Hacking

Once again I am not responsible for the stuff you do with these programs, they are here for educational purposes only. They are not meant for use with anything illegal. I'm warning you if you download these, don't use them illegaly just read the read.me if there is one and if the program seems illegal in the smallest way, then delete it. Don't say I didn't warn you.

 

Utilities

Fake112 Fake ID creator v1.12

Executable File Vs3.20 Executable file extractor

iss13L Linux Security Scanner

jammer Modem Jammer

Root Kit nuff said

Pounder Establishes 40,000 connections with a server and downloads any file you specify

Fake CD Makes computer think a CD's still in the drive

mIRC 32 bit only

Jakal Firewall Scanner for UNIX

Esniff Ethernet Packet Sniffer for UNIX

Poor Man's Sniffer

Password Thief Converts the *** in passwords in win 95 to letters

IP Scan 1.02

Pirate's Friend 2.6

DongleSpy 1.0

WinSpector

WinSight

Root Kit

CNA Inquiry 2.0

KGB Utility 1/04

Windows Key Logger

Key Logger for Win 3.1

Keylogger95 A keystroke recorder for Windows95

PCWatch v1.0 Debugger

Proview v1.2 Integrated System Analyzer and Viewer

SnoopDos v1.1 DOS Call Recorder

JLeech 2.1 J Modem Leecher v2.1

Tripwire.tar.gzSets up tripwires and alerts you if someone is trying to hack your system

Sysfog.c.gzRemove yourself from system logs

Inv.c.gzAnother of the above

Xkey.c Grab keystroks from local xterm

Rppchk.cFinds machines on domain with buggy rpc setup

Gimme.sh Exploit rdist bug to get access to any file

NFSwatch.tar.gzSee whose mounting your NFS fs's

Argus 1.5.tar.gzNice IP network monitor program for linux

ARPwatch.tar.gzMonitors IP / ethernet address pairings

Iss13_tar.tarExcellent Port Scanner check to see what sockets are available on a machine

Strobe tar.tar Another port scanner

Klaxon.tar.tarTells you if someone uses a port scanner on you

Word for Windows 6.0 Password Cracker

Zhacker



Encryption Tools

CBW.tar.gz Crypt Breakers Workbench

UFC.tarUltra Fast Cryptor

Gif Hide Hide data inside GIFs

Wav Hide Hide data inside WAVs

Data Crypt Data encryption utility

Steganos 1.4 Hide data inside all types of files

Secure Term Prog that encrypts outgoing text

AEgis WinPGP Shell

Crack for WinCrypt

Crypto 3.0B

CypherPak 2.0

Fast Encrypt 1.2

F.E.D. 1.1

Global Security 32.1

Havoc's CypherText 1.5

Hide and Seek 4.1

Mutation Encryptor 1.0

WilterCrypt 1.5

Scramble Plus

Puffer 2.0

Paradox 1.01

PBX Scanner vs5.0

ASCII Crypt for Windows Encryption/Decryption program/ASCII converter

ASCII Crypt for DOS Encryption/Decryption program/ASCII converter

Super Crypt 2.0A powerful encrypting program with many features, from Freshman

Code Buster 3.05

Changem1Changes codes to ASCII in wpd format By Cyber Phreak


EMail Things


General Mailbomb Script for mailbombing

Avalanche v1.0

Avalanche 2.8

Kaboom! v3

Bomb v2b

Up Yours v3.0

Anonymous Email for Win95

Pop3Hack hack into a pop3 port

smh Send Mail Hack


NETWORK HACKING UTILITIES


Cyber Kit 2.2 b5 Self-explanatory

IPX Remote Node Control Utility

NetCrack 1.0 calls verify pw function in Netware's Bindery Utilities

Port Hacking Util Port Scanning / Bombing utils

InfoSPY v2.52 A windows Internet Spying utility

Scan v5.0 TCP scanner

Sniffer TCP sniffer

Sniffit v.0.3.5 tar.gz file; TCP sniffer;LINUX, SunOS, Solaris, FreeBSD and IRIXPPP

Touch of Death for Sniffit the power to take down any TCP connection on your subnet; Linux

.tar Sniffit v0.3.5 Patch

FTP Bounce Attack

IP Spoofing pt1 Simple Spoofing txt file (Non Blind)

IP Spoofing ptII Advanced Spoofing txt file;(Blind)

Advanced Network Security Cracker

Netware Bindery Tools

Netware Hack

PC Pursuit Thief

SETSPass Module

NWP Crack 0.5b

User Dump 1.3

Modem Hunter v2.0

dsscard--Cracks DSS cards and opens them. A lot of nice "xtras" from Sathack

TelTermz Terminal Identifiers

LanThug How to be a LAN thug

Internet Worm Src Code

ZAP How to hide your presence on a Sun UNIX machine

Dissassemblers

Bubble Chamber

DOS Edit

Hexcaliber

Intelligent Dissassembler 1.2

Soft Ice Dissassebler '95 1.95

SoftICE DOS 2.80

WinSock Spy Facility 0.91

Java Decompiler

Novel
Novell Netword Password Stealer

Novell Watcher

How to hack Novell Networks FAQ The definitive Novell Hacking Guide

Super Creates Novell Super accounts

Novell SUP Gains Novell Super access

Novell FFS Gains Novell Super access

Koch Creates Novell Super accounts

Novell BFH Novell brute force hacker for pw cracking

Supervisor Checker 1.0

Novell Spy Pak

Getit Steals Novell passwords


Stuff
Death3.1

Encrypt It 1.0

Fake ID Generator

Hacker Tools 2.0

Netscape Utilities

WilterCrypt 1.0 for Windows

Word List Generator ALPHA 0.1


Other Stuff

Vrack Voice Mailbox Hacker

Amhack Answering Machine Hack How To

Soda How to gain from a soda machine

Tron Cheaper electricity by reverse phase

Bug Detector Get Raid!

Legal BBS How to run an elite BBS legally

Codebar Barcode key, also includes UNP Uncle Joe's Crackbook Tools and Files

McD's Hacking McDonald's computers

How to Build a Cable Descrambler

Ripit 400Best CD ripping prog out. Great for novice hackers

Probe Probe TCP ports

GateWays.txt TXT file on UNIX Gateways

CPU Booster speed up your 386, 486, 684, or Pentium

hckbbs vs.2 creates a virus looking back door into a bbs but it is safe to run

Security Hole List txt file

Finding Security Holes txt file by Manifestation

Anarchist's Cookbook The Original

CBI How to log onto a CBI system

Form Mail Bomber 1.5the only 300% anonymous mail bomber there is.

Hacking Webpages TXTBy Goat

ICQ Bomb txtTurning your mail bomber into an ICQ bomber-by Sandman

Angelfire txtHacking Angelfire Accounts-By HotWired

The Hotmail Hacktxt file by Digital

Act2! Txt hackDecrypting Act!v2 for Windows PWs

Hacking Webpages Txt by Virtual Circuit

Tripod txt Hacking Tripod Accts-by Negative Rage

Getting URL'sthrough Telnet-by Plahzma

Tripod Sux TxtHow to defeat the Tripod Adv on your webpg

Freecall txtHow to leave a message anywhere for free

Hack FTP txtHacking via Win95 ftp

PHF Web Hacking txt

CGI Vulnerabilities txt

Erase Logs txtHow to erase your presence from system logs

Internet Outdial txt</>explanation

Key Generator Tutorial txtby Razzia

Undongle txtHow to undongle by +Xoanan