Hacking Tools

Here are some hacking tools.

Crack MD5

Here top tools for crackig md5 to noral text.

Photo Editing

Top online tools for editing photos.

Thursday, October 13, 2011

Usefull Ebooks

 rc4-misuse.pdf   The Misuse of RC4 in Microsoft Word and Excel
 802.11_attacks.pdf   802.11 Attacks
 ActiveX_active_expl.pdf   ActiveX - Active Exploitation
 address-spoof.txt   Address Bar Spoofing Attacks Against IE 6
 Address_Resolution.txt   Understanding Address Resolution Protocol Attacks
 adv-buff-overflow.txt   Advanced Buffer Overflow Exploits
 Adv-Shell-Tech.txt   Advanced Shellcoding Techniques
 Advanced_SQL_Injection.pdf   Advanced SQL Injection In SQL Server Applications
 afs.ps   Highjacking AFS
 brute_force_analysis.txt   Analysis of Brute Force & Dictionary Attacks
 Anatomy_of_Malware.pdf   Anatomy of a Malware
 anomaly_rules_def.pdf   Using Snort as an anomaly based IDS
 AnonMax.txt   How to maintain your anonymity on the web
 appOSfingerprint.txt   Advanced application-level OS fingerprinting
 aspmail-spoof.pdf   ASP CDONTS.NEWMAIL object E-mail Spoofing
 Oracle_PL_SQL_Injection.pdf   Assault on Oracle PL SQL Injection
 xss-attack-defense.txt   Cross Site Scripting - Attack and Defense guide
 banking-flaws.pdf   Internet Banking Flaws In India
 beginners.txt   Beginners guide to UNIX Hacking
 Biologger.pdf   Biologger - A Biometric Keylogger
 biosdefault.txt   Default BIOS passwords
 Blind_MySQL_Injection.pdf   Blind MySQL Injection
 cryptography_basics.pdf   Basics of Cryptography
 browserhack.txt   Hacking from your Web Browser
 bsdkern.htm   Attacking FreeBSD with Kernel Modules
 Buffer_Overflow.txt   Buffer Overflow Tutorial
 Bypassing_NAC.pdf   Bypassing network access control (NAC) systems
 clickjack-xss.txt   The Clickjacking Meets XSS: A State Of Art
 Spyware_Intro.pdf   Introduction to Spyware
 defaultpasswords.txt   Default Passwords for network switches and devices
 dns-writeup.txt   DNS cache poisoning then and now
 dsniff_netmon.txt   Network Monitoring with Dsniff
 email_and_telnet.txt   Sending Emails via SMTP and Telnet
 Erasing_Logs.txt   Erasing Your Presence From System Logs
 ErrSQL_Inj.pdf   Error based SQL Injection
 format_string_exp.txt   Exploiting Format String Vulnerabilities
 faqar.txt   Remailers FAQs
 ffp.pdf   Fuzzy Fingerprinting
 firewall-stego.txt   Bypassing firewalls through protocol stenography
 FirewallsFAQ.txt   Firewalls FAQs
 advanced_xss.txt   Advanced Cross-Site-Scripting
 vista_dll_injection.pdf   Windows Vista DLL Injection
 IDS_Agents.pdf   IDS Using Security Agents
 whid_2008.pdf   Web Hacking Incidents Database 2008
 expl_buff_ovfl.pdf   Exploiting Buffer Overflows
 IIS_Exploitation.txt   Guide to IIS Exploitation
 finger.txt   Finger a user via telnet
 hacker-howto.html   How To Become A Hacker
 hackers-rfc.txt   The Hacker's RFC
 hackfaq.zip   The Hack FAQ
  hackkit-2.0b.txt   Hacking Kit v2.0
 hackpage.txt   Hacking Webpages The Ultimate Guide
 hackpw.txt   How to crack a unix password file
 HostFingerprinting.pdf   Host Fingerprinting and Firewalking With hping
 Honeywalldetection.pdf   How to detect Honeypots using hping
 host-detection.doc   Advanced Host Detection Techniques
 Bypass_BIOS.txt   How to Bypass BIOS Passwords
 find-ftps.txt   How To Find Ftp's The Easy Way
 modify_exe.txt   How to modify exe files
 httprint_paper.zip   Introduction to HTTP fingerprinting
 UnicodeExpl.doc   Unicode exploitation with how it works
 Info-Gathering.txt   The Info-Gathering Tutorial
 int-arr-overfl.txt   Integer array overflows
 intv2-8.pdf   A Network Intrusion Detector
 ip-faq.htm   An IP address FAQ
 tcp-attack.txt   Simple Active Attack Against TCP
 ipspoofing_dem.zip   IP-spoofing Demystified
 inetsec.txt   A Guide to Internet Security
 ip-spoof.txt   A short overview of IP spoofing
 anon-ftp-faq.htm   Anonymous FTP FAQ
 pack_cap.htm   Network Packet Capture FAQ
 javascript_fun.txt   how javascript can be used to bypass html forms
 John_The_Ripper.pdf   John The Ripper -An Illustrated Guide
 Learning_Perl.pdf   Learning Perl Writing Exploits
 Info_Gather.pdf   Learn Information Gathering By Example
 vuln_look.txt   Looking for Vulnerabilities
 linux-kernel.txt  The Linux Kernel HOWTO
 linux-shell-ref.pdf   LINUX SHELLCODING REFERENCE
 firewalls-loc.txt   Locating Stateless Firewalls
 mac_addr_clon.pdf   "Cloning MAC Addresses" Whitepaper
 metasploit_expl.txt   Metasploit 3.0 Automated Exploitation
 dns_spoof.htm   DNS Spoofing and Abuse
 MiddleMan.pdf   Paper explaining man-in-the-middle attacks
 linux_tips.txt   Misc Linux Tips & Tricks
 secret_codes.txt   Mobile Secret Codes
 HackingFeeds.pdf   Feed Injection in Web 2.0

Credit: http://insecure.in/

Saturday, October 8, 2011