Pages

how to accomplish a brute force attack

This article is designed to demonstrate how to accomplish a brute force attack, and what it looks like from the receiving end. Brute force means password guessing. This can only feasibly be accomplished with the aid of good target reconnaissance and some automated programs. While it is very easy to write your own brute force program, there are several available for free online. I find Brutus to be one of the best brute force tools. You can find it at Hoobie.net.

The first step in a brute force attack (or for that matter, any attack) is target enumeration. This is the process by which we find where and how a target is vulnerable. I use NMAP for almost all of my initial cursory scans of networks. Lets use the target of my own desktop server and run an NMAP scan to find out what we have to play with. The output from my scan follows:

nmap -sS -O 216.25.200.135

Starting nmap V. 2.30BETA17 by fyodor@insecure.org (
http://www.insecure.org/nmap/ )
Interesting ports on ip-216-25-200-135.covad.dsl.fcc.net
(216.25.200.135):
Port State Service
21/tcp open ftp
25/tcp open smtp
80/tcp open http
135/tcp open loc-srv
139/tcp open netbios-ssn
443/tcp open https
445/tcp open microsoft-ds
1025/tcp open listen
1026/tcp open nterm
1031/tcp open iad2

TCP Sequence Prediction: Class=random positive increments
Difficulty=7635 (Worthy challenge)
Remote operating system guess: Windows 2000 RC1 through final release

Nmap run completed -- 1 IP address (1 host up) scanned in 1 second

Ok, so we’ve got several services to choose from on this target. The first one that catches my eye is FTP. We can use this to brute force passwords, and we can use smtp to check for user accounts. Now the fun begins. I’ll first try ftp to find if anonymous ftp is enabled (which could potentially make my task a lot easier, there are rare computers with completely open upload/download ftp servers without strong restrictions (allowing you to upload and download to the web root folder)).

C:\>ftp 216.25.200.135
Connected to 216.25.200.135.
220 WIN2KSERVER Microsoft FTP Service (Version 5.0).
User (216.25.200.135:(none)): anonymous
331 Password required for anonymous.
Password:foo@nowhere.com
530 User anonymous cannot log in.
Login failed.
ftp> quit
221 Fuck off!

It seems that anonymous ftp isn’t enabled, and not only that the server is quite rude when I leave. The server did give some confirmation that it is running Windows NT, or in this case Windows 2000 (dead giveaway in the machine’s name ‘WIN2KSERVER’). We’ll try the SMTP server now to check for user names.

220 WIN2KSERVER Microsoft ESMTP MAIL Service, Version: 5.0.2195.2966
ready at Fri, 22 Jun 2001 09:08:49 –0400
vrfy smellydell
252 2.1.5 Cannot VRFY user, but will take message for smellydell
vrfy administrator
252 2.1.5 Cannot VRFY user, but will take message for administrator

well, there’s no use in verifying anyone on this server as it seems that the server will give the same message for real and bogus accounts (all NT servers have an ‘administrator’ account, in much the same way that *nix have root accounts). The ‘expn’ command didn’t work at all on this server (replied with ‘unknown command’ at expn postmaster). So at this point I’m S.O.L., but some machines will give a very good list of users and or active accounts using the smtp server.

Ok, so I’m off to brute forcing. The first thing I do is fire up Brutus.

Screenshot of brutus at startup

Next I’ll have to modify my users list (found in users.txt in the Brutus directory) to include users I suspect to be on an NT server. NT always has a ‘Guest’ account and an ‘Administrator’ account. I’ll add a few more guesses. In the end my users list looks like this:

A text file list of users

The next step is to fire Brutus at the target, when configured for an ftp attack, Brutus appears thus:

Configuring brutus

You’ll notice I set the timeout higher than the default. Brutus nicely circumvents connection limits by creating new connections for every request. This is useful because some servers will cut your connection after 3 bad guesses at passwords. Brutus uses the targets ability to take multiple ftp requests and creates a new request for every guess (I have set the program to make 10 requests simultaneously). The timeout is the lag time that the program will allow before it makes a new request. If you don’t set this high enough you are likely to flood the target and either crash its server, or simply hang Brutus. You can use a really high connection and low timeout rate as an effective DoS attack that will knock weak servers completely off the net.

So now I’ll fire Brutus at the target. I’m using the default password list that comes with the program, but there are several larger, and more complete word lists available online. What Brutus will do is try every username listed in the users file with every password in the word list (and can even generate its own random word list to include all combinations of letters, characters, and numbers). Remember that most passwords are 8 characters long, so its usually not worthwhile to try and brute force very short passwords. Here’s what Brutus looks like in action:

Screenshot of brutus attacking a target

Now, the downside to brute forcing is that it is extremely noisy, and even the worst sysadmin should notice it. During my demonstration my server immediately popped an alert that the system log was full. A quick examination of the system log reveals the problem immediately:

Screenshot of an NT event log

All those warnings you see are bad FTP login attempts. A double click on the alert shows:

Screenshot of an event log detail showing the brute force attack

It isn’t hard to figure out exactly what is going on. Even more disturbing is the log file left behind. Here’s a snippit:

13:30:18 216.25.200.135 [5]USER admin 331
13:30:18 216.25.200.135 [6]USER admin 331
13:30:18 216.25.200.135 [7]USER admin 331
13:30:18 216.25.200.135 [8]USER admin 331
13:30:18 216.25.200.135 [9]USER admin 331
13:30:18 216.25.200.135 [10]USER admin 331
13:30:18 216.25.200.135 [11]USER admin 331
13:30:18 216.25.200.135 [12]USER admin 331
13:30:18 216.25.200.135 [13]USER admin 331
13:30:18 216.25.200.135 [4]PASS - 530
13:30:18 216.25.200.135 [14]USER admin 331
13:30:18 216.25.200.135 [5]PASS - 530
13:30:18 216.25.200.135 [6]PASS - 530
13:30:18 216.25.200.135 [7]PASS - 530
13:30:18 216.25.200.135 [8]PASS - 530
13:30:18 216.25.200.135 [9]PASS - 530
13:30:18 216.25.200.135 [10]PASS - 530
13:30:18 216.25.200.135 [11]PASS - 530
13:30:18 216.25.200.135 [15]USER admin 331
13:30:18 216.25.200.135 [16]USER admin 331

Not only do you notice all the tries for the same account, but you can tell it is an automated attempt to brute force because the times of the attempts are so close together (60 or so attempts a second). Even more damning is that my IP address is logged all over the huge log file. Its not hard to spot me or figure out what I’m attempting to do. Be warned if you attempt a brute force that you are probably going to get notice.

Now, I happened to be successful on this attempt and got on username and password. The results are displayed in Brutus under the ‘Positive Authentication Results’ window:

Screenshot showing brutus successfully identifying login information

You can see the username ‘user’ and password ‘charles’ worked on the server. Lets try them out:

C:\>ftp 216.25.200.135
Connected to 216.25.200.135.
220 WIN2KSERVER Microsoft FTP Service (Version 5.0).
User (216.25.200.135:(none)): user
331 Password required for user.
Password: charles
230-Fuck you!
230 User user logged in.
ftp>

Boom, and its just that easy. Now that I’m in my first step should be to attempt to clean up the traces of my attack (i.e. the log files and system event logs). Accomplishing this task takes more explanation than I have time for here, but hopefully you get the idea.

If nothing else, this short article should show you the value of good passwords. If I hadn’t set up the account ‘user’ with such a crappy password this attack most likely would have been unsuccessful. See my article on passwords for a good run down of how to pick a good password to keep your accounts safe from brute force attempts.

Tutorial: How to hack with a ip address

Tutorial: How to hack with a ip address
So say somehow somewhere we ended up choosing a target to start wreaking havoc upon. All we need is an IP Address. Theres plenty of papers out there that go into how to obtain an IP Address from the preferred mark of your choice. So I'm not going to go into that subject. Alright so say we got the targets IP Address finally. What do we do with this IP Address. Well first ping the IP Address to make sure that its alive. In otherwords online. Now at the bottom of this document ill include some links where you can obtain some key tools that may help on your journey through the electronic jungle. So we need to find places to get inside of the computer so we can start trying to find a way to "hack" the box. Port Scanners are used to identify the open ports on a machine thats running on a network, whether its a router, or a desktop computer, they will all have ports. Protocols use these ports to communicate with other services and resources on the network.

1) Blues Port Scanner - This program will scan the IP address that you chose and identify open ports that are on the target box.

Example 1:
Idlescan using Zombie (192.150.13.111:80); Class: Incremental
Interesting ports on 208.225.90.120:
(The 65522 ports scanned but not shown below are in state: closed)
Port State Service
21/tcp open ftp
25/tcp open smtp
80/tcp open http
111/tcp open sunrpc
135/tcp open loc-srv
443/tcp open https 1027/tcp open IIS
1030/tcp open iad1
2306/tcp open unknown
5631/tcp open pcanywheredata
7937/tcp open unknown
7938/tcp open unknown
36890/tcp open unknown


In example 1 now we see that there are a variety of ports open on this box. Take note of all the ports that you see listed before you. Most of them will be paired up with the type of protocol that uses that port (IE. 80-HTTP 25-SMTP Etc Etc...) Simply take all that information and paste it into notepad or the editor of your choice. This is the beginning of your targets record. So now we know what ports are open. These are all theoretical points of entry where we could wiggle into the computer system. But we all know its not that easy. Alright so we dont even know what type of software or what operating system that this system is running.

2) NMAP - Port Scanner - Has unique OS fingerprinting methods so when the program sees a certain series of ports open it uses its best judgement to guess what operating system its running. Generally correct with my experiences.

So we have to figure out what type of software this box is running if we are gonna start hacking the thing right? Many of you have used TELNET for your MUDS and MOOS and weird multiplayer text dungeons and many of you havent even heard of it before period. TELNET is used to open a remote connection to an IP Address through a Port. So what that means is we are accessing their computer from across the internet, all we need is their IP Address and a port number. With that record you are starting to compile, open a TELNET connection to the IP Address and enter one of the OPEN ports that you found on the target.
So say we typed 'TELNET -o xxx.xxx.xxx.xxx 25' This command will open up a connection through port 25 to the IP xxx.xxx.xxx.xxx. Now you may see some text at the very top of the screen. You may think, well what the hell, how is that little string of text going to help me. Well get that list you are starting to write, and copy the banners into your compilation of the information youve gathered on your target. Banners/Headers are what you get when you TELNET to the open ports. Heres an example of a banner from port 25.


220 jesus.gha.chartermi.net ESMTP Sendmail 8.12.8/8.12.8; Fri, 7 Oct 2005 01:22:29 -0400


Now this is a very important part in the enumeration process. You notice it says 'Sendmail 8.12.8/8.12.8' Well what do ya know, we now have discovered a version number. This is where we can start identifying the programs running on the machine. There are some instances in which companies will try and falsify their headers/banners so hackers are unable to find out what programs are truly installed. Now just copy all the banners from all the open ports *Some Ports May Have No Bannners* and organize them in the little record we have of the target. Now we have all the open ports, and a list of the programs running and their version numbers. This is some of the most sensitive information you can come across in the networking world. Other points of interest may be the DNS server, that contains lots of information and if you are able to manipulate it than you can pretend to hotmail, and steal a bunch of peoples email. Well now back to the task at handu. Apart from actual company secrets and secret configurations of the network hardware, you got some good juicy info. http://www.securityfocus.com is a very good resource for looking up software vulnerabilities. If you cant find any vulnerabilities there, search on google. There are many, many, many other sites that post vulnerabilities that their groups find and their affiliates.

At SecurityFocus you can search through vendor and whatnot to try and find your peice of software, or you can use the search box. When i searched SecurityFocus i found a paper on how Sendmail 8.12.8 had a buffer overflow. There was proof of concept code where they wrote the shellcode and everything, so if you ran the code with the right syntax, a command prompt would just spawn. You should notice a (#) on the line where your code is being typed. That pound symbol means that the command prompt window thats currently open was opened as root. The highest privilage on a UNIX/Linux Box. You have just successfully hacked a box. Now that you have a command shell in front of you, you can start doing whatever you want, delete everything if you want to be a fucking jerk, however I dont recommend that. Maybe leave a text file saying how you did it and that they should patch their system.....whoever they are. And many times the best thing you can do is just lay in the shadows, dont let anyone know what you did. More often than not this is the path you are going to want to take to avoid unwanted visits by the authorities.

There are many types of exploits out there, some are Denial of Service exploits, where you shut down a box, or render an application/process unusable. Called denial of service simply because you are denying a service on someones box to everyone trying to access it. Buffer Overflow exploits are involved when a variable inside some code doesnt have any input validation. Each letter you enter in for the string variable will be 1 byte long. Now where the variables are located at when they are in use by a program is called the buffer. Now what do you think overflowing the buffer means. We overflow the buffer so we can get to a totally different memory address. Then people write whats called shellcode in hex. This shellcode is what returns that command prompt when you run the exploit. That wasnt the best description of a buffer overflow, however all you need to remember is that garbage data fills up the data registers so then the buffer overflows and allows for remote execution of almost every command available. There are many, many other types of attacks that cannot all be described here, like man-in-the-middle attacks where you spoof who you are. Performed correctly, the victim will enter http://www.bank.com and his connection will be redirected to your site where you can make a username and password box, make the site look legit. And your poor mark will enter their credentials into your site, when they think its really http://www.bank.com. You need to have a small script set up so it will automatiically display like an error or something once they try and log in with their credentials. This makes it seem like the site is down and the victim doenst give it a second thought and will simply try again later.
__________________________________________________ _______o_________

So as a summary of how to 0Wn a box when you only have an IP Address
Method Works On BOTH *Nix and Windoze

****You can do the same with domain names (IE google.com) than what you can with IP Addresses. Run a WHOIS Lookup or something along those lines. Or check up on InterNIC you should be able to resolve the domain name to an IP address.****

- Port Scan The Address And Record Open Ports
- Telnet To Open Ports To Identify Software Running On Ports

3) netcat - Network swiss army knife. Like TELNET only better and with a lot more functionality. Both can be used when you are trying to fingerprint software on open ports

- Record Banners And Take Note Of The Application Running and The Version Number
- Take A Gander Online At SecurityFocus.com or Eeye.com. If you cant find any vulnerabilities then search google.
- Make a copy of some Proof-Of-Concept code for the vulnerability.

*Read the documentation if there is any, for the proof-of-concept code you will be using for your exploit*

- Run The Exploit Against The Victim.
- Reap The Cheap-Sh0t Ownage
__________________________________________________ _______________
**This document does not go into covering your tracks. If you dare try any of this stuff on a box you dont have consent to hack on, They will simply look at the logs and see your IP Address and then go straight to your ISP. Once you get more 1337 you get to learn how to get away with the nasty deeds. This is what the majority of kode-kiddies do when they perform attacks. The key is to enumerate all the info you can from the machine, the more info you have on the system the better. User accounts can also be enumerated. Once you have a list of account names, you may then proceed to brute-force or perform a cryptanalysis attack to gain control of the account. Then you must work on privilage escalation. Users are not Admins/Root**

Ulitimate hack pack

Ulitimate hack pack
E:\FELIKSPACK3
|
+---FeliksPack3 - AIOs
| +---AIO Ip Tools
| | aio1pt00ls.rar
| |
| +---AIO Password Recovery
| | Password_Recovery_Utilities_AIO.rar
| |
| +---AntiSchoolKit
| | antischoolkkit.zip
| |
| \---Tracing pack AIO
| ecartoia_pass.thijs.rar
|
+---FeliksPack3 - Anonimity
| Barefoot IP Monitor 5.11 + Serial.zip
| Change IP 1.1.zip
| Complete Anonymous Web Surfing 3.2.zip
| Hide IP Platinum v2.31.zip
| Invisible Browsing v4.0.zip
| IP Switcher Professional 1.01.12 + Crack.zip
| Max Secure Anonysurf 1.2.zip
| NetConceal Anonymizer + Crack.zip
| Privacy Inspector 1.7 Full.zip
| Steganos Internet Anonym 2006 (8.0) Full.zip
| SurfAnonymous 1.0.1.0 + Crack.zip
|
+---FeliksPack3 - AV and FW Killing
| AV and FW Terminator v1.0.zip
| AV Devil 2.zip
| AV Killah 2.zip
| AV Killer.zip
| BackStealth.zip
| E-GEN 3.zip
| F-Server.zip
| Fire Cracker 2.0.zip
| kILLer 1.0.zip
| Killer1.5.zip
| Mistakilla.zip
| Nunca Mais.zip
| OKiller v1.0.zip
| Optix Killer RPV.zip
| Processes Pro 1.0.zip
| Renegade.zip
| SecureSpoof v1.1.zip
| StarKiller v0.2.zip
| Tech Killer.zip
| ZoneKiller.zip
|
+---FeliksPack3 - Binder
| 4m0kjoin3r.zip
| A simple Binder By Blackcobra.rar
| aase_-_crypter_binder.rar
| AFX Executable Binder PRO.zip
| Amok Joiner.zip
| Art of Deception.zip
| aspack21.zip
| Asylum Binder.zip
| Binder par chti hack.rar
| Binder v2.0 beta 1.rar
| Binder v2.1.rar
| Binder.zip
| Bionder 1.0_pass.unknown.rar
| BlackCore File Binder.zip
| Blade Stoner 1.5.zip
| brutal.zip
| brutalforce.zip
| BTS Binder.zip
| bytesadder.zip
| cactus_2.71beta.zip
| Cactus_Joiner_2.0_pass.unknown.rar
| coolbind22.zip
| Crucified 1.2.zip
| crypter maestro.zip
| daecr2pub.zip
| Daemon Crypt Public v2.zip
| Deception Binder.zip
| Deception v4.0.rar
| Deception v4.0.zip
| Deception4.zip
| Djoiner 1.3.zip
| Droopy Binder 1.0.zip
| EES Binder 1.0.zip
| EESBinder.zip
| EESBinder10.zip
| Exe Binder 07.zip
| exe,jpg,doc File Binder.zip
| Exebinder v2.5.zip
| F.B.I - Binder.rar
| F.B.I.rar
| F.B.I.zip
| File Injector v2.zip
| File Injector v3.rar
| File Injector v3.zip
| FileBinder by Chainer.zip
| FreeJoiner.zip
| Fresh Bind.zip
| Freshbind v2.01.zip
| freshbind.zip
| Frusion v1.0.zip
| fsg_v2.zip
| Fusion 1.0.zip
| Hammer Binder v1.0.rar
| Hammer Binder v3.0 FIX!.rar
| Hammer Binder v3.0 Pack1.rar
| Hammer Binder v3.0 Pack2.rar
| HammerBinder v2.0 Standar Edition.rar
| HammerBinder v3.0.rar
| HelioS Binder v1.0c.zip
| Hook Tool Box.rar
| Hook Toolbox.zip
| IDE Spinner.zip
| Inbinder v1.0.zip
| Interlaced II v1.00.zip
| Interlaced v1.00.zip
| interlacedbinder.zip
| J Multi Binder 1.0.zip
| J-BiNdEr.zip
| M3Byter.zip
| MBinder.zip
| MicroJoiner v1.7.zip
| mj17.zip
| Multi Binder 1.4.1.zip
| MultiBinder_v1.4.1.zip
| MVM v1.0.rar
| MVM v1.0.zip
| NakedBind v1.0.zip
| Newjoin.zip
| NG Binder Pro.rar
| NG Binder Pro.zip
| Nightwolf Binder 1.0 Alpha.zip
| nightwolf.rar
| nkedb.zip
| nkedbindv10.zip
| NTPacker.zip
| NTPackerV21.zip
| OverDoz 2.zip
| Overdoz V2.rar
| Pretator v1.6.rar
| Pretator v1.6.zip
| Pretator_v1.6.zip
| Redbinder_v_2.0.1.rar
| Reductor 1.0b (Beta 4).zip
| Rephlex Binder 0.2.zip
| Rephlex 0.2.zip
| SBinder.zip
| SCD 1.0.zip
| SCD [ binder ] v1.0.zip
| scrambletool02.zip
| Silk Rope v2.0 (Binaries and Source).zip
| TAOD.rar
| ToP GUI Full 2.0.zip
| Trendy ~censored~ 1.0b.zip
| Undetector 1.2.zip
| upx.zip
| X-Exe Joiner.zip
| y4b_blnd.zip
| YAB (Yet Another Binder).zip
| [B]inder.zip
|
+---FeliksPack3 - Bios
| AMI Bios Password Reader.zip
| AMI Cracker.zip
| Award Modular BiOS crack tool.zip
| BIOS & CMOS Password.zip
| CMOS Password.zip
| Password List.zip
|
+---FeliksPack3 - Bluetooth
| Blooover.jar
| Blooover2b.jar
| bluealert.zip
| BlueAuditor.zip
| bluescanner.zip
| BlueScannerSetup_1_1_1_0.exe
| bluesweep.zip
| bluetest.zip
| btbrowser.jar
| btbrowser.zip
| btcrack.zip
| BTExplorerPL.jar
| btscanner.zip
| EasyJackv2.jar
| freejack.jar
| ftp_bt_105.jar
| ftp_bt_106.jar
| ISeeYourFiles.jar
| MiyuX.jar
| mobiluck.jar
|
+---FeliksPack3 - Bots
| | AiDS1.0.zip
| | Blue Fuzion 1.0.zip
| | Brainbot v1.5.zip
| | BrainBot_Beta.zip
| | C_15Pub.rar
| | Dark IRC 4.0.zip
| | EPiC BoT 1.0.zip
| | Frozen Bot 6.zip
| | H4X0R B0T 2.0 (GT Edition).zip
| | iix.zip
| | illusion_bot.zip
| | Infrared 3.8.zip
| | IrcContact v3.0.zip
| | KoreTek 1.4.zip
| | Litmus 2.3.zip
| | Litmus v2.3.rar
| | Micro Bot 1.0.zip
| | Nap2k.zip
| | NuclearBot v1.0 Beta.zip
| | NzM 3.0 By Ph3mt.zip
| | Panic Attack 2.zip
| | Remote Control Center.zip
| | Skatan Bot.zip
| | SpyBot v1.3a CryptoMeth Edition.zip
| | Spybot v1.4.zip
| | Stealther 1.2.zip
| | Stubbos.Bot.Public Release.Version.1.3 BETA2.zip
| | TK Botnet.zip
| | Wiseg3ck0-AIM-DDOS-.zip
| | XPLoD 2.0.zip
| | ya.bot.zip
| |
| +---botnet
| | 120-[ModBot]-V1.0.rar
| | 120bot.rar
| | acebot.rar
| | agobot3-0[1].2.1-pre4-priv.rar
| | BlackAsn.rar
| | blueeyebot.zip
| | darkbot6a3.rar
| | edit_evilbot.rar
| | EPiC_BoT_V1.zip
| | evilbot.rar
| | evilbotscript.rar
| | ForBot [06-02-04-05].rar
| | ForBot-2.4.2.rar
| | ForBot_2.3.rar
| | fukj00.rar
| | gsys1.zip
| | gt bot gawd projects.rar
| | gt bot special edtion v1.rar
| | gt bot special edtion v2.rar
| | GT frozen bot II final.rar
| | H-Bot M0d 3.0 M0dd3d by TH & Sculay.rar
| | happybot.v2.0b.zip
| | htmlinfectbot.rar
| | icebot.zip
| | jbot.rar
| | jrbot.rar
| | litmus.rar
| | litmus2-bot.rar
| | litmus2-config.zip
| | microbot.rar
| | NzM [MoD].rar
| | nzmlite.rar
| | Ozel - Rx - Source.rar
| | panicAttack.rar
| | phat-bot_current.rar
| | Phatbot-gh3tt0Bot.rar
| | Phatbot-stoney.rar
| | phatbot_alpha1.rar
| | phatbot_ghetto.v.0.5.rar
| | Phatbot_src-(stoney).rar
| | Phatbot_src.rar
| | Q8Bot.rar
| | r00fuzV1.1a.rar
| | rbot 0.3.3 public.rar
| | rbot vnc spread.rar
| | rbot-0.3.2-fix1-public.rar
| | rbot.priv.alpha1.by.S.rar
| | rbot032public.rar
| | rBot1-SXT.rar
| | rbotoharra.rar
| | rBot_060104_RxBot_v0.7.8.pk_Isass_VG_Pr1v8.rar
| | rBot_dimensionfix_v.4.3.rar
| | rBot_DoS_ResilienT_7252004.rar
| | rBoT_oTh3R-dImeNsIoN_4.4x.rar
| | RepMini.NETAPI.PRIV.rar
| | reptile.03.asn.pnp.netapi.rar
| | reverb.rar
| | reverse.rar
| | Rose.rar
| | Rose_2008.rar
| | rouge-bots_xdcc.rar
| | RX-120-MYSQL-V2.rar
| | rx-asn-2-re-worked v3.rar
| | rx-asn-2-re-worked_v2.rar
| | Rx-MP.rar
| | rx066pl.zip
| | rxbot 0.6.5 pk.lsass.rar
| | rxbot 0.6.5 pk.rar
| | rxBot v0.7.7 Sass.rar
| | Rxbot-ak-0.7-Modded.by.Uncanny.rar
| | rxbot-EcLiPsE1.1.priv.rar
| | rxbot-IFS1.1.priv.rar
| | RXBOT-RevengE2005pnp.rar
| | rxBot0.6.6b-priv+stable-CoKeHeAd.rar
| | rxBot0.6.6d-priv+stable-CoKeHeAd.rar
| | rxbot06.5.rar
| | rxBot0[1].6.6b.rar
| | rxbot6.6.rar
| | rxbot_0.6.5_pk.lsass.rar
| | rxBOT_Fix_0wn4g3.rar
| | rxBot_v0.7.8_iis5ssl+lsass_private.rar
| | rXSass6.6(fixed).rar
| | Rx_0.6.Dev.rar
| | Rx_Dev.rar
| | Safety-Lab.Shadow.Security.Scanner.v7.86.178.Cracked-ARN.rar
| | Scan_BL.zip
| | sd bot with fake xdcc by Synco.zip
| | sdbot-b0rg-by-okasvi.rar
| | sdbot04b.zip
| | sdbot05a.zip
| | sdbot05b-AE.zip
| | sdbot05b-ago.rar
| | SDbot05b-getadm.rar
| | sdbot05b.zip
| | sdbot_syn_secure.zip
| | SDBot_with_NB spreader.rar
| | Sec.Sim_v2.2.0.rar
| | SkuZ [VNC-AIM].rar
| | SnRxBot.rar
| | spybot1.1 full mods.zip
| | spybot1.2a full mods.zip
| | spybot1.2b_beta full mods.zip
| | spybot1.3 full mods.zip
| | spybot1.4 full mods.zip
| | spybot1.4.zip
| | spybot2nd.rar
| | st_able_rx-1[1].01b.rar
| | Urxbot 1.2 [PRIV-INTERNAL].rar
| | Urxbot Lsass2.rar
| | Urxbot-stable-DoNtTrIp.rar
| | urxbot1.1-priv.rar
| | urxbot1.2-priv.rar
| | urxbot_lsass-ftpd_modgbuilds.rar
| | w32_netapi.ra
| | wisdom-modded.rar
| | XPLoD2.0.rar
| | xtbot mod by Sisco.rar
| | xTBot.0.0.2-priver.rar
| | xtbotv2 by Sisco.rar
| | xxx.rar
| | zunker.rar
| |
| \---Sources
| Agobot3-0.2.1 Pre4 Private.zip
| AIM Spread.zip
| aIRCBot 1.0.zip
| AkBot 0.4.1.zip
| bBot 0.5 (Private).zip
| CRX RealmBot (VNC exploit and RFI).zip
| Cyberbot 2.2 - Stable.zip
| DamN Spreader X v0.1b.zip
| Darkbot.tar.gz
| Dopebot.zip
| DSNX BoT 0.4b.zip
| ForBot (RealVNC,NetAPI,MS ASN).zip
| G-SyS Final.zip
| Ghost Bot 0.60.zip
| HDbot 0.2.zip
| Hellbot 3.zip
| HHB Public.zip
| IRC Bot in VB.zip
| ISpread v1.1 - Bot Worm.zip
| Jarbot Private.zip
| KBot.zip
| Kelvir PHP.zip
| Leechbot r1.5b Private.zip
| Leechbot Version 4.zip
| mBot.zip
| Microbot.zip
| Mostrix.zip
| NEW Bot.zip
| Ninja Bot (Puplic).zip
| NITE AIM.zip
| NLX0x1FE 3.2 (Private).zip
| NuRx.zip
| NZMlite.zip
| Omega II.zip
| pBot.zip
| Phatbot-stoney.zip
| Pinger - Backdoor DDoS Tool Bot (VB Sources Included).zip
| Q8Bot.zip
| RacerX90.zip
| RegaBot.zip
| Reverb.zip
| Ruffbot 2.0.zip
| Rxbot 7.6.zip
| SBX 0x00.zip
| sdbot05b.zip
| SDX.amk.0x00.zip
| Shellbot 1.0.zip
| SiX Bot.zip
| SkuZ-Netapi-VNC-IM.zip
| Spybot 1.2c.zip
| SpyBot v1.3 modded.zip
| SpyBot v1.3a CryptoMeth Edition.zip
| Spybot v1.4.zip
| Stubbos Bot 1.3 BETA2.zip
| sxBot.zip
| SYM-VNC-NETAP 3.0.4 ASN.PIABOT.zip
| tGspy-NT.zip
| Txbot.zip
| Undetected Module.zip
| uNkNoWnBoT Project.zip
| UnNamed Bot 1.2 Public.zip
| Urx Special Edition Ultra.zip
| X-Bot.zip
| XDCC Bot.rar
| xFFTSx 2.0.zip
| xTBot.0.0.2 Private.zip
| Zbot pre.zip
| Zonk Bot.zip
|
+---FeliksPack3 - Bruteforce
| 1-Attack Tool kit.zip
| 1-CrackWhore2.0.zip
| Apache_Scanner.zip
| brutus.zip
| Brutus_2006_Setup.zip
| CGIScan.zip
| Crackftp.zip
| E-mail Cracker.rar
| E-mail Cracker.zip
| FTP Brute Forcer.rar
| ftpbr.zip
| ftpbrut.zip
| hackersutility.zip
| phpbb bruteforcer.rar
| PhpBB pass extractor.zip
| phpBBcracker.rar
| Pop_crack.zip
| ShadowScan.zip
| voideye.zip
| Webcrack.zip
| WebCrackv4.0.zip
| wwwh4ckv1946.zip
| wwwhack.zip
|
+---FeliksPack3 - Decrypters
| Access Driver.zip
| Brutus-AEt2.zip
| Cain and Abel 4.2.zip
| FileZilla PWDump 0.1.zip
| ForceSQL.zip
| John The Ripper 1.7.1 Win.zip
| KMd5 1.03b.zip
| LC3.zip
| MailForce2.4.zip
| MD5 (Linux).zip
| MD5 Backup (Linux).tar.gz
| MD5 GUI.zip
| MD5 Toolbox 1.0.zip
| MD5brute 1.0.zip
| Passware 5.0 + Serial.zip
| POP3 BruteForcer.zip
| Sam Decrypt.zip
| Unsecurev1.2.zip
| VNCrack (Linux) 1.21.tar
| VNCrack (Win32) 1.21.zip
|
+---FeliksPack3 - eBooks and tutorials
| All my Warez and Hacker Links.zip
| Beginners Hacking Guide.zip
| Big C++ eBook Pack.ZIP
| bluetooth-hacking.pdf
| Dangerous Google - Searching For Secrets.pdf
| Fejlesztes mobil eszkozokre.ppt
| Hackerland.zip
| Hackers handbook.zip
| HackersBlackBook.zip
| HackersGuide.zip
| Hacking into computer systems - a beginners guide.zip
| How to Crack a Game and tools.zip
| How To Crack Any Type Of CD Protection.zip
| How To Crack With Softice.zip
| Learn Web Design.rar
| Mobil rendszerek programnyelvei.doc
| Phant0m_-_Hackers'_Guide_Vol_1.rar
| Phant0m_-_Hackers'_Guide_Vol_2.rar
| teach-yourself-perl5-in-21-days.zip
| TeachyourselfCin21days.zip
| TeachyourselfCplusplusin21days.zip
| TeachYourselfJavain21Days.zip
| TeachYourselfShellProgrammingin24Hours.zip
| The Little Black Book of Computer Virus.zip
| visual_basic_6_black_book.zip
| Web publishing - professional reference edition.zip
| Webmasters.Guide.To.The.Wireless.Internet.pdf
|
+---FeliksPack3 - FelikPicks
| Proagent_2.1.9_SE.zip
| Spytector 1.3.1 Full.zip
| Undetector 1.2.zip
| xploit_1.4.5_rat.zip
|
+---FeliksPack3 - Google
| Alt-Google.rar
| DaGoogler.zip
| Extreme Searching Guide.txt
| Google Hacker 1.2.zip
| Googlek 0.7.rar
| googler.zip
| google_hacker.zip
| GooLink.rar
| GooLink.zip
| SimpleGoogle_bin.rar
| t3chn0bra1n_z_Googler.zip
|
+---FeliksPack3 - Keyloggers
| | 1-elitekeylogger.zip
| | 5-BFK (Best Free Keylogger).zip
| | 5-power spy.zip
| | Activity Keylogger v1.0.zip
| | Advanced Invisible Keylogger 1.5 Full.zip
| | Aplus.zip
| | Ardamax.Keylogger.v2.8.rar
| | ardamaxl.zip
| | Barok 1.0.zip
| | bfk.zip
| | Chota.zip
| | Computer Spy.zip
| | Curiosity.zip
| | CYBERSHOK 1.0 Private.zip
| | Demon-Ps 2.3.zip
| | DK2Full.zip
| | egf1.0b.zip
| | ehks 2.2.zip
| | ehks.zip
| | Elite Keylogger 1.0.zip
| | elitek3yl0gg3r10.zip
| | EliteKeylogger v1.0.zip
| | elitekeylogger1.0.zip
| | EliteLog_1.7.rar
| | ESK.zip
| | EyeSpy.zip
| | Fearless Key Spy 2.0.zip
| | Fearless KeySpy v2.0.zip
| | fks20.zip
| | fks_2.0.zip.zip
| | FKWP v1.5.zip
| | FSK 2.0.zip
| | GloG.rar
| | Golden eye 2005.zip
| | goldeneye2005setup.zip
| | HermanAgent.zip
| | IKlogger0.1.rar
| | IKlogger0.1.rar.zip
| | k3yl0g3r.zip
| | KeyLog 1.1.zip
| | KeyLog 2.5.zip
| | keylogerSpy2006.zip
| | Keylogger.zip
| | KGB KeySpy 2.0 Private Xmas Edition.zip
| | KGB KeySpy Full.zip
| | LogIT v1.0.rar
| | LttLogger v1.0.rar
| | LttLogger v2.0.rar
| | Metakodix Stealth Keylogger 1.1.0 Cracked.zip
| | MSGate 0.1.zip
| | PasswordLogger.zip
| | Phantom 2.zip
| | Phoenix.zip
| | Pinch 3.zip
| | Power Spy 5.5.2.zip
| | powerspy.zip
| | Project Satan 1.1.zip
| | ProjectSatan20.zip
| | Radar Spy v1.0.zip
| | Radar.zip
| | Recon v1.0.zip
| | Recon v1.2.zip
| | Recon v2.0.zip
| | RemoteLogger v1.0.zip
| | rpkeylogger-0.1.zip
| | SC keylogger V3.2 Full.zip
| | SC-KeyLog 2.zip
| | Skat's.zip
| | SKL 0.1.zip
| | SKL v0.1.zip
| | skl01.zip
| | skl0g.zip
| | SKLEditor1.0.zip
| | Spy.zip
| | Spytector 1.3.1 Full.zip
| | Tong KeyLogger.zip
| | WickeD_Keylogger 1.0.1.zip
| | YSK KeyLog.zip
| |
| \---Installables
| golden Keylog.zip
| install_akl.exe
| i_bpk2003.exe
| i_bpk_lite.exe
| keylogger-king-pro33.exe
| keylogger.exe
| kidlogger.exe
| SC keylogger V3.2 Full.zip
| sc-keylogprodemo.exe
| stealthkeylogger.exe
| Sys_Keylog.exe
|
+---FeliksPack3 - Links
| bg2.jpg
| the_feliks_links.html
|
+---FeliksPack3 - Misc
| | CeedoInstaller.exe
| | pebuilder3110a.exe
| | Resource Hacker 3.4.0.79.zip
| |
| \---PuNkToOl 1.0
| PuNkToOl 1.0.exe
|
+---FeliksPack3 - MSN
| 2-A-IMessengerPasswoRd.zip
| HotFreeze 1.6.zip
| icecold_reloaded freezer.zip
| MesDiscoveryLive_110155.zip
| MSN Messenger Account Cracker v2.0.zip
| MSN Monitor & Sniffer.zip
| msnexte3.zip
| mspass.zip
| NetPass.zip
| nudgemadness.zip
| WWH Flooder 2.0.zip
|
+---FeliksPack3 - Nukers
| b4ttl3p0ng.zip
| fortune.zip
| inf3rn0_nk.zip
| meliskah25.zip
| nuk3it.zip
| PM2.zip
| RocketV1_0.zip
| Sphinx20.zip
| Superkod.zip
| Winsmurf.zip
|
+---FeliksPack3 - Packers and Crypters
| | !Epack.zip
| | BIP.rar
| | CryptX 1.0.zip
| | DalKrypt 1.0.zip
| | EXEFog.zip
| | FakeNinja - PrivateRelase.zip
| | fEaRz Crypter v1.0.zip
| | ICrypt 1.0.rar
| | nakedpack.zip
| | nme_1.1.rar
| | UC-v1.0PUB.rar
| | UnDo_Crypter.zip
| | unkOwn Crypter 1.0.zip
| |
| \---stolen from mytools.110mb.com
| AREA 51 Cryptor.zip
| ASPack 2.12.zip
| AZProtect.zip
| Cexe (NT Only).zip
| Diet.zip
| Enigma Protector 1.16.zip
| ExE Evil v1.0.zip
| exe32pack.zip
| EXESmasher 1.0.zip
| FSG v1.33.zip
| FSG v2.0.zip
| ICrypt 1.0.zip
| IProtect.zip
| Krypton v0.3.zip
| Lzexe1.00a.zip
| Mew 11 SE v1.2.zip
| MoleBox 2.6.1.zip
| Morphine v1.5.zip
| Morphine v1.6.zip
| Morphine v1.7.zip
| Morphine v1.9.zip
| Mr. Undectetable.zip
| NeoLite v2.0.zip
| nPack 1.1.300.zip
| NsPack v3.4 Full Cracked.zip
| NT Packer.zip
| Pack 1.0.zip
| Packman 1.0.zip
| PECompact v2.64 Full.zip
| PEncrypt 4.0.zip
| PEPack 1.0.zip
| Petite 2.2.zip
| Pex 0.99.zip
| Phantom.zip
| PKLite32 1.0.zip
| Private EXE Protector 2.0.zip
| RAT Packer.zip
| RLPack 1.16 Basic Edition.zip
| RLPack 1.17 Personal Edition.zip
| Scramble Tool v0.2.2 rc1.zip
| SDC 1.2.zip
| shrnkEXE.zip
| Stud v1.0 Crypter.zip
| tElock 0.98.zip
| Underground Crypter 1.0.zip
| UPX Crypt.zip
| UPX v1.08w.zip
| UPX v1.24w.zip
| UPX v1.25w.zip
| UPX˙v2.02w.zip
| Wind Of Crypt 1.0.zip
| WinLite.zip
| WWPACK 3.05.zip
| Yoda's Crypter v1.3.zip
|
+---FeliksPack3 - Passwd crackers
| 2-Advanced archive password recovery.zip
| 3-A-PDF-PRP.ZIP
| 3-AOfficePasswordRecovery.zip
| 3-PDF Password Remover v2.2.zip
| apocalypso.zip
| hydra-4.6-src.tar.tar
| john-17w.zip
| md5_cracker.rar
| mdcrack-1.2.tar.tar
| rainbowcrack-1.2-win.zip
| Ultra Zip Password Cracker.zip
|
+---FeliksPack3 - PHP Shells
| 0x333openssh-3.6.1p2.tar.gz
| 0x333openssh-3.7.1p2.tar.gz
| 2005.rar
| 23.php Shells.rar
| 23_diffrent_shells.rar
| 55k7-SWCS.rar
| admin-ad.asp
| adore-0.39b4.tgz
| Babyface.rar
| BackDooR (fr).rar
| BDoor.rar
| bind shell.txt
| binder2.rar
| borg.asp.txt
| byshell063.rar
| byshell064.rar
| byshell067beta2&src.rar
| c100.rar
| c99last.tar.gz
| c99shell.php
| cgitelnet.tar.gz
| chkrootkit-043.tar.gz
| cmd.rar
| darkspy105_en.rar
| Defacing Tool Pro v2.5.rar
| door.rar
| down.rar
| eBayId.rar
| Eternity.rar
| evilspy.rar
| evilspy2.rar
| He4Hook215b6.zip
| hkdoor1.0.rar
| hkshell_v1.0.rar
| httpdoor.rar
| hxdef084.zip
| hxdef100.zip
| hxdef100r.zip
| HYTop2005.rar
| HYTop2006.rar
| ibf_dbbackup.sql.gz
| icmpdoor.rar
| icyfox007v1.10.rar
| ironscanner.rar
| lrk5.src.tar.gz
| MDir.vbs
| Mithril v1.40.rar
| Mithril v1.45.rar
| NetCat_New_fixed_version.rar
| nstviewshell.rar
| packetdoor_src.zip
| PHP Backdoor v1.rar
| phpdoor.rar
| phpdoor2.0.rar
| PhpShell.php
| phpspy_2005.rar
| phpspy_2006.rar
| PHP_BackDoor_v1.5.rar
| php_files_thief.rar
| PHP_Shell_v1.7.rar
| PortLessNew.zip
| r57shell.rar
| remview_2003_04_22.zip
| rknt.zip
| root.c
| safe mode bypass coded by preddy.txt
| saphpshell.rar
| scripts 2 exe.rar
| sendip15.rar
| shells.rar
| simple.p
| Simple_PHP_BackDooR.rar
| sinar0.1.tar.tar
| sk-1.3a.tar.gz
| sk-1.3b.tar.gz
| skeeve1.0.tar.tar
| SSH RFI.txt
| ssh.rar
| tcp_backdoor.c.gz
| uay_source.rar
| usr.php
| vanquish-0.2.0.zip
| VipshellSrc.rar
| W4-c99.php
| wbc-v1.tar.gz
| WebAdmin.rar
| Webadmin2X.rar
| webshell.php
| webshellv001.rar
| webshellv005.rar
| winshell50src.zip
| wx-01.tar.gz
| wx.tar.tar
| x-door[F321].rar
| xIShell_218.zip
| xssshellv039.zip
| ZXshell2.0.rar
| _root_040.zip
|
+---FeliksPack3 - PWD Stealers
| Demon PS 2.3.zip
| HermanAgent 1.0.zip
| Hosein PS 1.6.zip
| JPS 1.8.zip
| Lord PS.zip
| MSN PassSender.zip
| PassSpy 1.0.zip
| ProAgent v2.0.zip
| PSPV K-Stealth III.zip
| RePass2.1.zip
| S-H Yahoo Password Sender 1.1.zip
|
+---FeliksPack3 - R00tk1ts
| 9xRX.zip
| advanced_loader.zip
| AFX Rootkit 2005 FIX.zip
| afxrk2k4.zip
| AFXRootkit2005.zip
| Agony.zip
| Basic Rootkit.zip
| basic_loader.zip
| Boot Root.zip
| Chazv2.rar
| eeyebootroot.zip
| Eternity.rar
| FUTo Enhanced.zip
| Hacker Defender.zip
| He 4 Hook.zip
| He4Hook215b6.zip
| HideProcessHookMDL.zip
| hxdef.zip
| klister-0.4.zip
| Klog 1.0.zip
| Logoner.zip
| Morphine.zip
| NT illusion.zip
| NT Rootkit.zip
| patchfinder_w2k_2.11.zip
| rk_044.zip
| RK_SRC_040.2.zip
| SInAR-0.1.tar.gz
| SysEnterHook.zip
| vanquish-0.2.1.zip
| Vanquish.zip
| vice.zip
| w32root.zip
| Windows XP RootKit.zip
| WinEggDrop Shell Eternity Version.zip
| winkit.zip
| WinLogon Hijack 0.3-src.zip
| winlogonhijack-v0.3-src.rar
|
+---FeliksPack3 - Rapid
| Rapid.rar
|
+---FeliksPack3 - ReMade
| +---AC
| | \---ACStripper
| | ACRebuilder.exe
| | ACStripper.exe
| |
| +---AS
| | +---ASPackDie
| | | ASPackDie.exe
| | | ForceLibrary.dll
| | |
| | \---AStripper
| | Engine.sys
| | Stripper X.exe
| |
| +---DBPE
| | \---DBPE Unpacker
| | DBPE Unpacker.exe
| |
| +---FSG
| | \---UnFSG
| | FSG Dumper.exe
| | UnFSG.exe
| |
| +---MEW
| | \---UnMEW
| | UnMEW.exe
| |
| +---PE
| | +---PESpin
| | | PESpin.EXE
| | |
| | +---UnPECompact
| | | Realign.dll
| | | rebIT.dll
| | | UnPECompact 2.EXE
| | | UnPECompact.exe
| | |
| | \---unPEncrypt
| | unPEncrypt.exe
| |
| +---PEiD
| | | external.txt
| | | IDToText.Ini
| | | PEiD.exe
| | | userdb.txt
| | |
| | +---plugins
| | | AddSig.DLL
| | | ExtOverlay.dll
| | | FC.DLL
| | | FixCrc.dll
| | | GenOEP.dll
| | | IDToText.DLL
| | | ImpREC.dll
| | | kanal.dll
| | | Morphine.dll
| | | PackUPX.dll
| | | PEiDBundle.DLL
| | | pluzina1.dll
| | | pluzina2.dll
| | | pluzina3.dll
| | | pluzina4.dll
| | | RebuildPE.dll
| | | ResView.dll
| | | SecTool.dll
| | | undef.dll
| | | unfsg_v133.dll
| | | unupolyx.dll
| | | unupx.dll
| | | UnUPXShit.dll
| | | XNResourceEditor_Plugin.DLL
| | | ypp.DLL
| | | ZDRx.dll
| | |
| | \---pluginsdk
| | defs.h
| | null.c
| | NULL.dll
| |
| +---Protection ID
| | Protection_ID.exe
| |
| +---Resource Hacker
| | Dialogs.def
| | ResHacker.cnt
| | ResHacker.exe
| | ResHacker.ini
| |
| \---Restorator2007
| Restorator2007.exe
| Restorator2007.txt
|
+---FeliksPack3 - Scanners
| 1-SuperScan 2.06.zip
| 1-SuperScan 4.zip
| 134_superscan4.zip
| 7th Sphere 1.2 Basic.zip
| Angry IP Scanner v2.08.zip
| angryipscan.zip
| aolip.zip
| AWSPS 4.61.zip
| Bitch in Threads.zip
| bitchinthreads.zip
| blue.zip
| Blues Port Scanner 5.zip
| bluesprtscn.zip
| CGI Founder v1.043.zip
| cgis4.zip
| CGISscan.zip
| Domain Scan.zip
| domainscanv1_0or.zip
| IP Grabber 3.zip
| IP Stealer Utilities.zip
| ITrace32 v2.00.zip
| lanspy.zip
| Legion NetBios Scanner v2.1.zip
| MooreR Port Scanner.rar
| NeoTrace 3.5.zip
| neotrc325.zip
| NetBIOS Name Scanner.rar
| netscantools4or.zip
| Nmap 4.01 (Win32).zip
| nmap-4.03.tar.bz2
| nts.zip
| Port Racer 2.0.zip
| Port Scanner.zip
| ProPort.zip
| Stealth - HTTP Scanner v1.0 build 23.zip
| sup3rsc4n.zip
| super.zip
| SuperScan 4.0.zip
| superscan4.zip
| TCP View.zip
| Trojan Hunter.zip
| TrojanHunter15.zip
| wasp.zip
|
+---FeliksPack3 - THE NET TOOLS 4.5!!
| NetTools4.5.74.zip
|
+---FeliksPack3 - Trojanz
| 0ptixv133.zip
| Amiboide Uploader 2.0.zip
| Amitis 1.4.3.zip
| Anal Rape 1.0.zip
| Assasin v2.0.zip
| Assasinv20.zip
| Atentator1.0.zip
| Ayo spy.zip
| Backdoor 2.02.zip
| BAD R.A.T 1.6.zip
| bandook_v135.zip
| Beast 2.07.zip
| Beast v2.07 06-08-2004.zip
| beast_206.zip
| beast_207.zip
| Bersek 1.1.zip
| Bifrost 1.2.1.zip
| bionet4-0-5.zip
| Bitfrost1.2.1.zip
| blueeye10b.zip
| BO2K 1.1.5.zip
| Bo2k.zip
| c-i-a-1-2-3.zip
| C-One.zip
| CFRATBETA.zip
| Char0n.zip
| CIA v1.23 PublicBeta 1.zip
| CIA v1.3.zip
| ColdFusion v1.2.rar
| Complete Control 2.0.zip
| cyberneticv162fix.zip
| cyberneticv162fix_rat.rar
| CyberPaky 1.8 Gold.zip
| Cyn 2.1.zip
| c_yn_21.zip
| d33Pthr04t.zip
| Destruction Designs 1.3.0.3 Beta.zip
| Digital Upload Trojan.zip
| elfRAT 1.2.zip
| Erazer Lite 0.3.zip
| Evilotus 1.3.zip
| Fearless Trojan 1.5.zip
| Flux V1.01 Pack.zip
| FuraX 1.0.zip
| furax_10b3.zip
| ggt23.rar
| Greek hackers rat v1.0.zip
| gupt2.zip
| Guptachar 2.0.zip
| Hackz.rar
| Hav-Rat1.3.0.zip
| HavRat 1.3.1.zip
| HelioS Trojan v3.1.zip
| hRat 1.0.zip
| Hue 1b.zip
| illusion.zip
| Institution2004 v0.4.zip
| InVasion 1.0.1.zip
| invasion1.1.zip
| Kryptonic Ghost 1.3.zip
| Latinus14(subseven gui).zip
| Leviathan10.zip
| Lithium v1.03.zip
| LogansSourcecode.zip
| m0sck3r.zip
| Mind Control v.5.0.zip
| mofotro 1.1.zip
| MofoTro1.7beta.zip
| n0kn0k72.zip
| n3t_d3v15.zip
| Net-Devil 1.5.zip
| NetAngel 1.0.zip
| NetBotAtt14En.zip
| NetDevil v1.5.zip
| NetShadow PublicBeta1.zip
| Nuclear RAT v1.0 PublicBeta 9.zip
| Nuclear Uploader v1.2.zip
| NuclearRatBeta9.zip
| older_trojans.zip
| Omerta13.zip
| Optix v1.33.rar
| OptixLite v0.5.zip
| OptixPro v1.32.zip
| Outbreak 0.3.0 Public Beta.rar
| Phantoms remote File Manager.zip
| PI2[1].3.0.ZIP
| PoisonIvy2.2.0.rar
| Proagent_2.1.9_SE.zip
| ProRat v1.9 FIX2.zip
| ProRat v1.9.zip
| ProRatv19.zip
| Prorat_ProCracker v1.9.exe
| ProRat_SE_Fx18.rar
| PsyRAT 1.0.zip
| RaZoR.zip
| remotedesktopspysetup4.zip
| RLPacker.rar
| S-H_Yahoo_Pass_Sender_1.1.zip
| senna spyworm generator.zip
| ShadowRAT Development Release 5.zip
| sharK v0.6.rar
| sharK_2.1_pass.shark-project.net.rar
| SilentSpy.zip
| SimpleTrojan.zip
| SkD RAT 2.0.zip
| skd2.zip
| SkDRAT2.zip
| Slh 4.0.rar
| Spirit 4.0 Beta 1.zip
| SpyOne 1.0.zip
| Sub7 2.2.zip
| sub7.zip
| sub7_21gold.zip
| Tequila Bandita v1.2F.rar
| TGA_backdoor_SP2_v2.0.zip
| th33fle_1_0.zip
| The Punisher Trojan.rar
| Theef v2.10.zip
| theef_210.zip
| Traffix_1.0_BETA_.rar
| Tranzhva 1.0.zip
| undetec33.zip
| UnDetected_3.3.rar
| Unicorn.zip
| Voice Spy.zip
| Vortex.zip
| Webcrack.zip
| wwwhack.zip
| X-BkDr 2.2.0.zip
| xHackerbasic2.1.zip
| xploit 1.4.5.zip
| xploit_1.4.5_rat.zip
| XZTOO.zip
| X_Rat_3.3.rar
| Y3K12.zip
| y3krat2k5rc10.zip
| Yet Another Trojan 1.3.zip
| You_Make_Me_Sick_Trojan.rar
| Yuri 1.2.zip
| Yuri_V12.zip
| Z-Dem0n 1.26.zip
| Zer0 Tolerance 1.9.zip
|
+---FeliksPack3 - Viruses
| | 6000_Viruses.rar
| |
| +---Binary
| | Access IV.zip
| | Agent.zip
| | Aids C.zip
| | Anthrax.zip
| | Antipascal.zip
| | BBook.zip
| | Blackjack32.zip
| | Caligula.zip
| | Civil War 2.8.zip
| | Damn!.zip
| | FoolsGold.zip
| | Groovie.zip
| | Hate97.zip
| | HD Killer.zip
| | labv14.zip
| | MDL.zip
| | NS.zip
| | Omega.zip
| | One.zip
| | OVCT.zip
| | Papaa.zip
| | Papab.zip
| | Parasite.zip
| | PSD 2000.zip
| | Shiver.zip
| | sic-vir.zip
| | Skimppy.zip
| | Smile.zip
| | Stupid.zip
| | Sugar 2.zip
| | Sugar.zip
| | Tequila.zip
| | Uruguay.zip
| | Ver1.zip
| | vir-v.zip
| | Vir61.zip
| | vircr20.zip
| | virfac.zip
| | virii-3.zip
| | vKit 1.0.zip
| | Win32.SKA.zip
| | win98vir.zip
| | WordBug.zip
| | WordSick.zip
| |
| +---Constructors
| | Access Macro Generator.zip
| | Acid Flowing Trojan Generator.zip
| | Advanced Batch Mutator.zip
| | Advanced Steam Trojan Generator 1.1.zip
| | Alchemic Life Generator.zip
| | ANSI Bomb Constructor.zip
| | Ansi Bomb Kit.zip
| | Biohazard's Worms Generator.zip
| | Biological Warefare Virus Creation Kit.zip
| | Byte Virus Generator v1.7 (DBVG).zip
| | Byte Virus Generator.zip
| | C++ Worm Generator.zip
| | CcT's Malware Construction Kit.zip
| | CM's Batch Virus Generator.zip
| | CM's Evil Tool (XP) Prank File Generator v1.0.zip
| | CVEX Virus Maker.zip
| | Dav's Media Files Worm Kit.zip
| | Dav's Virus Builder.zip
| | Deinonychus Virus Generator.zip
| | Dirty Nazi Virus Generator.zip
| | Dr.VBS Virus Maker.zip
| | Duke's Simple Virus Cloner Tool.zip
| | Easy Virus Maker.zip
| | Ejecutor Virus Creator.zip
| | Elektronny Pisatel Virusow.zip
| | Evil Tool.zip
| | EVX.zip
| | Falckon Encrypter.zip
| | G2 Phalcon Skism's.ZIP
| | Hell P2P Worm Generator (Fixed).zip
| | Instant Virus Production Kit.zip
| | JPS Virus Maker 2.0.zip
| | JPS Virus Maker.zip
| | Kids Worm Generator.zip
| | LineZer0 Macro Engine.zip
| | Looper Generator.zip
| | Macro Virus Development Kit.zip
| | Mass Destruction Library.zip
| | Microsoft Visual Basic Script Worm Editor v9.0.zip
| | Microsoft Visual Basic Script Worm Editor.zip
| | Mister Spock - Virusgenerator Version.zip
| | MSH Virus Kit.zip
| | Newborn Worm Generator 0.9.zip
| | Next Generation Virus Construktion Kit 0.45b.zip
| | Nowhere Utilities.zip
| | Nuke GenVirus.zip
| | Nuke Randomic Life Generator.zip
| | Pass Steal Trojan Gen.zip
| | PetiK Script Worm and Virus Generator.zip
| | Pokes WormGen 2.zip
| | Purgatory Companion Virus Kit.zip
| | Rajaat's Tiny Flexible Mutator.zip
| | Razorblade's Batch Virus Generator 1.1.zip
| | Satan's Apocalypse Virus Generator 1.0 by Z6.zip
| | Satanic Brain Virus Tool's.zip
| | SkamWerks Labs.zip
| | Special Format Generator v2.0 (BATCH Trojan Maker).zip
| | TeraBIT VirMaker 2.8.zip
| | The Czybik Gen Creation Kit 1.2.zip
| | The Fabulous Jany Batch Maker.zip
| | The Shinny Batch Trojan Generator 1.0b.zip
| | The Simple WinScript Virus Kit.zip
| | The Super Appending Batch VCK.zip
| | The Virus Wizard.zip
| | The WalruS Macro Virus Engine 1.21.zip
| | The WalruS Macro Virus Generator 1.0.zip
| | Time Bomb Generator.zip
| | Trojan Horse Construction Kit 2.0.zip
| | TSR Time Bomb Creator.zip
| | Uber Worm Generator (UWG).zip
| | Uber Worm Generator.zip
| | VBS Worms Generator 2.zip
| | VC.zip
| | Viral Matrix (VMG1.0).zip
| | Viral Matrix 1.0.zip
| | Virus Creation Laboratory.zip
| | Virus Researcher's Toolkit.zip
| | Win Script Virus Kit.zip
| | Windows Scripting Host Worm Constructor v1.0.zip
| | Windows Virus Creation Kit.ZIP
| | Worm Irc Script Kit.zip
| | XVGL 0.02b.zip
| | Zed's Word Macro Virus Constructor.zip
| |
| \---Sources
| VIRS-19.ZIP
| VIRS-AD.ZIP
| VIRS-EH.ZIP
| VIRS-IL.ZIP
| VIRS-MP.ZIP
| VIRS-QU.ZIP
| VIRS-VZ.ZIP
|
+---FeliksPack3 - Vista
| +---OEM BIOS Emulation Toolkit
| | | DIFxAPI.dll
| | | OEMTool.exe
| | | pkeys.txt
| | | readme.txt
| | | royal.inf
| | | royal.sys
| | |
| | \---CERTS
| | Acer.xrm-ms
| | ASUS.xrm-ms
| | Hewlett-Packard.xrm-ms
| | Lenovo.xrm-ms
| |
| +---Vista Activation Crack
| | pkeyconfig.xrm-ms
| | tokens.dat
| | Vista Activation Crack.txt
| |
| +---Vista Activator
| | | Install.exe
| | | TimerStop64.sys
| | |
| | \---Old
| | TimerStop.sys
| | Vista Test Crack.exe
| |
| +---Vista Activator 2007
| | Vista Activator 2007.exe
| |
| +---Vista Automated Activation Crack v3.0
| | KEYs.txt
| | Vista Automated Activation Crack v3.0.exe
| |
| +---Vista Final Crack
| | | Vista Final Crack.txt
| | |
| | \---Windows
| | +---ServiceProfiles
| | | \---NetworkService
| | | \---AppData
| | | \---Roaming
| | | \---Microsoft
| | | \---SoftwareLicensing
| | | tokens.dat
| | |
| | \---System32
| | \---Licensing
| | \---pkeyconfig
| | pkeyconfig.xrm-ms
| |
| +---VISTA KEYS
| | VISTA KEYS.txt
| |
| +---Vista Loader
| | Vista Loader.exe
| |
| +---Windows Vista Activation 1.3
| | Windows.Vista.Activation.Installer.1.3.exe
| |
| +---Windows Vista Activator
| | Windows Vista Activator.exe
| | Windows Vista KEY.txt
| |
| +---Windows Vista Activator 2
| | Windows Vista Activator 2.EXE
| |
| +---Windows Vista StopTime Crack
| | 1.bat
| | 2.bat
| | check.bat
| | Readme.txt
| | Windows Vista Crack.exe
| |
| +---x64 x32 Fix
| | \---Windows
| | +---ServiceProfiles
| | | \---NetworkService
| | | \---AppData
| | | \---Roaming
| | | \---Microsoft
| | | \---SoftwareLicensing
| | | tokens.dat
| | |
| | \---System32
| | \---Licensing
| | \---pkeyconfig
| | pkeyconfig.xrm-ms
| |
| \---XP
| | Key Finder.exe
| | OS Update Hack.exe
| | Random Serial Numbers.exe
| | RemoveWGA.exe
| | Reset.exe
| | Server 2003.exe
| | TweakNT.exe
| | WGA Fix.exe
| | Win 4 iN 1.exe
| | Win 95-2000.exe
| | Win XP Activator.exe
| | Windows 2003 & XP Anti Product Activation Crack 1.1.exe
| | Windows Xp Genuiner.exe
| | Windows XP KeyGen.exe
| | Windows XP Product ID Changer.exe
| | Windows XP-NET-2003 Product Key Changer.exe
| | WinXP Activation 1.1.exe
| | WinXP Corp. Key Changer 2.exe
| | WinXP_Validate_keys.exe
| | Xp Genuiner.reg
| | XP Password Manager.exe
| | XPPID.exe
| | xpy.exe
| |
| +---Windows Admin Password Hack
| | README.txt
| | Windows Admin Password Hack.iso
| |
| \---Windows Update Fix
| Corp Windows Update Fix.reg
| regupdate.vbe
|
+---FeliksPack3 - Vulnerabilty
| 950_sploit.rar
| CGI Founder.zip
| Cgi Scanner 4.zip
| LanSpy.zip
| Libwhisker 2.3.zip
| Nikto.zip
| NStealth HTTP Security Scanner 5.8 Free.zip
| Retina - For Windows NT.zip
| Shadow Security Scanner 7.84.zip
| THC-Amap Version 5.2.zip
| VoidEYE CGI Scanner.zip
| Vulnerabilityes Scanners & Exploiters Pack v1.10.zip
| vulnerabilty.rar
| Web Check.zip
|
+---FeliksPack3 - WebDownloaders
| Aphex Web DL 0.5 Lite.zip
| Atmaca Downloader 2.0.zip
| Blackcobra Downloader.zip
| Blind Downloader 1.1.zip
| BlxDl'er v2.zip
| BugsPrey 0.13.zip
| Cacheton Webdl 1.0.zip
| Code Injection Downloader.zip
| Cryptic Downloader.zip
| crypticdlr.zip
| D-WEB 1.0.zip
| D3S WebDownloader v1.0c.zip
| Downloader DARK.zip
| dwc.zip
| DWTC.zip
| Dyn-dl.zip
| Dyn-Dv1.zip
| Dynamic Downloader 1.0.zip
| Fearless Downloader.zip
| Fearless Web Downloader 1.2.zip
| Fearless Web Downloader 2.0.zip
| fedownloader_20.zip
| Follow the Reaper Downloader.zip
| ftrdl.zip
| FWB Web Downloader 1.0.zip
| fwebd10.zip
| Ghost Radmin 2.1.zip
| GIN! Downloader.zip
| GodWill.zip
| Hookbyter Final.zip
| hookbyter.zip
| ItalianFWB Downloader.zip
| KAOS WebDL v1.0.zip
| KaoTan 2.zip
| Lan Stealth Downloader.zip
| Mafia Downloader v1.0.zip
| Mind Controller.zip
| Noesis 1.1 Tiny.zip
| Passive Terror 1.3.zip
| Passive Terror v1.3 Final Edition.zip
| PRV-Downloader.zip
| pURE 0.9b.zip
| Sandesa 1.1.zip
| SelfSoft Downloader 2.0.zip
| Silent Assasin V2.0 Beta.zip
| silentassasinv20beta.zip
| SIS-Downloader v1.1.zip
| skddownloader.zip
| Smoke Downloader v1.1.zip
| SMW 1.4.3.zip
| Toxic Webdl 1.1.zip
| toxic11.zip
| TROLL Downloader 1.0.zip
| troll.zip
| U.R.B Downloader.zip
| Veritas Downloader v1.0.zip
| Wormito (Beta).zip
| YAW (Yet Another Webdownloader) v.0.1.zip
|
+---FeliksPack3 - Wireless
| | abappwd.zip
| | aerosol.zip
| | AIO Wireless Hack Toolz.exe
| | aircrack-ng-0.5.tar.gz
| | aircrack.zip
| | aircrackng.zip
| | aircrackpack.zip
| | aire.zip
| | airsnort.zip
| | aptools.zip
| | asleap.zip
| | cowpatty.zip
| | EasyWifiRadar.zip
| | Hotspotter-0.4.tar.gz
| | kismet-2005-08-R1.tar.tar
| | kismet-2006-04-R1.tar.gz
| | netstumbler.zip
| | Wellenreiter-v1.9.tar.gz
| | weplab.zip
| | wepwedgie-alpha-0.1.0.tar.gz
| | wireshark-setup-0.99.5.zip
| |
| +---Client evaluation tools
| | hotspotter-0.4.tar.gz
| | karma-0.4.tar.gz
| | rogue_squadron-0.1.bin
| | tool-probemapper0.5-tar.bz2
| |
| +---Misc
| | Admin-guid.pdf
| | advanced-guide.pdf
| | AIO.Wireless.Hack.Toolz.txt
| | AIO.Wireless.Hack.Toolz_1.txt
| | airpwn-0.50c.tar.gz
| | airsnarf-0.2.tar.gz
| | airsnort-0.2.7e.tar.gz
| | ap-utils-1.5.tar.bz2
| | aphopper-0.3.tar.gz
| | applewepkey.txt
| | aptools-unix-gtk-0.1.0.tar.gz
| | Bash-Beginners-Guide.pdf
| | gpsd-2.31.tar.gz
| | gpsdrive-2.10pre2.tar.gz
| | Hotspotter-0.4.tar.gz
| | kismet-2005-08-R1.tar.tar
| | macfld.txt
| | netstumblerinstaller_0_4_0.tar.rar
| | ori.11b.we14-2.mos
| | Wellenreiter-v1.9.tar.gz
| | WEPCrack-0.1.0.tar.gz
| | wepwedgie-alpha-0.1.0.tar.gz
| | wifi2eth.txt
| |
| +---RF signal strength monitoring
| | wavemon-current.tar.gz
| | wpm-0.00.tgz
| | wscan1.00.tar.gz
| | wscan_1.0_arm.ipk
| | xnetworkstrength-0.4.2.tar.gz
| |
| +---Wireless custom frame generation
| | airjack-v0.6.6b-alpha.tar.bz2
| | airjack26-0.1a.tar.bz2
| | chopchop-0.1.zip
| | fakeap-0.3.2.tar.gz
| | fata_jack.txt
| | file2air-0.1.tar.bz2
| | libradiate-beta-0.02.tar.gz
| | libwlan-0.1.tar.gz
| | omerta_source.txt
| | void11-0.2.0.tar.bz2
| | wifitap.tgz
| | wnet.tgz
| |
| +---Wireless Network Discovery, Mapping and Traffic Analysis
| | airfart-v0.2.1.tar.gz
| | airtraf-1.1.tar.gz
| | aphunter.tgz
| | apradar-0.52.tar.gz
| | bsd-airtools-v0.2.tgz
| | ClassicStumbler.img.sit.hqx
| | gtkskan-0.2.tgz
| | istumbler-96.tgz
| | KisMACR65.zip
| | kismet-2005-08-R1.tar.gz
| | Mognet-1.16.tar.gz
| | monitoring-2_6-2.diff.bz2
| | perlskan-0.1.tar.gz
| | prismdump_20001122.tgz
| | prismstumbler-0.7.3.tar.bz2
| | ssidsniff-0.42.tar.gz
| | wardrive-2.3.tar.gz
| | wavestumbler-1.2.0.tar.gz
| | Wellenreiter-v1.9.tar.gz
| | wi-find-0.2.1.tar.bz2
| | WifiScanner-1.0.2.tar.gz
| | wispy-tools-2006-01-R1.tar.gz
| | wistumbler-current.tar.gz
| | wlan-scan-0.0.1.tgz
| |
| +---Wireless-specific encryption cracking
| | aircrack-2.41.tgz
| | airsnort-0.2.7e.tar.gz
| | asleap-1.4.tgz
| | attacker.tgz
| | bsd-airtools-v0.2.tgz
| | cowpatty-2.0.tgz
| | leap.tgz
| | LucentRegCrypto-0.3.zip
| | thc-leapcracker-0.1.tar.gz
| | WepAttack-0.1.3.tar.gz
| | WEPCrack-0.1.0.tar.gz
| | WepDecrypt-0.7.tar.gz
| | weplab-0.1.5.tar.gz
| | wepwedgie-alpha-0.1.0.tar.gz
| | wep_tools.tgz
| | wnet.tgz
| |
| \---www.wardrive.net
| aerosol-0.65.zip
| airbase-stable.tar.gz
| aircrack-ng-0.9-win.zip
| aircrack-ng-0.9.tar.gz
| airfart-v0.2.1.tar.gz
| airjack-v0.6.6b-alpha.tar.bz2
| airsnarf-0.2.tar.gz
| airsnarf.ppt
| airtraf-1.1.tar.gz
| aphopper-0.3.tar.gz
| apradar-0.52-1.i586.rpm
| asleap-1.4.tgz
| Hitchhiker0.4b1.msi.zip
| hotspotdk.zip
| hotspotter-0.4.tar.gz
| istumbler-98.tgz
| kismet-2007-01-R1b.tar.gz
| MiniStumblerInstaller_0_4_0.exe
| Mognet-1.16.tar.gz
| NetStumblerInstaller_0_4_0.exe
| PacketyzerSetup_5_0_0.exe
| pong_v1.1.zip
| prismstumbler-0.7.3.tar.bz2
| rogue_squadron-0.1.tar
| ss2004-5.325.zip

links
http://rapidshare.com/files/39120712/Fel...part01.rar

http://rapidshare.com/files/45737784/Fel...part02.rar

http://www.gigasize.com/get.php/-1099776...part03.rar
http://rapidshare.com/files/56306635/Fel...part03.rar

http://www.gigasize.com/get.php/31952818...part04.rar
http://rapidshare.com/files/56322904/Fel...part04.rar

http://www.gigasize.com/get.php/-1099635...part05.rar
http://rapidshare.com/files/56363897/Fel...part05.rar

http://www.gigasize.com/get.php/-1099635...part06.rar
http://rapidshare.com/files/56394234/Fel...part06.rar

http://www.gigasize.com/get.php/-1099657...part07.rar
http://rapidshare.com/files/56520789/Fel...part07.rar

http://rapidshare.com/files/40549346/Fel...part08.rar

http://rapidshare.com/files/40563612/Fel...part09.rar

http://rapidshare.com/files/40584989/Fel...part10.rar

http://rapidshare.com/files/40605397/Fel...part11.rar

http://rapidshare.com/files/40753111/Fel...part12.rar

http://www.gigasize.com/get.php/-1099657...part13.rar
http://rapidshare.com/files/56537339/Fel...part13.rar

http://www.gigasize.com/get.php/-1099634...part14.rar
http://rapidshare.com/files/56545036/Fel...part14.rar

password: made_by_feliks

All Hacking Resources!

All Hacking Resources!
Here:
Security Links

§ A totally HUGE security archive http://neworder.box.sk/
§ THE best security forums http://www.security-forums.com/
§ Current and archived exploits http://www.securiteam.com/exploits/
§ 'Underground' search engine http://www.warez.com/
§ Default login’s for all sorts of devices http://www.governmentsecurity.org
§ One of the top mainstream security sites http://www.securityfocus.com/
§ TESO Computer security http://teso.scene.at/
§ Asian security group, lots of advisories http://www.shadowpenguin.org/
§ w00w00 Security development http://www.w00w00.org/
§ USSR a strong security group http://www.ussrback.com/
§ Good all around security site http://www.packetstormsecurity.nl
§ Exploits, backdoors, Trojans and more http://www.tlsecurity.net
§ SANS Security Institute with articles on EVERYTHING http://www.sans.org/
§ A Fairly immense WWW security FAQ http://www.w3.org/Security/Faq/
§ Computer Security Encyclopedia http://www.itsecurity.com/
§ Java Security information http://java.sun.com/security/
§ Help Net Security http://www.net-security.org/
§ Security Search Engine http://searchsecurity.techtarget.com/
§ Free BSD security information http://www.freebsd.org/security/
§ Netscape security information http://home.netscape.com/security/
§ Linux security community centre http://www.linuxsecurity.com/
§ Dutch Security Information Network http://www.dsinet.org/
§ Network Security Library http://secinf.net/
§ Infamous happy hacker http://www.happyhacker.org/
§ A once great site from a white hat hacker http://www.antionline.com/
§ Infosec papers and articles http://www.infosecwriters.com/
§ Security/privacy/crypto software archive http://www.wiretapped.net/
§ ISB - Info Sec Bible http://www.securityflaw.com/bible
§ Security tool’s Http://foundstone.com/
http://securitystats.com

Privacy and Anonymity

ÿ All about privacy http://www.privacy.net
ÿ Anonymity, privacy and security http://www.stack.nl/~galactus/remailers/
ÿ Free, anonymous web surfing http://www.anonymizer.com/
ÿ IDSecure service http://www.idzap.com/
ÿ News, information and action http://www.privacy.org/
ÿ Sam Spade Tools http://www.samspade.org/t/
ÿ International PGP homepage http://www.pgpi.org
ÿ Encryptable web-mail http://www.hushmail.com/
ÿ Anonymity software http://www.skuz.net/potatoware/
ÿ REALLY delete your data http://www.cs.auckland.ac.nz/~pgut001/pubs/
ÿ Anonymous access http://www.safeproxy.org/
ÿ Web privacy http://www.rewebber.de/
ÿ A list of web anonymisers http://mikhed.narod.ru/


Cryptography & Encryption

æ All about RSA http://www.rsasecurity.com/
æ Cryptography Archives http://www.kremlinencrypt.com/
æ Cryptography links http://cryptography.org/freecryp.htm
æ Cryptography Info http://world.std.com/~franl/crypto/
æ DriveCrypt http://www.e4m.net/
æ CCIPS http://www.cybercrime.gov/crypto.html
æ Cryptography resource http://www.crypto.com/
æ Bruce Schneier's operation http://www.counterpane.com/
æ Huge Crypto archive http://www.cryptome.org
æ A list of Crypto links http://www.security-forums.com/crypto


Source: http://www.darknet.org.uk/

There could be dead links among those; I got the list from the source above.

The rest of the story
Viruses /Trojans & Firewalls

¿ Trojan archive http://packetstormsecurity.nl/trojans/
¿ Up to date Trojan archive http://www.trojanforge.net/
¿ Fearless, everything Trojan http://www.areyoufearless.com/
¿ A good archive with info on each one http://www.dark-e.com
¿ (I'm a moron)'s official Home Page http://www.(I'm a moron).net/
¿ The BO2k project http://bo2k.sourceforge.net/
¿ Another comprehensive Trojan archive http://www.tlsecurity.net/amt.htm
¿ Home of BackOrifice http://www.cultdeadcow.com/
¿ Huge Trojan removal database http://www.anti-trojan.org/
¿ Excellent Anti-Viral software and Virii Database http://www.sophos.com/
¿ Mcafee's Searchable Virus Information Library http://vil.mcafee.com/
¿ Firewall Guide http://www.firewallguide.com/
Virus Writing
http://vx.netlux.org/lib/static/vdat/tutorial.htm

Nice find Strader...
¿ Firewall FAQ http://www.interhack.net/pubs/fwfaq/
¿ Firewall How To http://www.grennan.com/Firewall-HOWTO.html
¿ Squid http://www.squid-cache.org/
¿ Excellent virus news and info http://www.antivirus-online.de/english/
¿ The ULTIMATE IPTables resource http://www.linuxguruz.org/iptables/



Programming

PHP IDE http://www.phpide.de/
ç Scripts, Source and Books http://www.scriptsearch.com/
ç Java & Internet Glossary http://www.mindprod.com/jgloss.html
ç Java homepage http://java.sun.com/
ç Absolute Java FAQ http://www.javafaq.nu/
ç Thinking in Java http://www.mindview.net/Books/TIJ/
ç JavaScript Resource http://www.javascript.com
ç JavaScripts,tutorials & references http://javascript.internet.com/
ç MySQL home http://www.mysql.com
ç PostgreSQL home http://www.postgresql.org/
ç PHP home page http://www.programmersheaven.com/
ç PHP from hotscripts http://www.hotscripts.com/PHP/
ç PHP resource index http://php.resourceindex.com/
ç PHP FAQ's http://www.faqts.com/
ç PHP Developer resources http://www.phpbuilder.com/
ç Building dynamic sites with PHP http://www.phpwizard.net
ç PHP Developer network http://www.evilwalrus.com/
ç PHP Tutorials and more http://www.thescripts.com/serversidescripting/php
ç PHP Resource list http://www.security-forums.com/forum/php
ç ASPTear http://www.alphasierrapapa.com/IisD...nents/AspTear/
ç ASP Codes and techniques http://www.asptoday.com/
ç ASP, HTML, SQL and more http://www.w3schools.com/
ç Think ASP think... http://www.4guysfromrolla.com/
ç ASP 101 http://www.asp101.com/
ç ASP developers site http://haneng.com/
ç PERL Archive http://www.perlarchive.com/
ç PERL tutorials http://www.perlmonks.org/index.pl?node=Tutorials
ç Old school PERL programming http://www.cgi101.com/
ç Windows programming tools http://www.programmerstools.org/
ç Python homepage http://www.python.org/
ç Object Oriented Programming http://www.oopweb.com/
ç XML 101 http://www.xml101.com
ç Dev-X XML zone http://www.devx.com/xml/
ç Programmers Heaven http://www.programmersheaven.com/
ç Loads of tutorials http://www.echoecho.com
ç Plenty of Web Development scripts http://www.hotscripts.com
ç Code for everything http://www.planet-source-code.com/
ç The definitive Assembly resource http://webster.cs.ucr.edu/ASM
ç C Course http://www.strath.ac.uk/IT/Docs/Ccourse/
ç Another good C course http://www.eskimo.com/~scs/cclass/notes/top.html
'Legal' Hacking

Ð Zebulun http://www.cyberarmy.com/zebulun/
Ð Hack me http://loginmatrix.com/hackme/
Ð Try2Hack http://www.try2hack.nl/
Ð Hack3r/Roothack http://roothack.org/
Ð Pull The Plug http://www.pulltheplug.com/

News Groups

A great source of information, discussion and answers to questions
Depending how you put them

ñ alt.hacking.
ñ alt.binaries.hacking.beginner.
ñ alt.computer.security.
ñ alt.security.
ñ alt.os.security.
ñ alt.security.pgp.
ñ alt.security.pgp.patches.
ñ comp.os.linux.security.
ñ comp.os.ms-windows.nt.admin.security.
ñ comp.security.unix.
ñ comp.security.pgp.backdoors.
ñ comp.security.unix.
ñ microsoft.public.security.
ñ microsoft.public.sqlserver.security.
ñ microsoft.public.win2000.security.


tools, google it:

Tools

» THE ultimate port scanner nmap.
» The one and only NT password cracker L0phtcrack.
» Get the latest version of john the ripper.
» Windows process listener Inzider.
» The best packet assembler/analyzer hping.
» Hackers swiss army knife netcat.
» A tool for network monitoring and data acquisition TCPDump.
» The ONLY packet sniffer Ethereal.
» An active reconnaissance network security tool Firewalk.
» Grep your network traffic NGrep.
» NIDS tester from NIDSbench fragrouter.
» The best OS fingerprinter Xprobe.
» Port mapper fport.
» File Integrity checker Tripwire.
» Check for rootkits chkrootkit.
» OSS instrusion detection Snort.
» Security Scanner Nessus.
» TCP/IP Toolkit Paketto.


Nice find Strader........

Hackers Manifesto
http://www.infowar.com/forums/showthread...eadid=1162

"don't do anything illegal"

Pratice:
http://www.scifi.pages.at/hackits/
(Thanks newbie)

http://www.hackerslab.org/eorg/
(thanks newbie)

http://www.learntohack.org/
(thanks newbie)

http://neworder.box.sk/codebox.links.php?key=36581
(Thanks Net Buster)

http://www.hackthissite.org/
(thanks 55)

Programs applications and other need tools

Browsers
Mozilla Firefox 9.1
http://www.mozilla.org/products/firefox/
Opera
http://www.opera.com/
Netscape 7.1
http://channels.netscape.com/ns/browsers/download.jsp

Anti Virus programs Free
Avast
http://www.avast.com/
AVG
http://www.grisoft.com/us/us_dwnl_free.php
Free antivirus listing page
http://www.freebyte.com/antivirus/

Anti Trojan applications
http://www.emsisoft.com/en/software/free/

Firewalls free
Zone labs
http://www.zonelabs.com/store/conte...reeDownload.jsp
Sygate
http://smb.sygate.com/products/spf_standard.htm
Outpost
http://www.agnitum.com/download/
Kerio
http://www.kerio.com/us/kpf_download.html


Test sites for firewall security
Pcflank
http://www.pcflank.com/
Gibson Research Corporation
http://www.grc.com/default.htm


Misc. sites that have been posted over the years
How to read NETSTAT –an
http://www.geocities.com/merijn_bel.../netstatan.html
Dshield Distributed Intrusion Detection System
http://www.dshield.org/index.php
Hackers watch
http://www.hackerwatch.org/
TCP/ IP Ports list
http://www.chebucto.ns.ca/~rakerman/port-table.html
Network Tools
http://lists.gpick.com/pages/Network_Tools.htm
Hacking text files (older stuff but still useful )\
http://www.textfiles.com/hacking/INTERNET/
Beta News
http://www.betanews.com/
GIF works
http://www.gifworks.com/
Secunia Security pages virus alerts and such
http://secunia.com/ multiple_browse...ty_te
st/

Anti spyware apps
Spyware blaster
http://www.javacoolsoftware.com/
Spybot S&D
http://www.pcworld.com/downloads/fi...id,22262,00.asp
Spyware guard
http://www.javacoolsoftware.com/spywareguard.html
Adware
http://www.lavasoftusa.com/software/adaware/



Here are some tools posted by my friend Splabster(thank you for taking the time typing those tools) :



General System & Network Probing:

Sam Spade http://www.samspade.org/ssw
Online tools http://www.network-tools.com
Online tool http://visualroute.visualware.com
Online tool http://www.norid.no/domenenavnbaser/domreg-alpha.html
Nmap http://www.nmap.org
Scanline http://www.foundstone.com
SuperScan http://www.foundstone.com
Icmpenum http://razor.bindview.com/tools/des...num_readme.html
Snscan http://www.foundstone.com
Ethereal http://www.ethereal.com
Ettercap http://ettercap.sourceforge.net
Xprobe2 http://www.sys-security.com/html/projects/X.html
Hping2 http://www.hping.org/
SQLping http://www.sqlsecurity.com/scripts.asp
Amap http://www.thc.org/releases.php
Tcp Traceroute http://michael.toren.net/code/tcptraceroute
VisualRoute http://www.visualware.com/visualroute/index.html

Enumerating & Compromising Windows

Netcat http://www.atstake.com/research/tools/index.html
Zebedee http://www.winton.org.uk/sebedee/
Desproxy http://desproxy.courceforge.net/
Winfo http://ntsecurity.nu/toolbox/winfo
enum http://razor.bindview.com/tools/des...num_readme.html
Ldp LDAP query tool available in the windows 2000 server cd-rom
DumpSec http://www.somarsoft.com/
Userdump http://www.hammerofgod.com/download.htm
NTFSdos http://www.sysinternals.com/ntw2k/freeware/NTFDOS.shtml
Chntpw http://home.eunet.no/~pnordahl/ntpasswd/
PWDump3 http://www.polivec.com/pwdump3.html
Lsadump2 http://razor.bindview.com/tools/index.shtml
PipeUpAdmin http://content.443.ch/pub/security/...peup/W2KPipeUp/
Psexec http://www.sysinternals.com/ntw2k/freeware/psexec.shtml
Ettercap address above
Brutus http://www.hoobie.net/brutus/index.html
Hydra http://www.thc.org/releases.php
John http://www.openwall.com/john
VNCcrack http://www.phenoelit.de/fr/tools.html
Cain & Abel http://www.oxid.it/projects.html
ClearLogs http://www.ntsecurity.nu/toolbox/
WinZapper http://www.ntsecurity.nu/toolbox/
SQLdict http://www.ntsecurity.nu/toolbox/sqldict

Enumerating & Compromising UNIX

Netcat
Zebedee
Desproxy
Ettercap
Xscan http://packetstormsecurity.nl/Exploit_Code_Archive/
Xwhatchwin http://www.deter.com/unix/software/xwatchwin.tgz
Xkey http://www.deter.com/unix/software/xkey.c
Xspy http://www.deter.com/unix/software/xspy-1.0c.tgz
YPX http://www.deter.com/unix/software/ypx.sh.gz
Hunt http://lin.fsid.cvut.cz/~kra/index.html#HUNT
John
Brutus
Hydra
VNCcrack
SQLdict
Zap3 http://packetstormsecurity.nl/UNIX/...ion/log-wipers/

Enumerating & Compromising Novell

Pandora http://www.nmrc.org/project/pandora/index.html
On-site Admin http://www.environmental-center.com/freeware/onsite.htm
NCPQuery http://razor.bindview.com/tools/index.shtml

Enumerating & Compromising Wireless

Netstumbler http://www.netstumbler.com
Kismet http://www.kismetwireless.net/download.shtml
kisMac (for mac users) http://www.binaervarianz.de/projekt...ac/download.php
Airsnort http://airsnort.shmoo.com/
Airtraf http://www.elixar.com/index.html
SMAC http://www.klcconsulting.net/smac
Accessories http://www.fab-corp.com

General System & Network Vulnerability Checking

Nessus http://www.nessus.org
SARA http://www-arc.com/products.shtml
Nikto http://www.cirt.net/code/nikto.shtml

System Forensics Tools

Vision http://www.foundstone.com/knowledge...esc/vision.html
ListDLLs http://www.sysinternals.com/ntw2k/f.../listdlls.shtml
Process Explorer http://www.sysinternals.com/ntw2k/f...e/procexp.shtml
Coroner's Toolkit http://porcupine.org/forensics/tct.html
LADS http://www.sysinternals.com/ntw2k/f.../listdlls.shtml
Chkrootkit http://www.chkrootkit.org/
WinHex http://www.winhex.com/winhex/index-m.html
Active @ Undelete http://www.active-undelete.com/

Web Hacking tools

Black Widow http://www.softbytelabs.com/Frames.html
Web Sleuth http://sandsprite.com/Sleuth
Wfetch http://support.microsoft.com/defaul...B;en-us;q284285
Tsql http://www.aspalliance.com/mtgal/source_code/tsql.exe
Spike Proxy http://www.immunitysec.com/spike.html

Remote Command Shell/Remote Access Trojans/Rootkits

(I'm a moron) Trojan http://(I'm a moron).net/
Barok active Trojan http://www.thenewbiesarea.com/trojans.shtml
AckCmd backdoor http://ntsecurity.ni/toolbox/
Tini backdoor http://ntsecurity.ni/toolbox/
Psexec r-shell http://www.sysinternals.com/ntw2k/freeware/psexec.shtml
Rwwwshell r-shell http://www.thc.org/releases/rwwwshell-2.0.pl.gz
LRK5 rootkit http://www.hackersplayground.org/tools.html
Knark 2.4 rootkit http://www.hackersplayground.org/tools.html

Miscellaneous Tools

Fragrouter http://packetstorm.widexs.nl/UNIX/I.../nidsbench.html
Stunnel http://www.stunnel.org
WinRelay http://www.ntsecurity.nu/toolbox/
Fpipe http://www.foundstone.com/resources/freetools.htm
Tight VNC http://www.tightvnc.com
FileGateway http://www.steelbytes.com
Remote Anything http://remote-anything.com/en/ra_index.htm
TinyWeb http://www.ritlabs.com/tinyweb/index.html
IKS 200 key logger http://www.amecisco.com/index.htm
KLogger http://www.ntsecurity.nu/toolbox/
ShowWin http://www.foundstone.com/knowledge/free_tools.html
KEYhatcher http://www.keykatcher.com/howit.htm
Hex Editors http://www.expertcomsoft.com
http://www.winhex.com/winhex/index-m.html
Secure hard disk wiping and deletion
http://www.heidi.ie
http://www.jetico.com
http://www.winhex.com/winhex/index-m.html
Trinux http://trinux.sourceforge.net/
Silk Rope 2K http://www.hackersplayground.org/tools.html
CMOS killer http://www.hackersplayground.org/tools.html
LDAP Browser http://www.softerra.com/products/ldabrowser.php
QTODBC http://gpoulose.home.att.net/Tools/QTADO40_sr.exe

Host Lockdown/Protection/Assessment Tools

Bastille http://www.bastille-linux.org
lpchains http://www.linuxplanet.com/linuxpla...torials/2100/3/
Apache Shell http://ftp.porcupine.org/pub/security/index.html
Titan http://www.fish.com/titan
Tara http://www-arc.com/products.shtml
Tcpwrappers http://www.linuxsecurity.com/docs/colsfaq.html#4.5
URLscan http://www.microsoft.com/technet/security/tools/
IISLockdown http://www.microsoft.com/technet/security/tools/
Tripwire http://www.tripwire.com/
HFNETchk http://www.microsoft.com/technet/security/tools/
MS SQL Lockdown Script http://www.sqlsecurity.com/DesktopD...ndex=4&tabid=12
UNIX/Windows/router assessment tools http://www.cisecurity.org/
Secure Cisco Router Template http://www.cymru.com/Documents/secure-ios-template.html
Secure Cisco Switch Template
http://www.qorbit.net/documents/cat...re-template.pdf
Snort http://www.snort.org
Swatch http://swatch.sourceforge.net
Secure Remote Password http://srp.stanford.edu/
Software Code Review links https://sardonix.org/auditing_Resources.html
Sawmill http://www.sawmill.net/features.html


enjoy!!:)

N.B:This Stuff Isnt By me!!.. i just found it!!:)