<?xml version='1.0' encoding='UTF-8'?><?xml-stylesheet href="http://www.blogger.com/styles/atom.css" type="text/css"?><feed xmlns='http://www.w3.org/2005/Atom' xmlns:openSearch='http://a9.com/-/spec/opensearchrss/1.0/' xmlns:blogger='http://schemas.google.com/blogger/2008' xmlns:georss='http://www.georss.org/georss' xmlns:gd="http://schemas.google.com/g/2005" xmlns:thr='http://purl.org/syndication/thread/1.0'><id>tag:blogger.com,1999:blog-5903455644988733725</id><updated>2024-09-14T14:50:03.428-11:00</updated><category term="Hacking Tools"/><category term="penetration testing"/><category term="Security Tools"/><category term="Vulnerability Assessment"/><category term="Scanners"/><category term="Linux"/><category term="Windows"/><category term="Codes"/><category term="Network Mapping"/><category term="Password Cracker"/><category term="Network Hacking"/><category term="Vulnerabilities"/><category term="Wi-Fi Hacking"/><category term="Python"/><category term="Metasploit"/><category term="Exploits"/><category term="vulnerability scanner"/><category term="Reverse Engineering"/><category term="Forensics"/><category term="Android"/><category term="Auditing"/><category term="LiveCD"/><category term="Mobile"/><category term="Shell Code"/><category term="PHP"/><category term="fingerprinting"/><category term="Forensic Toolkit"/><category term="Sniffing"/><category term="Encryption"/><category term="Malwares"/><category term="Social Engineering"/><category term="script"/><category term="Monitoring"/><category term="Phishing"/><category term="dos attack"/><category term="MITM"/><category term="web browsers"/><category term="website hacking"/><category term="Cryptography"/><category term="Perl"/><category term="Social Engineer Toolkit"/><category term="Trojan"/><category term="wireless"/><category term="Attack Toolkit"/><category term="Web Application"/><category term="bruteforce"/><category term="exploitation Tool"/><category term="firewall"/><category term="malware"/><category term="Asp.net"/><category term="Black Hat"/><category term="BlindElephant"/><category term="Cheat Sheet"/><category term="Dark comet RAT"/><category term="Ebook"/><category term="GPU cracker"/><category term="Gentoo"/><category term="HTTP Enumeration"/><category term="Hashkill"/><category term="Internet Protocol"/><category term="John the Ripper"/><category term="Keylogger"/><category term="MD5 crack"/><category term="Mac rootkit"/><category term="Man-in-the-middle"/><category term="Nessus"/><category term="Null Security Team"/><category term="NullSecurity"/><category term="PHP web shell"/><category term="Patrick Thomas"/><category term="Pentoo"/><category term="PowerShell"/><category term="Proxy"/><category term="Recon-ng"/><category term="Reconnaissance"/><category term="Ruby"/><category term="SANS"/><category term="Server Analyser"/><category term="Server Shield"/><category term="Snort"/><category term="THC IPv6"/><category term="TrustedSec"/><category term="Unhide"/><category term="VPN"/><category term="WAppEx"/><category term="Weevely"/><category term="Whonix"/><category term="anonymous"/><category term="apk download"/><category term="backtrack"/><category term="bluetooth"/><category term="cloning"/><category term="cms"/><category term="database hacking"/><category term="framework"/><category term="fuzzing"/><category term="hacking  framework"/><category term="hashcat"/><category term="iphone"/><category term="ipv6 tools"/><category term="joomla"/><category term="live cd"/><category term="logs"/><category term="modsecurity"/><category term="network intrusion"/><category term="network security"/><category term="open source"/><category term="packet logger"/><category term="password cracking"/><category term="password hacking"/><category term="pentest  framework"/><category term="ports scanner"/><category term="post exploitation"/><category term="remote hacking"/><category term="remote keylogger"/><category term="rootkits"/><category term="shell server"/><category term="sniffer"/><category term="spoofing"/><category term="ssl"/><category term="too"/><category term="tor"/><category term="traffic analysis"/><category term="wordlists"/><category term="xss"/><title type='text'>Download Hacking Tools at &#39;Tools Yard&#39;</title><subtitle type='html'>Archive by The Hacker News for Hacking tools, networking tools, gmail hacking, learn ethical hacking, vulnerability assessment, penetration testing, email hacking, password hacking</subtitle><link rel='http://schemas.google.com/g/2005#feed' type='application/atom+xml' href='http://thntools999.blogspot.com/feeds/posts/default'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/5903455644988733725/posts/default?max-results=23&amp;redirect=false'/><link rel='alternate' type='text/html' href='http://thntools999.blogspot.com/'/><link rel='hub' href='http://pubsubhubbub.appspot.com/'/><link rel='next' type='application/atom+xml' href='http://www.blogger.com/feeds/5903455644988733725/posts/default?start-index=24&amp;max-results=23&amp;redirect=false'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><generator version='7.00' uri='http://www.blogger.com'>Blogger</generator><openSearch:totalResults>246</openSearch:totalResults><openSearch:startIndex>1</openSearch:startIndex><openSearch:itemsPerPage>23</openSearch:itemsPerPage><entry><id>tag:blogger.com,1999:blog-5903455644988733725.post-558438353366119522</id><published>2013-03-15T07:10:00.000-11:00</published><updated>2013-03-15T07:11:21.090-11:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="exploitation Tool"/><category scheme="http://www.blogger.com/atom/ns#" term="Hacking Tools"/><category scheme="http://www.blogger.com/atom/ns#" term="Metasploit"/><category scheme="http://www.blogger.com/atom/ns#" term="PowerShell"/><category scheme="http://www.blogger.com/atom/ns#" term="Social Engineer Toolkit"/><title type='text'>The Social-Engineer Toolkit (SET) v4.7 released</title><summary type="text">



The Social-Engineer Toolkit (SET) version 4.7 codename “Headshot” has been released. This version of SET introduces the ability to specify multi-powershell injection which allows you to specify as many ports as you want and SET will automatically inject PowerShell onto the system on all of the reverse ports outbound. What’s nice with this technique is it never touches disk and also uses </summary><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/5903455644988733725/posts/default/558438353366119522'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/5903455644988733725/posts/default/558438353366119522'/><link rel='alternate' type='text/html' href='http://thntools999.blogspot.com/2013/03/the-social-engineer-toolkit-set-v47.html' title='The Social-Engineer Toolkit (SET) v4.7 released'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhqrJtFpQuJk-WYMY_ULGrYj7oHpnEIlvIonAXWJqick68d6eoHoqBjbv3urVYm_GDr6ufHnivOAw_VJSvh0q4l5C233jXlbRcy_tb4Co4DNm4WBoq-S_4KdP__RY54yDCHuuE33JQ7HQiE/s72-c/SET-update.png" height="72" width="72"/></entry><entry><id>tag:blogger.com,1999:blog-5903455644988733725.post-1778776696128306043</id><published>2013-03-10T06:01:00.001-11:00</published><updated>2013-03-10T06:01:46.322-11:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="bruteforce"/><category scheme="http://www.blogger.com/atom/ns#" term="Hacking Tools"/><category scheme="http://www.blogger.com/atom/ns#" term="hashcat"/><category scheme="http://www.blogger.com/atom/ns#" term="John the Ripper"/><category scheme="http://www.blogger.com/atom/ns#" term="password cracking"/><category scheme="http://www.blogger.com/atom/ns#" term="wordlists"/><title type='text'>Biggest password cracking wordlist with millions of words</title><summary type="text">

One of the biggest and very comprehensive collection of 1,493,677,782 word for Password cracking list released for download.&amp;nbsp;The wordlists are intended primarily for use with password crackers such as hashcat, John the Ripper and with password recovery utilities.





Defuse Security have released the wordlist of 4.2 GiB (compressed) or 15 GiB (uncompressed) used by their Crackstation </summary><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/5903455644988733725/posts/default/1778776696128306043'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/5903455644988733725/posts/default/1778776696128306043'/><link rel='alternate' type='text/html' href='http://thntools999.blogspot.com/2013/03/biggest-password-cracking-wordlist-with.html' title='Biggest password cracking wordlist with millions of words'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiII_wxOfq4XCs40NzeqBTZTLg0JzVYj7dDIROHC3PU7cMalLUHx8R8IQn-z7Pi-fso9nXq0Ga2lJ3fQJWwEkVjrkLOzfKSXAAE2bXzUfpGZExKwGx5eZET9L3xqUHGSwP-0OOv7Lr75zox/s72-c/images.jpg" height="72" width="72"/></entry><entry><id>tag:blogger.com,1999:blog-5903455644988733725.post-6904006142926249858</id><published>2013-03-09T19:27:00.002-11:00</published><updated>2013-03-09T19:27:31.329-11:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Dark comet RAT"/><category scheme="http://www.blogger.com/atom/ns#" term="Hacking Tools"/><category scheme="http://www.blogger.com/atom/ns#" term="Keylogger"/><category scheme="http://www.blogger.com/atom/ns#" term="logs"/><category scheme="http://www.blogger.com/atom/ns#" term="remote hacking"/><category scheme="http://www.blogger.com/atom/ns#" term="remote keylogger"/><category scheme="http://www.blogger.com/atom/ns#" term="Windows"/><title type='text'>Phrozen Keylogger Lite v1.0 download</title><summary type="text">




Phrozen Keylogger Lite is finally available, developed by Dark comet RAT developer.&amp;nbsp;Phrozen Keylogger Lite is a powerful and user friendly keylogger especially created for Microsoft Windows systems. Phrozen Keylogger Lite is compatible with all currently supported versions of Windows, which effectively means Windows XP to the recently released Windows 8.




Phrozen Keylogger Lite has </summary><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/5903455644988733725/posts/default/6904006142926249858'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/5903455644988733725/posts/default/6904006142926249858'/><link rel='alternate' type='text/html' href='http://thntools999.blogspot.com/2013/03/phrozen-keylogger-lite-v10-download.html' title='Phrozen Keylogger Lite v1.0 download'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhnfElZ5urlC_reOjYE8CHCH-qmcXrTVkB8bm8nIGASiG6CPFMUAOXCXB3lsSNslFjhyphenhyphenh7e6eyLcLkvgwcisHK5H43LFW3Dg9YLIYOnmQuKUsptaanwpzvCfVRFsOYpliwWKJlINWu-ugiC/s72-c/sshot-36.png" height="72" width="72"/></entry><entry><id>tag:blogger.com,1999:blog-5903455644988733725.post-7752733056026929804</id><published>2013-03-09T19:21:00.000-11:00</published><updated>2013-03-09T19:21:11.188-11:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Gentoo"/><category scheme="http://www.blogger.com/atom/ns#" term="Hacking Tools"/><category scheme="http://www.blogger.com/atom/ns#" term="live cd"/><category scheme="http://www.blogger.com/atom/ns#" term="penetration testing"/><category scheme="http://www.blogger.com/atom/ns#" term="Pentoo"/><category scheme="http://www.blogger.com/atom/ns#" term="Security Tools"/><title type='text'>Pentoo 2013.0 RC1.1 Released</title><summary type="text">


Pentoo is a security-focused live CD based on Gentoo It&#39;s basically a Gentoo install with lots of customized tools, customized kernel, and much more.



Pentoo 2013.0 RC1.1 features :

Changes saving
CUDA/OpenCL Enhanced cracking software

John the ripper
Hashcat Suite of tools

Kernel 3.7.5 and all needed patches for injection
XFCE 4.10
All the latest tools and a responsive development team!
</summary><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/5903455644988733725/posts/default/7752733056026929804'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/5903455644988733725/posts/default/7752733056026929804'/><link rel='alternate' type='text/html' href='http://thntools999.blogspot.com/2013/03/pentoo-20130-rc11-released.html' title='Pentoo 2013.0 RC1.1 Released'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhVE89mdE6OON6e5Da-xZC4ZQkro_ZSuPjFyTMBTo7D1OtJ6P4Rt384cnTOkHW1x1lgMdGc9Ay4nzCyYAz5D5UX4kX80TfMYJk0zmXP3DMxeFI74uAoL7J6sM5qnbE1-gYs1SUPtQ4y_nr0/s72-c/Pentoo-LiveCD_1.jpg" height="72" width="72"/></entry><entry><id>tag:blogger.com,1999:blog-5903455644988733725.post-1718854475804078094</id><published>2013-03-04T20:46:00.001-11:00</published><updated>2013-03-04T20:46:13.404-11:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Internet Protocol"/><category scheme="http://www.blogger.com/atom/ns#" term="Linux"/><category scheme="http://www.blogger.com/atom/ns#" term="network intrusion"/><category scheme="http://www.blogger.com/atom/ns#" term="network security"/><category scheme="http://www.blogger.com/atom/ns#" term="open source"/><category scheme="http://www.blogger.com/atom/ns#" term="packet logger"/><category scheme="http://www.blogger.com/atom/ns#" term="Security Tools"/><category scheme="http://www.blogger.com/atom/ns#" term="sniffer"/><category scheme="http://www.blogger.com/atom/ns#" term="Snort"/><category scheme="http://www.blogger.com/atom/ns#" term="traffic analysis"/><category scheme="http://www.blogger.com/atom/ns#" term="Windows"/><title type='text'>Snort 2.9.4.1 - Network intrusion detection system</title><summary type="text">

Snort is a free and open source network intrusion prevention system (NIPS) and network intrusion detection system (NIDS) . Snort having the ability to perform real-time traffic analysis and packet logging on Internet Protocol (IP) networks. Snort performs protocol analysis, content searching, and content matching.






The program can also be used to detect probes or attacks, including, but </summary><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/5903455644988733725/posts/default/1718854475804078094'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/5903455644988733725/posts/default/1718854475804078094'/><link rel='alternate' type='text/html' href='http://thntools999.blogspot.com/2013/03/snort-2941-network-intrusion-detection.html' title='Snort 2.9.4.1 - Network intrusion detection system'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgwq6ZO60Kc0_M8qbOAW_wmmVE-gb6ppdjIVMPU6h_eXNYlZh6Cs-8eam0lz7VQS9OuiAfRwrhhB9f704wCupXTiVeWP5D32rAsYoW9LZWLEPk7HaqPgqPTFCnNZiD2CAWjGvLU3FuuEOek/s72-c/Snort+2.9.4.1+-+Network+intrusion+detection+system.jpg" height="72" width="72"/></entry><entry><id>tag:blogger.com,1999:blog-5903455644988733725.post-81925973933106204</id><published>2013-02-17T06:12:00.002-11:00</published><updated>2013-02-17T06:12:49.552-11:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Exploits"/><category scheme="http://www.blogger.com/atom/ns#" term="hacking  framework"/><category scheme="http://www.blogger.com/atom/ns#" term="Hacking Tools"/><category scheme="http://www.blogger.com/atom/ns#" term="pentest  framework"/><category scheme="http://www.blogger.com/atom/ns#" term="Python"/><category scheme="http://www.blogger.com/atom/ns#" term="Recon-ng"/><category scheme="http://www.blogger.com/atom/ns#" term="Reconnaissance"/><category scheme="http://www.blogger.com/atom/ns#" term="website hacking"/><title type='text'>Recon-ng : Web Reconnaisance framework for Penetration testers</title><summary type="text">

Recon-ng is a full-featured Web&amp;nbsp;Reconnaissance&amp;nbsp;framework written in Python. Recon-ng has a look and feel similar to the Metasploit Framework, reducing the learning curve for leveraging the framework.





Complete with independent modules, database interaction, built in convenience functions, interactive help, and command completion, Recon-ng provides a powerful environment in which </summary><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/5903455644988733725/posts/default/81925973933106204'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/5903455644988733725/posts/default/81925973933106204'/><link rel='alternate' type='text/html' href='http://thntools999.blogspot.com/2013/02/recon-ng-web-reconnaisance-framework.html' title='Recon-ng : Web Reconnaisance framework for Penetration testers'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEipORrkdkBEnQ8R45CPQyVUselam0slqdEoSY5kwqLxzEpoiaprB6fyP0VmlY2XLLlTwpPKfgkMvNtsawwdpy_jU-YLm1dG_3ssWolXKvg8VbCOqyQsx3TbY4wuUZhu2vzMa1iupl9KBN9R/s72-c/Screenshot.png" height="72" width="72"/></entry><entry><id>tag:blogger.com,1999:blog-5903455644988733725.post-6360378523077132359</id><published>2013-02-15T06:39:00.000-11:00</published><updated>2013-02-15T06:39:07.420-11:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Forensic Toolkit"/><category scheme="http://www.blogger.com/atom/ns#" term="Linux"/><category scheme="http://www.blogger.com/atom/ns#" term="ports scanner"/><category scheme="http://www.blogger.com/atom/ns#" term="rootkits"/><category scheme="http://www.blogger.com/atom/ns#" term="Scanners"/><category scheme="http://www.blogger.com/atom/ns#" term="Security Tools"/><category scheme="http://www.blogger.com/atom/ns#" term="Unhide"/><category scheme="http://www.blogger.com/atom/ns#" term="Vulnerability Assessment"/><category scheme="http://www.blogger.com/atom/ns#" term="Windows"/><title type='text'>Unhide Forensic Tool, Find hidden processes and ports</title><summary type="text">



Unhide is a forensic tool to find processes hidden by rootkits, Linux kernel modules or by other techniques. It detects hidden processes using six techniques:


Compare /proc vs /bin/ps output
Compare info gathered from /bin/ps with info gathered by walking thru the procfs. ONLY for Linux 2.6 version
Compare info gathered from /bin/ps with info gathered from syscalls (syscall scanning).
Full </summary><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/5903455644988733725/posts/default/6360378523077132359'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/5903455644988733725/posts/default/6360378523077132359'/><link rel='alternate' type='text/html' href='http://thntools999.blogspot.com/2013/02/unhide-forensic-tool-find-hidden.html' title='Unhide Forensic Tool, Find hidden processes and ports'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhEBOGQcihg8KbX9yDckzAiWabHDd1j2n9T38efrRM3sfmNgIsBDi8WkbBkAh_YgehVttkpREMhu1_CqlLaESIHEI689Wy-X66IRBeWh9Dvrkxiwg0OJiW4vBVs1HOjOtIVoe6zvYwVv0Lr/s72-c/Unhide+Forensic+Tool,+Find+hidden+processes+and+ports.PNG" height="72" width="72"/></entry><entry><id>tag:blogger.com,1999:blog-5903455644988733725.post-6223709678907627658</id><published>2013-02-15T06:15:00.003-11:00</published><updated>2013-02-15T06:15:37.479-11:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="exploitation Tool"/><category scheme="http://www.blogger.com/atom/ns#" term="Hacking Tools"/><category scheme="http://www.blogger.com/atom/ns#" term="penetration testing"/><category scheme="http://www.blogger.com/atom/ns#" term="Scanners"/><category scheme="http://www.blogger.com/atom/ns#" term="Vulnerability Assessment"/><category scheme="http://www.blogger.com/atom/ns#" term="vulnerability scanner"/><category scheme="http://www.blogger.com/atom/ns#" term="WAppEx"/><category scheme="http://www.blogger.com/atom/ns#" term="Web Application"/><title type='text'>WAppEx v2.0 : Web Application exploitation Tool</title><summary type="text">


WAppEx is an integrated Web Application security assessment and exploitation platform designed with the whole spectrum of security professionals to web application hobbyists in mind. It suggests a security assessment model which revolves around an extensible exploit database. Further, it complements the power with various tools required to perform all stages of a web application attack.

</summary><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/5903455644988733725/posts/default/6223709678907627658'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/5903455644988733725/posts/default/6223709678907627658'/><link rel='alternate' type='text/html' href='http://thntools999.blogspot.com/2013/02/wappex-v20-web-application-exploitation.html' title='WAppEx v2.0 : Web Application exploitation Tool'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjAXzXreoA2bfoN3gzjDOSlgVHaJ81OyrSAzvucLjiG1jN1o-beb5ZLS_YETae5aXB2-FvU928_qxEX38jyuf6-lgMOYw0bv7iS2cAEz_y4uvdBpFgV5ODi_cABd6gRxuYPxdT4avZFFwu7/s72-c/lfi.png" height="72" width="72"/></entry><entry><id>tag:blogger.com,1999:blog-5903455644988733725.post-2405996423485099302</id><published>2013-02-15T06:02:00.000-11:00</published><updated>2013-02-15T06:02:54.288-11:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="GPU cracker"/><category scheme="http://www.blogger.com/atom/ns#" term="Hacking Tools"/><category scheme="http://www.blogger.com/atom/ns#" term="Hashkill"/><category scheme="http://www.blogger.com/atom/ns#" term="Linux"/><category scheme="http://www.blogger.com/atom/ns#" term="MD5 crack"/><category scheme="http://www.blogger.com/atom/ns#" term="Password Cracker"/><category scheme="http://www.blogger.com/atom/ns#" term="password hacking"/><category scheme="http://www.blogger.com/atom/ns#" term="Windows"/><title type='text'>Password Cracker Tool Hashkill version 0.3.1 released</title><summary type="text">

Hashkill is an opensource hash cracker for Linux that uses OpenSSL. Currently it supports 4 attack methods (dictionary, bruteforce, hybrid).





Hashkill has 35 plugins for different types of passwords (ranging from simple hashes like MD5 and SHA1 to passworded ZIP files and private SSL key passphrases).



Multi-hash support (you may load hashlists of length up to 1 million) and very fast GPU</summary><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/5903455644988733725/posts/default/2405996423485099302'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/5903455644988733725/posts/default/2405996423485099302'/><link rel='alternate' type='text/html' href='http://thntools999.blogspot.com/2013/02/password-cracker-tool-hashkill-version.html' title='Password Cracker Tool Hashkill version 0.3.1 released'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjAolRwqL1Uq2FmKNLKlOjD88v4y0JwK0JyUNT86qbaea7AvITrXxalbhJRT-AJP43u58zMVDJvmGwYz35GMjOCrY7lrJ6x3-y6BfPaLbEsbamB-2WG1FCHj4pw1U-H7N9CNHage2PM_XKR/s72-c/Password+Cracker+Tool+Hashkill+version+0.3.1+released.png" height="72" width="72"/></entry><entry><id>tag:blogger.com,1999:blog-5903455644988733725.post-5034192914955241214</id><published>2013-02-15T05:48:00.001-11:00</published><updated>2013-02-16T05:15:15.635-11:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="backtrack"/><category scheme="http://www.blogger.com/atom/ns#" term="Hacking Tools"/><category scheme="http://www.blogger.com/atom/ns#" term="PHP"/><category scheme="http://www.blogger.com/atom/ns#" term="PHP web shell"/><category scheme="http://www.blogger.com/atom/ns#" term="post exploitation"/><category scheme="http://www.blogger.com/atom/ns#" term="script"/><category scheme="http://www.blogger.com/atom/ns#" term="shell server"/><category scheme="http://www.blogger.com/atom/ns#" term="Weevely"/><title type='text'>Weevely : Stealth PHP web shell with telnet style console</title><summary type="text">


Weevely is a stealth PHP web shell that provides a telnet-like console. It is an essential tool for web application post exploitation, and can be used as stealth backdoor or as a web shell to manage legit web accounts, even free hosted ones.





More than 30 modules to automatize administration and post exploitation tasks:

Execute commands and browse remote filesystem, even with PHP security</summary><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/5903455644988733725/posts/default/5034192914955241214'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/5903455644988733725/posts/default/5034192914955241214'/><link rel='alternate' type='text/html' href='http://thntools999.blogspot.com/2013/02/weevely-stealth-php-web-shell-with.html' title='Weevely : Stealth PHP web shell with telnet style console'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiGFxgitKwh4YrMW4yyPr8nglkYZClwP4obvvdmBFsWjBbVK9lYkaMWmFsHMoGgZX5LyQ_9NwBB0HLEC0cgn-m4B49A4Awx4WW3WiPyQIv70dl9_BwWnwK9TrgzEPt5TO8SI9JYotT-qy0/s72-c/Capture.PNG" height="72" width="72"/></entry><entry><id>tag:blogger.com,1999:blog-5903455644988733725.post-2240909486979820511</id><published>2013-02-15T05:07:00.000-11:00</published><updated>2013-02-15T05:07:39.601-11:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Codes"/><category scheme="http://www.blogger.com/atom/ns#" term="Hacking Tools"/><category scheme="http://www.blogger.com/atom/ns#" term="HTTP Enumeration"/><category scheme="http://www.blogger.com/atom/ns#" term="Linux"/><category scheme="http://www.blogger.com/atom/ns#" term="Null Security Team"/><category scheme="http://www.blogger.com/atom/ns#" term="Python"/><category scheme="http://www.blogger.com/atom/ns#" term="Scanners"/><category scheme="http://www.blogger.com/atom/ns#" term="script"/><title type='text'>Automated HTTP Enumeration Tool</title><summary type="text">




Null Security Team writing a python script for Automated HTTP Enumeration. currently only in the initial beta stage, but includes basic checking of files including the Apache server-status as well as well IIS WebDAV and Microsoft FrontPage Extensions, many more features will be added to this tool which will make&amp;nbsp;lot&amp;nbsp;of the enumeration process quick and simple.




Version 0.2 adds </summary><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/5903455644988733725/posts/default/2240909486979820511'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/5903455644988733725/posts/default/2240909486979820511'/><link rel='alternate' type='text/html' href='http://thntools999.blogspot.com/2013/02/automated-http-enumeration-tool.html' title='Automated HTTP Enumeration Tool'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgz9B78jmnjdb8dU0K-spOv6Z-DtlXVQbpknwlAjGrzT09UlcpX8SPw8aLxjMTktcyIAWZLxfO51Az-3xLjcEU6LPN62g22wAnLNadAyvYO8xxW0OglWnmvI4B9SEnogmIUvQ89vFKFqILy/s72-c/Automated+HTTP+Enumeration+Tool.png" height="72" width="72"/></entry><entry><id>tag:blogger.com,1999:blog-5903455644988733725.post-4688748053017220036</id><published>2013-02-15T03:47:00.001-11:00</published><updated>2013-02-15T03:47:28.749-11:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Black Hat"/><category scheme="http://www.blogger.com/atom/ns#" term="BlindElephant"/><category scheme="http://www.blogger.com/atom/ns#" term="fingerprinting"/><category scheme="http://www.blogger.com/atom/ns#" term="Hacking Tools"/><category scheme="http://www.blogger.com/atom/ns#" term="Patrick Thomas"/><category scheme="http://www.blogger.com/atom/ns#" term="penetration testing"/><category scheme="http://www.blogger.com/atom/ns#" term="Vulnerability Assessment"/><category scheme="http://www.blogger.com/atom/ns#" term="Web Application"/><category scheme="http://www.blogger.com/atom/ns#" term="website hacking"/><title type='text'>BlindElephant – Web Application Fingerprinting</title><summary type="text">


During Black Hat USA 2010, Patrick Thomas presented a new web application fingerprinting tool called Blind Elephant.


The BlindElephant Web Application&amp;nbsp;Finger-printer&amp;nbsp;attempts to discover the version of a (known) web application by comparing static files at known locations against precomputed hashes for versions of those files in all all available releases. The technique is fast, </summary><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/5903455644988733725/posts/default/4688748053017220036'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/5903455644988733725/posts/default/4688748053017220036'/><link rel='alternate' type='text/html' href='http://thntools999.blogspot.com/2013/02/blindelephant-web-application.html' title='BlindElephant – Web Application Fingerprinting'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhtWwbnDvJvd7frkVGNndw8rJLwAXVI7qxgTTJUOE5ie61P8cnZV_KJKT1N9SMexARqMMh_i2N6kSvhhuzRW79nMCarVlOgaRrnyM4rfKfeVeIs5AOuZyvN2qnPC5-_nJYMKyFtnDZU0NcS/s72-c/BlindElephant+%E2%80%93+Web+Application+Fingerprinting.png" height="72" width="72"/></entry><entry><id>tag:blogger.com,1999:blog-5903455644988733725.post-5403418993207531879</id><published>2012-11-10T04:53:00.001-11:00</published><updated>2012-11-10T04:53:10.713-11:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Hacking Tools"/><category scheme="http://www.blogger.com/atom/ns#" term="Linux"/><category scheme="http://www.blogger.com/atom/ns#" term="Network Hacking"/><category scheme="http://www.blogger.com/atom/ns#" term="Wi-Fi Hacking"/><category scheme="http://www.blogger.com/atom/ns#" term="wireless"/><title type='text'>PwnStar latest version with new Exploits released</title><summary type="text">


A bash script to launch a Soft AP, configurable with a wide variety of attack options. Includes a number of index.html and server php scripts, for sniffing/phishing. Can act as multi-client captive portal using php and iptables. &amp;nbsp;Launches classic exploits such as evil-PDF. De-auth with aireplay, airdrop-ng or MDK3.




Changes  and New Features

“hotspot_3″ is a simple phishing web page, </summary><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/5903455644988733725/posts/default/5403418993207531879'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/5903455644988733725/posts/default/5403418993207531879'/><link rel='alternate' type='text/html' href='http://thntools999.blogspot.com/2012/11/pwnstar-latest-version-with-new.html' title='PwnStar latest version with new Exploits released'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhknMZCyMzk4EA26JIZS6NvYFiJcRvtHxcP1eblbKzpE2qTrwpg9ticU1LAZeNKthp8TmWn7suMCx-TpJDRzjoBiGjF0xWiNNf1jmKmJ1SHDBO2tjIMH-GYHpMEKyBl5CdzOlXjaqysxi9F/s72-c/PwnSTARscreenshot.png" height="72" width="72"/></entry><entry><id>tag:blogger.com,1999:blog-5903455644988733725.post-9047365711337422405</id><published>2012-11-10T04:42:00.001-11:00</published><updated>2012-11-10T04:42:38.303-11:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Forensic Toolkit"/><category scheme="http://www.blogger.com/atom/ns#" term="Hacking Tools"/><category scheme="http://www.blogger.com/atom/ns#" term="Linux"/><category scheme="http://www.blogger.com/atom/ns#" term="LiveCD"/><category scheme="http://www.blogger.com/atom/ns#" term="penetration testing"/><category scheme="http://www.blogger.com/atom/ns#" term="Scanners"/><category scheme="http://www.blogger.com/atom/ns#" term="Security Tools"/><category scheme="http://www.blogger.com/atom/ns#" term="Vulnerability Assessment"/><title type='text'>PwnPi v2.0 - A Pen Test Drop Box distro for the Raspberry Pi</title><summary type="text">
PwnPi is a Linux-based penetration testing dropbox distribution for the Raspberry Pi. It currently has 114 network security tools pre-installed to aid the penetration tester. It is built on the debian squeeze image from the raspberry pi foundation’s website and uses Xfce as the window manager

Login&amp;nbsp;username and password is root:root



Tools List:



Download Here
</summary><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/5903455644988733725/posts/default/9047365711337422405'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/5903455644988733725/posts/default/9047365711337422405'/><link rel='alternate' type='text/html' href='http://thntools999.blogspot.com/2012/11/pwnpi-v20-pen-test-drop-box-distro-for.html' title='PwnPi v2.0 - A Pen Test Drop Box distro for the Raspberry Pi'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjkQGxkkIL4CYL47eWekSI7ueclN5RQtgkaSyNQgIBGAhSWK8Xcq7qOUWkx3nYLfIgt8LszXMznPDJFDN60YVx6yrCe3i9-OgzKThScsMsjNX1rI32abHV6NjiFs4-G-kR8YlgDY1PD-8X3/s72-c/download.png" height="72" width="72"/></entry><entry><id>tag:blogger.com,1999:blog-5903455644988733725.post-3059446882700911407</id><published>2012-11-10T04:30:00.000-11:00</published><updated>2012-11-10T04:30:31.206-11:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Man-in-the-middle"/><category scheme="http://www.blogger.com/atom/ns#" term="Network Hacking"/><category scheme="http://www.blogger.com/atom/ns#" term="penetration testing"/><category scheme="http://www.blogger.com/atom/ns#" term="Sniffing"/><category scheme="http://www.blogger.com/atom/ns#" term="spoofing"/><category scheme="http://www.blogger.com/atom/ns#" term="ssl"/><category scheme="http://www.blogger.com/atom/ns#" term="Vulnerabilities"/><title type='text'>SSLsplit v 0.4.5 - Man-in-the-middle attacks against SSL/TLS</title><summary type="text">


SLsplit is a tool for man-in-the-middle attacks against SSL/TLS encrypted network connections. Connections are transparently intercepted through a network address translation engine and redirected to SSLsplit. SSLsplit terminates SSL/TLS and initiates a new SSL/TLS connection to the original destination address, while logging all data transmitted. SSLsplit is intended to be useful for network </summary><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/5903455644988733725/posts/default/3059446882700911407'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/5903455644988733725/posts/default/3059446882700911407'/><link rel='alternate' type='text/html' href='http://thntools999.blogspot.com/2012/11/sslsplit-v-045-man-in-middle-attacks.html' title='SSLsplit v 0.4.5 - Man-in-the-middle attacks against SSL/TLS'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhRK6zaD9CUP3Vuk4ijoRyMrxgnQuyKdfDkvdqZXVYhFsna2xIZ_of7aqc5quNAydS8zqiRoSC5XI4vY-xonOsTIpZleGgaWEw9l_7loc_HIWxJUHWNR7FY1FfIIS0IXv7NA8QNaJuNJ9cO/s72-c/use.png" height="72" width="72"/></entry><entry><id>tag:blogger.com,1999:blog-5903455644988733725.post-3979407697037050361</id><published>2012-11-10T04:21:00.001-11:00</published><updated>2012-11-10T04:21:55.163-11:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Forensic Toolkit"/><category scheme="http://www.blogger.com/atom/ns#" term="Forensics"/><category scheme="http://www.blogger.com/atom/ns#" term="Hacking Tools"/><category scheme="http://www.blogger.com/atom/ns#" term="Network Hacking"/><category scheme="http://www.blogger.com/atom/ns#" term="Scanners"/><title type='text'>NetSleuth : Open source Network Forensics And Analysis Tools</title><summary type="text">




NetSleuth identifies and fingerprints network devices by silent network monitoring or by processing data from PCAP files.

NetSleuth is an opensource network forensics and analysis tool, designed for triage in incident response situations.&amp;nbsp;It can identify and fingerprint network hosts and devices from pcap files captured from Ethernet or WiFi data (from tools like Kismet).



It also </summary><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/5903455644988733725/posts/default/3979407697037050361'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/5903455644988733725/posts/default/3979407697037050361'/><link rel='alternate' type='text/html' href='http://thntools999.blogspot.com/2012/11/netsleuth-open-source-network-forensics.html' title='NetSleuth : Open source Network Forensics And Analysis Tools'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhHVJCwgxGqotKxM5o8iLEkB7_Mq2k01PHI1528JGnrwkmbOf2u9PjCNQj5N9xKEAcMEB_20U5DvAoqixNPUm2yXk8LK8yGYBY5guxirSi0LODI8dfi2h_lbc2FBKe8YRODEsCOl12q3frS/s72-c/NetSleuth-Offline-Varied-2.png" height="72" width="72"/></entry><entry><id>tag:blogger.com,1999:blog-5903455644988733725.post-5534885444054737301</id><published>2012-11-10T04:13:00.000-11:00</published><updated>2012-11-10T04:13:09.241-11:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Hacking Tools"/><category scheme="http://www.blogger.com/atom/ns#" term="Network Hacking"/><category scheme="http://www.blogger.com/atom/ns#" term="Network Mapping"/><category scheme="http://www.blogger.com/atom/ns#" term="penetration testing"/><category scheme="http://www.blogger.com/atom/ns#" term="Scanners"/><category scheme="http://www.blogger.com/atom/ns#" term="Security Tools"/><category scheme="http://www.blogger.com/atom/ns#" term="vulnerability scanner"/><title type='text'>TXDNS v 2.2.1 - Aggressive multithreaded DNS digger</title><summary type="text">


TXDNS is a Win32 aggressive multithreaded DNS digger. Capable of placing, on the wire, thousands of DNS queries per minute. TXDNS main goal is to expose a domain namespace trough a number of techniques:



-- Typos: Mised, doouble and transposde keystrokes;

-- TLD/ccSLD rotation;

-- Dictionary attack;

-- Full Brute-force attack: alpha, numeric or alphanumeric charsets.


New features:


</summary><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/5903455644988733725/posts/default/5534885444054737301'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/5903455644988733725/posts/default/5534885444054737301'/><link rel='alternate' type='text/html' href='http://thntools999.blogspot.com/2012/11/txdns-v-221-aggressive-multithreaded.html' title='TXDNS v 2.2.1 - Aggressive multithreaded DNS digger'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author></entry><entry><id>tag:blogger.com,1999:blog-5903455644988733725.post-7549433212760834038</id><published>2012-11-04T07:03:00.000-11:00</published><updated>2012-11-04T07:03:29.776-11:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="database hacking"/><category scheme="http://www.blogger.com/atom/ns#" term="Hacking Tools"/><category scheme="http://www.blogger.com/atom/ns#" term="penetration testing"/><category scheme="http://www.blogger.com/atom/ns#" term="Python"/><category scheme="http://www.blogger.com/atom/ns#" term="Scanners"/><category scheme="http://www.blogger.com/atom/ns#" term="script"/><category scheme="http://www.blogger.com/atom/ns#" term="website hacking"/><title type='text'>PySQLi - Python SQL injection framework</title><summary type="text">

PySQLi is a python framework designed to exploit complex SQL injection vulnerabilities. It provides dedicated bricks that can be used to build advanced exploits or easily extended/improved to fit the case.



PySQLi is thought to be easily modified and extended through derivated classes and to be able to inject into various ways such as command line, custom network protocols and even in </summary><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/5903455644988733725/posts/default/7549433212760834038'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/5903455644988733725/posts/default/7549433212760834038'/><link rel='alternate' type='text/html' href='http://thntools999.blogspot.com/2012/11/pysqli-python-sql-injection-framework.html' title='PySQLi - Python SQL injection framework'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author></entry><entry><id>tag:blogger.com,1999:blog-5903455644988733725.post-4644252900904743112</id><published>2012-11-04T01:32:00.000-11:00</published><updated>2012-11-04T01:32:44.524-11:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Exploits"/><category scheme="http://www.blogger.com/atom/ns#" term="Forensic Toolkit"/><category scheme="http://www.blogger.com/atom/ns#" term="Security Tools"/><category scheme="http://www.blogger.com/atom/ns#" term="vulnerability scanner"/><category scheme="http://www.blogger.com/atom/ns#" term="web browsers"/><category scheme="http://www.blogger.com/atom/ns#" term="Windows"/><title type='text'>ExploitShield Browser Edition - Forget about browser vulnerabilities</title><summary type="text">



ExploitShield Browser Edition protects against all known and unknown 0-day day vulnerability exploits, protecting users where traditional antivirus and security products fail. It consists of an innovative patent-pending vulnerability-agnostic application shielding technology that prevents malicious vulnerability exploits from compromising computers.



Includes &quot;shields&quot; for all major </summary><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/5903455644988733725/posts/default/4644252900904743112'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/5903455644988733725/posts/default/4644252900904743112'/><link rel='alternate' type='text/html' href='http://thntools999.blogspot.com/2012/11/exploitshield-browser-edition-forget.html' title='ExploitShield Browser Edition - Forget about browser vulnerabilities'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj59l6o78pYU02oOWYeRK5kB4RGn094q8N45q9Wx6anoixjcvGXgIIrcAH1WjQv8r2OXgbRude0SSrXSIEX_-OVOj8XWR8vb3P_PvRmWBDhwFGtBzv51xxnqdYfDkjc1qYwNDLVcXSki5rw/s72-c/ExploitShield+Browser+Edition.png" height="72" width="72"/></entry><entry><id>tag:blogger.com,1999:blog-5903455644988733725.post-265816358882170235</id><published>2012-11-03T10:45:00.000-11:00</published><updated>2012-11-03T10:45:17.729-11:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="cms"/><category scheme="http://www.blogger.com/atom/ns#" term="Hacking Tools"/><category scheme="http://www.blogger.com/atom/ns#" term="joomla"/><category scheme="http://www.blogger.com/atom/ns#" term="penetration testing"/><category scheme="http://www.blogger.com/atom/ns#" term="Scanners"/><category scheme="http://www.blogger.com/atom/ns#" term="Vulnerabilities"/><category scheme="http://www.blogger.com/atom/ns#" term="Vulnerability Assessment"/><category scheme="http://www.blogger.com/atom/ns#" term="vulnerability scanner"/><title type='text'>Joomscan updated - now can identify 673 joomla vulnerabilities</title><summary type="text">


Security Team Web-Center just released an updated for Joomscan Security Scanner. The new database Have&amp;nbsp;673 joomla&amp;nbsp;vulnerabilities




Joomla! is probably the most widely-used CMS out there due to its flexibility, user friendlinesss, extensibility to name a few.So, watching its vulnerabilities and adding such vulnerabilities as KB to Joomla scanner takes ongoing activity.It will help </summary><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/5903455644988733725/posts/default/265816358882170235'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/5903455644988733725/posts/default/265816358882170235'/><link rel='alternate' type='text/html' href='http://thntools999.blogspot.com/2012/11/joomscan-updated-now-can-identify-673.html' title='Joomscan updated - now can identify 673 joomla vulnerabilities'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgQT7lEY_nprGD6pzYqsy7Lu52bTCFh0cQf593Z2mjKMapoLSx92PecfA6-nzgFp4D50NVh4nLoIxfQ4MOKRr_uKv1QtdaUT6Qhzz0UxNb9AVCnmyVJURiQs6z273_XCVdpAOYO9sEDHdE0/s72-c/Joomscan.png" height="72" width="72"/></entry><entry><id>tag:blogger.com,1999:blog-5903455644988733725.post-217068200165857111</id><published>2012-11-03T10:37:00.000-11:00</published><updated>2012-11-03T10:37:23.307-11:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Exploits"/><category scheme="http://www.blogger.com/atom/ns#" term="framework"/><category scheme="http://www.blogger.com/atom/ns#" term="Hacking Tools"/><category scheme="http://www.blogger.com/atom/ns#" term="penetration testing"/><category scheme="http://www.blogger.com/atom/ns#" term="Scanners"/><category scheme="http://www.blogger.com/atom/ns#" term="Vulnerability Assessment"/><category scheme="http://www.blogger.com/atom/ns#" term="vulnerability scanner"/><category scheme="http://www.blogger.com/atom/ns#" term="web browsers"/><title type='text'>BeEF 0.4.3.8 - Browser Exploitation Framework </title><summary type="text">

The Browser Exploitation Framework (BeEF) is a powerful professional security tool. It is a penetration testing tool that focuses on the web browser.&amp;nbsp;BeEF is pioneering techniques that provide the experienced penetration tester with practical client side attack vectors.&amp;nbsp;





Unlike other security frameworks, BeEF focuses on leveraging browser vulnerabilities to assess the security </summary><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/5903455644988733725/posts/default/217068200165857111'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/5903455644988733725/posts/default/217068200165857111'/><link rel='alternate' type='text/html' href='http://thntools999.blogspot.com/2012/11/beef-0438-browser-exploitation-framework.html' title='BeEF 0.4.3.8 - Browser Exploitation Framework '/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg9WAeiKA63lxhA_AJpXrkW8PpvSK_ajgMcM1dUhxXTvo8-joWHo_r6BMtO7F8tXqU_YqTh1Nnr98T9Mcoz_fvGIYeJAkEjbtBdltfNmooeaEqpBDnlW3nr7cNK9qMUoOjdSilA2WALEfZm/s72-c/beef.jpg" height="72" width="72"/></entry><entry><id>tag:blogger.com,1999:blog-5903455644988733725.post-7863180172705411373</id><published>2012-11-03T10:21:00.001-11:00</published><updated>2012-11-03T10:21:30.996-11:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="bluetooth"/><category scheme="http://www.blogger.com/atom/ns#" term="cloning"/><category scheme="http://www.blogger.com/atom/ns#" term="Hacking Tools"/><category scheme="http://www.blogger.com/atom/ns#" term="penetration testing"/><category scheme="http://www.blogger.com/atom/ns#" term="Wi-Fi Hacking"/><category scheme="http://www.blogger.com/atom/ns#" term="wireless"/><title type='text'>Spooftooph 0.5.2 - Automated spoofing or cloning Bluetooth device</title><summary type="text">



Spooftooph is designed to automate spoofing or cloning Bluetooth device Name, Class, and Address. Cloning this information effectively allows Bluetooth device to hide in plain site. Bluetooth scanning software will only list one of the devices if more than one device in range shares the same device information when the devices are in Discoverable Mode (specificaly the same Address).




</summary><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/5903455644988733725/posts/default/7863180172705411373'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/5903455644988733725/posts/default/7863180172705411373'/><link rel='alternate' type='text/html' href='http://thntools999.blogspot.com/2012/11/spooftooph-052-automated-spoofing-or.html' title='Spooftooph 0.5.2 - Automated spoofing or cloning Bluetooth device'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjpbXSxPLJOAt826AS4azfT7JKcUFFMKE5dJEqQb7W6R02KYjxZslPrdQ9ZZD6RUzETD0egjx9NJHU0zDt6mH9ZSNalF-bK9ojA1JgQAHrlIQnLBAn_L6JXkouo8az48P9Do9N0Qz9WYAfI/s72-c/Spooftooph.jpeg" height="72" width="72"/></entry><entry><id>tag:blogger.com,1999:blog-5903455644988733725.post-7200999963460781125</id><published>2012-11-03T10:13:00.000-11:00</published><updated>2012-11-03T10:24:59.202-11:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Hacking Tools"/><category scheme="http://www.blogger.com/atom/ns#" term="penetration testing"/><category scheme="http://www.blogger.com/atom/ns#" term="script"/><category scheme="http://www.blogger.com/atom/ns#" term="Security Tools"/><category scheme="http://www.blogger.com/atom/ns#" term="Shell Code"/><category scheme="http://www.blogger.com/atom/ns#" term="Wi-Fi Hacking"/><category scheme="http://www.blogger.com/atom/ns#" term="wireless"/><title type='text'>Wifi Honey - Creates fake APs using all encryption</title><summary type="text">


This is a script, attack can use to creates fake APs using all encryption and monitors with Airodump.&amp;nbsp;It automate the setup process, it creates five monitor mode interfaces, four are used as APs and the fifth is used for airdump-ng. To make things easier, rather than having five windows all this is done in a screen session which allows you to switch between screens to see what is going on</summary><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/5903455644988733725/posts/default/7200999963460781125'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/5903455644988733725/posts/default/7200999963460781125'/><link rel='alternate' type='text/html' href='http://thntools999.blogspot.com/2012/11/wifi-honey-creates-fake-aps-using-all.html' title='Wifi Honey - Creates fake APs using all encryption'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjjqaOko4dI4JfFMdOzHsfRapLaqoy-vXADx8RMHLBy0iib-YsE39jheD37zWlXciA9SsWFPtC72D_VMUhFiWNtaLtiCSY9rY8NQOGA9gshhthjxddldZkNHo5_ro722GUhRyC8QbNN9B-5/s72-c/fake.png" height="72" width="72"/></entry></feed>