Hacking
Once again I am not responsible for the stuff you do with these programs, they are here for educational purposes only. They are not meant for use with anything illegal. I'm warning you if you download these, don't use them illegaly just read the read.me if there is one and if the program seems illegal in the smallest way, then delete it. Don't say I didn't warn you.
Utilities
Fake112 Fake ID creator v1.12
Executable File Vs3.20 Executable file extractor
iss13L Linux Security Scanner
jammer Modem Jammer
Root Kit nuff said
Pounder Establishes 40,000 connections with a server and downloads any file you specify
Fake CD Makes computer think a CD's still in the drive
mIRC 32 bit only
Jakal Firewall Scanner for UNIX
Esniff Ethernet Packet Sniffer for UNIX
Password Thief Converts the *** in passwords in
win 95 to letters
Key Logger for Win 3.1
Keylogger95 A keystroke recorder for Windows95
PCWatch v1.0 Debugger
Proview v1.2 Integrated System Analyzer and Viewer
SnoopDos v1.1 DOS Call Recorder
JLeech 2.1 J Modem Leecher v2.1
Tripwire.tar.gzSets up tripwires and alerts you if someone is trying to hack your system
Sysfog.c.gzRemove yourself from system logs
Inv.c.gzAnother of the above
Xkey.c Grab keystroks from local xterm
Rppchk.cFinds machines on domain with buggy rpc setup
Gimme.sh Exploit rdist bug to get access to any file
NFSwatch.tar.gzSee whose mounting your NFS fs's
Argus 1.5.tar.gzNice IP network monitor program for linux
ARPwatch.tar.gzMonitors IP / ethernet address pairings
Iss13_tar.tarExcellent Port Scanner check to see what sockets are available on a machine
Strobe tar.tar Another port scanner
Klaxon.tar.tarTells you if someone uses a port scanner on you
Word for Windows 6.0 Password Cracker
Encryption
Tools
CBW.tar.gz Crypt Breakers Workbench
UFC.tarUltra Fast Cryptor
Gif Hide Hide data inside GIFs
Wav Hide Hide data inside WAVs
Data Crypt Data encryption utility
Steganos 1.4 Hide data inside all types of files
Secure Term Prog that encrypts outgoing text
ASCII Crypt for Windows Encryption/Decryption program/ASCII converter
ASCII Crypt for DOS Encryption/Decryption program/ASCII converter
Super Crypt 2.0A powerful encrypting program with many features, from Freshman
Changem1Changes codes to ASCII in wpd format By Cyber Phreak
EMail Things
General Mailbomb Script for mailbombing
Pop3Hack hack into a pop3 port
smh Send Mail Hack
NETWORK
HACKING UTILITIES
Cyber Kit 2.2 b5 Self-explanatory
IPX Remote Node Control Utility
NetCrack 1.0 calls verify pw function in Netware's Bindery Utilities
Port Hacking Util Port Scanning / Bombing utils
InfoSPY v2.52 A windows Internet Spying utility
Scan v5.0 TCP scanner
Sniffer TCP sniffer
Sniffit v.0.3.5 tar.gz file; TCP sniffer;LINUX, SunOS, Solaris, FreeBSD and IRIXPPP
Touch of Death for Sniffit the power to take down any TCP connection on your subnet; Linux
IP Spoofing pt1 Simple Spoofing txt file (Non Blind)
IP Spoofing ptII Advanced Spoofing txt file;(Blind)
Advanced Network Security Cracker
dsscard--Cracks DSS cards and opens them. A lot of nice "xtras" from Sathack
TelTermz Terminal Identifiers
LanThug How to be a LAN thug
ZAP How to hide your presence on a Sun UNIX machine
Dissassemblers
Soft Ice Dissassebler '95 1.95
Java Decompiler
Novel
Novell Netword Password Stealer
How to hack Novell Networks FAQ The definitive Novell Hacking Guide
Super Creates Novell Super accounts
Novell SUP Gains Novell Super access
Novell FFS Gains Novell Super access
Koch Creates Novell Super accounts
Novell BFH Novell brute force hacker for pw cracking
Getit Steals Novell passwords
Stuff
Death3.1
Other
Stuff
Vrack Voice Mailbox Hacker
Amhack Answering Machine Hack How To
Soda How to gain from a soda machine
Tron Cheaper electricity by reverse phase
Bug Detector Get Raid!
Legal BBS How to run an elite BBS legally
Codebar Barcode key, also includes UNP Uncle Joe's Crackbook Tools and Files
McD's Hacking McDonald's computers
How to Build a Cable Descrambler
Ripit 400Best CD ripping prog out. Great for novice hackers
Probe Probe TCP ports
GateWays.txt TXT file on UNIX Gateways
CPU Booster speed up your 386, 486, 684, or Pentium
hckbbs vs.2 creates a virus looking back door into a bbs but it is safe to run
Security Hole List txt file
Finding Security Holes txt file by Manifestation
Anarchist's Cookbook The Original
CBI How to log onto a CBI system
Form Mail Bomber 1.5the only 300% anonymous mail bomber there is.
Hacking Webpages TXTBy Goat
ICQ Bomb txtTurning your mail bomber into an ICQ bomber-by Sandman
Angelfire txtHacking Angelfire Accounts-By HotWired
The Hotmail Hacktxt file by Digital
Act2! Txt hackDecrypting Act!v2 for Windows PWs
Hacking Webpages Txt by Virtual Circuit
Tripod txt Hacking Tripod Accts-by Negative Rage
Getting URL'sthrough Telnet-by Plahzma
Tripod Sux TxtHow to defeat the Tripod Adv on your webpg
Freecall txtHow to leave a message anywhere for free
Hack FTP txtHacking via Win95 ftp
Erase Logs txtHow to erase your presence from system logs
Internet Outdial txt</>explanation
Key Generator Tutorial txtby Razzia
Undongle txtHow to undongle by +Xoanan