Knowing Hacker Tool Sets Hacking Toolbox Backdoor: Intrude computer and control the computer with client

program. Crack tool: Crack passwords of systems or applications, crack the serial numbers. Disassembler: Disassemble the program with it. If you have a executable file, you can look the source code of this file with it. DoS tool: Make computer stop to respond to any request with these tools, so other people can not access the computer. Document: Documents about hacker, cracker, etc. E-mail tool: Destroy the computer system using these tools, the tools are all related to email. It includes several tools about e-mail, for example, email bomber, tool to find someone’s email address, etc. Editor: Edit or modify your program with them. Encryption & decryption tool: Encrypt files of almost any type using many strong cryptography algorithms. Executable file tool: Manipulate executable files with these tools, bind some executable files, split one executable file, etc. So, for example, you can add one executable file to another one. ICQ tool: Destroy the computer system using these tools, the tools are all related to ICQ. All programs in it work with ICQ. With the tools, you can do many things, for example, recovering ICQ’s password, sharing your files, and encrypting your ICQ messages, and so on. Keylogger: Record keystrokes when the program is running, so you can get some useful information, for example, password. MISC: Examine source code for security holes, hack games, and other interesting tools for both linux and windows. Packet forging: Modify the data packet on network at will. Phreak tool: Test the paging transmitters and systems, and so on, it includes box and wardialier. Scanner: Acquire the system information, for example, open ports, OS, and so on. Sniffer: Intercept and capture the data on the network. Snoop tool: Show information of your system. For example, it can show IP address of your computer, or it can show SCSI and ATAPI devices in your system, and so on. Source code: Source code of many tools. Spoof: Bypass an HTTP proxy, keep your connection active, creates fake credit card numbers, ip spoof, etc. Virus: Source code of virus and executable virus. Backdoor 1. 2. 3. 4. 5. 6. Back Orifice: Tools about back orifice. Backdoor kit: Collection of many backdoor program. Backdoor source: Source of backdoor program. Minigift: Another backdoor program. Net spy: Allow you to gain control of another computer using the internet. Trojan: Control other people’s computer.

Crack tool 1. AMI Crack: Crack the Ami BIOS.

11. 22. Hades cracker: Crack the password. 48. 47. 33. Windows crack: Crack password on windows. 28. Advanced ZIP Password Recovery: Crack the password of zip. 35. Linux crack: Crack password on linux. Password dictionaries: Used by cracker to crack the password.01: Recover passwords for Windows NT. 44. Advanced NT Security Explorer: An application for Windows NT/2000/XP system administrators for finding holes in system security. John The Ripper: Crack unix password. Ami BIOS cracker: Crack password of ami BIOS. Advanced Archive Password Recovery: Crack the password of archive. Quicken Password Recovery Key: Recover password.00: Crack the password of CMOS. 3. MailPassword: Recover lost password of e-mail. Adv Office 2000 Password Recovery (std): Crack the password. 12. 17. Kill CMOS ver 1. SERIALS 2000: Crack the register code. 27. 25. 14. 39. 8. 45. AMI Decoder: Crack the password of ami BIOS. THC-PrintDates: Crack password using date. 9. 16.1: The password testing tool for the Palm Computing Platform. 41. MakePwl: Create the PWL files. 49. Word List: Word dictionary. Advanced Outlook Express Password Recovery: Crack the outlook express password. CryptoExplorer for Borland Paradox: Recover Borland Paradox passwords. 13. 30. PwlTools: Recover login password. 29. Windows password crackers: Crack password on windows. Register: Register the software.6: Crack password of BIOS. 23. Password Recovery Tools: Recover some passwords. BIOS / CMOS tools: Crack the password of BIOS and CMOS. Advanced Excel 2000 Password Recovery: A program to recover lost or forgotten passwords to files/documents created in Microsoft Excel. Lilo crack: Crack password of lilo. 37. 31. Adv Office 2000 Password Recovery (pro): Crack the password. 26. 7. 34. FBRUTE: Crack unix password. 6. Advanced PDF Password Recovery Pro: Crack the PDF password. NtPassword: Find holes in system security. 18. THC-CUPASS: Crack password of user on a WindowsNT/W2K server. Serial number: Used by cracker to crack s/n. 43. WordPerfect Password Recovery Key: Recover passwords for WordPerfect document . 10. Dictionary Maker: Makes dictionary files for password crackers. PWLCRACK: Crack the PWL files. PalmCrack 1. Advanced Word 2000 Password Recovery: Crack the password of word 2000. PGP Crack: Crack the PGP. 36. 46. 19. MS Access Password Detection: Crack password of MS Access. 4. 40. 32. Passware Kit: Recover the password.2. 24. L0phtCrack 2. 51. RemPass Ver 2. 50. 21. 15. Dictionary: Used by cracker to crack the password. Mac crack: Crack password on Mac. Lotus Word Pro Password Recovery Key: Recover Lotus Word Pro Password. Lotus 1-2-3 Password Recovery Key: 1-2-3 Key is a program to recover passwords for Lotus 1-2-3 documents. 42. 38. AW: Crack the password of BIOS. 20. ARJ Cracker: Cracks password protected ARJ Files. Unix password crackers: Crack passwords for unix. 5.

Document about phreaking: Introduce knowledge about phreaking. 7. 4. 11. 3. 16. 2. 2. 4. 15. 2. 55. Articles about programming: Introduce some knowledge about programming. 14. Books about linux: Introduce information about linux. 3. Aticles about hack: Narrate some knowledge about hack. Anima: Bomb some others’ computers with this tool(e-mail bomber). DoS tool 1. Disassembler 1. ZIP Cracker: Cracks ZIP Files that are password protected. Article about hack: Introduce some knowledge about hack. Articles about DoS: Describe what is DoS attack. 5. Article about hacker: Tell you how to become a hacker. The Trojans Removal Database: Describe a lot of Trojan programs. Windows Disassembler: Disassembe Windows executables and dynamic link libraries. Articles about crack: Teach you how to crack. iMesh Password Recovery: Recover a password installed in the iMesh client. Other documents: Introduce you some information. E-mail bomber kit: Bomb some e-mail box with these tools. 4. 3. 5. 6. E-mail tool 1. Euthanasia: Bomb other’s e-mail address with this tool. 12. windows95/98 patch: Patch you system in order to avoid attack by hackers. Document about pbx: Introduce some pbx knowledge. 4. IGMP Nuker: Bomb other’s computer with this popular tool. 8. Books about hacking: Narrate some knowledge about hacking. Wzippwd: Creates valid serial number for Winzip. Document 1. 53. 3. Windows DoS kit: Attack computer systems with this useful tools. Books about programming: Introduce some knowledge about programming. 52. 9. .files. Books about network: Tell you knowledge about network. variation tool: Prepare the word list used by cracker to crack password. 5. DoDi’s Visual Basic Tools: DoDi is a VB kit. 13. ASMGEN: A program to generate cross-referenced assembly language code from any executable file. Bubble Chamber: Disassemble executable files. 5. 10. 2. Anonymous emailer: Send e-mail without being recognized. 54. Document about jargon: Tell you some about jargon. PROVIEW: Analyze and view system. Phrack Documents: Discuss some questions about phrack. pagebomb: Bomb windows pager with this tool. Black: Bomb someone’s computer with it. Bomber: Bomb someone’s e-mail box with it.

virtual or dynamic linking. 6. or binary format. 11. PGPfreeware: Protect your email form unauthorized view. 5. 6. insert. Executable file tool 1. 14. Editor 1. Apocalypso: Crypto tool from HNC. 8. 3. Hex Workshop: Edit. Haktek: Use this program to attack your victim or protect yourself from being hacked. Web Mail Agent: Find any e-mail address in the internet. 2. 4. Stealth Mailer: Send bombs to other people with this tool. 5. WinSafe: Encrypt your files with some powerful algorithms. HEXCALIBUR: Examining. 10. NetMangler: Encrypt your emails and protect yourself with NetMangler. copy.6. of any EXE/BAT type. 9. Hexedit: Edit your raw files. 7. 2. HEXpert for Windows: Edit windows multi-format binary files. 8. 12. WebPassword: Protect your web pages with password. Topo: Scan all sections in order to find large ‘usable’ areas. . Quick Fyre: QuickFyre is an anonymous emailer mail bomber. 5. Mail Bomb: Bomb your victim by this e-mail bomber. HTML Encrypt: Encrypt your HTML/Script program. Cryptonite Pro: Uses a superfast 64 bit encryption algorithm on Windows 95/98/Me. Unabomb: Send people email bombs. Hiew: Dump NE-executable file and dump LE/LX-executable file. Encryption tools: Collecting a huge munber of encryption and decryption tools. 13. WinSplit: Split and join files with this tool. Multi Binder: Bind an unlimited number of files. Macintosh Encryption: Include various Macintosh encryption tools. modify or otherwise manipulate disk files in their raw. Bound File Detector & Remover: Detect bound file with this tool. 7. cut. Extreme mailer: Bomb some victim’s e-mail address with it. Newjoiner: Avoid av detection. inPEct: Bind 2 executables in one. Encryption & decryption tool 1. 2. Exe file tool: Manage the exe files with these tools. and paste hex to your files. 3. delete. PEBundle: Allow for DLLs or other files to be ??bundled?? with an executable file. 7. Support Files: Add the necessary files that script hack wizard uses to run. 12. 4. 8. 13. 7. EasyFP: Performs file encryption to protect your files and folders from being read by others. PC-Encrypt: Compress and encrypt almost any type of file. 9. 6. 9. 4. Fusion: Enable static. with sophisticated version control when using dynamic linking. KaBoom!: Bomb other’s e-mail box. 3. Encryptonite: Encrypt and decrypt text file with it easily. News Mail Agent: Find any e-mail address in news groups. 11. Script Hack Wizard: Allow you to hack or modify many language scripts with ease. 10. Encryption: Encrypt your system information by four tools.

Keylog5 and Keylog25. 6. Slog: Provide you with a log of what you have typed on your own computer for later review. SecureICQ: Allow you to encrypt messages you send and to decrypt encrypted messages you receive. Playback!: Record the complete task and then play it back with one keystroke. 10. Send It Agent: Send very large data in no time to the ICQ users. 5. 7. Keylog: Include keylog tools such as Keylogwn. Misc: Include many misc of source codes and tools that can do such job as hijacking. inPEct source code: Bind 2 executables in one. Advanced ICQ Password Recovery: Recover passwords to ICQ accounts. 11. 14.DAT) files. 5. Phantom2: Record and playback a keystroke program for MS-DOS. 2. 5. Game Hack: Having Game Wizard 32 and CrackAid. Keylog95. two tools. MISC 1. PC Acme: Monitor activity on PC and saves all information in the LOG files. 3. ICQ Document: There are two documents about ICQ. KeyTrap: Log keyboard key effectively!. 7. SILC. or interception. Hooker: Make intelligent trojan keylogger module. ICQ kit: Attack your victim with these tools. 4.10. PGP-ICQ: Encrypt your ICQ messages. Aquila: Recover your passwords with it. 12. Source code about ICQ: Snoop ICQ traffic for a set host. KeySpy: Spy program as a keyboard logger and a PC remote controller. IKS12d-m. and Skin5 Demo. HeadStrong WebClicker: Use public proxies to create artificial banner ad clicks. 2. Quick Socket: Allow you administrator to chat (via keyboard) directly to a remote user also running Quick Socket. 11. Keylogger 1. 9. ICQ MachineGun: Attack victim computer by ICQ. Skin98as. SKInNT: Monitoring program developed for Windows NT and Windows 2000. Skint5. 3. 3. 16. 15. 13. . 6. KeyGhost: Record keystrokes with tiny module that clips on to PC keyboard cable. HookThis: Set a systemwide keyboard-hook. Linux_misc: Collect many Linux misc tools with some source files as TCFS. ICQr Information: Read and reveal personal information stored in Mirabilis ICQ Database (. FreeVSD. Invisible KeyLogger Stealth: Monitor computer activity to steal key information invisibly. Shutdown 2000: Disturb running application program. 2. 8. 4. 10. PC Acme Pro: Monitor software on PC and saves all information in the LOG files. 8. ICQ tool 1. ICQ File Share: Share your files over the internet with your online friends. monitoring. Keycopy: Keep a record of any keyboard activity on your computer. St Jude. 9. 4. etc. DDNSF. 6. G2kBIOSspoof: Spoof BIOS password for gateway pc’s simply. Skin: Monitors kit of Skin5pro.

looking for some kind of tone with it. ToneLoc: Dials numbers. 8. Grim Scanner: Search for dial tones and carriers in the same call. 17. PhoneTag: Check for starttime every second while it’s running. Pageit: Page a billion different pagers and put in one number. Packet_Forging: Include 21 files that are all used to create and send arbitrary packets on ethernet networks. 7. or Page ONE pager and put in a billion numbers!. . 6. especially Wat. Dumy. 2. Packet_tool: Having other five packing tools as tcpkill. No Carrier: Scan with Dos shell. 7th Dimension Port Scanner: Scan your port address more easily. CHaoS DeViCe: Call random pagers. 2. CATCALL: Deal out a sentence from mildly annoying to downright galling. Boxtone: Create phone tones. Tone Loc Utilities: It is also a wardialer. graphics and more!. Pksnd102: Packing 16 files as Winpkt. puts in a phone number. 10. 9. LibnetNT. 18. 12. Outlook Header Exp. etc. AB Complete Ping: Allow you to ping one or more IP addresses. 6. Super Dial: Call all of your town (or cities) phone numbers. Auto Dial: Help you to use a war dialer easily. Stealth Proxy. Phreak box: Construct and use phreak box. Ap2. 5. 1200 or 2400 bits/second.7. Ndis3pkt. among which are packed or executable files and source files of packet driver programs. Snot: Use snort rules files as its source of packet information. Windows_misc: Contain all kinds of Windows misc tools. Phreak tool 1. Dialing Demon: Wardialer. POCSAG Decoder: Allow the off-air decoding of POCSAG paging signals at 512. 5. TELNET and FINGER deamons running on any TCP host machine. Raw IP Packet Capture/Creation Utility: Allow you free reign to directly forge the packet in any way you so desire. WebClicker2. Dave’s Port Sniffer: Detect FTP. hangs up. 3. Netcat: Reading and writing data utility across network connections using TCP or UDP protocol. 11. 2. 4. POP. 7. 4. 4. Dump. Scanner 1. 3. 16. arpinject in the kit. Packet forging 1. also called drugs for Windows. Winject: Inject packet for Windows 9x. Blue Dial: Make it easy to create and use different frequency settings for dialing. Angry IP Scanner: Scan IP very easily and rapidly!. 14. HTTP. The Little Operator: It is another wardialer. 3. CPhreak: It is the first fone phreaking utility. and goes all over again. Pktsend.0. msmh.74. 13. SMTP. to scan a network for shared resources and to scan a computer for open ports. 15. THC-SCAN: Scan phone-number areas with your modem. packetx1. Dis_pkt9 in it.

Netmon: Monitor network connections. 13. 5. LittleBrother: Allow supervisors to accurately manage and measure internet and network resource usage. Ethereal0814: Free network protocol analyzer’s another version. 8. 16. THC-HappyBrowser: Check an NT-Server/Webserver for known vulnerabilities. 23. 26. and Yahoo Messenger. giving you the power to stop viruses dead in their tracks!. and Generator Packet program. XSharez scanner: Scan. Windows_Trojan_Scanner: Collect 6 little tools scanning whole networks to find well known Trojans. 15. 25. Linux_sniff_source: Contain 18 sniffer tools on Linux and some source files. NetBIOS Security Kit(unix): Perform various security checks on remote servers running NetBIOS file sharing services. PacketX: Integrate winpcap packet capture functionality with VB or any other programming environment supporting Microsoft ActiveX technology. 18. AIM. 4. Phenoelit’s own security sniffer: Open a network interface for all packets and not only . Nmap: Explore or security audit network on Linux or Unix. 21. SecureScan NX: Scan your distributed network architecture for vulnerabilities from one central location. 12. Port_Scanner: Collet 20 tools to use in port sacanner on Linux or Unix!. 3. and more. 17. Ethereal0817: Analyze network protocol. DeadBolt: Monitor holes in Windows and alert you when it detects suspicious activity. search and get specific resources for you. 10.5. Ethereal0820: Analyze network protocol freely for Win32. vmb scanning. NetBIOS Security Kit(windows): Perform various security checks on remote servers running NetBIOS file sharing services. SkPortScan ActiveX Control: Integrate port-scanning capabilities into your applications with this ActiveX control. another version of Ethereal. MacAnalysis: Audit suite for your Macintosh to perform and help implement a security standard for your computer/network by performing some work. 7. the latest release of Libpcap. 24. 10. Colasoft Application Protocol Sniffer & Analyzer: It is a TCP/IP Network Sniffer & Analyzer program based on Windows system. WhereIsIP: Find the geographic location of chat room members. Scanner: Collect 84 tools and misc to scan. 6. 7. 11. NetProb32 Network Analyzer: Analyze. Monitor Traffic. Sniffer 1. Linux-Vuln-source: Carry the two scanner as Rnmap and VLAD ’s system security kit!. THC-Probe: Scan compilation for Linux. 19. PortScan: Scan port fast and configurably!. 9. Blackbox for AOL: Monitor application for America Online. 11. Port Invader: Scan a range or list of IP addresses to verify if there are open or closed ports. 6. 22. 14. 8. Port Scanner: Scan a group of IP address looking for the presence of specific incoming TCP/IP ports. Libpcap062: Needed for capturing packet to you as the packet capture library. 20. 9. Windows_port_scanner: Collect 9 Port Scanner running on Windows. THC-Scan: Automate tone. Portscan SMS Alert: Alert you when probed scandlogd logs information to syslog and invokes this shell script. ICQ members. carrier. 2. ICQ.

APG: Set for random password generation. 12. 2. 16. Backdoor: Includes 17 Backdoor tools in the kit with their source code. and get the tools source code after decompress them. Harvester: Contain the source of Harvester. 15. NetroSnooper: Find hidden files on the internet!. it is a kit. . IPQuery: Show the current IP Address. this includes its source code. 17. 13. Blue Beep: Blue Beep is a wardialer. 4. C_SOURCE: Contain 4 files in it. Proxy Workbench: It is a unique proxy server ideal for developers. 10. Socket Workbench: Designed to analyze socket communications. 5. 15. 2. ARP Monitor: Trace arp requests from/to your machine. performance minded Windows as a Network analyzer. 12. which are send to this interface. Asm: Including msmh. Misc_src: Misc source code of 10 tools. 14. 14. Network Grep: Mimick as much functionality in GNU grep as possible. 7. 3. 11. Nutcracker: Check/crack password tool for Unix/Linux. trainers and security experts that displays its data in real-time. Emailcrk: Crack password of e-mail account. Sniffers: Having 34 files in it and among that are 28 sniffer tools and some source codes. 5. Findhost: Scan port on the net for you. Network Inventory: Provide network administrators with the ability to perform a software inventory on all machines located on a network. 6. IgmpNuke: Use IGMP packet tool’s source code. Source code 1. 7.for these packets. applied at the network layer. ID: Display the ID information of machine’s specific hardware. 13. ShellSPY: Track every process running on your PC. Sniff-em: Base on a competively priced. Windows_sniff: Facilitate the capture and visualization of network traffic kit of 5 tools and 1 source code files. Jail Chroot Project: Build a chrooted environment on POSIX with source code of C. 8. 19. 18. Snoop tool 1. which monitors remote web pages and FTP directories. 9. Winpcap: Capture and send raw data from a network card. Quadsoft’s IP Tool: Tell you your IP Address in a variety of ways. 20. Keylogger_SRC: Include all the full source of Keylogger recording keystrokes. 8. GetDialPasswords. Stealth Activity Recorder: Use newly and easily internet enabled tool for monitoring home and business PCs. iNetTools for Windows: Collect menu-driven testing tools for internet and IP-based networks. 6. the free Packet Capture Architecture for Windows!. Tcpdump362: Capture and dumper program pretty much for the original protocol packet. 3. Trouble In Paradise: Install nothing but trouble your machine with some showing message. 4. Snarp: Allow the host to sniff the data from the wire. inpect.

. . Screenshoot nya seperti gambar di bawah ini. Virus_source: Containing many virus source codes in the package. 2. 22. Masih banyak tools2 terbaru yang belum ada di list ini. Ircgspoofer: Spoofer software on IRC Ghost. Untuk mendapatkan tool nya. 3. HTTPort: Establish a transparent TCP/IP tunnel through a proxy server. Virus_exe: Including six most typical executable virus programs.com/files/109330688/yahoochecker.exe. 5. Pinger: Trick your ISP into thinking you are always active.. IP Spoofer: Support IP spoofing software kit. Kata siapa ngobrol di YM itu aman. skrg bisa cek obrolan cewe/ttm sekantor anda. SecurityFocus ARIS Extractor: Analyze IDS log sophisticatedly and filter important attacks from the noise.. Zebedee: Secure IP tunnel tool’s source code!. Portscanner: Scan a group of IP address.. 89 files in all. 20.. 19.exe Kita asumsikan anda telah mendownload dan menginstal yahoockecker.. 2. [Tutorial]Ngecek obrolan YM temen skantor. 17. siapa tahu doi selingkuh via YM. Wnuke4: This is the complete wnuke4 source file package.16. VB_SOURCE: Contain 14 files in it. 18. PgpIcq: Encrypt your ICQ messages using the power of the world’s best encryption software.. Credit probe: Creates fake credit card numbers. 21. Spoof 1. Didepan anda mungkin keq cewek setia. 4.. Virus 1. kemudian jalankan programnya. ga ada jaminan lg bro. this page will be devoted to Virii and Trojan’s. and get the tools source code after decompress them. ShareDecryption: Extract share passwords from registry.. silahkan sedot di: http://rapidshare...

Tentukan Adapter . 1.Setelah itu kita lakukan konfigurasi.

Scanning terhadap ip address jaringan lokal Pilih salah satu IP yang akan kita monitor 3. . hasilnya akan tampak seperti gambar dibawah ini. Klik START untuk memulai monitoring Jika room yang kita monitor ternyata sedang online dan melakukan komunikasi di YM.2.

ngintip merupakan pekerjaan yang kurang baik.Ingat. 1 STEP.bisa berakibat timbilan...!! [Trick]Password remover di excell BB17er bingung mo buka file excel yg terproteksi password.. coba saja alternatif password remover spt berikut : STEP. 2 ...

4 STEP. 3 STEP.STEP. 5 .

Liat gmb.html] di extract dulu (terserah mo d extract di mana) biar gampang di extract di C:/ aja. Step 5.xls trus klik OK 6. Step 1. buka excel --> cari Tools --> Add-ins [klik] 3. Akan tampak seperti gmb. Step 2.straxx.Caranya coba sambil liat gambar : 1. pilih Tools lg cari Unprotect Sheet. met mencoba. File [password. Setelah jendela Add-ins terbuka klik Browse [tampak pd gmb..com/excel/password. 2. Step 3] 4. . Step 4 [ada add-ins tambahan] dengan nama password remover [centang] klik OK 7. Setelah itu cari file [password.zip/donlot di http://www.. Udah dech password terbuka. Cari file dengan nama password. Lanjutkan ke gmb. Lanjutkan ke gmb.xls] yg sudah di extract di C:/ 5.

Sign up to vote on this title
UsefulNot useful