Blog Posts - Hacking Tools
Download of the day: Kali Linux ( BackTrack Linux )

Kali Linux is the successor of the BackTrack Penetration Testing Linux distribution has been released. From the official project page:Kali is a complete re-build of BackTrack Linux, adhering completely to Debian development standards. All-new infrast...
by Youth Information Center on Oct 25, 2013
Download of the day: Kali Linux ( BackTrack Linux )

Kali Linux is the successor of the BackTrack Penetration Testing Linux distribution has been released. From the official project page:Kali is a complete re-build of BackTrack Linux, adhering completely to Debian development standards. All-new infrast...
by Youth Information Center on Oct 25, 2013
Facebook Data Mining Tool Uncovers Your Life

You know you shouldn’t post potentially damaging data on Facebook, but more often that not, your friends don’t think twice about it, and this can impact you even more than you think. At the Hack In The Box conference in Kuala Lumpur, secu...
by insecure on Oct 21, 2013
Leak NEW InstaFire Bot [$99.99] CRACK Account Creator | Mass Liker I Working as on 30/8/13

Leak NEW InstaFire Bot [$99.99] CRACK Account Creator | Mass Liker I Working as on 30/8/13HEY GUYS,HERE IS INSTAFIRE. A NEW INSTAGRAM BOT WITH ALL THE FUNCTIONS OF XGRAM AND FULLY FUNCTIONING. THE CRACK WAS JUST A RELEASED A COUPLE DAYS AGO SO HERE I...
by The Best Hacker And Cracker Tools Site on Sep 23, 2013
Free Unlimited high speed VPNS Hotspot Shield Elite Life Time Update

Ad Free Browsing Experience Encrypted and private communication A secure gateway to access censored and blocked sites Masked IP address for complete anonymity One license works on both PC and Mac VPN for Windows Hotspot Shield VPN from Anchor...
by Free Proxy List | Free Premium Accounts | Free VPN on Aug 12, 2013
Download CyberGate v3.5.0.0 - Hacking Tools

You'll be familiar with RATs (Remote Administration Tools). CyberGate is one of them and it's of course a great option to choose.CyberGate is a powerful, fully configurable and stable Remote Administration Tool coded in Delphi that is continuously ge...
by LEH | Learn Ethical Hacking on Jul 22, 2013
Password Cracking Wordlist With Tons Of Words

One of the biggest and very comprehensive collection of 1,493,677,782 word for Password cracking list released for download. The wordlists are intended primarily for use with password crackers such as hashcat, John the Ripper and with password r...
by LEH | Learn Ethical Hacking on Jul 22, 2013
Bunch Of Essential Hacking Tools

Hello guys, today i'm posting a punch of hacking essential tools. These tools are compatible with with Windows and Mac OS. Few of them will work on Linux too.[Password Crackers]John The Ripper - http://www.openwall.com/john/THC Hydra - http...
by LEH | Learn Ethical Hacking on Jul 22, 2013
Download WAppEx v2.0 : Web Application exploitation Tool

WAppEx is an integrated Web Application security assessment and exploitation platform designed with the whole spectrum of security professionals to web application hobbyists in mind. It suggests a security assessment model which revolves around an ex...
by LEH | Learn Ethical Hacking on Jul 21, 2013
BlindElephant – Web Application Fingerprinting

During Black Hat USA 2010, Patrick Thomas presented a new web application fingerprinting tool called Blind Elephant.The BlindElephant Web Application Finger-printer attempts to discover the version of a (known) web application by...
by LEH | Learn Ethical Hacking on Jul 21, 2013
Free Unlimited high speed VPNS Hotspot Shield Elite Life Time Update

Ad Free Browsing ExperienceEncrypted and private communicationA secure gateway to access censored and blocked sitesMasked IP address for complete anonymityOne license works on both PC and Mac VPN for WindowsHotspot Shield VPN from Anchor Free is...
by Free Proxy List | Free Premium Accounts | Free VPN on Jul 15, 2013
Download Android Privacy Guard

There's no public key encryption for Android yet, but that's an important feature for many of us. Android Privacy Guard is to manage OpenPGP keys on your phone, use them to encrypt, sign, decrypt emails and files.Change log v1.0.8HKP key server suppo...
by LEH | Learn Ethical Hacking on Jul 12, 2013
Download Mac OS X Rootkit - Supported By Multiple Kernels Having Root Access

Today, a 64bit Mac OS-X kernel rootkit has been released by prdelka from NullSecurity. It supports: multiple kernel versions, give root privileges, hide files / folders, hide process, hide user from 'who'/'w', hide network port, sysctl...
by LEH | Learn Ethical Hacking on Jul 12, 2013
FAQ's About Remote Administrator Tools

Q – Whats RAT?A – A RAT is also a shortcut called Remote Administrator Tool. It is mostly used for malicious purposes, such as controlling PC’s, stealing victims data, deleting or editing some files. You can only infect someone by sending...
by LEH | Learn Ethical Hacking on Jun 29, 2013
Free Unlimited high speed VPNS Hotspot Shield Elite Life Time Update

Ad Free Browsing Experience Encrypted and private communication A secure gateway to access censored and blocked sites Masked IP address for complete anonymity One license works on both PC and Mac VPN for Windows Hotspot Shield VPN from Anchor...
by Free Proxy List | Free Premium Accounts | Free VPN on Jun 21, 2013
Free Unlimited high speed VPNS Hotspot Shield Elite Life Time Update

Ad Free Browsing Experience Encrypted and private communication A secure gateway to access censored and blocked sites Masked IP address for complete anonymity One license works on both PC and Mac VPN for Windows Hotspot Shield VPN from Anchor...
by Free Proxy List | Free Premium Accounts | Free VPN on Jun 21, 2013
Download Automated HTTP Enumeration Tool - Hacking Tools

Null Security Team writing a python script for Automated HTTP Enumeration. currently only in the initial beta stage, but includes basic checking of files including the Apache server-status as well as well IIS WebDAV and Microsoft FrontPage Exten...
by LEH | Learn Ethical Hacking on Jun 19, 2013
AirCrack-NG Updated after 3-Years

After a few years, we finally got a release: 1.2 Beta 1. The page length listing of updates include new supported chipsets, fixes for prior chipsets, and just some general clean-up overall covering Airmon-ng, Airmon-zc, Airdecap-ng, Airgraph-ng, A...
by H4xOrin' T3h WOrLd on Jun 4, 2013
Download Low Orbit Canon (DDoS Attack)

Dalam blog ini kami akan mencakup serangan DDoS, apa yang mereka, dan alat-alat yang digunakan untuk menyerang. Apa yang dimaksud dengan serangan DDoS Anda bertanya? Nah dalam bentuk yang paling sederhana serangan DDoS digunakan untuk membuat sumber...
by Tholib Site on May 24, 2013
DroidSQLi first automated MySQL Injection tool for Android.

DescriptionDroidSQLi is the first automated MySQL Injection tool for Android. It allows you to test your MySQL-based web application against SQL injection attacks.DroidSQLi supports the following injection techniques:- Time based injection- Blind inj...
by H4xOrin' T3h WOrLd on May 18, 2013