background preloader

Projects

Projects

HackingLoops | Next Generation Hackers Portal There’s a seemingly endless number of free open-source tools for penetration testing, and most of them seem to gravitate around the Kali Linux distribution. But with so many free tools, it’s easy to miss out on some of the best ones. So today we’re going to take a closer look at Armitage, define what it is, and define how it works. However, there’s a few things that you need to know before we start digging into the dirty details of how to use this tool. Naturally, I do have to give a brief warning before we get started, too. First of all, doing so would be unethical. Now that we’ve got that out of the way, let’s define what Armitage is and how it works. What Does Armitage Do? Armitage, however, is really more of a scripting tool that “plugs in” to Metasploit. As they say, two heads are better than one, and the ability to share sessions opens the door for teamwork during an attack or penetration testing exercise. But wait, there’s more (as Billy Mays might say)! Before You Begin

Peekabooty | Download Peekabooty software for free Malicious Linux Commands - From (This article was originally published in Ubuntu Forums but was removed there. Ubuntuguide feels that knowledge about these risks is more important than any misguided attempts to "protect the public" by hiding their potential dangers or protect the (K)Ubuntu/Linux image. The original article has therefore been re-created (and subsequently edited) here.) ATTENTION: It is worthwhile to have some basic awareness about malicious commands in Linux. It is also worthwhile to always enable a Kubuntu screensaver or Ubuntu screensaver with a password so that a casual passerby is not able to maliciously execute one of these commands from your keyboard while you are away from your computer. When in doubt as to the safety of a recommended procedure or command, it is best to verify the command's function from several sources, such as from readily available documentation on Linux commands (e.g. manpages). Here are some common examples of dangerous commands that should raise a red flag. rm -r In Perl

Top 15 Open Source/Free Security/Hacking Tools 1. Nmap Nmap (“Network Mapper”) is a free and open source (license) utility for network discovery and security auditing. Nmap uses raw IP packets in novel ways to determine what hosts are available on the network, what services (application name and version) those hosts are offering, what operating systems (and OS versions) they are running, what type of packet filters/firewalls are in use, and dozens of other characteristics. Nmap homepage. 2. Wireshark is a network protocol analyzer. 3. Metasploit Community Edition simplifies network discovery and vulnerability verification for specific exploits, increasing the effectiveness of vulnerability scanners. 4. Nikto is an Open Source (GPL) web server scanner which performs comprehensive tests against web servers for multiple items, including over 6400 potentially dangerous files/CGIs, checks for outdated versions of over 1200 servers, and version specific problems on over 270 servers. 5. 6. ettercap 7. 8. 9. 10. w3af 11. hping 12. burpsuite 13.

Privoxy - Home Page MR01001101 :: cryptography steganography resources and challenges Hack Passwords Using iStealer ~ Defend Hackers, Secure The World There are diffirent way's to steal passwords. I want to be able to steal passwords from cookie files with 1 click, well what do you know it exists! It's a cookie stealer called iStealer ( 6.0 is newest version ). It steals every cookie password from the slave's browser, and shows it to the attacker.So if you do it correctly you will have hotmail, netlog, facebook, WoW, rapidshare and other passwords from lots of people in no time. I'll set one up, and will go thru all the details. Prepare yourself 1st Download iStealer 6.0 ( link is at the bottom of the thread ) 2th Disable your virusscanner, this is because your antivirus sees the iStealer program as a keylogger ( it's acctualy a CookieStealer but whatever ) 3th Register domain and hosting iStealer requires a webserver, this is because when someone click's your own made "Virus" it has to send the passwords and usernames somewhere. The registration can take a while, but when u have your domain registered, go to the cPanel. Configure to steal

Popup Ad Smasher | SMASHER Software Introduction to Algorithms - Download free content from MIT Education Protection Program | Surferprotectionprogram.com | www.surferprotectionprogram.com PC Architecture. A book by Michael B. Karbo - a book by Michael Karbo. This book is protected by copyright. It has been published in many European countries but never in English language. Therefore I desided to upload it to the Internet. It is free to use as it is for personal, non-commercial use. All rights belong to Michael Karbo. These web pages have been produced from a Microsoft Word file. PC Architecture.

NoScript - JavaScript/Java/Flash blocker for a safer Firefox experience! - what is it? - InformAction Dictionary of Algorithms and Data Structures This web site is hosted by the Software and Systems Division, Information Technology Laboratory, NIST. Development of this dictionary started in 1998 under the editorship of Paul E. Black. After 20 years, DADS needs to move. This is a dictionary of algorithms, algorithmic techniques, data structures, archetypal problems, and related definitions. Don't use this site to cheat. Currently we do not include algorithms particular to business data processing, communications, operating systems or distributed algorithms, programming languages, AI, graphics, or numerical analysis: it is tough enough covering "general" algorithms and data structures. Some terms with a leading variable, such as n-way, m-dimensional, or p-branching, are under k-. To look up words or phrases, enter them in the box, then click the button. We thank those who contributed definitions as well as many others who offered suggestions and corrections. Here are some references on algorithms and data structures. Bibliography

Related: