gz
| | WepAttack-0.1.3.tar.gz
| | WEPCrack-0.1.0.tar.gz
| | WepDecrypt-0.7.tar.gz
| | weplab-0.1.5.tar.gz
| | wepwedgie-alpha-0.1.0.tar.gz
| | wep_tools.tgz
| | wnet.tgz
| |
| \---www.wardrive.net
| aerosol-0.65.zip
| airbase-stable.tar.gz
| aircrack-ng-0.9-win.zip
| aircrack-ng-0.9.tar.gz
| airfart-v0.2.1.tar.gz
| airjack-v0.6.6b-alpha.tar.bz2
| airsnarf-0.2.tar.gz
| airsnarf.ppt
| airtraf-1.1.tar.gz
| aphopper-0.3.tar.gz
| apradar-0.52-1.i586.rpm
| asleap-1.4.tgz
| Hitchhiker0.4b1.msi.zip
| hotspotdk.zip
| hotspotter-0.4.tar.gz
| istumbler-98.tgz
| kismet-2007-01-R1b.tar.gz
| MiniStumblerInstaller_0_4_0.exe
| Mognet-1.16.tar.gz
| NetStumblerInstaller_0_4_0.exe
| PacketyzerSetup_5_0_0.exe
| pong_v1.1.zip
| prismstumbler-0.7.3.tar.bz2
| rogue_squadron-0.1.tar
| ss2004-5.325.zip
\-----------------

password:made_by_feliks


Download Part 1

Download Part 2

Download Part 3

Download Part 4

Download Part 5

Download Part 6

Download Part 7

Download Part 8

Download Part 9

Download Part 10

Download Part 11

Download Part 12

Download Part 13

Download Part 14


--A Black Hack: Post