[Download Hash Verifier] Quickly Verify Integrity (MD5/SHA256 Hash) of...
Download Hash Verifier is the FREE tool to verify the integrity of your downloaded file.It makes file hash verification easier and quicker with its smart features such as 'Auto Hash Detection', 'Drag...
View Article[SPS] Simple Packet Sender
A Linux packet crafting tool. Supports IPv4, IPv6 including extension headers, and tunneling IPv6 over IPv4. Written in C on Linux with GUI built using GTK+ and released under GPLv3. Does not require...
View Article[MailPasswordDecryptor v4.0] All-in-one eMail Password Recovery Software
Mail Password Decryptor is the FREE software to instantly recover Mail Account passwords from popular email clients and other desktop applications.You can recover your lost password for email accounts...
View Article[Windbgshark] Windbg extension for VM traffic manipulation and analysis
This project includes an extension for the windbg debugger as well as a driver code, which allow you to manipulate the virtual machine network traffic and to integrate the wireshark protocol analyzer...
View Article[Games Key Decryptor] Tool to Recover License/CD Keys of Popular Games
Games Key Decryptor is the Free all-ine-one Tool to instantly recover License Keys of popular Gaming Softwares. It automatically detects and recovers the license/CD key of all the supported Games...
View Article[ExifTool] Read, Writing Meta Information Tools
ExifTool is a platform-independent Perl library plus a command-line application for reading, writing and editing meta information in a wide variety of files.ExifTool supports many different metadata...
View Article[XSS Shell] XSS Backdoor and Zombie Manager
XSS Shell is powerful a XSS backdoor and zombie manager. This concept first presented by “XSS-Proxy – http://xss-proxy.sourceforge.net/”. Normally in XSS attacks attacker has one shot, in XSS Shell you...
View ArticleListado de Herramientas Forenses
ADQUISICIÓN Y ANÁLISIS DE LA MEMORIA Set de utilidades que permite la adquisición de la memoria ram para posteriormente hacer un análisis con ella.pd Proccess Dumper - Convierte un proceso de la...
View Article[Lazy-Kali] Bash Script for Kali Linux
A bash script for when you feel lazy. Adds quite a few tools to Kali Linux. Bleeding Edge Repos AngryIP Scanner Terminator Xchat Unicornscan Nautilus Open Terminal Simple-Ducky Subterfuge Ghost-Phisher...
View Article[EtherApe] A graphical network monitor
EtherApe is a graphical network monitor for Unix modeled after etherman. Featuring link layer, IP and TCP modes, it displays network activity graphically. Hosts and links change in size with traffic....
View Article[PACK] Password Analysis & Cracking Kit
PACK (Password Analysis and Cracking Toolkit) is a collection of utilities developed to aid in analysis of password lists in order to enhance password cracking through pattern detection of masks,...
View Article[Lynis 1.4.0] Security and System Auditing Tool to Harden Linux Systems
Lynis is an auditing tool for Unix/Linux. It performs a security scan and determines the hardening state of the machine. Any detected security issues will be provided in the form of a suggestion or...
View Article[TYFYP] Massive Telnet Password Tester
Commercial name: TYFYP (Thank you for your password), to the honor of ADTRAN telnet banner motd welcome message.Please use it ONLY in LAN IPs. This is a very rudimentary program only for investigation...
View Article[OpenSSH 6.5] FREE version of the SSH Connectivity Tools
OpenSSH is a FREE version of the SSH connectivity tools that technical users of the Internet rely on. Users of telnet, rlogin, and ftp may not realize that their password is transmitted across the...
View ArticleExploit Linux 3.4+ Arbitrary write with CONFIG_X86_X32
CVE: 2014-0038Author: saeloPublished: 2014-02-02/* * Local root exploit for CVE-2014-0038. * * https://raw.github.com/saelo/cve-2014-0038/master/timeoutpwn.c * * Bug: The X86_X32 recvmmsg syscall does...
View ArticleExploit Linux 3.4+ Local Root (CONFIG_X86_X32=y)
OSVDB-ID: 2014-0038Author: rebelPublished: 2014-02-02/**=*=*=*=*=*=*=*=*=*=*=*=*=*=*=*=*=*=*=*=*=*=*=*=*=*=*=*=*=*=*recvmmsg.c - linux 3.4+ local root (CONFIG_X86_X32=y)CVE-2014-0038 / x32 ABI with...
View ArticleCollection Of Free Computer Forensic Tools
.myTable { background-color:#eee;border-collapse:collapse; } .myTable th { background-color:#000;color:white;} .myTable td, .myTable th { padding:5px;border:1px solid #000; } Disk tools and data...
View Article[FBHT v2.0] Facebook Hacking Tool
FBHT (Facebook Hacking Tool) is an open-source tool written in Python that exploits multiple vulnerabilities on the Facebook platformThe tool provides:Tests account handling (Create, Delete, Friend,...
View Article[Sub7 v0.5] Remote Administration Tool
This is the Newest Sub7 Remote Administration Tool..The Official Releases can only be found @ www.sub-7.orgSubmitted by Diabl0Password:www.sub-7.orgDownload Sub7 v0.5
View Article[WormTrack] Detection of scanning worms, and machine scans
A Network IDS which allows detection of scanning worms on a Local Area Network by monitoring of anomalous ARP traffic. This allows detection of scanning threats on the network, without having a...
View Article