<?xml version='1.0' encoding='UTF-8'?><rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:openSearch="http://a9.com/-/spec/opensearchrss/1.0/" xmlns:blogger="http://schemas.google.com/blogger/2008" xmlns:georss="http://www.georss.org/georss" xmlns:gd="http://schemas.google.com/g/2005" xmlns:thr="http://purl.org/syndication/thread/1.0" version="2.0"><channel><atom:id>tag:blogger.com,1999:blog-5850186663859316637</atom:id><lastBuildDate>Mon, 25 Aug 2025 08:40:11 +0000</lastBuildDate><category>Tutorials</category><category>other</category><category>Rats</category><category>Hack tools</category><category>web sites</category><category>Keyloggers</category><category>Antivirus</category><category>Sql injection</category><category>internet Softwares</category><category>internet Downloaders</category><category>security</category><category>servers</category><category>converters</category><category>XSS</category><category>backtrack</category><category>Wireless</category><category>Spam Tools</category><category>optimizers</category><category>compression</category><category>games</category><category>Email Hacking</category><category>Networking Softwares</category><category>bots</category><category>graphics</category><category>Ratss</category><category>ebooks</category><category>fileice</category><category>adfly</category><category>make mony</category><title> The Hacking Trick : Free Hacking Tools Tricks Tips and Tutorials  | H4xOrin&#39; Th3 WOrLd |</title><description>Free Hacking Tools Tricks Tips and Tutorials &#xa;The Hacking Trick</description><link>https://hax0rtools.blogspot.com/</link><managingEditor>noreply@blogger.com (Unknown)</managingEditor><generator>Blogger</generator><openSearch:totalResults>320</openSearch:totalResults><openSearch:startIndex>1</openSearch:startIndex><openSearch:itemsPerPage>25</openSearch:itemsPerPage><item><guid isPermaLink="false">tag:blogger.com,1999:blog-5850186663859316637.post-6641498461189030811</guid><pubDate>Tue, 01 Jul 2014 10:09:00 +0000</pubDate><atom:updated>2016-04-22T09:06:54.830-07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">internet Downloaders</category><category domain="http://www.blogger.com/atom/ns#">optimizers</category><title>DOWNLOAD IDM 6.20 WITH CRACk + Serial Keys</title><description>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;/div&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjj-0Dgi_yXRDNQ7HTTma8c-fnwJG_5iXIIA9Ksge4Mu1Qj4UWNHRZ64-EY-rmR_YcJFJ1S4dFTW1P-428T9Kpx83HOwb-XgeHph2IEePk0Bikpy8eA1jCBVn4UmqYSpLY4sZyGrxO4X9Bo/s1600/IDM-Internet_Download_Manager_517%255B1%255D.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;400&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjj-0Dgi_yXRDNQ7HTTma8c-fnwJG_5iXIIA9Ksge4Mu1Qj4UWNHRZ64-EY-rmR_YcJFJ1S4dFTW1P-428T9Kpx83HOwb-XgeHph2IEePk0Bikpy8eA1jCBVn4UmqYSpLY4sZyGrxO4X9Bo/s400/IDM-Internet_Download_Manager_517%255B1%255D.png&quot; width=&quot;312&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;span style=&quot;color: white; font-family: &amp;quot;verdana&amp;quot; , sans-serif;&quot;&gt;Internet Download Manager gives you the tools to download many types of files from the Internet and organize them as you see fit. You can categorize each file as you download it, and then access all downloads right from the app&#39;s main interface.&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: &amp;quot;verdana&amp;quot; , sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span style=&quot;font-family: &amp;quot;verdana&amp;quot; , sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span style=&quot;color: red; font-size: large;&quot;&gt;&lt;a href=&quot;http://adf.ly/pzkCw&quot;&gt;DOWNLOAD IDM 6.20 WITH CRACk&amp;nbsp;+ Serial Keys&lt;/a&gt;&lt;/span&gt;&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;/div&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;span style=&quot;color: white; font-family: &amp;quot;verdana&amp;quot; , sans-serif;&quot;&gt;How To Crack IDM 6.20 tutorial :&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;iframe allowfullscreen=&quot;&quot; frameborder=&quot;0&quot; height=&quot;315&quot; src=&quot;//www.youtube.com/embed/PDzj5q0eAxw&quot; width=&quot;560&quot;&gt;&lt;/iframe&gt;

&lt;/div&gt;
&lt;/div&gt;
</description><link>https://hax0rtools.blogspot.com/2014/07/download-idm-620-build-5-crack.html</link><author>noreply@blogger.com (Unknown)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjj-0Dgi_yXRDNQ7HTTma8c-fnwJG_5iXIIA9Ksge4Mu1Qj4UWNHRZ64-EY-rmR_YcJFJ1S4dFTW1P-428T9Kpx83HOwb-XgeHph2IEePk0Bikpy8eA1jCBVn4UmqYSpLY4sZyGrxO4X9Bo/s72-c/IDM-Internet_Download_Manager_517%255B1%255D.png" height="72" width="72"/><thr:total>3</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-5850186663859316637.post-5889043171816901855</guid><pubDate>Sun, 29 Dec 2013 15:25:00 +0000</pubDate><atom:updated>2014-07-01T06:38:59.425-07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">internet Downloaders</category><category domain="http://www.blogger.com/atom/ns#">Networking Softwares</category><category domain="http://www.blogger.com/atom/ns#">optimizers</category><title>Internet download manager 6.18 clean patch (idm 6.18 crack)</title><description>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;color: white; font-family: Century Gothic, sans-serif;&quot;&gt;Hello H4x0rs today i will share with you &amp;nbsp;the easiest method to register idm 6.18 &amp;nbsp;using a crack basically you don&#39;t need&amp;nbsp;any skills to&amp;nbsp;do this just follow the steps :&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;color: white; font-family: Century Gothic, sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;color: red; font-family: Century Gothic, sans-serif;&quot;&gt;&lt;u&gt;Step 1 :&lt;/u&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;color: white; font-family: Century Gothic, sans-serif;&quot;&gt;Download IDM 6.18 from the offical site &lt;a href=&quot;http://mirror2.internetdownloadmanager.com/idman618build11.exe?b=1&amp;amp;filename=idman618build11.exe&quot;&gt;here&lt;/a&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;color: white; font-family: Century Gothic, sans-serif;&quot;&gt;Download &amp;nbsp;Patch IDM 6.18 Build 7 &lt;a href=&quot;http://adf.ly/pzzOr&quot;&gt;here&lt;/a&gt;&amp;nbsp;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;color: white; font-family: Century Gothic, sans-serif;&quot;&gt;Total virus &lt;a href=&quot;https://www.virustotal.com/fr/file/990e6eff8f5eed2b3c03d328d309216c5f3ac539e30eb0a6e28d72cffc4d2bab/analysis/1388326760/&quot;&gt;report&amp;nbsp;&lt;/a&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;color: red; font-family: Century Gothic, sans-serif;&quot;&gt;&lt;u&gt;Step 2:&lt;/u&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;color: white; font-family: Century Gothic, sans-serif;&quot;&gt;install the IDM 6.18&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;color: white; font-family: Century Gothic, sans-serif;&quot;&gt;Registre IDM with One of the &amp;nbsp;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style=&quot;color: white; font-family: Verdana, sans-serif;&quot;&gt;following Keys:&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;color: white; font-family: Verdana, sans-serif;&quot;&gt;9QNBL-L2641-Y7WVE-QEN3I&lt;br /&gt;NZ2CT-GBN1G-8BQ8J-CAW9E&lt;br /&gt;HFM96-NFUDF-IDZIY-XMTJ8&lt;br /&gt;RIU8I-RF6FX-ZDQS3-HU2LE&lt;br /&gt;K4LP8-G4YL4-IT6TM-5GAKG&lt;br /&gt;DPC2Q-KLL22-WTBXF-26JJL&lt;br /&gt;635R2-LIAT1-TP29G-MTUBK&lt;br /&gt;51SM3-13XZ2-EYHP5-AR5LZ&lt;br /&gt;B72MZ-DC6WV-W627R-HCQWJ&lt;br /&gt;RXMC9-FJITN-2PAGE-66RJW&lt;br /&gt;R3QAA-M3475-5JABK-QLKE5&lt;br /&gt;ZBGRD-FW8QY-RBHXG-QL72H&lt;br /&gt;AJ4TG-9M2WG-G385I-XID8I&lt;br /&gt;CDANV-K15WY-KXG4D-E5BDX&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;color: white; font-family: &#39;Century Gothic&#39;, sans-serif;&quot;&gt;close IDM 6.18 application or CTRL+ALT+DEL and&amp;nbsp;terminate IDMan.exe processeur&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;color: red; font-family: Century Gothic, sans-serif;&quot;&gt;&lt;u&gt;Step 3 :&lt;/u&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;color: white; font-family: Century Gothic, sans-serif;&quot;&gt;extratct Patch&amp;nbsp;file anywhere your PC &amp;nbsp;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;color: white; font-family: Century Gothic, sans-serif;&quot;&gt;then run Patch IDM 6.18 Build 7.exe as administarator&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhBYM7NgeScWIpT54j5dRcpS6nL1KRc5M99wUbDFBH2RbjAXFQrr4Bwj8nOUy9zGFZBBkBpLl4v4I4zyxlD7QxS1hD8UdtQ1Sa2VW-YnpTmB6rQ-w9W90vb-7XmtEfMSci03Y-CmQcDvWjA/s1600/hax.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;span style=&quot;color: white; font-family: Century Gothic, sans-serif;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhBYM7NgeScWIpT54j5dRcpS6nL1KRc5M99wUbDFBH2RbjAXFQrr4Bwj8nOUy9zGFZBBkBpLl4v4I4zyxlD7QxS1hD8UdtQ1Sa2VW-YnpTmB6rQ-w9W90vb-7XmtEfMSci03Y-CmQcDvWjA/s400/hax.jpg&quot; height=&quot;300&quot; width=&quot;400&quot; /&gt;&lt;/span&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;color: white; font-family: Century Gothic, sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;color: white; font-family: Century Gothic, sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;color: white; font-family: Century Gothic, sans-serif;&quot;&gt;Now click on installer .&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;color: white; font-family: Century Gothic, sans-serif;&quot;&gt;Congratulations Now You have IDM 6.18 full version !!&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgyAI4wEWDqm-n4Gpgce_x6J9cuP2mIefXlpZjQ6puj2EH8V7b8YWUEqJLCHO4I3Fs3Rj5TqueFyjyjmcT-PMDlLRuazd1zbeyXIAisfJ10iCVg6BrhXf6CMajb9lOwJKyBayclyprqZ1Ew/s1600/Sans+titre.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;span style=&quot;color: white; font-family: Century Gothic, sans-serif;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgyAI4wEWDqm-n4Gpgce_x6J9cuP2mIefXlpZjQ6puj2EH8V7b8YWUEqJLCHO4I3Fs3Rj5TqueFyjyjmcT-PMDlLRuazd1zbeyXIAisfJ10iCVg6BrhXf6CMajb9lOwJKyBayclyprqZ1Ew/s400/Sans+titre.jpg&quot; height=&quot;228&quot; width=&quot;400&quot; /&gt;&lt;/span&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;color: white; font-family: Century Gothic, sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;color: white; font-family: Century Gothic, sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;color: white; font-family: Century Gothic, sans-serif;&quot;&gt;please if you have any questions or suggestions post it in this topic and i will see what i can do :) ,&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;color: white; font-family: Century Gothic, sans-serif;&quot;&gt;and if you need the serial method &lt;a href=&quot;http://www.hax0rtools.com/2013/09/how-to-register-internet-download.html&quot;&gt;click here&lt;/a&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
Version &amp;nbsp;6.19 Build 9 :&lt;br /&gt;
&lt;br /&gt;
&lt;iframe allowfullscreen=&quot;&quot; frameborder=&quot;0&quot; height=&quot;315&quot; src=&quot;//www.youtube.com/embed/Y7ZwVX0hjHk&quot; width=&quot;560&quot;&gt;&lt;/iframe&gt;
&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;color: white; font-family: Century Gothic, sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;/div&gt;
</description><link>https://hax0rtools.blogspot.com/2013/12/internet-download-manager-618-clean.html</link><author>noreply@blogger.com (Unknown)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhBYM7NgeScWIpT54j5dRcpS6nL1KRc5M99wUbDFBH2RbjAXFQrr4Bwj8nOUy9zGFZBBkBpLl4v4I4zyxlD7QxS1hD8UdtQ1Sa2VW-YnpTmB6rQ-w9W90vb-7XmtEfMSci03Y-CmQcDvWjA/s72-c/hax.jpg" height="72" width="72"/><thr:total>5</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-5850186663859316637.post-777647344359252668</guid><pubDate>Sun, 01 Dec 2013 09:50:00 +0000</pubDate><atom:updated>2013-12-01T01:51:01.847-08:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Hack tools</category><category domain="http://www.blogger.com/atom/ns#">internet Softwares</category><title>Download PuTTY SSH and telnet client</title><description>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
&lt;div style=&quot;font-family: Century Gothic, Helvetica, sans-serif; font-size: 14px; line-height: 25.90625px; margin-bottom: 15px; margin-top: 15px; padding: 0px;&quot;&gt;
&lt;strong&gt;&lt;span style=&quot;color: white;&quot;&gt;PuTTY&lt;/span&gt;&lt;/strong&gt;&lt;/div&gt;
&lt;div style=&quot;font-family: Verdana, Tahoma, Century Gothic, helvetica, sans-serif;&quot;&gt;
&lt;span style=&quot;color: white;&quot;&gt;PuTTY is an SSH and telnet client, developed originally by Simon Tatham for the Windows platform. PuTTY is open source software that is available with source code and is developed and supported by a group of volunteers.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;font-family: Verdana, Tahoma, Century Gothic, helvetica, sans-serif;&quot;&gt;
&lt;span style=&quot;color: white;&quot;&gt;You can download PuTTY&amp;nbsp;&lt;a href=&quot;http://www.chiark.greenend.org.uk/~sgtatham/putty/download.html&quot;&gt;here&lt;/a&gt;.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;font-family: Century Gothic, Helvetica, sans-serif; font-size: 14px; line-height: 25.90625px; margin-bottom: 15px; margin-top: 15px; padding: 0px;&quot;&gt;
&lt;a href=&quot;http://hackspc.com/wp-content/uploads/2009/03/putty.jpg&quot; style=&quot;text-decoration: none;&quot;&gt;&lt;span style=&quot;color: white;&quot;&gt;&lt;img alt=&quot;&quot; class=&quot;alignnone size-full wp-image-2184&quot; height=&quot;310&quot; src=&quot;http://hackspc.com/wp-content/uploads/2009/03/putty.jpg&quot; style=&quot;border: 1px solid rgb(119, 119, 119);&quot; title=&quot;putty&quot; width=&quot;499&quot; /&gt;&lt;/span&gt;&lt;/a&gt;&lt;/div&gt;
&lt;table border=&quot;1&quot; style=&quot;font-family: Century Gothic, Helvetica, sans-serif; font-size: 14px; line-height: 25.90625px; width: 500pxpx;&quot;&gt;&lt;tbody&gt;
&lt;tr&gt;&lt;td align=&quot;center&quot; colspan=&quot;2&quot;&gt;&lt;span style=&quot;color: white;&quot;&gt;PuTTY&lt;/span&gt;&lt;/td&gt;&lt;td align=&quot;center&quot; rowspan=&quot;6&quot;&gt;&lt;br /&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td&gt;&lt;span style=&quot;color: white;&quot;&gt;Website&lt;/span&gt;&lt;/td&gt;&lt;td&gt;&lt;a href=&quot;http://www.putty.org/&quot;&gt;&lt;span style=&quot;color: white;&quot;&gt;http://www.putty.org/&lt;/span&gt;&lt;/a&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td&gt;&lt;span style=&quot;color: white;&quot;&gt;Download Page&lt;/span&gt;&lt;/td&gt;&lt;td&gt;&lt;a href=&quot;http://www.chiark.greenend.org.uk/~sgtatham/putty/download.html&quot;&gt;&lt;span style=&quot;color: white;&quot;&gt;http://www.chiark.greenend.org.uk/~sgtatham/putty/download.html&lt;/span&gt;&lt;/a&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td&gt;&lt;span style=&quot;color: white;&quot;&gt;File size&lt;/span&gt;&lt;/td&gt;&lt;td&gt;&lt;span style=&quot;color: white;&quot;&gt;196 kb&lt;/span&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td&gt;&lt;span style=&quot;color: white;&quot;&gt;License&lt;/span&gt;&lt;/td&gt;&lt;td&gt;&lt;span style=&quot;color: white;&quot;&gt;Freeware&lt;/span&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td&gt;&lt;span style=&quot;color: white;&quot;&gt;Operating System&lt;/span&gt;&lt;/td&gt;&lt;td&gt;&lt;span style=&quot;color: white;&quot;&gt;Windows 2000/XP/Windows 7/windows 8&lt;/span&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;/tbody&gt;&lt;/table&gt;
&lt;/div&gt;
</description><link>https://hax0rtools.blogspot.com/2013/12/download-putty-ssh-and-telnet-client.html</link><author>noreply@blogger.com (Unknown)</author><thr:total>1</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-5850186663859316637.post-3935959216144185156</guid><pubDate>Sun, 01 Dec 2013 09:40:00 +0000</pubDate><atom:updated>2013-12-01T01:41:58.521-08:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">internet Softwares</category><category domain="http://www.blogger.com/atom/ns#">other</category><category domain="http://www.blogger.com/atom/ns#">security</category><title>Download Advanced Port Scanner</title><description>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
&lt;div style=&quot;font-size: 14px; line-height: 25.90625px; margin-bottom: 15px; margin-top: 15px; padding: 0px;&quot;&gt;
&lt;span style=&quot;color: white; font-family: Century Gothic, Helvetica, sans-serif;&quot;&gt;Very small size, fast and simple for use port scanner . Just type IP Addresses of the computer or you can scan a range , &amp;nbsp;and you´ll get detailed descriptions for common ports.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;font-size: 14px; line-height: 25.90625px; margin-bottom: 15px; margin-top: 15px; padding: 0px;&quot;&gt;
&lt;span style=&quot;color: white; font-family: Century Gothic, Helvetica, sans-serif;&quot;&gt;this software is similar to Angry Ip scanner&amp;nbsp;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgj1rQ-RGhNqSJoEkZQ51rVf9T0I4yQ-BSTsZSMYN1OQGaQqXy03l8-Qb1a9whd5aE_G-ncH0f33UimiPLvdifwvOk29C8ZK1p1FJFs8jE4GtUg62ymvya-6niBi5ouiHYArvtgoWy_qFDr/s1600/advanced-port-scanner.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;span style=&quot;color: white; font-family: Century Gothic, Helvetica, sans-serif;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;400&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgj1rQ-RGhNqSJoEkZQ51rVf9T0I4yQ-BSTsZSMYN1OQGaQqXy03l8-Qb1a9whd5aE_G-ncH0f33UimiPLvdifwvOk29C8ZK1p1FJFs8jE4GtUg62ymvya-6niBi5ouiHYArvtgoWy_qFDr/s400/advanced-port-scanner.jpg&quot; width=&quot;387&quot; /&gt;&lt;/span&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div style=&quot;font-size: 14px; line-height: 25.90625px; margin-bottom: 15px; margin-top: 15px; padding: 0px;&quot;&gt;
&lt;span style=&quot;color: white; font-family: Century Gothic, Helvetica, sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;font-size: 14px; line-height: 25.90625px; margin-bottom: 15px; margin-top: 15px; padding: 0px;&quot;&gt;
&lt;/div&gt;
&lt;table border=&quot;1&quot; style=&quot;font-size: 14px; line-height: 25.90625px;&quot;&gt;&lt;tbody&gt;
&lt;tr&gt;&lt;td&gt;&lt;span style=&quot;color: white; font-family: Century Gothic, Helvetica, sans-serif;&quot;&gt;File size&lt;/span&gt;&lt;/td&gt;&lt;td&gt;&lt;span style=&quot;color: white; font-family: Century Gothic, Helvetica, sans-serif;&quot;&gt;426 KB&lt;/span&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td&gt;&lt;span style=&quot;color: white; font-family: Century Gothic, Helvetica, sans-serif;&quot;&gt;Operating System&lt;/span&gt;&lt;/td&gt;&lt;td&gt;&lt;span style=&quot;color: white; font-family: Century Gothic, Helvetica, sans-serif;&quot;&gt;Windows 95/98/ME/NT4.0/2000/XP/2003/Vista/2008&lt;/span&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td&gt;&lt;span style=&quot;color: white; font-family: Century Gothic, Helvetica, sans-serif;&quot;&gt;License:&lt;/span&gt;&lt;/td&gt;&lt;td&gt;&lt;span style=&quot;color: white; font-family: Century Gothic, Helvetica, sans-serif;&quot;&gt;Free&lt;/span&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;/tbody&gt;&lt;/table&gt;
&lt;span style=&quot;color: white; font-family: Century Gothic, Helvetica, sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;br /&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;a href=&quot;http://www.download.com/Advanced-Port-Scanner/3000-18508_4-98269.html?part=dl-73294&amp;amp;subj=dl&amp;amp;tag=button&quot;&gt;&lt;span style=&quot;color: white; font-family: Century Gothic, Helvetica, sans-serif;&quot;&gt;&lt;img alt=&quot;download&quot; height=&quot;191&quot; src=&quot;http://hackspc.com/wp-content/uploads/2009/03/download-button.jpg&quot; width=&quot;200&quot; /&gt;&lt;/span&gt;&lt;/a&gt;&lt;/div&gt;
&lt;/div&gt;
</description><link>https://hax0rtools.blogspot.com/2013/12/download-advanced-port-scanner.html</link><author>noreply@blogger.com (Unknown)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgj1rQ-RGhNqSJoEkZQ51rVf9T0I4yQ-BSTsZSMYN1OQGaQqXy03l8-Qb1a9whd5aE_G-ncH0f33UimiPLvdifwvOk29C8ZK1p1FJFs8jE4GtUg62ymvya-6niBi5ouiHYArvtgoWy_qFDr/s72-c/advanced-port-scanner.jpg" height="72" width="72"/><thr:total>2</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-5850186663859316637.post-4262342170628245475</guid><pubDate>Mon, 04 Nov 2013 19:29:00 +0000</pubDate><atom:updated>2013-11-04T11:31:25.164-08:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Hack tools</category><category domain="http://www.blogger.com/atom/ns#">other</category><title>Download Instant PDF Password Remover v3.0 tools for free</title><description>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; font-size: 16px; line-height: 22px; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhS0gHM31_p8SVdLxK41_Hb4sOqmAdAKR0Qs_bM_b8F6G50IdNm22lXaOLugeS0gp9aqqzjoe8yRET1-QvaDcRsyaz-eCkKtodW_Tk05G7IRWdlgTVbe2fEpjQAw4H5ziJkyB8bN5UTscU/s1600/instant_pdf_password_remover.jpg&quot; imageanchor=&quot;1&quot; style=&quot;border: none; margin-left: 1em; margin-right: 1em; text-decoration: none;&quot;&gt;&lt;span style=&quot;color: white; font-family: Century Gothic, Helvetica, sans-serif;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhS0gHM31_p8SVdLxK41_Hb4sOqmAdAKR0Qs_bM_b8F6G50IdNm22lXaOLugeS0gp9aqqzjoe8yRET1-QvaDcRsyaz-eCkKtodW_Tk05G7IRWdlgTVbe2fEpjQAw4H5ziJkyB8bN5UTscU/s1600/instant_pdf_password_remover.jpg&quot; style=&quot;-webkit-transition: all 1s; border: none; padding: 5px; position: relative; transition: all 1s;&quot; /&gt;&lt;/span&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div style=&quot;font-size: 16px; line-height: 22px; text-align: justify;&quot;&gt;
&lt;strong&gt;&lt;span style=&quot;color: white; font-family: Century Gothic, Helvetica, sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/strong&gt;&lt;/div&gt;
&lt;div style=&quot;font-size: 16px; line-height: 22px; text-align: justify;&quot;&gt;
&lt;span style=&quot;color: white; font-family: Century Gothic, Helvetica, sans-serif;&quot;&gt;&lt;strong&gt;Instant PDF Password Remover&lt;/strong&gt;&amp;nbsp;is the FREE tool to instantly remove Password of&amp;nbsp;&lt;strong&gt;protected PDF&lt;/strong&gt;document. It can remove both User &amp;amp; Owner password along with all&amp;nbsp;&lt;strong&gt;PDF file restrictions&lt;/strong&gt;&amp;nbsp;such as Copy, Printing, Screen Reader etc.&lt;/span&gt;&lt;/div&gt;
&lt;span style=&quot;color: white; font-family: Century Gothic, Helvetica, sans-serif;&quot;&gt;&lt;a href=&quot;http://www.blogger.com/blogger.g?blogID=5850186663859316637&quot; name=&quot;more&quot; style=&quot;font-size: 16px; line-height: 22px;&quot;&gt;&lt;/a&gt;&lt;br style=&quot;font-size: 16px; line-height: 22px;&quot; /&gt;&lt;/span&gt;
&lt;br /&gt;
&lt;div style=&quot;font-size: 16px; line-height: 22px; text-align: justify;&quot;&gt;
&lt;span style=&quot;color: white; font-family: Century Gothic, Helvetica, sans-serif;&quot;&gt;Often we receive password protected PDF documents in the form of mobile bills, bank statements or other financial reports. It is highly&amp;nbsp;&lt;strong&gt;inconvenient&lt;/strong&gt;&amp;nbsp;to remember or type these complex and long passwords.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;font-size: 16px; line-height: 22px; text-align: justify;&quot;&gt;
&lt;span style=&quot;color: white; font-family: Century Gothic, Helvetica, sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;font-size: 16px; line-height: 22px; text-align: justify;&quot;&gt;
&lt;span style=&quot;color: white; font-family: Century Gothic, Helvetica, sans-serif;&quot;&gt;&#39;Instant PDF Password Remover&#39;&lt;strong&gt;&amp;nbsp;&lt;/strong&gt;helps you to quickly remove the Password from these PDF documents. Thus preventing the need to type these complex/long password every time you open such protected PDF documents.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;font-size: 16px; line-height: 22px; text-align: justify;&quot;&gt;
&lt;span style=&quot;color: white; font-family: Century Gothic, Helvetica, sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;font-size: 16px; line-height: 22px; text-align: justify;&quot;&gt;
&lt;span style=&quot;color: white; font-family: Century Gothic, Helvetica, sans-serif;&quot;&gt;Note that it cannot help you to remove the unknown password. It will only help you to remove the KNOWN password so that you don&#39;t have to enter the password everytime while opening the PDF file.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;font-size: 16px; line-height: 22px; text-align: justify;&quot;&gt;
&lt;span style=&quot;color: white; font-family: Century Gothic, Helvetica, sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;font-size: 16px; line-height: 22px; text-align: justify;&quot;&gt;
&lt;span style=&quot;color: white; font-family: Century Gothic, Helvetica, sans-serif;&quot;&gt;It makes it even easier with the&amp;nbsp;&lt;strong&gt;&#39;Right Click Context Menu&lt;/strong&gt;&#39; integration. This allows you to simply right click on the PDF file and launch the tool. Also you can&amp;nbsp;&lt;strong&gt;Drag &amp;amp; Drop&lt;/strong&gt;&amp;nbsp;PDF file directly onto the GUI window to start the password removal operation instantly.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;font-size: 16px; line-height: 22px; text-align: justify;&quot;&gt;
&lt;span style=&quot;color: white; font-family: Century Gothic, Helvetica, sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;font-size: 16px; line-height: 22px; text-align: justify;&quot;&gt;
&lt;span style=&quot;color: white; font-family: Century Gothic, Helvetica, sans-serif;&quot;&gt;It can&amp;nbsp;&lt;strong&gt;unlock PDF document&lt;/strong&gt;&amp;nbsp;protected with all versions of Adobe Acrobat Reader using different&amp;nbsp;&lt;strong&gt;(RC4, AES) encryption&lt;/strong&gt;&amp;nbsp;methods.&amp;nbsp;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;font-size: 16px; line-height: 22px; text-align: justify;&quot;&gt;
&lt;span style=&quot;color: white; font-family: Century Gothic, Helvetica, sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;font-size: 16px; line-height: 22px; text-align: justify;&quot;&gt;
&lt;a href=&quot;http://securityxploded.com/getfile_plus.php?id=7571&quot; style=&quot;border: none; text-align: center; text-decoration: none;&quot;&gt;&lt;span style=&quot;font-size: large; font-weight: bold;&quot;&gt;&lt;span style=&quot;color: lime; font-family: Century Gothic, Helvetica, sans-serif;&quot;&gt;Download Instant PDF Password Remover v3.0&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;/a&gt;&lt;/div&gt;
&lt;/div&gt;
</description><link>https://hax0rtools.blogspot.com/2013/11/download-instant-pdf-password-remover.html</link><author>noreply@blogger.com (Unknown)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhS0gHM31_p8SVdLxK41_Hb4sOqmAdAKR0Qs_bM_b8F6G50IdNm22lXaOLugeS0gp9aqqzjoe8yRET1-QvaDcRsyaz-eCkKtodW_Tk05G7IRWdlgTVbe2fEpjQAw4H5ziJkyB8bN5UTscU/s72-c/instant_pdf_password_remover.jpg" height="72" width="72"/><thr:total>2</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-5850186663859316637.post-3540561424745245752</guid><pubDate>Sat, 19 Oct 2013 11:12:00 +0000</pubDate><atom:updated>2013-10-19T04:12:50.421-07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Hack tools</category><category domain="http://www.blogger.com/atom/ns#">Tutorials</category><title>Hacking and Security Tools for Beginners and Elite - Complete Tool Kit</title><description>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
&lt;br /&gt;
&lt;div class=&quot;post-footer&quot; style=&quot;-webkit-text-stroke-width: 0px; color: #191919; font-family: &#39;Trebuchet MS&#39;, Helvetica, sans-serif; font-size: 13px; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: normal; orphans: auto; text-align: left; text-indent: 0px; text-transform: none; white-space: normal; widows: auto; word-spacing: 0px;&quot;&gt;
&lt;/div&gt;
&lt;br /&gt;
&lt;div class=&quot;post-body entry-content&quot; style=&quot;-webkit-text-stroke-width: 0px; border-left-color: rgb(255, 255, 255); border-left-style: solid; border-left-width: 1px; border-right-color: rgb(255, 255, 255); border-right-style: solid; border-right-width: 1px; font-size: 13px; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: 1.6em; margin: 0px 0px 0.75em; orphans: auto; padding: 10px; text-align: left; text-indent: 0px; text-transform: none; white-space: normal; widows: auto; word-spacing: 0px;&quot;&gt;
&lt;span style=&quot;color: white; font-family: Century Gothic, Helvetica, sans-serif;&quot;&gt;Here is this post I have listed out few of the frequently and widely used Tools used by Hackers of all levels.But one thing i would like to mention is that &quot;&lt;b&gt;Hackers make tool but tool do not make Hackers&lt;/b&gt;&quot;If you depend more on tools then you cannot evolve as a hacker rather you will be surrounded by tools and dependent on them.&lt;/span&gt;&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEisr8Oo8AvCDKWN70Q7nVIGSqdINMbI2lBuQIH1dA8R6nqybMLmRGsclkiTFJoMgeRjIkaYA_1RvgZeNjllHtPvI7KZ-Yzva1Rh6aMFD4bpqW0VIeE-fuqL9P7F3vX_LrQYUfl3F3lmvcU/s1600/Hacking+Tool.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em; text-decoration: none;&quot;&gt;&lt;span style=&quot;color: white; font-family: Century Gothic, Helvetica, sans-serif;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;135&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEisr8Oo8AvCDKWN70Q7nVIGSqdINMbI2lBuQIH1dA8R6nqybMLmRGsclkiTFJoMgeRjIkaYA_1RvgZeNjllHtPvI7KZ-Yzva1Rh6aMFD4bpqW0VIeE-fuqL9P7F3vX_LrQYUfl3F3lmvcU/s320/Hacking+Tool.png&quot; style=&quot;background-attachment: scroll; background-image: none; background-position: 0px 0px; background-repeat: repeat repeat; border-bottom-left-radius: 2px; border-bottom-right-radius: 2px; border-top-left-radius: 2px; border-top-right-radius: 2px; border: 1px solid rgb(255, 255, 255); display: inline; margin: 0px 0px 10px; padding: 5px;&quot; width=&quot;320&quot; /&gt;&lt;/span&gt;&lt;/a&gt;&lt;/div&gt;
&lt;span style=&quot;color: white; font-family: Century Gothic, Helvetica, sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;blockquote style=&quot;border-color: rgb(255, 255, 255) rgb(255, 255, 255) rgb(255, 255, 255) rgb(74, 73, 73); border-style: solid; border-width: 1px 1px 1px 4px; display: block; font-size: 12px; line-height: 18px; margin: 10px; overflow: auto; padding: 10px 10px 15px; width: 530px;&quot;&gt;
&lt;center&gt;
&lt;b&gt;&lt;span style=&quot;color: white; font-family: Century Gothic, Helvetica, sans-serif;&quot;&gt;&lt;span style=&quot;font-size: medium;&quot;&gt;1.&lt;/span&gt;Password Cracking Tools:&lt;/span&gt;&lt;/b&gt;&lt;/center&gt;
&lt;/blockquote&gt;
&lt;span style=&quot;color: white; font-family: Century Gothic, Helvetica, sans-serif;&quot;&gt;&lt;br /&gt;a) John the ripper-&lt;a href=&quot;http://www.openwall.com/john/&quot; style=&quot;text-decoration: none;&quot;&gt;http://www.openwall.com/john/&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;b) THC hydra-&lt;a href=&quot;http://www.thc.org/thc-hydra/&quot; style=&quot;text-decoration: none;&quot;&gt;http://www.thc.org/thc-hydra/&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;c) Brutus-&lt;a href=&quot;http://www.hoobie.net/brutus/&quot; style=&quot;text-decoration: none;&quot;&gt;http://www.hoobie.net/brutus/&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;d) L0PhtCrack-&lt;a href=&quot;http://www.l0phtcrack.com/&quot; style=&quot;text-decoration: none;&quot;&gt;http://www.l0phtcrack.com/&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;e) SAMInside-&lt;a href=&quot;http://insidepro.com/&quot; style=&quot;text-decoration: none;&quot;&gt;http://insidepro.com&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;f) Cain and abel-&lt;a href=&quot;http://www.oxid.it/cain.html&quot; style=&quot;text-decoration: none;&quot;&gt;http://www.oxid.it/cain.html&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;g) Pwdump-&lt;a href=&quot;http://www.foofus.net/fizzgig/pwdump/&quot; style=&quot;text-decoration: none;&quot;&gt;http://www.foofus.net/fizzgig/pwdump/&lt;/a&gt;&lt;/span&gt;&lt;br /&gt;
&lt;blockquote style=&quot;border-color: rgb(255, 255, 255) rgb(255, 255, 255) rgb(255, 255, 255) rgb(74, 73, 73); border-style: solid; border-width: 1px 1px 1px 4px; display: block; font-size: 12px; line-height: 18px; margin: 10px; overflow: auto; padding: 10px 10px 15px; width: 530px;&quot;&gt;
&lt;center&gt;
&lt;span style=&quot;color: white; font-family: Century Gothic, Helvetica, sans-serif;&quot;&gt;&lt;span style=&quot;font-size: medium;&quot;&gt;&lt;b&gt;2.&lt;/b&gt;&lt;/span&gt;&lt;b&gt;Pentesting Tools:&lt;/b&gt;&lt;/span&gt;&lt;/center&gt;
&lt;/blockquote&gt;
&lt;span style=&quot;color: white; font-family: Century Gothic, Helvetica, sans-serif;&quot;&gt;&lt;br /&gt;a) Metasploit framework-&amp;nbsp;&lt;a href=&quot;http://www.metasploit.com/&quot; style=&quot;text-decoration: none;&quot;&gt;http://www.metasploit.com/&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;b) Canvas-&amp;nbsp;&lt;a href=&quot;http://www.immunitysec.com/products-canvas.shtml&quot; style=&quot;text-decoration: none;&quot;&gt;http://www.immunitysec.com/products-canvas.shtml&lt;/a&gt;&lt;/span&gt;&lt;br /&gt;
&lt;blockquote style=&quot;border-color: rgb(255, 255, 255) rgb(255, 255, 255) rgb(255, 255, 255) rgb(74, 73, 73); border-style: solid; border-width: 1px 1px 1px 4px; display: block; font-size: 12px; line-height: 18px; margin: 10px; overflow: auto; padding: 10px 10px 15px; width: 530px;&quot;&gt;
&lt;center&gt;
&lt;b&gt;&lt;span style=&quot;color: white; font-family: Century Gothic, Helvetica, sans-serif;&quot;&gt;&lt;span style=&quot;font-size: medium;&quot;&gt;3.&lt;/span&gt;Sql injector Tools:&lt;/span&gt;&lt;/b&gt;&lt;/center&gt;
&lt;/blockquote&gt;
&lt;span style=&quot;color: white; font-family: Century Gothic, Helvetica, sans-serif;&quot;&gt;&lt;br /&gt;a) Sqlihelper&lt;br /&gt;&lt;br /&gt;b) &lt;a href=&quot;http://www.hax0rtools.com/2013/10/hack-websites-using-havij-sql-injection.html&quot; target=&quot;_blank&quot;&gt;Havij&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;c) SQL Exploiter&lt;/span&gt;&lt;br /&gt;
&lt;blockquote style=&quot;border-color: rgb(255, 255, 255) rgb(255, 255, 255) rgb(255, 255, 255) rgb(74, 73, 73); border-style: solid; border-width: 1px 1px 1px 4px; display: block; font-size: 12px; line-height: 18px; margin: 10px; overflow: auto; padding: 10px 10px 15px; width: 530px;&quot;&gt;
&lt;center&gt;
&lt;span style=&quot;color: white; font-family: Century Gothic, Helvetica, sans-serif;&quot;&gt;&lt;span style=&quot;font-size: medium;&quot;&gt;&lt;b&gt;4.&lt;/b&gt;&lt;/span&gt;&lt;b&gt;Website Vulnerability Scanner:&lt;/b&gt;&lt;/span&gt;&lt;/center&gt;
&lt;/blockquote&gt;
&lt;span style=&quot;color: white; font-family: Century Gothic, Helvetica, sans-serif;&quot;&gt;&lt;br /&gt;a) Acunetix-&amp;nbsp;&lt;a href=&quot;http://www.acunetix.com/&quot; style=&quot;text-decoration: none;&quot;&gt;http://www.acunetix.com/&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;b) Rational appscan-&amp;nbsp;&lt;a href=&quot;http://www.ibm.com/software/awdtools/appscan/&quot; style=&quot;text-decoration: none;&quot;&gt;http://www.ibm.com/software/awdtools/appscan/&lt;/a&gt;&lt;/span&gt;&lt;br /&gt;
&lt;blockquote style=&quot;border-color: rgb(255, 255, 255) rgb(255, 255, 255) rgb(255, 255, 255) rgb(74, 73, 73); border-style: solid; border-width: 1px 1px 1px 4px; display: block; font-size: 12px; line-height: 18px; margin: 10px; overflow: auto; padding: 10px 10px 15px; width: 530px;&quot;&gt;
&lt;center&gt;
&lt;b&gt;&lt;span style=&quot;color: white; font-family: Century Gothic, Helvetica, sans-serif;&quot;&gt;&lt;span style=&quot;font-size: medium;&quot;&gt;5.&lt;/span&gt;Vulnerability Scanner:&lt;/span&gt;&lt;/b&gt;&lt;/center&gt;
&lt;/blockquote&gt;
&lt;span style=&quot;color: white; font-family: Century Gothic, Helvetica, sans-serif;&quot;&gt;&lt;br /&gt;a) Nessus-&lt;a href=&quot;http://www.nessus.org/&quot; style=&quot;text-decoration: none;&quot;&gt;http://www.nessus.org/&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;b) Retina-&lt;a href=&quot;http://www.eeye.com/html/Products/Retina/index.html&quot; style=&quot;text-decoration: none;&quot;&gt;http://www.eeye.com/html/Products/Retina/index.html&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;c) Sara-&lt;a href=&quot;http://www-arc.com/sara/&quot; style=&quot;text-decoration: none;&quot;&gt;http://www-arc.com/sara/&lt;/a&gt;&lt;/span&gt;&lt;br /&gt;
&lt;blockquote style=&quot;border-color: rgb(255, 255, 255) rgb(255, 255, 255) rgb(255, 255, 255) rgb(74, 73, 73); border-style: solid; border-width: 1px 1px 1px 4px; display: block; font-size: 12px; line-height: 18px; margin: 10px; overflow: auto; padding: 10px 10px 15px; width: 530px;&quot;&gt;
&lt;center&gt;
&lt;b&gt;&lt;span style=&quot;color: white; font-family: Century Gothic, Helvetica, sans-serif;&quot;&gt;&lt;span style=&quot;font-size: medium;&quot;&gt;6.&lt;/span&gt;Port Scanner:&lt;/span&gt;&lt;/b&gt;&lt;/center&gt;
&lt;/blockquote&gt;
&lt;span style=&quot;color: white; font-family: Century Gothic, Helvetica, sans-serif;&quot;&gt;&lt;br /&gt;a) Nmap-&amp;nbsp;&lt;a href=&quot;http://nmap.org/&quot; style=&quot;text-decoration: none;&quot;&gt;http://nmap.org/&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;b) Angry Ip scanner-&amp;nbsp;&lt;a href=&quot;http://www.angryziber.com/ipscan/&quot; style=&quot;text-decoration: none;&quot;&gt;http://www.angryziber.com/ipscan/&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;c) Super Scan-&amp;nbsp;&lt;a href=&quot;http://www.foundstone.com/us/resources/proddesc/superscan.htm&quot; style=&quot;text-decoration: none;&quot;&gt;http://www.foundstone.com/us/resources/proddesc/superscan.htm&lt;/a&gt;&lt;/span&gt;&lt;br /&gt;
&lt;blockquote style=&quot;border-color: rgb(255, 255, 255) rgb(255, 255, 255) rgb(255, 255, 255) rgb(74, 73, 73); border-style: solid; border-width: 1px 1px 1px 4px; display: block; font-size: 12px; line-height: 18px; margin: 10px; overflow: auto; padding: 10px 10px 15px; width: 530px;&quot;&gt;
&lt;center&gt;
&lt;span style=&quot;color: white; font-family: Century Gothic, Helvetica, sans-serif;&quot;&gt;&lt;span style=&quot;font-size: medium;&quot;&gt;&lt;b&gt;7.&lt;/b&gt;&lt;/span&gt;&lt;b&gt;Intrusion detection Tools:&lt;/b&gt;&lt;/span&gt;&lt;/center&gt;
&lt;/blockquote&gt;
&lt;span style=&quot;color: white; font-family: Century Gothic, Helvetica, sans-serif;&quot;&gt;&lt;br /&gt;a) Snort-&lt;a href=&quot;http://www.snort.org/&quot; style=&quot;text-decoration: none;&quot;&gt;http://www.snort.org/&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;b) Sguil-&lt;a href=&quot;http://sguil.sourceforge.net/&quot; style=&quot;text-decoration: none;&quot;&gt;http://sguil.sourceforge.net/&lt;/a&gt;&lt;/span&gt;&lt;br /&gt;
&lt;blockquote style=&quot;border-color: rgb(255, 255, 255) rgb(255, 255, 255) rgb(255, 255, 255) rgb(74, 73, 73); border-style: solid; border-width: 1px 1px 1px 4px; display: block; font-size: 12px; line-height: 18px; margin: 10px; overflow: auto; padding: 10px 10px 15px; width: 530px;&quot;&gt;
&lt;center&gt;
&lt;span style=&quot;color: white; font-family: Century Gothic, Helvetica, sans-serif;&quot;&gt;&lt;span style=&quot;font-size: medium;&quot;&gt;&lt;b&gt;8.&lt;/b&gt;&lt;/span&gt;&lt;b&gt;Live CDs:&lt;/b&gt;&lt;/span&gt;&lt;/center&gt;
&lt;/blockquote&gt;
&lt;span style=&quot;color: white; font-family: Century Gothic, Helvetica, sans-serif;&quot;&gt;&lt;br /&gt;a) Ophcrack-&amp;nbsp;&lt;a href=&quot;http://ophcrack.sourceforge.net/&quot; style=&quot;text-decoration: none;&quot;&gt;http://ophcrack.sourceforge.net/&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;b) Backtrack-&amp;nbsp;&lt;a href=&quot;http://www.backtrack-linux.org/&quot; style=&quot;text-decoration: none;&quot;&gt;http://www.backtrack-linux.org/&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;c) Hiren’s boot cd-&amp;nbsp;&lt;a href=&quot;http://www.hiren.info/pages/bootcd&quot; style=&quot;text-decoration: none;&quot;&gt;http://www.hiren.info/pages/bootcd&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;d) Ultimate boot cd-&amp;nbsp;&lt;a href=&quot;http://www.ultimatebootcd.com/&quot; style=&quot;text-decoration: none;&quot;&gt;http://www.ultimatebootcd.com/&lt;/a&gt;&lt;br /&gt;&lt;span style=&quot;font-size: medium;&quot;&gt;&lt;b&gt;&lt;br /&gt;&lt;/b&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;blockquote style=&quot;border-color: rgb(255, 255, 255) rgb(255, 255, 255) rgb(255, 255, 255) rgb(74, 73, 73); border-style: solid; border-width: 1px 1px 1px 4px; display: block; font-size: 12px; line-height: 18px; margin: 10px; overflow: auto; padding: 10px 10px 15px; width: 530px;&quot;&gt;
&lt;center&gt;
&lt;span style=&quot;color: white; font-family: Century Gothic, Helvetica, sans-serif;&quot;&gt;&lt;span style=&quot;font-size: medium;&quot;&gt;&lt;b&gt;9.&lt;/b&gt;&lt;/span&gt;&lt;b&gt;Wireless Tools:&lt;/b&gt;&lt;/span&gt;&lt;/center&gt;
&lt;/blockquote&gt;
&lt;span style=&quot;color: white; font-family: Century Gothic, Helvetica, sans-serif;&quot;&gt;&lt;br /&gt;a) Wireshark-&amp;nbsp;&lt;a href=&quot;http://www.wireshark.org/&quot; style=&quot;text-decoration: none;&quot;&gt;http://www.wireshark.org/&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;b) Kismet-&lt;a href=&quot;http://www.kismetwireless.net/&quot; style=&quot;text-decoration: none;&quot;&gt;http://www.kismetwireless.net/&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;c) Aircrack-&amp;nbsp;&lt;a href=&quot;http://www.aircrack-ng.org/&quot; style=&quot;text-decoration: none;&quot;&gt;http://www.aircrack-ng.org/&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;d) Netstumbler-&amp;nbsp;&lt;a href=&quot;http://www.stumbler.net/&quot; style=&quot;text-decoration: none;&quot;&gt;http://www.stumbler.net/&lt;/a&gt;&lt;/span&gt;&lt;br /&gt;
&lt;blockquote style=&quot;border-color: rgb(255, 255, 255) rgb(255, 255, 255) rgb(255, 255, 255) rgb(74, 73, 73); border-style: solid; border-width: 1px 1px 1px 4px; display: block; font-size: 12px; line-height: 18px; margin: 10px; overflow: auto; padding: 10px 10px 15px; width: 530px;&quot;&gt;
&lt;center&gt;
&lt;span style=&quot;color: white; font-family: Century Gothic, Helvetica, sans-serif;&quot;&gt;&lt;span style=&quot;font-size: medium;&quot;&gt;&lt;b&gt;10.&lt;/b&gt;&lt;/span&gt;&lt;b&gt;Steganography Tools:&lt;/b&gt;&lt;/span&gt;&lt;/center&gt;
&lt;/blockquote&gt;
&lt;span style=&quot;color: white; font-family: Century Gothic, Helvetica, sans-serif;&quot;&gt;&lt;br /&gt;&lt;a href=&quot;http://sourceforge.net/search/?type_of_search=soft&amp;amp;words=steganography&quot; style=&quot;text-decoration: none;&quot;&gt;A list of&amp;nbsp; few &quot;STEGANOGRAPHY TOOLS &quot; free to DOWNLOAD.&lt;/a&gt;&lt;/span&gt;&lt;br /&gt;
&lt;blockquote style=&quot;border-color: rgb(255, 255, 255) rgb(255, 255, 255) rgb(255, 255, 255) rgb(74, 73, 73); border-style: solid; border-width: 1px 1px 1px 4px; display: block; font-size: 12px; line-height: 18px; margin: 10px; overflow: auto; padding: 10px 10px 15px; width: 530px;&quot;&gt;
&lt;center&gt;
&lt;span style=&quot;color: white; font-family: Century Gothic, Helvetica, sans-serif;&quot;&gt;&lt;span style=&quot;font-size: medium;&quot;&gt;&lt;b&gt;11.&lt;/b&gt;&lt;/span&gt;&lt;b&gt;IP Tracing Tools:&lt;/b&gt;&lt;/span&gt;&lt;/center&gt;
&lt;/blockquote&gt;
&lt;span style=&quot;color: white; font-family: Century Gothic, Helvetica, sans-serif;&quot;&gt;&lt;br /&gt;a) Neo Trace-&amp;nbsp;&lt;a href=&quot;http://www.networkingfiles.com/neotrace/&quot; style=&quot;text-decoration: none;&quot;&gt;http://www.networkingfiles.com/neotrace/&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;b) Visual Trace-&lt;a href=&quot;http://www.visualiptrace.com/&quot; style=&quot;text-decoration: none;&quot;&gt;http://www.visualiptrace.com&lt;/a&gt;&lt;/span&gt;&lt;br /&gt;
&lt;blockquote style=&quot;border-color: rgb(255, 255, 255) rgb(255, 255, 255) rgb(255, 255, 255) rgb(74, 73, 73); border-style: solid; border-width: 1px 1px 1px 4px; display: block; font-size: 12px; line-height: 18px; margin: 10px; overflow: auto; padding: 10px 10px 15px; width: 530px;&quot;&gt;
&lt;center&gt;
&lt;b&gt;&lt;span style=&quot;color: white; font-family: Century Gothic, Helvetica, sans-serif;&quot;&gt;&lt;span style=&quot;font-size: medium;&quot;&gt;12.&lt;/span&gt;Software Cracking Tools:&lt;/span&gt;&lt;/b&gt;&lt;/center&gt;
&lt;/blockquote&gt;
&lt;span style=&quot;color: white; font-family: Century Gothic, Helvetica, sans-serif;&quot;&gt;&lt;br /&gt;a) Debuggers-OllyDbg,WinDbg&lt;br /&gt;&lt;br /&gt;b) Unpackers-QUnpack&lt;br /&gt;&lt;br /&gt;c) DisAssemblers-WIN32Dasm&lt;br /&gt;&lt;br /&gt;d) Decompilers-Boomerang,Mocha,JAD&lt;br /&gt;&lt;br /&gt;e) Hex Editors-Hexworkshop,Hview, HxDSetupEN&lt;br /&gt;&lt;br /&gt;&lt;a href=&quot;http://www.woodmann.com/crackz/Tools.htm&quot; style=&quot;text-decoration: none;&quot;&gt;A list of few &quot;REVERSE ENGINEERING&quot; tools free to Download.&lt;/a&gt;&lt;/span&gt;&lt;br /&gt;
&lt;blockquote style=&quot;border-color: rgb(255, 255, 255) rgb(255, 255, 255) rgb(255, 255, 255) rgb(74, 73, 73); border-style: solid; border-width: 1px 1px 1px 4px; display: block; font-size: 12px; line-height: 18px; margin: 10px; overflow: auto; padding: 10px 10px 15px; width: 530px;&quot;&gt;
&lt;center&gt;
&lt;span style=&quot;color: white; font-family: Century Gothic, Helvetica, sans-serif;&quot;&gt;&lt;span style=&quot;font-size: medium;&quot;&gt;&lt;b&gt;13.&lt;/b&gt;&lt;/span&gt;&lt;b&gt;Virtual Enviroment Software:&lt;/b&gt;&lt;/span&gt;&lt;/center&gt;
&lt;/blockquote&gt;
&lt;span style=&quot;color: white; font-family: Century Gothic, Helvetica, sans-serif;&quot;&gt;&lt;br /&gt;a) Vmware-&amp;nbsp;&lt;a href=&quot;http://www.vmware.com/&quot; style=&quot;text-decoration: none;&quot;&gt;http://www.vmware.com/&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;b) Virtual box-&amp;nbsp;&lt;a href=&quot;http://www.virtualbox.org/&quot; style=&quot;text-decoration: none;&quot;&gt;http://www.virtualbox.org/&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;c) Sandboxie-&amp;nbsp;&lt;a href=&quot;http://www.sandboxie.com/&quot; style=&quot;text-decoration: none;&quot;&gt;http://www.sandboxie.com/&lt;/a&gt;&lt;/span&gt;&lt;br /&gt;
&lt;div style=&quot;background-color: #ebebea; clear: both; color: #191919; font-family: &#39;Trebuchet MS&#39;, verdana;&quot;&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
</description><link>https://hax0rtools.blogspot.com/2013/10/hacking-and-security-tools-for.html</link><author>noreply@blogger.com (Unknown)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEisr8Oo8AvCDKWN70Q7nVIGSqdINMbI2lBuQIH1dA8R6nqybMLmRGsclkiTFJoMgeRjIkaYA_1RvgZeNjllHtPvI7KZ-Yzva1Rh6aMFD4bpqW0VIeE-fuqL9P7F3vX_LrQYUfl3F3lmvcU/s72-c/Hacking+Tool.png" height="72" width="72"/><thr:total>2</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-5850186663859316637.post-5235949556618747011</guid><pubDate>Fri, 18 Oct 2013 19:00:00 +0000</pubDate><atom:updated>2013-10-18T12:00:06.723-07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Hack tools</category><category domain="http://www.blogger.com/atom/ns#">security</category><title>[Resolver v1.0.9] The reverse/bruteforce DNS lookup</title><description>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
&lt;div style=&quot;font-size: 16px; line-height: 22px; text-align: justify;&quot;&gt;
&lt;span style=&quot;color: white; font-family: Century Gothic, Helvetica, sans-serif;&quot;&gt;Resolver is a windows based tool which designed to preform a reverse DNS Lookup for a given IP address or for a range of IP’s in order to find its PTR. Updated to Version 1.0.3 added dns records brute force.&lt;/span&gt;&lt;/div&gt;
&lt;span style=&quot;color: white; font-family: Century Gothic, Helvetica, sans-serif;&quot;&gt;&lt;br style=&quot;font-size: 16px; line-height: 22px;&quot; /&gt;&lt;/span&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; font-size: 16px; line-height: 22px; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjamXou_rA5vDdREP0q_ThWi7LiRxSejSuOYeXoYFAgvCItXNRzZUKmodfHDa2FSfDewfinWuh5pguPryq4dV1pYXvPmbygZ06zPf_hdieQOx8xqH1hN3fMnDPF-qwHIMpRPbJh6RsUi7s/s1600/resolver-1.0.9-1.png&quot; imageanchor=&quot;1&quot; style=&quot;border: none; margin-left: 1em; margin-right: 1em; text-decoration: none;&quot;&gt;&lt;span style=&quot;color: white; font-family: Century Gothic, Helvetica, sans-serif;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;394&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjamXou_rA5vDdREP0q_ThWi7LiRxSejSuOYeXoYFAgvCItXNRzZUKmodfHDa2FSfDewfinWuh5pguPryq4dV1pYXvPmbygZ06zPf_hdieQOx8xqH1hN3fMnDPF-qwHIMpRPbJh6RsUi7s/s640/resolver-1.0.9-1.png&quot; style=&quot;-webkit-transition: all 1s; border: none; padding: 5px; position: relative; transition: all 1s;&quot; width=&quot;640&quot; /&gt;&lt;/span&gt;&lt;/a&gt;&lt;/div&gt;
&lt;span style=&quot;color: white; font-family: Century Gothic, Helvetica, sans-serif;&quot;&gt;&lt;br style=&quot;font-size: 16px; line-height: 22px;&quot; /&gt;&lt;a href=&quot;http://www.blogger.com/blogger.g?blogID=5850186663859316637&quot; name=&quot;more&quot; style=&quot;font-size: 16px; line-height: 22px;&quot;&gt;&lt;/a&gt;&lt;span style=&quot;font-size: 16px; line-height: 22px;&quot;&gt;&lt;/span&gt;&lt;br style=&quot;font-size: 16px; line-height: 22px;&quot; /&gt;&lt;strong style=&quot;font-size: 16px; line-height: 22px;&quot;&gt;Resolver features:&lt;/strong&gt;&lt;/span&gt;&lt;br /&gt;
&lt;ul style=&quot;font-size: 16px; line-height: 22px; margin: 0.5em 0px; padding: 0px 2.5em;&quot;&gt;
&lt;li style=&quot;margin: 0px 0px 0.25em; padding: 0px;&quot;&gt;&lt;span style=&quot;color: white; font-family: Century Gothic, Helvetica, sans-serif;&quot;&gt;Resolve a Single IP&lt;/span&gt;&lt;/li&gt;
&lt;li style=&quot;margin: 0px 0px 0.25em; padding: 0px;&quot;&gt;&lt;span style=&quot;color: white; font-family: Century Gothic, Helvetica, sans-serif;&quot;&gt;Resolve an IP Range&lt;/span&gt;&lt;/li&gt;
&lt;li style=&quot;margin: 0px 0px 0.25em; padding: 0px;&quot;&gt;&lt;span style=&quot;color: white; font-family: Century Gothic, Helvetica, sans-serif;&quot;&gt;Resolve IP’s provided in a text file&lt;/span&gt;&lt;/li&gt;
&lt;li style=&quot;margin: 0px 0px 0.25em; padding: 0px;&quot;&gt;&lt;span style=&quot;color: white; font-family: Century Gothic, Helvetica, sans-serif;&quot;&gt;Export Results to a text file&lt;/span&gt;&lt;/li&gt;
&lt;li style=&quot;margin: 0px 0px 0.25em; padding: 0px;&quot;&gt;&lt;span style=&quot;color: white; font-family: Century Gothic, Helvetica, sans-serif;&quot;&gt;Copy results to Clipboard&lt;/span&gt;&lt;/li&gt;
&lt;li style=&quot;margin: 0px 0px 0.25em; padding: 0px;&quot;&gt;&lt;span style=&quot;color: white; font-family: Century Gothic, Helvetica, sans-serif;&quot;&gt;DNS Records brute force&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;div style=&quot;font-size: 16px; line-height: 22px;&quot;&gt;
&lt;span style=&quot;color: white; font-family: Century Gothic, Helvetica, sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;font-size: 16px; line-height: 22px; text-align: center;&quot;&gt;
&lt;b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: large;&quot;&gt;&lt;a href=&quot;http://sourceforge.net/projects/exploitresolver/files/Resolver-1.0.9.0.zip/download&quot; style=&quot;border: none; text-decoration: none;&quot; target=&quot;_blank&quot;&gt;&lt;span style=&quot;color: white; font-family: Century Gothic, Helvetica, sans-serif;&quot;&gt;Download&amp;nbsp;Resolver v1.0.9&lt;/span&gt;&lt;/a&gt;&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;
&lt;/div&gt;
</description><link>https://hax0rtools.blogspot.com/2013/10/resolver-v109-reversebruteforce-dns.html</link><author>noreply@blogger.com (Unknown)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjamXou_rA5vDdREP0q_ThWi7LiRxSejSuOYeXoYFAgvCItXNRzZUKmodfHDa2FSfDewfinWuh5pguPryq4dV1pYXvPmbygZ06zPf_hdieQOx8xqH1hN3fMnDPF-qwHIMpRPbJh6RsUi7s/s72-c/resolver-1.0.9-1.png" height="72" width="72"/><thr:total>1</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-5850186663859316637.post-8887932905083080015</guid><pubDate>Fri, 18 Oct 2013 18:56:00 +0000</pubDate><atom:updated>2013-10-18T11:56:22.502-07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">other</category><category domain="http://www.blogger.com/atom/ns#">Tutorials</category><title>Change (Spoof) MAC Address on  Windows 2000, XP, 2003, VISTA, 2008, Windows 7</title><description>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;margin-left: 0.25in;&quot;&gt;
&lt;u&gt;&lt;b&gt;&lt;span style=&quot;color: white; font-family: Century Gothic, Helvetica, sans-serif;&quot;&gt;Method 1:&lt;/span&gt;&lt;/b&gt;&lt;/u&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;margin-left: 0.25in;&quot;&gt;
&lt;span style=&quot;color: white; font-family: Century Gothic, Helvetica, sans-serif;&quot;&gt;This is depending on the type of Network Interface Card (NIC) you have.&amp;nbsp;&amp;nbsp;If you have a card that doesn’t support Clone MAC address, then you have to go to second method.&lt;/span&gt;&lt;/div&gt;
&lt;ol style=&quot;margin-top: 0in;&quot; type=&quot;1&quot;&gt;&lt;ol style=&quot;margin-top: 0in;&quot;&gt;
&lt;li class=&quot;MsoNormal&quot;&gt;&lt;div style=&quot;margin-bottom: 6px;&quot;&gt;
&lt;span style=&quot;color: white; font-family: Century Gothic, Helvetica, sans-serif;&quot;&gt;Go to Start-&amp;gt;Settings-&amp;gt;Control Panel and double click on Network and Dial-up Connections.&lt;/span&gt;&lt;/div&gt;
&lt;/li&gt;
&lt;li class=&quot;MsoNormal&quot;&gt;&lt;div style=&quot;margin-bottom: 6px;&quot;&gt;
&lt;span style=&quot;color: white; font-family: Century Gothic, Helvetica, sans-serif;&quot;&gt;Right click on the NIC you want to change the MAC address and click on properties.&lt;/span&gt;&lt;/div&gt;
&lt;/li&gt;
&lt;li class=&quot;MsoNormal&quot;&gt;&lt;div style=&quot;margin-bottom: 6px;&quot;&gt;
&lt;span style=&quot;color: white; font-family: Century Gothic, Helvetica, sans-serif;&quot;&gt;Under “General” tab, click on the “Configure” button&lt;/span&gt;&lt;/div&gt;
&lt;/li&gt;
&lt;li class=&quot;MsoNormal&quot;&gt;&lt;div style=&quot;margin-bottom: 6px;&quot;&gt;
&lt;span style=&quot;color: white; font-family: Century Gothic, Helvetica, sans-serif;&quot;&gt;Click on “Advanced” tab&lt;/span&gt;&lt;/div&gt;
&lt;/li&gt;
&lt;li class=&quot;MsoNormal&quot;&gt;&lt;div style=&quot;margin-bottom: 6px;&quot;&gt;
&lt;span style=&quot;color: white; font-family: Century Gothic, Helvetica, sans-serif;&quot;&gt;Under “Property section”, you should see an item called “Network Address” or &quot;Locally Administered Address&quot;, click on it. (See figure below as an example)&lt;br /&gt;&lt;br /&gt;&lt;img border=&quot;0&quot; height=&quot;448&quot; src=&quot;http://www.klcconsulting.net/images/smac/locallyAdminAddress.gif&quot; width=&quot;404&quot; /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;/li&gt;
&lt;li class=&quot;MsoNormal&quot;&gt;&lt;div style=&quot;margin-bottom: 6px;&quot;&gt;
&lt;span style=&quot;color: white; font-family: Century Gothic, Helvetica, sans-serif;&quot;&gt;On the right side, under “Value”, type in the New MAC address you want to assign to your NIC.&amp;nbsp;&amp;nbsp;Usually this value is entered without the “-“ between the MAC address numbers.&lt;/span&gt;&lt;/div&gt;
&lt;/li&gt;
&lt;li class=&quot;MsoNormal&quot;&gt;&lt;div style=&quot;margin-bottom: 6px;&quot;&gt;
&lt;span style=&quot;color: white; font-family: Century Gothic, Helvetica, sans-serif;&quot;&gt;Goto command prompt and type in “ipconfig /all” or “net config rdr” to verify the changes.&amp;nbsp;&amp;nbsp;If the changes are not materialized, then use the second method.&lt;/span&gt;&lt;/div&gt;
&lt;/li&gt;
&lt;li class=&quot;MsoNormal&quot;&gt;&lt;div style=&quot;margin-bottom: 6px;&quot;&gt;
&lt;span style=&quot;color: white; font-family: Century Gothic, Helvetica, sans-serif;&quot;&gt;If successful, reboot your systems.&lt;/span&gt;&lt;/div&gt;
&lt;/li&gt;
&lt;/ol&gt;
&lt;/ol&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;margin-left: 0.75in;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;margin-left: 0.25in;&quot;&gt;
&lt;u&gt;&lt;b&gt;&lt;span style=&quot;color: white; font-family: Century Gothic, Helvetica, sans-serif;&quot;&gt;&lt;a href=&quot;http://www.blogger.com/blogger.g?blogID=5850186663859316637&quot; name=&quot;method2&quot;&gt;&lt;/a&gt;Method 2:&lt;/span&gt;&lt;/b&gt;&lt;/u&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;margin-left: 0.25in;&quot;&gt;
&lt;span style=&quot;color: white; font-family: Century Gothic, Helvetica, sans-serif;&quot;&gt;This method requires some knowledge on the Windows Registry.&amp;nbsp;&amp;nbsp;If you are not familiar with Windows Registry, just use the simple-to-use&lt;b&gt;&lt;a href=&quot;http://www.klcconsulting.net/smac&quot;&gt;SMAC&lt;/a&gt;&lt;/b&gt;&lt;a href=&quot;http://www.klcconsulting.net/smac&quot;&gt;&amp;nbsp;MAC Address Changer&lt;/a&gt;&amp;nbsp;to change the MAC addresses (&lt;u&gt;the easiest and safest way&lt;/u&gt;,) or consult with a technical person before you attempt on the following steps.&amp;nbsp;&amp;nbsp;Also, make sure you have a good backup of your registry.&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;margin-left: 1in; text-indent: -0.25in;&quot;&gt;
&lt;span style=&quot;color: white; font-family: Century Gothic, Helvetica, sans-serif;&quot;&gt;1.&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;Goto command prompt and type “ipconfig /all”, and&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;margin-left: 1in; text-indent: -0.25in;&quot;&gt;
&lt;span style=&quot;color: white; font-family: Century Gothic, Helvetica, sans-serif;&quot;&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; I. Record the&amp;nbsp;&lt;b&gt;Description&lt;/b&gt;&amp;nbsp;for the NIC you want to change.&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;margin-left: 1in; text-indent: -0.25in;&quot;&gt;
&lt;span style=&quot;color: white; font-family: Century Gothic, Helvetica, sans-serif;&quot;&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; II. Record the&amp;nbsp;&lt;b&gt;Physical Address&lt;/b&gt;&amp;nbsp;for the NIC you want to change.&amp;nbsp; Physical Address is the MAC Address&lt;br /&gt;&lt;br /&gt;&lt;img border=&quot;0&quot; height=&quot;180&quot; src=&quot;http://www.klcconsulting.net/images/smac/ipconfig.gif&quot; width=&quot;532&quot; /&gt;&lt;br /&gt;figure 1.&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;margin-left: 1in; text-indent: -0.25in;&quot;&gt;
&lt;span style=&quot;color: white; font-family: Century Gothic, Helvetica, sans-serif;&quot;&gt;2.&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;Goto command prompt and type “net config rdr”, and you should see something like&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;margin-left: 1in; text-indent: -0.25in;&quot;&gt;
&lt;span style=&quot;color: white; font-family: Century Gothic, Helvetica, sans-serif;&quot;&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;img border=&quot;0&quot; height=&quot;251&quot; src=&quot;http://www.klcconsulting.net/images/smac/net_config_rdr.gif&quot; width=&quot;485&quot; /&gt;&lt;br /&gt;figure 2.&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;margin-left: 1in; text-indent: -0.25in;&quot;&gt;
&lt;span style=&quot;color: white; font-family: Century Gothic, Helvetica, sans-serif;&quot;&gt;3.&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;Remember the number between the long number (GUID) inside the { }.&amp;nbsp;&amp;nbsp;For example, in the above “net config rdr” output, for MAC address “00C095ECB793,” you should remember {1C9324AD-ADB7-4920-B02D-AB281838637A}.&amp;nbsp;&amp;nbsp;You can copy and paste it to the Notepad, that’s probably the easiest way.&amp;nbsp; (See figure 2.)&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;margin-left: 1in; text-indent: -0.25in;&quot;&gt;
&lt;span style=&quot;color: white; font-family: Century Gothic, Helvetica, sans-serif;&quot;&gt;4.&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;Go to Start -&amp;gt; Run, type “regedt32” to start registry editor.&amp;nbsp;&amp;nbsp;Do not use “Regedit.”&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;margin-left: 1in; text-indent: -0.25in;&quot;&gt;
&lt;span style=&quot;color: white; font-family: Century Gothic, Helvetica, sans-serif;&quot;&gt;5.&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;Do a BACKUP of your registry in case you screw up the following steps.&amp;nbsp;&amp;nbsp;To do this&lt;/span&gt;&lt;/div&gt;
&lt;blockquote&gt;
&lt;blockquote&gt;
&lt;blockquote&gt;
&lt;ol&gt;
&lt;li&gt;&lt;div class=&quot;MsoNormal&quot; style=&quot;margin-left: 99pt; text-indent: -99pt;&quot;&gt;
&lt;span style=&quot;color: white; font-family: Century Gothic, Helvetica, sans-serif;&quot;&gt;Click on “HKEY_LOCAL_MACHINE on Local Machine” sub-window&lt;/span&gt;&lt;/div&gt;
&lt;/li&gt;
&lt;li&gt;&lt;div class=&quot;MsoNormal&quot; style=&quot;margin-left: 99pt; text-indent: -99pt;&quot;&gt;
&lt;span style=&quot;color: white; font-family: Century Gothic, Helvetica, sans-serif;&quot;&gt;Click on the root key “HKEY_LOCAL_MACHINE”.&amp;nbsp;&lt;/span&gt;&lt;/div&gt;
&lt;/li&gt;
&lt;li&gt;&lt;div class=&quot;MsoNormal&quot;&gt;
&lt;span style=&quot;color: white; font-family: Century Gothic, Helvetica, sans-serif;&quot;&gt;Click on the drop-down menu “Registry -&amp;gt; Save Subtree As” and save the backup registry in to a file.&amp;nbsp; Keep this file in a safe place.&lt;/span&gt;&lt;/div&gt;
&lt;/li&gt;
&lt;/ol&gt;
&lt;div class=&quot;MsoNormal&quot;&gt;
&lt;a href=&quot;http://www.klcconsulting.net/smac/&quot;&gt;&lt;span style=&quot;color: white; font-family: Century Gothic, Helvetica, sans-serif;&quot;&gt;IF YOU ARE NERVOUS ABOUT THIS STEP, JUST USE SIMPLE-TO-USE GUI BASED&amp;nbsp;&lt;b&gt;SMAC&lt;/b&gt;&amp;nbsp;MAC ADDRESS CHANGER&amp;nbsp;TO MAKE THIS PROCESS SAFER and EASIER FOR YOU. ☺&lt;/span&gt;&lt;/a&gt;&lt;/div&gt;
&lt;/blockquote&gt;
&lt;/blockquote&gt;
&lt;/blockquote&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;margin-left: 1in; text-indent: -0.25in;&quot;&gt;
&lt;span style=&quot;color: white; font-family: Century Gothic, Helvetica, sans-serif;&quot;&gt;6.&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;Go to “HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Class\{4D36E972-E325-11CE-BFC1-08002BE10318}.&amp;nbsp; Double click on it to expand the tree.&amp;nbsp;&amp;nbsp;The subkeys are&amp;nbsp;&lt;nobr&gt;4-digit&lt;/nobr&gt;&amp;nbsp;numbers, which represent particular network adapters.&amp;nbsp; You should see it starts with 0000, then 0001, 0002, 0003 and so on.&amp;nbsp; (See figure 3.)&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;margin-left: 1in; text-indent: -0.25in;&quot;&gt;
&lt;span style=&quot;color: white; font-family: Century Gothic, Helvetica, sans-serif;&quot;&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;img border=&quot;0&quot; height=&quot;372&quot; src=&quot;http://www.klcconsulting.net/images/smac/mac_reg.gif&quot; width=&quot;765&quot; /&gt;&lt;br /&gt;Figure 3.&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;margin-left: 1in; text-indent: -0.25in;&quot;&gt;
&lt;span style=&quot;color: white; font-family: Century Gothic, Helvetica, sans-serif;&quot;&gt;7.&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Go through each subkey that starts with 0000.&amp;nbsp; Click on 0000, check&amp;nbsp;&lt;b&gt;DriverDesc&lt;/b&gt;&amp;nbsp;keyword on the right to see if that&#39;s the NIC you want to change the MAC address.&amp;nbsp; The&amp;nbsp;&lt;b&gt;DriveDesc&lt;/b&gt;&amp;nbsp;should match the&amp;nbsp;&lt;b&gt;Description&lt;/b&gt;&amp;nbsp;you recorded from step (a.-I.).&amp;nbsp; If you are not 100% sure about the DriverDesc, then you can verify by checking if the&amp;nbsp;&lt;b&gt;NetCfgInstanceID&lt;/b&gt;&amp;nbsp;keyword value matches the GUID from step (c).&lt;br /&gt;If there is no match, then move on to 0001, 0002, 0003, and so on, until you find the one you want.&amp;nbsp; Usually 0000 contains the first NIC you installed on the computer.&lt;br /&gt;In this demonstration, 0000 is the NIC I selected. (See figure 3.)&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;margin-left: 1in; text-indent: -0.25in;&quot;&gt;
&lt;span style=&quot;color: white; font-family: Century Gothic, Helvetica, sans-serif;&quot;&gt;8. &amp;nbsp;&amp;nbsp;&amp;nbsp; Once you selected the subkey (i.e. 0000), check if there is a keyword &quot;NetworkAddress&quot; exist in the right side of the window.(See figure 3.)&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;margin-left: 1in; text-indent: -0.25in;&quot;&gt;
&lt;span style=&quot;color: white; font-family: Century Gothic, Helvetica, sans-serif;&quot;&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; I.&amp;nbsp;If &quot;&lt;b&gt;NetworkAddress&lt;/b&gt;&quot; keyword does not exist, then create this new keyword:&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;margin-left: 1in; text-indent: -0.25in;&quot;&gt;
&lt;span style=&quot;color: white; font-family: Century Gothic, Helvetica, sans-serif;&quot;&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; i.&amp;nbsp;Click on the drop down menu “Edit -&amp;gt; Add Value”.&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;margin-left: 1in; text-indent: -0.25in;&quot;&gt;
&lt;span style=&quot;color: white; font-family: Century Gothic, Helvetica, sans-serif;&quot;&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; ii.&amp;nbsp; In the Add Value window, enter the following value then click OK.&amp;nbsp; (See figure 4.)&lt;br /&gt;&lt;b&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;/b&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;b&gt;Value Name:&lt;/b&gt;&amp;nbsp;=&amp;nbsp;&lt;b&gt;NetworkAddress&lt;/b&gt;&lt;b&gt;&lt;br /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;/b&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;b&gt;Data Type:&lt;/b&gt;&amp;nbsp;=&amp;nbsp;&lt;b&gt;REG_SZ&lt;/b&gt;&amp;nbsp;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;margin-left: 1in; text-indent: -0.25in;&quot;&gt;
&lt;span style=&quot;color: white; font-family: Century Gothic, Helvetica, sans-serif;&quot;&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;img border=&quot;0&quot; height=&quot;161&quot; src=&quot;http://www.klcconsulting.net/images/smac/mac_new_value.gif&quot; width=&quot;353&quot; /&gt;&lt;br /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Figure 4.&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;margin-left: 1in; text-indent: -0.25in;&quot;&gt;
&lt;span style=&quot;color: white; font-family: Century Gothic, Helvetica, sans-serif;&quot;&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; iii.&amp;nbsp;&amp;nbsp;&lt;b&gt;String Editor&lt;/b&gt;&amp;nbsp;window will pop up at this time (see figure 5.)&amp;nbsp;&amp;nbsp;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;margin-left: 1in; text-indent: -0.25in;&quot;&gt;
&lt;span style=&quot;color: white; font-family: Century Gothic, Helvetica, sans-serif;&quot;&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; iv.&amp;nbsp; Enter the new MAC address you want to modify.&amp;nbsp; Then click OK.&lt;br /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; (There should not be any &quot;-&quot; in this address.&amp;nbsp; Your entry should only consist of 12 digits as seen in the figure 5.)&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;margin-left: 1in; text-indent: -0.25in;&quot;&gt;
&lt;span style=&quot;color: white; font-family: Century Gothic, Helvetica, sans-serif;&quot;&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;II. If &quot;&lt;b&gt;NetworkAddress&lt;/b&gt;&quot; keyword exists, make sure it shows the keyword type is REG_SZ, and it should show as&lt;b&gt;NetworkAddress:REG_SZ:&amp;nbsp;&amp;nbsp;&lt;/b&gt;.&amp;nbsp; This keyword might not have a value at this time.&amp;nbsp;&amp;nbsp;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;margin-left: 1in; text-indent: -0.25in;&quot;&gt;
&lt;span style=&quot;color: white; font-family: Century Gothic, Helvetica, sans-serif;&quot;&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; i. Double click on the keyword&amp;nbsp;&lt;b&gt;NetworkAddress&lt;/b&gt;&amp;nbsp;and the String Editor window will pop up. (See Figure 5.)&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;margin-left: 1in; text-indent: -0.25in;&quot;&gt;
&lt;span style=&quot;color: white; font-family: Century Gothic, Helvetica, sans-serif;&quot;&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; ii.&amp;nbsp; Enter the new MAC address you want to modify.&amp;nbsp; Then click OK.&lt;br /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; (There should not be any &quot;-&quot; in this address.&amp;nbsp; Your entry should only consist of 12 digits as seen in the figure 5.)&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;margin-left: 1in; text-indent: -0.25in;&quot;&gt;
&lt;span style=&quot;color: white; font-family: Century Gothic, Helvetica, sans-serif;&quot;&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;img border=&quot;0&quot; height=&quot;117&quot; src=&quot;http://www.klcconsulting.net/images/smac/mac_new_string.gif&quot; width=&quot;378&quot; /&gt;&lt;br /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Figure 5.&lt;/span&gt;&lt;/div&gt;
&lt;blockquote&gt;
&lt;blockquote&gt;
&lt;blockquote&gt;
&lt;div class=&quot;MsoNormal&quot;&gt;
&lt;span style=&quot;color: white; font-family: Century Gothic, Helvetica, sans-serif;&quot;&gt;&lt;a href=&quot;http://www.klcconsulting.net/smac/&quot;&gt;The&amp;nbsp;&lt;/a&gt;&lt;a href=&quot;http://www.klcconsulting.net/smac/&quot;&gt;Simple-to-Use&amp;nbsp;&lt;b&gt;SMAC&lt;/b&gt;&amp;nbsp;MAC Address Changer (Spoofer)&amp;nbsp;is definitely a lot SAFER and EASIER for this type of process.&amp;nbsp; Check out some SMAC screenshots. ☺&lt;/a&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;/blockquote&gt;
&lt;/blockquote&gt;
&lt;/blockquote&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;margin-left: 1in; text-indent: -0.25in;&quot;&gt;
&lt;span style=&quot;color: white; font-family: Century Gothic, Helvetica, sans-serif;&quot;&gt;9.&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;There are 2 ways to make the new MAC address active.&amp;nbsp; Method I does not require a system reboot:&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;margin-left: 1in; text-indent: -0.25in;&quot;&gt;
&lt;span style=&quot;color: white; font-family: Century Gothic, Helvetica, sans-serif;&quot;&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; I.&amp;nbsp; Goto Start-&amp;gt;Setting-&amp;gt;Control Panel, and double click on &quot;Network Neighborhood&quot;.&lt;br /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; WARNING: Make sure you understand that you WILL lose the network connection after completing step &quot;ii.&quot; below, and&lt;br /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; if you have a DHCP client, you will get a new IP address after completing step &quot;iii.&quot;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;margin-left: 1in; text-indent: -0.25in;&quot;&gt;
&lt;span style=&quot;color: white; font-family: Century Gothic, Helvetica, sans-serif;&quot;&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; i.&amp;nbsp; Select the Network Adaptor you just changed the MAC address.&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;margin-left: 1in; text-indent: -0.25in;&quot;&gt;
&lt;span style=&quot;color: white; font-family: Century Gothic, Helvetica, sans-serif;&quot;&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; ii.&amp;nbsp; Right click on the selected Network Adaptor and click &quot;Disable.&quot;&lt;br /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Verify the status column for this adaptor changes to &quot;Disabled&quot;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;margin-left: 1in; text-indent: -0.25in;&quot;&gt;
&lt;span style=&quot;color: white; font-family: Century Gothic, Helvetica, sans-serif;&quot;&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; iii.&amp;nbsp; Right click on the selected Network Adaptor and click &quot;Enable.&quot;&lt;br /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Verify the status column for this adaptor changes to &quot;Enabled&quot;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;margin-left: 1in; text-indent: -0.25in;&quot;&gt;
&lt;span style=&quot;color: white; font-family: Century Gothic, Helvetica, sans-serif;&quot;&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; iv.&amp;nbsp; If for any reason it cannot be disabled or re-enabled, you have to&lt;br /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; reboot your system to make the changes effective.&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;margin-left: 1in; text-indent: -0.25in;&quot;&gt;
&lt;span style=&quot;color: white; font-family: Century Gothic, Helvetica, sans-serif;&quot;&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; II.&amp;nbsp; Reboot your Windows system.&amp;nbsp;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;margin-left: 1in; text-indent: -0.25in;&quot;&gt;
&lt;span style=&quot;color: white; font-family: Century Gothic, Helvetica, sans-serif;&quot;&gt;10.&amp;nbsp; Once completing step j (if rebooting the system, wait until the reboot is completed), go to command prompt, type “ipconfig /all” to confirm the new MAC address.&lt;/span&gt;&lt;/div&gt;
&lt;/div&gt;
</description><link>https://hax0rtools.blogspot.com/2013/10/change-spoof-mac-address-on-windows.html</link><author>noreply@blogger.com (Unknown)</author><thr:total>1</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-5850186663859316637.post-4808687361366151862</guid><pubDate>Fri, 18 Oct 2013 18:49:00 +0000</pubDate><atom:updated>2013-10-18T11:50:45.366-07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">security</category><category domain="http://www.blogger.com/atom/ns#">Tutorials</category><title>Few Online Tools for Computer and Online Security</title><description>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
&lt;br /&gt;
&lt;div class=&quot;post-footer&quot; style=&quot;-webkit-text-stroke-width: 0px; color: #191919; font-family: &#39;Trebuchet MS&#39;, Helvetica, sans-serif; font-size: 13px; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: normal; orphans: auto; text-align: left; text-indent: 0px; text-transform: none; white-space: normal; widows: auto; word-spacing: 0px;&quot;&gt;
&lt;/div&gt;
&lt;br /&gt;
&lt;div class=&quot;post-body entry-content&quot; style=&quot;-webkit-text-stroke-width: 0px; border-left-color: rgb(255, 255, 255); border-left-style: solid; border-left-width: 1px; border-right-color: rgb(255, 255, 255); border-right-style: solid; border-right-width: 1px; font-size: 13px; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: 1.6em; margin: 0px 0px 0.75em; orphans: auto; padding: 10px; text-align: left; text-indent: 0px; text-transform: none; white-space: normal; widows: auto; word-spacing: 0px;&quot;&gt;
&lt;span style=&quot;color: white; font-family: Century Gothic, Helvetica, sans-serif;&quot;&gt;Computer&amp;nbsp;&lt;a href=&quot;http://www.hax0rtools.com/search/label/Security&quot; style=&quot;text-decoration: none;&quot;&gt;security&lt;/a&gt;&amp;nbsp;is of foremost importance these days even more than our physical security..lol.There are few online&amp;nbsp;tools&amp;nbsp;available through which we ensure our security to certain extent.We cannot say our PC will be 100% secure but to some extent we will be benefited&amp;nbsp; for sure.&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;post-body entry-content&quot; style=&quot;-webkit-text-stroke-width: 0px; border-left-color: rgb(255, 255, 255); border-left-style: solid; border-left-width: 1px; border-right-color: rgb(255, 255, 255); border-right-style: solid; border-right-width: 1px; font-size: 13px; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: 1.6em; margin: 0px 0px 0.75em; orphans: auto; padding: 10px; text-align: left; text-indent: 0px; text-transform: none; white-space: normal; widows: auto; word-spacing: 0px;&quot;&gt;
&lt;span style=&quot;color: white; font-family: Century Gothic, Helvetica, sans-serif;&quot;&gt;(if you are looking for Antiviru software &lt;a href=&quot;http://www.hax0rtools.com/search/label/Antivirus&quot;&gt;Click here&lt;/a&gt;)&lt;/span&gt;&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiqjUN0JcSKG1XBVcomBdeapvDDGvxD3lVhWskcM_9RVrFebBHaKQ7ZbRj_ia0aayxmQo3Akl6xp-w7bxwkL9yxgwz6_3Rek_4k1MW4wmYtJHeCNspm8nzf6ReQN0I9TFF-bXFhXxCd4tI/s1600/Online+security.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em; text-decoration: none;&quot;&gt;&lt;span style=&quot;color: white; font-family: Century Gothic, Helvetica, sans-serif;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiqjUN0JcSKG1XBVcomBdeapvDDGvxD3lVhWskcM_9RVrFebBHaKQ7ZbRj_ia0aayxmQo3Akl6xp-w7bxwkL9yxgwz6_3Rek_4k1MW4wmYtJHeCNspm8nzf6ReQN0I9TFF-bXFhXxCd4tI/s1600/Online+security.jpg&quot; style=&quot;background-attachment: scroll; background-image: none; background-position: 0px 0px; background-repeat: repeat repeat; border-bottom-left-radius: 2px; border-bottom-right-radius: 2px; border-top-left-radius: 2px; border-top-right-radius: 2px; border: 1px solid rgb(255, 255, 255); display: inline; margin: 0px 0px 10px; padding: 5px;&quot; /&gt;&lt;/span&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div&gt;
&lt;span style=&quot;font-size: large;&quot;&gt;&lt;b&gt;&lt;span style=&quot;color: white; font-family: Century Gothic, Helvetica, sans-serif;&quot;&gt;File scanner:&lt;/span&gt;&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;
&lt;span style=&quot;color: white; font-family: Century Gothic, Helvetica, sans-serif;&quot;&gt;&lt;br /&gt;&lt;b&gt;1.&lt;/b&gt;&lt;a href=&quot;http://www.kaspersky.com/scanforvirus&quot; style=&quot;text-decoration: none;&quot;&gt;Kaspersky&lt;/a&gt;:&lt;br /&gt;It can used to scan files upto size 1mb and archieve file(zip,arj format etc) upto 1mb.The database is updated every 3 hours to ensure that newest virus are detected.&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;b&gt;2.&lt;/b&gt;&lt;a href=&quot;http://onlinescan.avast.com/&quot; style=&quot;text-decoration: none;&quot;&gt;Avast&lt;/a&gt;:&lt;br /&gt;Here you can scan a single file each time and that should not be more than 16mb.&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;b&gt;3.&lt;/b&gt;&lt;a href=&quot;http://www.virustotal.com/&quot; style=&quot;text-decoration: none;&quot;&gt;VirusTotal:&lt;/a&gt;&lt;br /&gt;Here you can scan a file upto 20mb.You can send file by SSL and via email also.&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;b&gt;4.&lt;/b&gt;&lt;a href=&quot;http://vscan.novirusthanks.org/&quot; style=&quot;text-decoration: none;&quot;&gt;NovirusThanks:&lt;/a&gt;&lt;br /&gt;Here you can scan file upto 20mb,where the file will be scanned by 24 antivirus engine and is one of the best online scanning&amp;nbsp;tool.&lt;/span&gt;&lt;br /&gt;
&lt;div&gt;
&lt;span style=&quot;font-size: large;&quot;&gt;&lt;b&gt;&lt;span style=&quot;color: white; font-family: Century Gothic, Helvetica, sans-serif;&quot;&gt;System scanner:&lt;/span&gt;&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;
&lt;span style=&quot;color: white; font-family: Century Gothic, Helvetica, sans-serif;&quot;&gt;&lt;br /&gt;&lt;b&gt;1.&lt;/b&gt;&lt;a href=&quot;http://www.bitdefender.com/scanner/online/free.html&quot; style=&quot;text-decoration: none;&quot;&gt;Bitdefender:&lt;/a&gt;&lt;br /&gt;It can scan your PC ,system memory,boot sector.It can be used without uninstalling the existing security product.&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;b&gt;2.&lt;/b&gt;&lt;a href=&quot;http://security.symantec.com/sscv6/WelcomePage.asp&quot; style=&quot;text-decoration: none;&quot;&gt;Symantec(Norton):&lt;/a&gt;&lt;br /&gt;It can be used to scan the system.It is the one of the old Anti-virus company and easy to use.&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;b&gt;3.&lt;/b&gt;&lt;a href=&quot;http://www.eset.com/onlinescan/&quot; style=&quot;text-decoration: none;&quot;&gt;Eset:&lt;/a&gt;&lt;br /&gt;Administrative previleges is required to use this online scanner.It is user friendly and operates from the browser.&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;b&gt;4.&lt;/b&gt;&lt;a href=&quot;http://www.pandasecurity.com/usa/homeusers/solutions/activescan/default.htm?track=80383&quot; style=&quot;text-decoration: none;&quot;&gt;PandaSecurity:&lt;/a&gt;&lt;br /&gt;You need the activex control to use this online tool.It is a good product from panda.&lt;/span&gt;&lt;br /&gt;
&lt;div&gt;
&lt;span style=&quot;font-size: large;&quot;&gt;&lt;b&gt;&lt;span style=&quot;color: white; font-family: Century Gothic, Helvetica, sans-serif;&quot;&gt;Browser scanner:&lt;/span&gt;&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;
&lt;span style=&quot;color: white; font-family: Century Gothic, Helvetica, sans-serif;&quot;&gt;&lt;br /&gt;&lt;b&gt;1.&lt;/b&gt;&lt;a href=&quot;https://browsercheck.qualys.com/&quot; style=&quot;text-decoration: none;&quot;&gt;Qualys:&lt;/a&gt;&lt;br /&gt;You need to install the required plugin to use this tool.It checks for vulnerability and issues in the browser.&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;b&gt;2.&lt;/b&gt;&lt;a href=&quot;http://www.browserscope.org/&quot; style=&quot;text-decoration: none;&quot;&gt;BrowserScope:&lt;/a&gt;&lt;br /&gt;It scans for browser functionality and issues.&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;b&gt;3.&lt;/b&gt;&lt;a href=&quot;http://bcheck.scanit.be/bcheck/index.php&quot; style=&quot;text-decoration: none;&quot;&gt;Scanit:&lt;/a&gt;&lt;br /&gt;It will scan the browser for issues and vulnerabilites.You need to close all other tabs before using it and enable persistent cookies.&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;b&gt;4.&lt;/b&gt;&lt;a href=&quot;http://panopticlick.eff.org/&quot; style=&quot;text-decoration: none;&quot;&gt;Panopticlick:&lt;/a&gt;&lt;br /&gt;It test your browser and give scores for uniqueness and trackable functionality.&lt;/span&gt;&lt;br /&gt;
&lt;div&gt;
&lt;span style=&quot;font-size: large;&quot;&gt;&lt;b&gt;&lt;span style=&quot;color: white; font-family: Century Gothic, Helvetica, sans-serif;&quot;&gt;Url scanner:&lt;/span&gt;&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;
&lt;span style=&quot;color: white; font-family: Century Gothic, Helvetica, sans-serif;&quot;&gt;&lt;br /&gt;&lt;b&gt;1.&lt;/b&gt;&lt;a href=&quot;http://vscan.urlvoid.com/&quot; style=&quot;text-decoration: none;&quot;&gt;UrlVoid:&lt;/a&gt;&lt;br /&gt;It scans the url with multiple antivirus engine.It is simple to use.&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;b&gt;2.&lt;/b&gt;&lt;a href=&quot;http://www.avg.com.au/resources/web-page-scanner/&quot; style=&quot;text-decoration: none;&quot;&gt;Avg:&lt;/a&gt;&lt;br /&gt;Just copy and drop the suspicious url and press enter.&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;b&gt;3.&lt;/b&gt;&lt;a href=&quot;http://www.virustotal.com/&quot; style=&quot;text-decoration: none;&quot;&gt;VirusTotal:&lt;/a&gt;&lt;br /&gt;It is a simple tool to use as the file scanner of it.&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;b&gt;4.&lt;/b&gt;&lt;a href=&quot;http://onlinelinkscan.com/&quot; style=&quot;text-decoration: none;&quot;&gt;OnlineLinkscan:&lt;/a&gt;&lt;br /&gt;It scan the link from potential threats with a simple click.&lt;/span&gt;&lt;br /&gt;
&lt;div&gt;
&lt;span style=&quot;font-size: large;&quot;&gt;&lt;b&gt;&lt;span style=&quot;color: white; font-family: Century Gothic, Helvetica, sans-serif;&quot;&gt;Port scanner:&lt;/span&gt;&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;
&lt;span style=&quot;color: white; font-family: Century Gothic, Helvetica, sans-serif;&quot;&gt;&lt;br /&gt;&lt;b&gt;1.&lt;/b&gt;&lt;a href=&quot;http://www.t1shopper.com/tools/port-scan/&quot; style=&quot;text-decoration: none;&quot;&gt;T1shopper:&lt;/a&gt;&lt;br /&gt;It scans the Ipaddress for open ports.There is a list of some essential ports on the webpage.&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;b&gt;2.&lt;/b&gt;&lt;a href=&quot;http://nmap-online.com/&quot; style=&quot;text-decoration: none;&quot;&gt;Nmap:&lt;/a&gt;&lt;br /&gt;It is one of the best port scanning tool and easy to use.&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;b&gt;3.&lt;/b&gt;&lt;a href=&quot;http://www.subnetonline.com/pages/network-tools/online-port-scanner.php&quot; style=&quot;text-decoration: none;&quot;&gt;SubnetOnline:&lt;/a&gt;&lt;br /&gt;It scans an Ipaddress for open and closed TCP ports.&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;b&gt;4.&lt;/b&gt;&lt;a href=&quot;http://www.auditmypc.com/firewall-test.asp&quot; style=&quot;text-decoration: none;&quot;&gt;AuditmyPc:&lt;/a&gt;&lt;br /&gt;Here you can scan for ports to test the strength of your firewall.&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;b&gt;5.&lt;/b&gt;&lt;a href=&quot;http://www.hashemian.com/tools/port-scanner.php%20&quot; style=&quot;text-decoration: none;&quot;&gt;Hashmian:&lt;/a&gt;&lt;br /&gt;It provide a range of ports to scan and list of some essential ports.&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;If you find this post useful and interesting then do drop your comment.,it will be appreciated.. :)&lt;/span&gt;&lt;br /&gt;
&lt;div style=&quot;background-color: #ebebea; clear: both; color: #191919; font-family: &#39;Trebuchet MS&#39;, verdana;&quot;&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
</description><link>https://hax0rtools.blogspot.com/2013/10/few-online-tools-for-computer-and.html</link><author>noreply@blogger.com (Unknown)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiqjUN0JcSKG1XBVcomBdeapvDDGvxD3lVhWskcM_9RVrFebBHaKQ7ZbRj_ia0aayxmQo3Akl6xp-w7bxwkL9yxgwz6_3Rek_4k1MW4wmYtJHeCNspm8nzf6ReQN0I9TFF-bXFhXxCd4tI/s72-c/Online+security.jpg" height="72" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-5850186663859316637.post-1503039874269310899</guid><pubDate>Fri, 18 Oct 2013 18:40:00 +0000</pubDate><atom:updated>2013-10-18T11:40:40.905-07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Hack tools</category><category domain="http://www.blogger.com/atom/ns#">security</category><category domain="http://www.blogger.com/atom/ns#">Tutorials</category><title>Http Tunneling | Bypass firewall and proxy</title><description>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
&lt;span class=&quot;more&quot; style=&quot;-webkit-text-stroke-width: 0px; color: #191919; font-family: &#39;Trebuchet MS&#39;, verdana; font-size: 13px; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: 20.171875px; orphans: auto; text-align: left; text-indent: 0px; text-transform: none; white-space: normal; widows: auto; word-spacing: 0px;&quot;&gt;&lt;/span&gt;&lt;br /&gt;
&lt;div id=&quot;summary2907030811875569517&quot; style=&quot;-webkit-text-stroke-width: 0px; font-size: 13px; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: 20.171875px; orphans: auto; text-align: left; text-indent: 0px; text-transform: none; white-space: normal; widows: auto; word-spacing: 0px;&quot;&gt;
&lt;div class=&quot;post-body entry-content&quot; style=&quot;border-left-color: rgb(255, 255, 255); border-left-style: solid; border-left-width: 1px; border-right-color: rgb(255, 255, 255); border-right-style: solid; border-right-width: 1px; line-height: 1.6em; margin: 0px 0px 0.75em; padding: 10px;&quot;&gt;
&lt;span style=&quot;color: white; font-family: Century Gothic, Helvetica, sans-serif;&quot;&gt;In most of the institutions and companies due to security risk many restrictions are being imposed on network like blocked ports etc.There are many ports that are blocked for outbound connection and few ports for http connection are opened so that people working over there can access there email etc.As the http port outbound is opened so it can be used for http tunnel to access restricted applications like IM etc.In this post we will see how we can do that.&lt;/span&gt;&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjptxarz8LMDPdcAb7PLbtTd4pU6jSCsnwRPHkd7RA65B5CKrWglOTMrd-MRxMlbJfMcjBqfG7TfrqGGJpxdqsBJ9v9gYMfjRG8_VYSZgUljFGpRgosNQkx26tMGrRJAMb-DSm6QT8UO2U/s1600/httptunnel3.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em; text-decoration: none;&quot;&gt;&lt;span style=&quot;color: white; font-family: Century Gothic, Helvetica, sans-serif;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;198&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjptxarz8LMDPdcAb7PLbtTd4pU6jSCsnwRPHkd7RA65B5CKrWglOTMrd-MRxMlbJfMcjBqfG7TfrqGGJpxdqsBJ9v9gYMfjRG8_VYSZgUljFGpRgosNQkx26tMGrRJAMb-DSm6QT8UO2U/s320/httptunnel3.jpg&quot; style=&quot;background-attachment: scroll; background-image: none; background-position: 0px 0px; background-repeat: repeat repeat; border-bottom-left-radius: 2px; border-bottom-right-radius: 2px; border-top-left-radius: 2px; border-top-right-radius: 2px; border: 1px solid rgb(255, 255, 255); display: inline; margin: 0px 0px 10px; padding: 5px;&quot; width=&quot;320&quot; /&gt;&lt;/span&gt;&lt;/a&gt;&lt;/div&gt;
&lt;span style=&quot;color: white; font-family: Century Gothic, Helvetica, sans-serif;&quot;&gt;&lt;span style=&quot;font-size: medium;&quot;&gt;&lt;b&gt;What is Http Tunnel?&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;It is a technique in which the communications that are restricted in the network are bundled within the http protocol and allowed to communicate.The user uses a httptunnel software with client-server but to use it with administrative privileges.&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-size: medium;&quot;&gt;&lt;b&gt;How it works?&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;The user need a http_Tunnel-client and a server other than the original client-server.What happens that when the original_client decides to connect to a desire server then it sends its request through the httptunnel_client to the httptunnel_server then to the original_server as shown in the figure below.&lt;/span&gt;&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiz_hFPd5FMkGutK4hv6McR02svBB1nEtSJKusU9j-n64bA9tHv8bLtXgCr1crUwmd_JW6n56121DumP_MWckH_3CbSc54ny1Pru4UX5EPIIaR4WSdoj92SuxXqZXNlku6qPH2ESvTaoNo/s1600/httptunnel2.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em; text-decoration: none;&quot;&gt;&lt;span style=&quot;color: white; font-family: Century Gothic, Helvetica, sans-serif;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiz_hFPd5FMkGutK4hv6McR02svBB1nEtSJKusU9j-n64bA9tHv8bLtXgCr1crUwmd_JW6n56121DumP_MWckH_3CbSc54ny1Pru4UX5EPIIaR4WSdoj92SuxXqZXNlku6qPH2ESvTaoNo/s1600/httptunnel2.jpg&quot; style=&quot;background-attachment: scroll; background-image: none; background-position: 0px 0px; background-repeat: repeat repeat; border-bottom-left-radius: 2px; border-bottom-right-radius: 2px; border-top-left-radius: 2px; border-top-right-radius: 2px; border: 1px solid rgb(255, 255, 255); display: inline; margin: 0px 0px 10px; padding: 5px;&quot; /&gt;&lt;/span&gt;&lt;/a&gt;&lt;/div&gt;
&lt;span style=&quot;color: white; font-family: Century Gothic, Helvetica, sans-serif;&quot;&gt;&amp;nbsp;Actually the restrcited application that is the client(in the figure) sends a request other than http through the httptunnel_client bundle inside the http request.Then the httptunnel_server receives its unwrap,decrypt,uncompress it and forward it to the original server in the same way the data is transferred.The main concept over here is that there is middle (client-server) other than the orginal client-server.&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-size: medium;&quot;&gt;&lt;b&gt;Advantages:&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;&lt;b&gt;1.&lt;/b&gt;Undo restrictions on applications like instant messengers etc&lt;br /&gt;&lt;br /&gt;&lt;b&gt;2.&lt;/b&gt;Helpful in accessing restrcited pages and sites.&lt;br /&gt;&lt;br /&gt;&lt;b&gt;3.&lt;/b&gt;May be helpful in bypassing firewall&amp;nbsp; restriction but not in an extensive manner.&lt;br /&gt;&lt;br /&gt;Lets see how we can use http tunneling.&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-size: medium;&quot;&gt;&lt;b&gt;Http Tunneling Software:&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;b&gt;1.&lt;/b&gt;Http-Tunnel(&lt;a href=&quot;http://sourceforge.net/project/showfiles.php?group_id=178782&quot; style=&quot;text-decoration: none;&quot;&gt;Download&lt;/a&gt;)&lt;br /&gt;&lt;br /&gt;&lt;b&gt;2.&lt;/b&gt;HttpTunnel(&lt;a href=&quot;http://www.http-tunnel.com/html/&quot; style=&quot;text-decoration: none;&quot;&gt;Download&lt;/a&gt;)&lt;br /&gt;&lt;br /&gt;&lt;b&gt;3.&lt;/b&gt;Hopster(&lt;a href=&quot;http://www.hopster.com/&quot; style=&quot;text-decoration: none;&quot;&gt;Download&lt;/a&gt;)&lt;br /&gt;&lt;br /&gt;&lt;b&gt;4.&lt;/b&gt;Super Network Tunnel(&lt;a href=&quot;http://www.networktunnel.net/&quot; style=&quot;text-decoration: none;&quot;&gt;Download&lt;/a&gt;)&lt;br /&gt;&lt;br /&gt;&lt;b&gt;5.&lt;/b&gt;HttpTunnel(Linux)(&lt;a href=&quot;http://www.nocrew.org/software/httptunnel.html&quot; style=&quot;text-decoration: none;&quot;&gt;Download&lt;/a&gt;)&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-size: medium;&quot;&gt;&lt;b&gt;Requrirements:&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;b&gt;1.&lt;/b&gt;Http Tunneling Software(Client-server)&lt;br /&gt;&lt;br /&gt;&lt;b&gt;2.&lt;/b&gt;Administrative Previlage.&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-size: medium;&quot;&gt;&lt;b&gt;Procedure:&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;b&gt;Step 1.&lt;/b&gt;&lt;br /&gt;Here I have used the soft named HttpTunnel for tunneling with both server and client.Download and install it.&lt;br /&gt;&lt;br /&gt;&lt;b&gt;Step 2.&lt;/b&gt;&lt;br /&gt;Now click on the client and server part of it and you can use port mapping or socks5 for connecting throught the client.&lt;/span&gt;&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEij0huYnuZo8fNnv0niw7Jdrtr8EsdHLIvWc_YPYodXbkIjcYL3w_A7pfmfTS5Eu-db-GUqhMI4Bz2sWd-gcts-eRFs51hFL1B-zeV-sICTl5bo0FZyp1haq-AoQFjwca1GW3MP7faPTKA/s1600/httptunnel1.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em; text-decoration: none;&quot;&gt;&lt;span style=&quot;color: white; font-family: Century Gothic, Helvetica, sans-serif;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;233&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEij0huYnuZo8fNnv0niw7Jdrtr8EsdHLIvWc_YPYodXbkIjcYL3w_A7pfmfTS5Eu-db-GUqhMI4Bz2sWd-gcts-eRFs51hFL1B-zeV-sICTl5bo0FZyp1haq-AoQFjwca1GW3MP7faPTKA/s320/httptunnel1.jpg&quot; style=&quot;background-attachment: scroll; background-image: none; background-position: 0px 0px; background-repeat: repeat repeat; border-bottom-left-radius: 2px; border-bottom-right-radius: 2px; border-top-left-radius: 2px; border-top-right-radius: 2px; border: 1px solid rgb(255, 255, 255); display: inline; margin: 0px 0px 10px; padding: 5px;&quot; width=&quot;320&quot; /&gt;&lt;/span&gt;&lt;/a&gt;&lt;/div&gt;
&lt;span style=&quot;color: white; font-family: Century Gothic, Helvetica, sans-serif;&quot;&gt;&lt;b&gt;Step 3.&lt;/b&gt;&lt;br /&gt;Here I have used Rediff bol as a restricted application and socks5 for connecting.As you set the settings click on &quot;Test&quot; to see if it could connect ot the server,if it is successful then proceed as shown below.&lt;/span&gt;&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjoXiS9m7-Dqb48ohbnCbfp7VRgsz9GeoCRdEncxDDCU1TZzafIxbC-1079oNX0e1zjS-dEB6NVhqy3kc5_giututLDzZVi7J32thhsviaOp4mRTFteykNZ_Obn2dw1kHBzV09YSY7NPqY/s1600/http_tunnel.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em; text-decoration: none;&quot;&gt;&lt;span style=&quot;color: white; font-family: Century Gothic, Helvetica, sans-serif;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;233&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjoXiS9m7-Dqb48ohbnCbfp7VRgsz9GeoCRdEncxDDCU1TZzafIxbC-1079oNX0e1zjS-dEB6NVhqy3kc5_giututLDzZVi7J32thhsviaOp4mRTFteykNZ_Obn2dw1kHBzV09YSY7NPqY/s320/http_tunnel.jpg&quot; style=&quot;background-attachment: scroll; background-image: none; background-position: 0px 0px; background-repeat: repeat repeat; border-bottom-left-radius: 2px; border-bottom-right-radius: 2px; border-top-left-radius: 2px; border-top-right-radius: 2px; border: 1px solid rgb(255, 255, 255); display: inline; margin: 0px 0px 10px; padding: 5px;&quot; width=&quot;320&quot; /&gt;&lt;/span&gt;&lt;/a&gt;&lt;/div&gt;
&lt;span style=&quot;color: white; font-family: Century Gothic, Helvetica, sans-serif;&quot;&gt;Http tunnel in the network can be still detected by analysing the data and packets in the network.On more thing is that http connections last for less interval of time but since in http tunnel with tcp protocol bundled in side it may last for extended period of time so it may create a suspicion in the mind of the network admininstrator.&lt;/span&gt;&lt;br /&gt;
&lt;div style=&quot;clear: both;&quot;&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;div style=&quot;color: #191919; font-family: &#39;Trebuchet MS&#39;, verdana;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;post-footer&quot; style=&quot;color: #191919; font-family: &#39;Trebuchet MS&#39;, Helvetica, sans-serif; line-height: normal;&quot;&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
</description><link>https://hax0rtools.blogspot.com/2013/10/http-tunneling-bypass-firewall-and-proxy.html</link><author>noreply@blogger.com (Unknown)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjptxarz8LMDPdcAb7PLbtTd4pU6jSCsnwRPHkd7RA65B5CKrWglOTMrd-MRxMlbJfMcjBqfG7TfrqGGJpxdqsBJ9v9gYMfjRG8_VYSZgUljFGpRgosNQkx26tMGrRJAMb-DSm6QT8UO2U/s72-c/httptunnel3.jpg" height="72" width="72"/><thr:total>3</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-5850186663859316637.post-2536710555931299844</guid><pubDate>Fri, 18 Oct 2013 18:27:00 +0000</pubDate><atom:updated>2013-10-18T11:27:13.980-07:00</atom:updated><title>[SuperPutty Password Decryptor] SuperPutty Session Login Password Recovery Software</title><description>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; font-size: 16px; line-height: 22px; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjA806qm8JehmZLcgaKjbGYcQHoPixGCpqmRmNhpmRFh4T_ePCieExSSu1SwqyxXF8uNPXTeOC_89mruwU4zGJtglTk73HuUuCzmUlNVv1nxa3HwSylBm72SJ_vOtHmCWpRagD-ULFUzFE/s1600/superputtypassworddecryptor_mainscreen_big.jpg&quot; imageanchor=&quot;1&quot; style=&quot;border: none; margin-left: 1em; margin-right: 1em; text-decoration: none;&quot;&gt;&lt;span style=&quot;color: white; font-family: Century Gothic, Helvetica, sans-serif;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;335&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjA806qm8JehmZLcgaKjbGYcQHoPixGCpqmRmNhpmRFh4T_ePCieExSSu1SwqyxXF8uNPXTeOC_89mruwU4zGJtglTk73HuUuCzmUlNVv1nxa3HwSylBm72SJ_vOtHmCWpRagD-ULFUzFE/s400/superputtypassworddecryptor_mainscreen_big.jpg&quot; style=&quot;-webkit-transition: all 1s; border: none; padding: 5px; position: relative; transition: all 1s;&quot; width=&quot;400&quot; /&gt;&lt;/span&gt;&lt;/a&gt;&lt;/div&gt;
&lt;span style=&quot;color: white; font-family: Century Gothic, Helvetica, sans-serif;&quot;&gt;&lt;strong style=&quot;font-size: 16px; line-height: 22px;&quot;&gt;&lt;br /&gt;&lt;/strong&gt;&lt;span style=&quot;font-size: 16px; line-height: 22px;&quot;&gt;&lt;/span&gt;&lt;/span&gt;
&lt;br /&gt;
&lt;div style=&quot;font-size: 16px; line-height: 22px; text-align: justify;&quot;&gt;
&lt;span style=&quot;color: white; font-family: Century Gothic, Helvetica, sans-serif;&quot;&gt;&lt;strong&gt;SuperPutty Password Decryptor&lt;/strong&gt;&amp;nbsp;is the Free desktop tool to instantly recover all the login passswords from SuperPutty session history.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;font-size: 16px; line-height: 22px; text-align: justify;&quot;&gt;
&lt;span style=&quot;color: white; font-family: Century Gothic, Helvetica, sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;font-size: 16px; line-height: 22px; text-align: justify;&quot;&gt;
&lt;span style=&quot;color: white; font-family: Century Gothic, Helvetica, sans-serif;&quot;&gt;&lt;a href=&quot;http://code.google.com/p/superputty/&quot; style=&quot;border: none; text-decoration: none;&quot; target=&quot;_blank&quot;&gt;SuperPutty&lt;/a&gt;&amp;nbsp;is a Windows GUI Application that allows PuTTY SSH Client to be opened in Tabs. It also stores the session details allowing users to&amp;nbsp;&lt;strong&gt;automatically login&lt;/strong&gt;&amp;nbsp;without entering the password every time.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;font-size: 16px; line-height: 22px; text-align: justify;&quot;&gt;
&lt;span style=&quot;color: white; font-family: Century Gothic, Helvetica, sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;font-size: 16px; line-height: 22px; text-align: justify;&quot;&gt;
&lt;span style=&quot;color: white; font-family: Century Gothic, Helvetica, sans-serif;&quot;&gt;SuperPutty Password Decryptor helps you to quickly recover all the stored login passwords from this session file. It also automatically&amp;nbsp;&lt;strong&gt;detects SuperPutty session&lt;/strong&gt;&amp;nbsp;file for the current user and displays it. Alternatively, you can also select another session file copied from remote system.&lt;/span&gt;&lt;/div&gt;
&lt;span style=&quot;color: white; font-family: Century Gothic, Helvetica, sans-serif;&quot;&gt;&lt;br style=&quot;font-size: 16px; line-height: 22px;&quot; /&gt;&lt;/span&gt;
&lt;br /&gt;
&lt;div style=&quot;font-size: 16px; line-height: 22px; text-align: justify;&quot;&gt;
&lt;/div&gt;
&lt;span style=&quot;color: white; font-family: Century Gothic, Helvetica, sans-serif;&quot;&gt;&lt;a href=&quot;http://www.blogger.com/blogger.g?blogID=5850186663859316637&quot; name=&quot;more&quot; style=&quot;font-size: 16px; line-height: 22px;&quot;&gt;&lt;/a&gt;&lt;span style=&quot;font-size: 16px; line-height: 22px;&quot;&gt;&lt;/span&gt;&lt;br style=&quot;font-size: 16px; line-height: 22px;&quot; /&gt;&lt;/span&gt;
&lt;br /&gt;
&lt;div style=&quot;font-size: 16px; line-height: 22px; text-align: justify;&quot;&gt;
&lt;span style=&quot;color: white; font-family: Century Gothic, Helvetica, sans-serif;&quot;&gt;After the successful recovery, you can generate detailed password report in&amp;nbsp;&lt;strong&gt;HTML/XML/TEXT&lt;/strong&gt;&amp;nbsp;file. It is very simple and easy to use tool with its cool GUI interface.&lt;/span&gt;&lt;/div&gt;
&lt;/div&gt;
</description><link>https://hax0rtools.blogspot.com/2013/10/superputty-password-decryptor.html</link><author>noreply@blogger.com (Unknown)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjA806qm8JehmZLcgaKjbGYcQHoPixGCpqmRmNhpmRFh4T_ePCieExSSu1SwqyxXF8uNPXTeOC_89mruwU4zGJtglTk73HuUuCzmUlNVv1nxa3HwSylBm72SJ_vOtHmCWpRagD-ULFUzFE/s72-c/superputtypassworddecryptor_mainscreen_big.jpg" height="72" width="72"/><thr:total>1</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-5850186663859316637.post-6660037724247401905</guid><pubDate>Fri, 18 Oct 2013 18:23:00 +0000</pubDate><atom:updated>2013-10-18T11:23:34.791-07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Hack tools</category><category domain="http://www.blogger.com/atom/ns#">security</category><category domain="http://www.blogger.com/atom/ns#">web sites</category><title>[Arachni v0.4.5.1-0.4.2] Open Source Web Application Security Scanner Framework</title><description>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; font-size: 16px; line-height: 22px; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj7e7mUNT-5DbBo_HyZkJj6T_Dc1HBKg5oDUZrsPWrW_MIaTX_nsfC4rB5DBJ4ACWwTQyQQ5yj9Alm5UrYNpDcOtKg2YKwXcejrJtpoTpy_3v74UtOVQmI2gIXuHGDdIKlHo2r0q3av5go/s1600/arachni-web-logo.png&quot; imageanchor=&quot;1&quot; style=&quot;border: none; margin-left: 1em; margin-right: 1em; text-decoration: none;&quot;&gt;&lt;span style=&quot;color: white; font-family: Century Gothic, Helvetica, sans-serif;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;76&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj7e7mUNT-5DbBo_HyZkJj6T_Dc1HBKg5oDUZrsPWrW_MIaTX_nsfC4rB5DBJ4ACWwTQyQQ5yj9Alm5UrYNpDcOtKg2YKwXcejrJtpoTpy_3v74UtOVQmI2gIXuHGDdIKlHo2r0q3av5go/s640/arachni-web-logo.png&quot; style=&quot;-webkit-transition: all 1s; border: none; padding: 5px; position: relative; transition: all 1s;&quot; width=&quot;640&quot; /&gt;&lt;/span&gt;&lt;/a&gt;&lt;/div&gt;
&lt;span style=&quot;color: white; font-family: Century Gothic, Helvetica, sans-serif;&quot;&gt;&lt;br style=&quot;font-size: 16px; line-height: 22px;&quot; /&gt;&lt;/span&gt;
&lt;br /&gt;
&lt;div style=&quot;font-size: 16px; line-height: 22px; text-align: justify;&quot;&gt;
&lt;span style=&quot;color: white; font-family: Century Gothic, Helvetica, sans-serif;&quot;&gt;Arachni is a Free/Open Source project, the code is released under the&amp;nbsp;&lt;a href=&quot;http://www.apache.org/licenses/LICENSE-2.0.html&quot; style=&quot;border: none; text-decoration: none;&quot;&gt;Apache License Version 2.0&lt;/a&gt;&amp;nbsp;and you are free to use it as you see fit.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;font-size: 16px; line-height: 22px; text-align: justify;&quot;&gt;
&lt;span style=&quot;color: white; font-family: Century Gothic, Helvetica, sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;font-size: 16px; line-height: 22px; text-align: justify;&quot;&gt;
&lt;span style=&quot;color: white; font-family: Century Gothic, Helvetica, sans-serif;&quot;&gt;Initially started as an educational exercise, it has since evolved into a powerful and modular framework allowing for fast, accurate and flexible security/vulnerability assessments. More than that, Arachni is highly extend-able allowing for anyone to improve upon it by adding custom components and tailoring most aspects to meet most needs.&lt;/span&gt;&lt;/div&gt;
&lt;span style=&quot;color: white; font-family: Century Gothic, Helvetica, sans-serif;&quot;&gt;&lt;br style=&quot;font-size: 16px; line-height: 22px;&quot; /&gt;&lt;a href=&quot;http://www.blogger.com/blogger.g?blogID=5850186663859316637&quot; name=&quot;more&quot; style=&quot;font-size: 16px; line-height: 22px;&quot;&gt;&lt;/a&gt;&lt;/span&gt;
&lt;h3 style=&quot;margin: 0px; position: relative;&quot;&gt;
&lt;span style=&quot;color: white; font-family: Century Gothic, Helvetica, sans-serif;&quot;&gt;New Changes&lt;/span&gt;&lt;/h3&gt;
&lt;ul style=&quot;font-size: 16px; line-height: 22px; margin: 0.5em 0px; padding: 0px 2.5em;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgOgTzt2vqiMM0mfsz9vh9Kn16Kp2q5FXTl5f4KyNfU6iHVW9jDUn5N1U7IFwitRP3WRqTtpoiZ3NEXlwhtT3XwHt5WQhugE0RQ6ALk1ofhsWfxMKKE4M6M1e29MX8lT-fibEGtomEF_Pw/s1600/arachni.png&quot; imageanchor=&quot;1&quot; style=&quot;border: none; clear: right; float: right; margin-bottom: 1em; margin-left: 1em; text-decoration: none;&quot;&gt;&lt;span style=&quot;color: white; font-family: Century Gothic, Helvetica, sans-serif;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;150&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgOgTzt2vqiMM0mfsz9vh9Kn16Kp2q5FXTl5f4KyNfU6iHVW9jDUn5N1U7IFwitRP3WRqTtpoiZ3NEXlwhtT3XwHt5WQhugE0RQ6ALk1ofhsWfxMKKE4M6M1e29MX8lT-fibEGtomEF_Pw/s200/arachni.png&quot; style=&quot;-webkit-transition: all 1s; border: none; padding: 5px; position: relative; transition: all 1s;&quot; width=&quot;200&quot; /&gt;&lt;/span&gt;&lt;/a&gt;
&lt;li style=&quot;margin: 0px 0px 0.25em; padding: 0px;&quot;&gt;&lt;span style=&quot;color: white; font-family: Century Gothic, Helvetica, sans-serif;&quot;&gt;Optimized pattern matching to use less resources by grouping patterns to only be matched against the per-platform payloads. Bottom line, pattern matching operations have been greatly reduced overall and vulnerabilities can be used to fingerprint the remote platform.&lt;/span&gt;&lt;/li&gt;
&lt;li style=&quot;margin: 0px 0px 0.25em; padding: 0px;&quot;&gt;&lt;span style=&quot;color: white; font-family: Century Gothic, Helvetica, sans-serif;&quot;&gt;Modules&lt;/span&gt;&lt;ul style=&quot;line-height: 1.4; margin: 0.5em 0px; padding: 0px 2.5em;&quot;&gt;
&lt;li style=&quot;margin: 0px 0px 0.25em; padding: 0px;&quot;&gt;&lt;span style=&quot;color: white; font-family: Century Gothic, Helvetica, sans-serif;&quot;&gt;Path traversal ( path_traversal)&lt;/span&gt;&lt;ul style=&quot;line-height: 1.4; margin: 0.5em 0px; padding: 0px 2.5em;&quot;&gt;
&lt;li style=&quot;margin: 0px 0px 0.25em; padding: 0px;&quot;&gt;&lt;span style=&quot;color: white; font-family: Century Gothic, Helvetica, sans-serif;&quot;&gt;Updated to use more generic signatures.&lt;/span&gt;&lt;/li&gt;
&lt;li style=&quot;margin: 0px 0px 0.25em; padding: 0px;&quot;&gt;&lt;span style=&quot;color: white; font-family: Century Gothic, Helvetica, sans-serif;&quot;&gt;Added dot-truncation for MS Windows payloads.&lt;/span&gt;&lt;/li&gt;
&lt;li style=&quot;margin: 0px 0px 0.25em; padding: 0px;&quot;&gt;&lt;span style=&quot;color: white; font-family: Century Gothic, Helvetica, sans-serif;&quot;&gt;Moved non-traversal payloads to the file_inclusion module.&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li style=&quot;margin: 0px 0px 0.25em; padding: 0px;&quot;&gt;&lt;span style=&quot;color: white; font-family: Century Gothic, Helvetica, sans-serif;&quot;&gt;File inclusion ( file_inclusion) — Extracted from path_traversal.&lt;/span&gt;&lt;ul style=&quot;line-height: 1.4; margin: 0.5em 0px; padding: 0px 2.5em;&quot;&gt;
&lt;li style=&quot;margin: 0px 0px 0.25em; padding: 0px;&quot;&gt;&lt;span style=&quot;color: white; font-family: Century Gothic, Helvetica, sans-serif;&quot;&gt;Uses common server-side files and errors to identify issues.&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li style=&quot;margin: 0px 0px 0.25em; padding: 0px;&quot;&gt;&lt;span style=&quot;color: white; font-family: Century Gothic, Helvetica, sans-serif;&quot;&gt;SQL Injection ( sqli) — Added support for the following databases:&lt;/span&gt;&lt;ul style=&quot;line-height: 1.4; margin: 0.5em 0px; padding: 0px 2.5em;&quot;&gt;
&lt;li style=&quot;margin: 0px 0px 0.25em; padding: 0px;&quot;&gt;&lt;span style=&quot;color: white; font-family: Century Gothic, Helvetica, sans-serif;&quot;&gt;Firebird&lt;/span&gt;&lt;/li&gt;
&lt;li style=&quot;margin: 0px 0px 0.25em; padding: 0px;&quot;&gt;&lt;span style=&quot;color: white; font-family: Century Gothic, Helvetica, sans-serif;&quot;&gt;SAP Max DB&lt;/span&gt;&lt;/li&gt;
&lt;li style=&quot;margin: 0px 0px 0.25em; padding: 0px;&quot;&gt;&lt;span style=&quot;color: white; font-family: Century Gothic, Helvetica, sans-serif;&quot;&gt;Sybase&lt;/span&gt;&lt;/li&gt;
&lt;li style=&quot;margin: 0px 0px 0.25em; padding: 0px;&quot;&gt;&lt;span style=&quot;color: white; font-family: Century Gothic, Helvetica, sans-serif;&quot;&gt;Frontbase&lt;/span&gt;&lt;/li&gt;
&lt;li style=&quot;margin: 0px 0px 0.25em; padding: 0px;&quot;&gt;&lt;span style=&quot;color: white; font-family: Century Gothic, Helvetica, sans-serif;&quot;&gt;IngresDB&lt;/span&gt;&lt;/li&gt;
&lt;li style=&quot;margin: 0px 0px 0.25em; padding: 0px;&quot;&gt;&lt;span style=&quot;color: white; font-family: Century Gothic, Helvetica, sans-serif;&quot;&gt;HSQLDB&lt;/span&gt;&lt;/li&gt;
&lt;li style=&quot;margin: 0px 0px 0.25em; padding: 0px;&quot;&gt;&lt;span style=&quot;color: white; font-family: Century Gothic, Helvetica, sans-serif;&quot;&gt;MS Access&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li style=&quot;margin: 0px 0px 0.25em; padding: 0px;&quot;&gt;&lt;span style=&quot;color: white; font-family: Century Gothic, Helvetica, sans-serif;&quot;&gt;localstart_asp — Checks if localstart.asp is accessible.&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li style=&quot;margin: 0px 0px 0.25em; padding: 0px;&quot;&gt;&lt;span style=&quot;color: white; font-family: Century Gothic, Helvetica, sans-serif;&quot;&gt;Plugins — Added:&lt;/span&gt;&lt;ul style=&quot;line-height: 1.4; margin: 0.5em 0px; padding: 0px 2.5em;&quot;&gt;
&lt;li style=&quot;margin: 0px 0px 0.25em; padding: 0px;&quot;&gt;&lt;span style=&quot;color: white; font-family: Century Gothic, Helvetica, sans-serif;&quot;&gt;Uncommon headers ( uncommon_headers) — Logs uncommon headers.&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;div style=&quot;font-size: 16px; line-height: 22px;&quot;&gt;
&lt;span style=&quot;color: white; font-family: Century Gothic, Helvetica, sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;font-size: 16px; line-height: 22px; text-align: center;&quot;&gt;
&lt;a href=&quot;http://www.arachni-scanner.com/download&quot; style=&quot;border: none; text-decoration: none;&quot; target=&quot;_blank&quot;&gt;&lt;b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: large;&quot;&gt;&lt;span style=&quot;color: white; font-family: Century Gothic, Helvetica, sans-serif;&quot;&gt;Download Arachni v0.4.5.1-0.4.2&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;/a&gt;&lt;/div&gt;
&lt;/div&gt;
</description><link>https://hax0rtools.blogspot.com/2013/10/arachni-v0451-042-open-source-web.html</link><author>noreply@blogger.com (Unknown)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj7e7mUNT-5DbBo_HyZkJj6T_Dc1HBKg5oDUZrsPWrW_MIaTX_nsfC4rB5DBJ4ACWwTQyQQ5yj9Alm5UrYNpDcOtKg2YKwXcejrJtpoTpy_3v74UtOVQmI2gIXuHGDdIKlHo2r0q3av5go/s72-c/arachni-web-logo.png" height="72" width="72"/><thr:total>1</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-5850186663859316637.post-8123422775650747554</guid><pubDate>Fri, 18 Oct 2013 18:21:00 +0000</pubDate><atom:updated>2013-10-18T11:21:39.807-07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Hack tools</category><title>[ollydbg-binary-execution-visualizer] New Tool for Visualizing Binaries With Ollydbg and Graphvis</title><description>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
&lt;span style=&quot;color: white; font-family: Century Gothic, Helvetica, sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; font-size: 16px; line-height: 22px; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjDRA3OQe8XWTlmE3raMCjWL1604UWud42oqwkDWkdLxohyphenhyphenPEKd7NsWPti0zNm2Y9GgzUXyJLx5V23ggjiSEdWz2Xvbx9Km3zUVXb77pYvGkuAYnyFFqSA-RoZSfd5NsQNeYkbKZuBJbB0/s1600/OllyDbg2.gif&quot; imageanchor=&quot;1&quot; style=&quot;border: none; margin-left: 1em; margin-right: 1em; text-decoration: none;&quot;&gt;&lt;span style=&quot;color: white; font-family: Century Gothic, Helvetica, sans-serif;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;293&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjDRA3OQe8XWTlmE3raMCjWL1604UWud42oqwkDWkdLxohyphenhyphenPEKd7NsWPti0zNm2Y9GgzUXyJLx5V23ggjiSEdWz2Xvbx9Km3zUVXb77pYvGkuAYnyFFqSA-RoZSfd5NsQNeYkbKZuBJbB0/s400/OllyDbg2.gif&quot; style=&quot;-webkit-transition: all 1s; border: none; padding: 5px; position: relative; transition: all 1s;&quot; width=&quot;400&quot; /&gt;&lt;/span&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div style=&quot;font-size: 16px; line-height: 22px; text-align: justify;&quot;&gt;
&lt;span style=&quot;color: white; font-family: Century Gothic, Helvetica, sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;font-size: 16px; line-height: 22px; text-align: justify;&quot;&gt;
&lt;span style=&quot;color: white; font-family: Century Gothic, Helvetica, sans-serif;&quot;&gt;Sometimes crackme’s or something you might be reversing will constantly bug you due to the excessive usage of f7 &amp;amp; f8. It will be quiet neat if you can see how the application is executing visually and set your break points accordingly.&lt;/span&gt;&lt;/div&gt;
&lt;span style=&quot;color: white; font-family: Century Gothic, Helvetica, sans-serif;&quot;&gt;&lt;a href=&quot;http://www.blogger.com/blogger.g?blogID=5850186663859316637&quot; name=&quot;more&quot; style=&quot;font-size: 16px; line-height: 22px;&quot;&gt;&lt;/a&gt;&lt;br style=&quot;font-size: 16px; line-height: 22px;&quot; /&gt;&lt;/span&gt;
&lt;br /&gt;
&lt;div style=&quot;font-size: 16px; line-height: 22px; text-align: justify;&quot;&gt;
&lt;b&gt;&lt;span style=&quot;color: white; font-family: Century Gothic, Helvetica, sans-serif;&quot;&gt;Requirements:&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;
&lt;div style=&quot;font-size: 16px; line-height: 22px;&quot;&gt;
&lt;span style=&quot;color: white; font-family: Century Gothic, Helvetica, sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;color: white; font-family: Century Gothic, Helvetica, sans-serif;&quot;&gt;o Ollyscript plugin&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;color: white; font-family: Century Gothic, Helvetica, sans-serif;&quot;&gt;o Bunch of your favorite anti-­‐debug plugins (phantom , ollyadvanced, …etc) o Pygraphviz&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;color: white; font-family: Century Gothic, Helvetica, sans-serif;&quot;&gt;o Graphviz&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;color: white; font-family: Century Gothic, Helvetica, sans-serif;&quot;&gt;o Python 2.7&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;color: white; font-family: Century Gothic, Helvetica, sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;span style=&quot;color: white; font-family: Century Gothic, Helvetica, sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;b&gt;&lt;span style=&quot;color: white; font-family: Century Gothic, Helvetica, sans-serif;&quot;&gt;Approach:&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;
&lt;ul style=&quot;line-height: 1.4; margin: 0.5em 0px; padding: 0px 2.5em;&quot;&gt;
&lt;li style=&quot;margin: 0px 0px 0.25em; padding: 0px;&quot;&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;color: white; font-family: Century Gothic, Helvetica, sans-serif;&quot;&gt;Create an ollyscript that will do the following&lt;/span&gt;&lt;/div&gt;
&lt;span style=&quot;color: white; font-family: Century Gothic, Helvetica, sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;color: white; font-family: Century Gothic, Helvetica, sans-serif;&quot;&gt;o Log all EIP for main application&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;color: white; font-family: Century Gothic, Helvetica, sans-serif;&quot;&gt;o Disregard to log calls to kernel32 , ntdll &amp;amp; addresses which are above&lt;/span&gt;&lt;/div&gt;
&lt;span style=&quot;color: white; font-family: Century Gothic, Helvetica, sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;color: white; font-family: Century Gothic, Helvetica, sans-serif;&quot;&gt;7C000000 using step over not step into include more addresses to&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;color: white; font-family: Century Gothic, Helvetica, sans-serif;&quot;&gt;exclude if needed later for other system dll’s 77000000 … etc. o Save EIP Logs to file&lt;/span&gt;&lt;/div&gt;
&lt;/li&gt;
&lt;li style=&quot;margin: 0px 0px 0.25em; padding: 0px; text-align: justify;&quot;&gt;&lt;span style=&quot;color: white; font-family: Century Gothic, Helvetica, sans-serif;&quot;&gt;Parse the log file&lt;/span&gt;&lt;/li&gt;
&lt;li style=&quot;margin: 0px 0px 0.25em; padding: 0px; text-align: justify;&quot;&gt;&lt;span style=&quot;color: white; font-family: Century Gothic, Helvetica, sans-serif;&quot;&gt;Feed it into pygraphviz&lt;/span&gt;&lt;/li&gt;
&lt;li style=&quot;margin: 0px 0px 0.25em; padding: 0px; text-align: justify;&quot;&gt;&lt;span style=&quot;color: white; font-family: Century Gothic, Helvetica, sans-serif;&quot;&gt;Export to png&lt;/span&gt;&lt;/li&gt;
&lt;li style=&quot;margin: 0px 0px 0.25em; padding: 0px; text-align: justify;&quot;&gt;&lt;span style=&quot;color: white; font-family: Century Gothic, Helvetica, sans-serif;&quot;&gt;Visualize &amp;amp; note needed breakpoints.&lt;/span&gt;&lt;/li&gt;
&lt;li style=&quot;margin: 0px 0px 0.25em; padding: 0px; text-align: justify;&quot;&gt;&lt;span style=&quot;color: white; font-family: Century Gothic, Helvetica, sans-serif;&quot;&gt;Re-­‐run the app setting above breakpoints.&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;color: white; font-family: Century Gothic, Helvetica, sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;div style=&quot;font-size: 16px; line-height: 22px; text-align: justify;&quot;&gt;
&lt;a href=&quot;https://github.com/ehabhussein/ollydbg-binary-execution-visualizer/blob/master/Visualizing%20Binaries%20With%20Ollydbg.pdf&quot; style=&quot;border: none; text-decoration: none;&quot; target=&quot;_blank&quot;&gt;&lt;span style=&quot;color: white; font-family: Century Gothic, Helvetica, sans-serif;&quot;&gt;Full documentation here&lt;/span&gt;&lt;/a&gt;&lt;/div&gt;
&lt;span style=&quot;color: white; font-family: Century Gothic, Helvetica, sans-serif;&quot;&gt;&lt;br style=&quot;font-size: 16px; line-height: 22px;&quot; /&gt;&lt;/span&gt;
&lt;br /&gt;
&lt;div style=&quot;font-size: 16px; line-height: 22px; text-align: center;&quot;&gt;
&lt;a href=&quot;https://github.com/ehabhussein/ollydbg-binary-execution-visualizer&quot; style=&quot;border: none; text-decoration: none;&quot;&gt;&lt;b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: medium;&quot;&gt;&lt;span style=&quot;color: white; font-family: Century Gothic, Helvetica, sans-serif;&quot;&gt;Download ollydbg-binary-execution-visualizer&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;/a&gt;&lt;/div&gt;
&lt;/div&gt;
</description><link>https://hax0rtools.blogspot.com/2013/10/ollydbg-binary-execution-visualizer-new.html</link><author>noreply@blogger.com (Unknown)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjDRA3OQe8XWTlmE3raMCjWL1604UWud42oqwkDWkdLxohyphenhyphenPEKd7NsWPti0zNm2Y9GgzUXyJLx5V23ggjiSEdWz2Xvbx9Km3zUVXb77pYvGkuAYnyFFqSA-RoZSfd5NsQNeYkbKZuBJbB0/s72-c/OllyDbg2.gif" height="72" width="72"/><thr:total>2</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-5850186663859316637.post-3902644721274777216</guid><pubDate>Fri, 18 Oct 2013 18:17:00 +0000</pubDate><atom:updated>2013-10-18T11:17:34.526-07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Hack tools</category><category domain="http://www.blogger.com/atom/ns#">other</category><title>[JBrute v0.9.4] Open Source Security tool to audit hashed passwords</title><description>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
&lt;span style=&quot;color: white; font-family: Century Gothic, Helvetica, sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; font-size: 16px; line-height: 22px; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhqADGi5ypsBq_LXu-oisAKlfJiPN5pQX3Kj_KMpHNAIxMY4n04O7EEu2T4JdqeMdx99Owr0jqYSd2P5srgx2QskPgovXCgafaG-6up4S3pYYaGtcBjwco5OSSqjU6wR6Bcomps0-wpUr0/s1600/password-cracking.jpg&quot; imageanchor=&quot;1&quot; style=&quot;border: none; margin-left: 1em; margin-right: 1em; text-decoration: none;&quot;&gt;&lt;span style=&quot;color: white; font-family: Century Gothic, Helvetica, sans-serif;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;300&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhqADGi5ypsBq_LXu-oisAKlfJiPN5pQX3Kj_KMpHNAIxMY4n04O7EEu2T4JdqeMdx99Owr0jqYSd2P5srgx2QskPgovXCgafaG-6up4S3pYYaGtcBjwco5OSSqjU6wR6Bcomps0-wpUr0/s400/password-cracking.jpg&quot; style=&quot;-webkit-transition: all 1s; border: none; padding: 5px; position: relative; transition: all 1s;&quot; width=&quot;400&quot; /&gt;&lt;/span&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div style=&quot;font-size: 16px; line-height: 22px; text-align: justify;&quot;&gt;
&lt;span style=&quot;color: white; font-family: Century Gothic, Helvetica, sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;font-size: 16px; line-height: 22px; text-align: justify;&quot;&gt;
&lt;span style=&quot;color: white; font-family: Century Gothic, Helvetica, sans-serif;&quot;&gt;JBrute is an open source tool written in Java to audit security and stronghold of stored password for several open source and commercial apps. It is focused to provide multi-platform support and flexible parameters to cover most of the possible password-auditing scenarios.&lt;/span&gt;&lt;/div&gt;
&lt;span style=&quot;color: white; font-family: Century Gothic, Helvetica, sans-serif;&quot;&gt;&lt;a href=&quot;http://www.blogger.com/blogger.g?blogID=5850186663859316637&quot; name=&quot;more&quot; style=&quot;font-size: 16px; line-height: 22px;&quot;&gt;&lt;/a&gt;&lt;br style=&quot;font-size: 16px; line-height: 22px;&quot; /&gt;&lt;/span&gt;
&lt;div style=&quot;font-size: 16px; line-height: 22px; text-align: justify;&quot;&gt;
&lt;span style=&quot;color: white; font-family: Century Gothic, Helvetica, sans-serif;&quot;&gt;Java Runtime version 1.7 or higher is required for running JBrute.&lt;/span&gt;&lt;/div&gt;
&lt;span style=&quot;color: white; font-family: Century Gothic, Helvetica, sans-serif;&quot;&gt;&lt;br style=&quot;font-size: 16px; line-height: 22px;&quot; /&gt;&lt;/span&gt;
&lt;br /&gt;
&lt;header style=&quot;font-size: 16px; line-height: 22px;&quot;&gt;&lt;h2 style=&quot;font-size: 14px; line-height: normal; margin: 0px; position: relative; text-align: justify;&quot;&gt;
&lt;span style=&quot;color: white; font-family: Century Gothic, Helvetica, sans-serif;&quot;&gt;Features&lt;/span&gt;&lt;/h2&gt;
&lt;/header&gt;&lt;span style=&quot;color: white; font-family: Century Gothic, Helvetica, sans-serif;&quot;&gt;&lt;br style=&quot;font-size: 16px; line-height: 22px;&quot; /&gt;&lt;/span&gt;
&lt;br /&gt;
&lt;ul style=&quot;font-size: 16px; line-height: 22px; margin: 0.5em 0px; padding: 0px 2.5em;&quot;&gt;
&lt;li style=&quot;margin: 0px 0px 0.25em; padding: 0px; text-align: justify;&quot;&gt;&lt;span style=&quot;color: white; font-family: Century Gothic, Helvetica, sans-serif;&quot;&gt;Muli-platform support (by Java VM)&lt;/span&gt;&lt;/li&gt;
&lt;li style=&quot;margin: 0px 0px 0.25em; padding: 0px; text-align: justify;&quot;&gt;&lt;span style=&quot;color: white; font-family: Century Gothic, Helvetica, sans-serif;&quot;&gt;Several hashing algorithms supported&lt;/span&gt;&lt;/li&gt;
&lt;li style=&quot;margin: 0px 0px 0.25em; padding: 0px; text-align: justify;&quot;&gt;&lt;span style=&quot;color: white; font-family: Century Gothic, Helvetica, sans-serif;&quot;&gt;Flexible chained hashes decryption (like MD5(SHA1(MD5())))&lt;/span&gt;&lt;/li&gt;
&lt;li style=&quot;margin: 0px 0px 0.25em; padding: 0px; text-align: justify;&quot;&gt;&lt;span style=&quot;color: white; font-family: Century Gothic, Helvetica, sans-serif;&quot;&gt;Both brute force and dictionary decryption methods supported&lt;/span&gt;&lt;/li&gt;
&lt;li style=&quot;margin: 0px 0px 0.25em; padding: 0px; text-align: justify;&quot;&gt;&lt;span style=&quot;color: white; font-family: Century Gothic, Helvetica, sans-serif;&quot;&gt;Build-In rule pre-processor for dictionary decryption&lt;/span&gt;&lt;/li&gt;
&lt;li style=&quot;margin: 0px 0px 0.25em; padding: 0px; text-align: justify;&quot;&gt;&lt;span style=&quot;color: white; font-family: Century Gothic, Helvetica, sans-serif;&quot;&gt;Multi-threading support for brute force decryption&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;div style=&quot;font-size: 16px; line-height: 22px; text-align: justify;&quot;&gt;
&lt;strong&gt;&lt;span style=&quot;color: white; font-family: Century Gothic, Helvetica, sans-serif;&quot;&gt;Supported algorithms:&lt;/span&gt;&lt;/strong&gt;&lt;/div&gt;
&lt;ul style=&quot;font-size: 16px; line-height: 22px; margin: 0.5em 0px; padding: 0px 2.5em;&quot;&gt;
&lt;li style=&quot;margin: 0px 0px 0.25em; padding: 0px; text-align: justify;&quot;&gt;&lt;span style=&quot;color: white; font-family: Century Gothic, Helvetica, sans-serif;&quot;&gt;MD5&lt;/span&gt;&lt;/li&gt;
&lt;li style=&quot;margin: 0px 0px 0.25em; padding: 0px; text-align: justify;&quot;&gt;&lt;span style=&quot;color: white; font-family: Century Gothic, Helvetica, sans-serif;&quot;&gt;MD4&lt;/span&gt;&lt;/li&gt;
&lt;li style=&quot;margin: 0px 0px 0.25em; padding: 0px; text-align: justify;&quot;&gt;&lt;span style=&quot;color: white; font-family: Century Gothic, Helvetica, sans-serif;&quot;&gt;SHA-256&lt;/span&gt;&lt;/li&gt;
&lt;li style=&quot;margin: 0px 0px 0.25em; padding: 0px; text-align: justify;&quot;&gt;&lt;span style=&quot;color: white; font-family: Century Gothic, Helvetica, sans-serif;&quot;&gt;SHA-512&lt;/span&gt;&lt;/li&gt;
&lt;li style=&quot;margin: 0px 0px 0.25em; padding: 0px; text-align: justify;&quot;&gt;&lt;span style=&quot;color: white; font-family: Century Gothic, Helvetica, sans-serif;&quot;&gt;MD5CRYPT&lt;/span&gt;&lt;/li&gt;
&lt;li style=&quot;margin: 0px 0px 0.25em; padding: 0px; text-align: justify;&quot;&gt;&lt;span style=&quot;color: white; font-family: Century Gothic, Helvetica, sans-serif;&quot;&gt;SHA1&lt;/span&gt;&lt;/li&gt;
&lt;li style=&quot;margin: 0px 0px 0.25em; padding: 0px; text-align: justify;&quot;&gt;&lt;span style=&quot;color: white; font-family: Century Gothic, Helvetica, sans-serif;&quot;&gt;ORACLE-10G&lt;/span&gt;&lt;/li&gt;
&lt;li style=&quot;margin: 0px 0px 0.25em; padding: 0px; text-align: justify;&quot;&gt;&lt;span style=&quot;color: white; font-family: Century Gothic, Helvetica, sans-serif;&quot;&gt;ORACLE-11G&lt;/span&gt;&lt;/li&gt;
&lt;li style=&quot;margin: 0px 0px 0.25em; padding: 0px; text-align: justify;&quot;&gt;&lt;span style=&quot;color: white; font-family: Century Gothic, Helvetica, sans-serif;&quot;&gt;NTLM&lt;/span&gt;&lt;/li&gt;
&lt;li style=&quot;margin: 0px 0px 0.25em; padding: 0px; text-align: justify;&quot;&gt;&lt;span style=&quot;color: white; font-family: Century Gothic, Helvetica, sans-serif;&quot;&gt;LM&lt;/span&gt;&lt;/li&gt;
&lt;li style=&quot;margin: 0px 0px 0.25em; padding: 0px; text-align: justify;&quot;&gt;&lt;span style=&quot;color: white; font-family: Century Gothic, Helvetica, sans-serif;&quot;&gt;MSSQL-2000&lt;/span&gt;&lt;/li&gt;
&lt;li style=&quot;margin: 0px 0px 0.25em; padding: 0px; text-align: justify;&quot;&gt;&lt;span style=&quot;color: white; font-family: Century Gothic, Helvetica, sans-serif;&quot;&gt;MSSQL-2005&lt;/span&gt;&lt;/li&gt;
&lt;li style=&quot;margin: 0px 0px 0.25em; padding: 0px; text-align: justify;&quot;&gt;&lt;span style=&quot;color: white; font-family: Century Gothic, Helvetica, sans-serif;&quot;&gt;MSSQL-2012&lt;/span&gt;&lt;/li&gt;
&lt;li style=&quot;margin: 0px 0px 0.25em; padding: 0px; text-align: justify;&quot;&gt;&lt;span style=&quot;color: white; font-family: Century Gothic, Helvetica, sans-serif;&quot;&gt;MYSQL-322&lt;/span&gt;&lt;/li&gt;
&lt;li style=&quot;margin: 0px 0px 0.25em; padding: 0px; text-align: justify;&quot;&gt;&lt;span style=&quot;color: white; font-family: Century Gothic, Helvetica, sans-serif;&quot;&gt;MYSQL-411&lt;/span&gt;&lt;/li&gt;
&lt;li style=&quot;margin: 0px 0px 0.25em; padding: 0px; text-align: justify;&quot;&gt;&lt;span style=&quot;color: white; font-family: Century Gothic, Helvetica, sans-serif;&quot;&gt;POSTGRESQL&lt;/span&gt;&lt;/li&gt;
&lt;li style=&quot;margin: 0px 0px 0.25em; padding: 0px; text-align: justify;&quot;&gt;&lt;span style=&quot;color: white; font-family: Century Gothic, Helvetica, sans-serif;&quot;&gt;SYBASE-ASE1502&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;span style=&quot;color: white; font-family: Century Gothic, Helvetica, sans-serif;&quot;&gt;&lt;br style=&quot;font-size: 16px; line-height: 22px;&quot; /&gt;&lt;a href=&quot;http://sourceforge.net/projects/jbrute&quot; style=&quot;border: none; font-size: 16px; line-height: 22px; text-decoration: none;&quot;&gt;&lt;/a&gt;&lt;/span&gt;
&lt;div style=&quot;font-size: 16px; line-height: 22px; text-align: center;&quot;&gt;
&lt;a href=&quot;http://sourceforge.net/projects/jbrute&quot; style=&quot;border: none; text-decoration: none;&quot;&gt;&lt;b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: large;&quot;&gt;&lt;span style=&quot;color: white; font-family: Century Gothic, Helvetica, sans-serif;&quot;&gt;Download JBrute v0.9.4&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;/a&gt;&lt;/div&gt;
&lt;/div&gt;
</description><link>https://hax0rtools.blogspot.com/2013/10/jbrute-v094-open-source-security-tool.html</link><author>noreply@blogger.com (Unknown)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhqADGi5ypsBq_LXu-oisAKlfJiPN5pQX3Kj_KMpHNAIxMY4n04O7EEu2T4JdqeMdx99Owr0jqYSd2P5srgx2QskPgovXCgafaG-6up4S3pYYaGtcBjwco5OSSqjU6wR6Bcomps0-wpUr0/s72-c/password-cracking.jpg" height="72" width="72"/><thr:total>1</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-5850186663859316637.post-7318064228470615992</guid><pubDate>Fri, 18 Oct 2013 17:18:00 +0000</pubDate><atom:updated>2013-10-18T10:18:55.581-07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Hack tools</category><title>[Syhunt Sandcat Browser v4.1] A Penetration-oriented browser (extented to Web Application Assessment)</title><description>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
&lt;span style=&quot;color: white; font-family: Century Gothic, Helvetica, sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;br /&gt;
&lt;div class=&quot;post-body entry-content&quot; id=&quot;post-body-3031322673211927143&quot; itemprop=&quot;description articleBody&quot; style=&quot;line-height: 22px; position: relative; width: 680px;&quot;&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiCKE8zUFmXgIPCAcj3p_IKdIR4abwI7aiZS0OBDZIuUoI4hRmyHolYaIh61LL9EPnckI6q7XV1e07__Yy7ryPzGWk2QfaqxChDDa8gN2cZbbuN8V7u7HSQOkw5xKyHAK1Z7J6DNF6TI-Q/s1600/sandcat+fuzzer.png&quot; imageanchor=&quot;1&quot; style=&quot;border: none; margin-left: 1em; margin-right: 1em; text-decoration: none;&quot;&gt;&lt;span style=&quot;color: white; font-family: Century Gothic, Helvetica, sans-serif;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;311&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiCKE8zUFmXgIPCAcj3p_IKdIR4abwI7aiZS0OBDZIuUoI4hRmyHolYaIh61LL9EPnckI6q7XV1e07__Yy7ryPzGWk2QfaqxChDDa8gN2cZbbuN8V7u7HSQOkw5xKyHAK1Z7J6DNF6TI-Q/s400/sandcat+fuzzer.png&quot; style=&quot;-webkit-transition: all 1s; border: none; padding: 5px; position: relative; transition: all 1s;&quot; width=&quot;400&quot; /&gt;&lt;/span&gt;&lt;/a&gt;&lt;/div&gt;
&lt;span style=&quot;color: white; font-family: Century Gothic, Helvetica, sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;br /&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;color: white; font-family: Century Gothic, Helvetica, sans-serif;&quot;&gt;Sandcat Browser 4 brings unique features that are useful for pen-testers and web developers. Sandcat is built on top of Chromium, the same engine that powers the Google Chrome browser, and uses the Lua programming language to provide extensions and scripting support.&lt;br /&gt;&lt;br /&gt;&lt;a href=&quot;http://www.blogger.com/blogger.g?blogID=5850186663859316637&quot; name=&quot;more&quot;&gt;&lt;/a&gt;&lt;/span&gt;&lt;/div&gt;
&lt;h3 style=&quot;margin: 0px; position: relative; text-align: justify;&quot;&gt;
&lt;span style=&quot;color: white; font-family: Century Gothic, Helvetica, sans-serif; font-size: small;&quot;&gt;Features&lt;/span&gt;&lt;/h3&gt;
&lt;ul style=&quot;line-height: 1.4; margin: 0.5em 0px; padding: 0px 2.5em;&quot;&gt;
&lt;li style=&quot;margin: 0px 0px 0.25em; padding: 0px; text-align: justify;&quot;&gt;&lt;span style=&quot;color: white; font-family: Century Gothic, Helvetica, sans-serif;&quot;&gt;&lt;strong&gt;Live HTTP Headers&lt;/strong&gt;&amp;nbsp;— built-in live headers with a dedicated cache per tab and support for preview extensions&lt;/span&gt;&lt;/li&gt;
&lt;li style=&quot;margin: 0px 0px 0.25em; padding: 0px; text-align: justify;&quot;&gt;&lt;span style=&quot;color: white; font-family: Century Gothic, Helvetica, sans-serif;&quot;&gt;&lt;strong&gt;Sandcat Console&lt;/strong&gt;&amp;nbsp;— an extensible command line console; Allows you to easily run custom commands and scripts in a loaded page&lt;/span&gt;&lt;/li&gt;
&lt;li style=&quot;margin: 0px 0px 0.25em; padding: 0px; text-align: justify;&quot;&gt;&lt;span style=&quot;color: white; font-family: Century Gothic, Helvetica, sans-serif;&quot;&gt;&lt;strong&gt;Resources&lt;/strong&gt;&amp;nbsp;tab — allows you to view the page resources, such as JavaScript files and other web files.&lt;/span&gt;&lt;/li&gt;
&lt;li style=&quot;margin: 0px 0px 0.25em; padding: 0px; text-align: justify;&quot;&gt;&lt;span style=&quot;color: white; font-family: Century Gothic, Helvetica, sans-serif;&quot;&gt;&lt;strong&gt;Page Menu&lt;/strong&gt;&amp;nbsp;extensions — allows you to view details about a page and more.&lt;/span&gt;&lt;/li&gt;
&lt;li style=&quot;margin: 0px 0px 0.25em; padding: 0px; text-align: justify;&quot;&gt;&lt;span style=&quot;color: white; font-family: Century Gothic, Helvetica, sans-serif;&quot;&gt;&lt;strong&gt;Pen-Tester Tools&lt;/strong&gt;&amp;nbsp;— Sandcat comes with a multitude of pen-test oriented extensions. This includes a Fuzzer, a Script Runner, HTTP &amp;amp; XHR Editors, Request Loader, Request Replay capabilities and&amp;nbsp;&lt;a href=&quot;http://www.syhunt.com/sandcat/index.php?n=AddOns.Extensions#pentestertools&quot; style=&quot;border: none; text-decoration: none;&quot;&gt;more&lt;/a&gt;.&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;color: white; font-family: Century Gothic, Helvetica, sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;h3 style=&quot;margin: 0px; position: relative; text-align: justify;&quot;&gt;
&lt;span style=&quot;color: white; font-family: Century Gothic, Helvetica, sans-serif; font-size: small;&quot;&gt;Pentesting tools&lt;/span&gt;&lt;/h3&gt;
&lt;ul style=&quot;line-height: 1.4; margin: 0.5em 0px; padding: 0px 2.5em;&quot;&gt;
&lt;li style=&quot;margin: 0px 0px 0.25em; padding: 0px; text-align: justify;&quot;&gt;&lt;strong&gt;&lt;span style=&quot;color: white; font-family: Century Gothic, Helvetica, sans-serif;&quot;&gt;Cookies and Cache Viewers&lt;/span&gt;&lt;/strong&gt;&lt;/li&gt;
&lt;li style=&quot;margin: 0px 0px 0.25em; padding: 0px; text-align: justify;&quot;&gt;&lt;span style=&quot;color: white; font-family: Century Gothic, Helvetica, sans-serif;&quot;&gt;&lt;strong&gt;JavaScript Executor&lt;/strong&gt;&amp;nbsp;extension — allows you to load and run external JavaScript files&lt;/span&gt;&lt;/li&gt;
&lt;li style=&quot;margin: 0px 0px 0.25em; padding: 0px; text-align: justify;&quot;&gt;&lt;span style=&quot;color: white; font-family: Century Gothic, Helvetica, sans-serif;&quot;&gt;&lt;strong&gt;Lua Executor&lt;/strong&gt;&amp;nbsp;extension — allows you to load and run external Lua scripts&lt;/span&gt;&lt;/li&gt;
&lt;li style=&quot;margin: 0px 0px 0.25em; padding: 0px; text-align: justify;&quot;&gt;&lt;span style=&quot;color: white; font-family: Century Gothic, Helvetica, sans-serif;&quot;&gt;&lt;strong&gt;Page Menu&lt;/strong&gt;&amp;nbsp;extensions — allows you to view the page headers, cookies, whois information and more&lt;/span&gt;&lt;/li&gt;
&lt;li style=&quot;margin: 0px 0px 0.25em; padding: 0px; text-align: justify;&quot;&gt;&lt;span style=&quot;color: white; font-family: Century Gothic, Helvetica, sans-serif;&quot;&gt;&lt;strong&gt;Request Editor&lt;/strong&gt;&amp;nbsp;extension with request loading capabilities&lt;/span&gt;&lt;/li&gt;
&lt;li style=&quot;margin: 0px 0px 0.25em; padding: 0px; text-align: justify;&quot;&gt;&lt;strong&gt;&lt;span style=&quot;color: white; font-family: Century Gothic, Helvetica, sans-serif;&quot;&gt;Request Editor (Low-Level version)&lt;/span&gt;&lt;/strong&gt;&lt;/li&gt;
&lt;li style=&quot;margin: 0px 0px 0.25em; padding: 0px; text-align: justify;&quot;&gt;&lt;span style=&quot;color: white; font-family: Century Gothic, Helvetica, sans-serif;&quot;&gt;&lt;strong&gt;Request Viewer&lt;/strong&gt;&amp;nbsp;— allows you to view details about a request or replay a request.&lt;/span&gt;&lt;/li&gt;
&lt;li style=&quot;margin: 0px 0px 0.25em; padding: 0px; text-align: justify;&quot;&gt;&lt;span style=&quot;color: white; font-family: Century Gothic, Helvetica, sans-serif;&quot;&gt;&lt;strong&gt;Ruby Console&lt;/strong&gt;&amp;nbsp;extension&lt;/span&gt;&lt;/li&gt;
&lt;li style=&quot;margin: 0px 0px 0.25em; padding: 0px;&quot;&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;color: white; font-family: Century Gothic, Helvetica, sans-serif;&quot;&gt;&lt;strong&gt;Sandcat Tasks&lt;/strong&gt;&amp;nbsp;(Extensions that run as isolated processes):&lt;/span&gt;&lt;/div&gt;
&lt;ul style=&quot;line-height: 1.4; margin: 0.5em 0px; padding: 0px 2.5em;&quot;&gt;
&lt;li style=&quot;margin: 0px 0px 0.25em; padding: 0px; text-align: justify;&quot;&gt;&lt;span style=&quot;color: white; font-family: Century Gothic, Helvetica, sans-serif;&quot;&gt;Fuzzer extensions with multiple modes and support for filters&lt;/span&gt;&lt;/li&gt;
&lt;li style=&quot;margin: 0px 0px 0.25em; padding: 0px; text-align: justify;&quot;&gt;&lt;span style=&quot;color: white; font-family: Century Gothic, Helvetica, sans-serif;&quot;&gt;CGI Scanner extension&lt;/span&gt;&lt;/li&gt;
&lt;li style=&quot;margin: 0px 0px 0.25em; padding: 0px; text-align: justify;&quot;&gt;&lt;span style=&quot;color: white; font-family: Century Gothic, Helvetica, sans-serif;&quot;&gt;HTTP Brute Force&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li style=&quot;margin: 0px 0px 0.25em; padding: 0px; text-align: justify;&quot;&gt;&lt;span style=&quot;color: white; font-family: Century Gothic, Helvetica, sans-serif;&quot;&gt;&lt;strong&gt;Script Runner&lt;/strong&gt;&amp;nbsp;extension — can execute scripts in a variety of languages&lt;/span&gt;&lt;/li&gt;
&lt;li style=&quot;margin: 0px 0px 0.25em; padding: 0px; text-align: justify;&quot;&gt;&lt;span style=&quot;color: white; font-family: Century Gothic, Helvetica, sans-serif;&quot;&gt;&lt;strong&gt;Tor Button&lt;/strong&gt;&amp;nbsp;extension — Anonymity for standard browsing&lt;/span&gt;&lt;/li&gt;
&lt;li style=&quot;margin: 0px 0px 0.25em; padding: 0px; text-align: justify;&quot;&gt;&lt;strong&gt;&lt;span style=&quot;color: white; font-family: Century Gothic, Helvetica, sans-serif;&quot;&gt;XHR Editor&lt;/span&gt;&lt;/strong&gt;&lt;/li&gt;
&lt;li style=&quot;margin: 0px 0px 0.25em; padding: 0px; text-align: justify;&quot;&gt;&lt;span style=&quot;color: white; font-family: Century Gothic, Helvetica, sans-serif;&quot;&gt;Various Encoders/Decoders, new Sandcat Console commands, security related search engine options, and more&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;strong&gt;&lt;span style=&quot;color: white; font-family: Century Gothic, Helvetica, sans-serif;&quot;&gt;Web application hacking is based on QuickInject&lt;/span&gt;&lt;/strong&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;color: white; font-family: Century Gothic, Helvetica, sans-serif;&quot;&gt;QuickInject is an extensive toolkit for manual web application security assessment. QuickInject allows to tailor injection requests that you can send or load using Sandcat, and can be used for performing a number of different operations, such as URL and POST Data Manipulation, Filter Evasion, as well as Referer and User-Agent Spoofing, and HTTP Header Manipulation. In addition to the capability to build requests, QuickInject can also be used to execute JavaScript in a loaded page. The first release of QuickInject is focused on File Inclusion, XSS and SQL Injection and comes with the following options:&lt;/span&gt;&lt;/div&gt;
&lt;ul style=&quot;line-height: 1.4; margin: 0.5em 0px; padding: 0px 2.5em;&quot;&gt;
&lt;li style=&quot;margin: 0px 0px 0.25em; padding: 0px;&quot;&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;color: white; font-family: Century Gothic, Helvetica, sans-serif;&quot;&gt;&lt;strong&gt;SQL Injection&lt;/strong&gt;&amp;nbsp;functions&lt;/span&gt;&lt;/div&gt;
&lt;ul style=&quot;line-height: 1.4; margin: 0.5em 0px; padding: 0px 2.5em;&quot;&gt;
&lt;li style=&quot;margin: 0px 0px 0.25em; padding: 0px; text-align: justify;&quot;&gt;&lt;span style=&quot;color: white; font-family: Century Gothic, Helvetica, sans-serif;&quot;&gt;&lt;strong&gt;Filter Evasion&lt;/strong&gt;&amp;nbsp;– Database-Specific String Escape (CHAR &amp;amp; CHR). Conversion of strings to quoted strings, conversion of spaces to comment tags or new lines&lt;/span&gt;&lt;/li&gt;
&lt;li style=&quot;margin: 0px 0px 0.25em; padding: 0px; text-align: justify;&quot;&gt;&lt;span style=&quot;color: white; font-family: Century Gothic, Helvetica, sans-serif;&quot;&gt;&lt;strong&gt;Filter Evasion (MySQL-Specific)&lt;/strong&gt;&amp;nbsp;– String Concatenation, Percent Obfuscation &amp;amp; Integer Representation (eg: ’26′ becomes ‘ceil(pi()*pi())*(!!!pi()+true)+ceil(@@version)’, a technique presented by Johannes Dahse).&lt;/span&gt;&lt;/li&gt;
&lt;li style=&quot;margin: 0px 0px 0.25em; padding: 0px; text-align: justify;&quot;&gt;&lt;strong&gt;&lt;span style=&quot;color: white; font-family: Century Gothic, Helvetica, sans-serif;&quot;&gt;UNION Statement Maker&lt;/span&gt;&lt;/strong&gt;&lt;/li&gt;
&lt;li style=&quot;margin: 0px 0px 0.25em; padding: 0px; text-align: justify;&quot;&gt;&lt;span style=&quot;color: white; font-family: Century Gothic, Helvetica, sans-serif;&quot;&gt;Quick insertion of common injections covering DB2, Informix, Ingres, MySQL, MSSQL, Oracle &amp;amp; PostgreSQL&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li style=&quot;margin: 0px 0px 0.25em; padding: 0px;&quot;&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;color: white; font-family: Century Gothic, Helvetica, sans-serif;&quot;&gt;&lt;strong&gt;File Inclusion&lt;/strong&gt;&amp;nbsp;functions&lt;/span&gt;&lt;/div&gt;
&lt;ul style=&quot;line-height: 1.4; margin: 0.5em 0px; padding: 0px 2.5em;&quot;&gt;
&lt;li style=&quot;margin: 0px 0px 0.25em; padding: 0px; text-align: justify;&quot;&gt;&lt;strong&gt;&lt;span style=&quot;color: white; font-family: Century Gothic, Helvetica, sans-serif;&quot;&gt;One-Click Log Poisoning&lt;/span&gt;&lt;/strong&gt;&lt;/li&gt;
&lt;li style=&quot;margin: 0px 0px 0.25em; padding: 0px; text-align: justify;&quot;&gt;&lt;span style=&quot;color: white; font-family: Century Gothic, Helvetica, sans-serif;&quot;&gt;Quick Shell Upload code generator&lt;/span&gt;&lt;/li&gt;
&lt;li style=&quot;margin: 0px 0px 0.25em; padding: 0px; text-align: justify;&quot;&gt;&lt;strong&gt;&lt;span style=&quot;color: white; font-family: Century Gothic, Helvetica, sans-serif;&quot;&gt;PHP String Escape (chr)&lt;/span&gt;&lt;/strong&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li style=&quot;margin: 0px 0px 0.25em; padding: 0px;&quot;&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;color: white; font-family: Century Gothic, Helvetica, sans-serif;&quot;&gt;&lt;strong&gt;Cross-Site Scripting (XSS)&lt;/strong&gt;&amp;nbsp;functions&lt;/span&gt;&lt;/div&gt;
&lt;ul style=&quot;line-height: 1.4; margin: 0.5em 0px; padding: 0px 2.5em;&quot;&gt;
&lt;li style=&quot;margin: 0px 0px 0.25em; padding: 0px; text-align: justify;&quot;&gt;&lt;span style=&quot;color: white; font-family: Century Gothic, Helvetica, sans-serif;&quot;&gt;&lt;strong&gt;Filter Evasion&lt;/strong&gt;&amp;nbsp;– JavaScript String Escape (String.fromCharCode), CSS Escape&lt;/span&gt;&lt;/li&gt;
&lt;li style=&quot;margin: 0px 0px 0.25em; padding: 0px; text-align: justify;&quot;&gt;&lt;span style=&quot;color: white; font-family: Century Gothic, Helvetica, sans-serif;&quot;&gt;Various handy alert statements for testing for XSS vulnerabilities.&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li style=&quot;margin: 0px 0px 0.25em; padding: 0px;&quot;&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;color: white; font-family: Century Gothic, Helvetica, sans-serif;&quot;&gt;&lt;strong&gt;Hash&lt;/strong&gt;&amp;nbsp;functions&lt;/span&gt;&lt;/div&gt;
&lt;ul style=&quot;line-height: 1.4; margin: 0.5em 0px; padding: 0px 2.5em;&quot;&gt;
&lt;li style=&quot;margin: 0px 0px 0.25em; padding: 0px; text-align: justify;&quot;&gt;&lt;span style=&quot;color: white; font-family: Century Gothic, Helvetica, sans-serif;&quot;&gt;&lt;strong&gt;MD5 Hash Crackers&lt;/strong&gt;&amp;nbsp;– Built-in (offline) and online MD5 hash crackers&lt;/span&gt;&lt;/li&gt;
&lt;li style=&quot;margin: 0px 0px 0.25em; padding: 0px; text-align: justify;&quot;&gt;&lt;span style=&quot;color: white; font-family: Century Gothic, Helvetica, sans-serif;&quot;&gt;&lt;strong&gt;Hash Generators&lt;/strong&gt;&amp;nbsp;– MD5, SHA-1, SHA-2 (224, 256, 384 &amp;amp; 512), GOST, HAVAL (various), MD2, MD4, RIPEMD (128, 160, 256 &amp;amp; 320), Salsa10, Salsa20, Snefru (128 &amp;amp; 256), Tiger (various) &amp;amp; WHIRLPOOL&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li style=&quot;margin: 0px 0px 0.25em; padding: 0px;&quot;&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;strong&gt;&lt;span style=&quot;color: white; font-family: Century Gothic, Helvetica, sans-serif;&quot;&gt;Encoders/Decoders&lt;/span&gt;&lt;/strong&gt;&lt;/div&gt;
&lt;ul style=&quot;line-height: 1.4; margin: 0.5em 0px; padding: 0px 2.5em;&quot;&gt;
&lt;li style=&quot;margin: 0px 0px 0.25em; padding: 0px; text-align: justify;&quot;&gt;&lt;strong&gt;&lt;span style=&quot;color: white; font-family: Century Gothic, Helvetica, sans-serif;&quot;&gt;URL Encoder/Decoder&lt;/span&gt;&lt;/strong&gt;&lt;/li&gt;
&lt;li style=&quot;margin: 0px 0px 0.25em; padding: 0px; text-align: justify;&quot;&gt;&lt;span style=&quot;color: white; font-family: Century Gothic, Helvetica, sans-serif;&quot;&gt;&lt;strong&gt;Hex Encoder/Decoder&lt;/strong&gt;&amp;nbsp;– Converts a string or integer to hexadecimal or vice-versa (multiple output formats supported).&lt;/span&gt;&lt;/li&gt;
&lt;li style=&quot;margin: 0px 0px 0.25em; padding: 0px; text-align: justify;&quot;&gt;&lt;strong&gt;&lt;span style=&quot;color: white; font-family: Century Gothic, Helvetica, sans-serif;&quot;&gt;Base64 Encoder/Decoder&lt;/span&gt;&lt;/strong&gt;&lt;/li&gt;
&lt;li style=&quot;margin: 0px 0px 0.25em; padding: 0px; text-align: justify;&quot;&gt;&lt;span style=&quot;color: white; font-family: Century Gothic, Helvetica, sans-serif;&quot;&gt;&lt;strong&gt;CharCode Converter&lt;/strong&gt;&amp;nbsp;– Converts a string to charcodes (eg: ‘abc’ becomes ’97,98,99′) or vice-versa.&lt;/span&gt;&lt;/li&gt;
&lt;li style=&quot;margin: 0px 0px 0.25em; padding: 0px; text-align: justify;&quot;&gt;&lt;span style=&quot;color: white; font-family: Century Gothic, Helvetica, sans-serif;&quot;&gt;&lt;strong&gt;IP Obfuscator&lt;/strong&gt;&amp;nbsp;– Converts an IP to dword, hex or octal.&lt;/span&gt;&lt;/li&gt;
&lt;li style=&quot;margin: 0px 0px 0.25em; padding: 0px; text-align: justify;&quot;&gt;&lt;span style=&quot;color: white; font-family: Century Gothic, Helvetica, sans-serif;&quot;&gt;&lt;strong&gt;JavaScript Encoders&lt;/strong&gt;&amp;nbsp;– Such as&amp;nbsp;&lt;a href=&quot;http://utf-8.jp/public/jjencode.html&quot; rel=&quot;nofollow&quot; style=&quot;border: none; text-decoration: none;&quot; target=&quot;_blank&quot;&gt;JJEncode&lt;/a&gt;&amp;nbsp;by Yosuke HASEGAWA&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li style=&quot;margin: 0px 0px 0.25em; padding: 0px;&quot;&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;color: white; font-family: Century Gothic, Helvetica, sans-serif;&quot;&gt;&lt;strong&gt;HTML&lt;/strong&gt;&amp;nbsp;functions&lt;/span&gt;&lt;/div&gt;
&lt;ul style=&quot;line-height: 1.4; margin: 0.5em 0px; padding: 0px 2.5em;&quot;&gt;
&lt;li style=&quot;margin: 0px 0px 0.25em; padding: 0px; text-align: justify;&quot;&gt;&lt;strong&gt;&lt;span style=&quot;color: white; font-family: Century Gothic, Helvetica, sans-serif;&quot;&gt;HTML Escape/Unescape&lt;/span&gt;&lt;/strong&gt;&lt;/li&gt;
&lt;li style=&quot;margin: 0px 0px 0.25em; padding: 0px; text-align: justify;&quot;&gt;&lt;span style=&quot;color: white; font-family: Century Gothic, Helvetica, sans-serif;&quot;&gt;&lt;strong&gt;HTML Entity Encoder/Decoder&lt;/strong&gt;&amp;nbsp;– Decimal and hexadecimal HTML entity encoders &amp;amp; decoders&lt;/span&gt;&lt;/li&gt;
&lt;li style=&quot;margin: 0px 0px 0.25em; padding: 0px; text-align: justify;&quot;&gt;&lt;strong&gt;&lt;span style=&quot;color: white; font-family: Century Gothic, Helvetica, sans-serif;&quot;&gt;JavaScript String Escape&lt;/span&gt;&lt;/strong&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li style=&quot;margin: 0px 0px 0.25em; padding: 0px; text-align: justify;&quot;&gt;&lt;span style=&quot;color: white; font-family: Century Gothic, Helvetica, sans-serif;&quot;&gt;&lt;strong&gt;Text Manipulation&lt;/strong&gt;&amp;nbsp;functions – Uppercase, Lowercase, Swap Case, Title Case, Reverse, Shuffle, Strip Slashes, Strip Spaces, Add Slashes, Char Separator&lt;/span&gt;&lt;/li&gt;
&lt;li style=&quot;margin: 0px 0px 0.25em; padding: 0px; text-align: justify;&quot;&gt;&lt;span style=&quot;color: white; font-family: Century Gothic, Helvetica, sans-serif;&quot;&gt;&lt;strong&gt;Time-Based Blind Injection&lt;/strong&gt;&amp;nbsp;code – Covering MySQL, MSSQL, Oracle, PostgreSQL, Server-Side JavaScript &amp;amp; MongoDB&lt;/span&gt;&lt;/li&gt;
&lt;li style=&quot;margin: 0px 0px 0.25em; padding: 0px; text-align: justify;&quot;&gt;&lt;span style=&quot;color: white; font-family: Century Gothic, Helvetica, sans-serif;&quot;&gt;&lt;strong&gt;CRC Calculators&lt;/strong&gt;&amp;nbsp;– CRC16, CRC32, CRC32b, and more.&lt;/span&gt;&lt;/li&gt;
&lt;li style=&quot;margin: 0px 0px 0.25em; padding: 0px; text-align: justify;&quot;&gt;&lt;span style=&quot;color: white; font-family: Century Gothic, Helvetica, sans-serif;&quot;&gt;&lt;strong&gt;Classical Ciphers&lt;/strong&gt;&amp;nbsp;– ROT13 &amp;amp; ROT[N]&lt;/span&gt;&lt;/li&gt;
&lt;li style=&quot;margin: 0px 0px 0.25em; padding: 0px; text-align: justify;&quot;&gt;&lt;span style=&quot;color: white; font-family: Century Gothic, Helvetica, sans-serif;&quot;&gt;&lt;strong&gt;Checksum Calculators&lt;/strong&gt;&amp;nbsp;– Adler-32 &amp;amp; Fletcher&lt;/span&gt;&lt;/li&gt;
&lt;li style=&quot;margin: 0px 0px 0.25em; padding: 0px; text-align: justify;&quot;&gt;&lt;strong&gt;&lt;span style=&quot;color: white; font-family: Century Gothic, Helvetica, sans-serif;&quot;&gt;Buffer Overflow String Creator&lt;/span&gt;&lt;/strong&gt;&lt;/li&gt;
&lt;li style=&quot;margin: 0px 0px 0.25em; padding: 0px; text-align: justify;&quot;&gt;&lt;span style=&quot;color: white; font-family: Century Gothic, Helvetica, sans-serif;&quot;&gt;&lt;strong&gt;Random String &amp;amp; Number Generation&lt;/strong&gt;&amp;nbsp;functions&lt;/span&gt;&lt;/li&gt;
&lt;li style=&quot;margin: 0px 0px 0.25em; padding: 0px; text-align: justify;&quot;&gt;&lt;strong&gt;&lt;span style=&quot;color: white; font-family: Century Gothic, Helvetica, sans-serif;&quot;&gt;URL Splitter&lt;/span&gt;&lt;/strong&gt;&lt;/li&gt;
&lt;li style=&quot;margin: 0px 0px 0.25em; padding: 0px; text-align: justify;&quot;&gt;&lt;span style=&quot;color: white; font-family: Century Gothic, Helvetica, sans-serif;&quot;&gt;&lt;strong&gt;Useful Strings&lt;/strong&gt;&amp;nbsp;– Math, character sets and more.&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;span style=&quot;color: white; font-family: Century Gothic, Helvetica, sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;br /&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;b style=&quot;border: none; text-decoration: none;&quot;&gt;&lt;a href=&quot;http://www.syhunt.com/sandcat/index.php?n=Download.Sandcat&quot; style=&quot;border: none; text-decoration: none;&quot; target=&quot;_blank&quot;&gt;&lt;span style=&quot;color: white; font-family: Century Gothic, Helvetica, sans-serif;&quot;&gt;Download Syhunt Sandcat Browser v4.1&lt;/span&gt;&lt;/a&gt;&lt;/b&gt;&lt;/div&gt;
&lt;div&gt;
&lt;b style=&quot;border: none; color: #094eb8; text-decoration: none;&quot;&gt;&lt;br /&gt;&lt;/b&gt;&lt;/div&gt;
&lt;div style=&quot;background-color: #f3f3f3; clear: both; color: #1b1b1b; font-family: Calibri; font-size: 16px;&quot;&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
</description><link>https://hax0rtools.blogspot.com/2013/10/syhunt-sandcat-browser-v41-penetration.html</link><author>noreply@blogger.com (Unknown)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiCKE8zUFmXgIPCAcj3p_IKdIR4abwI7aiZS0OBDZIuUoI4hRmyHolYaIh61LL9EPnckI6q7XV1e07__Yy7ryPzGWk2QfaqxChDDa8gN2cZbbuN8V7u7HSQOkw5xKyHAK1Z7J6DNF6TI-Q/s72-c/sandcat+fuzzer.png" height="72" width="72"/><thr:total>2</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-5850186663859316637.post-6176975032624777088</guid><pubDate>Fri, 18 Oct 2013 17:11:00 +0000</pubDate><atom:updated>2013-10-18T10:11:24.911-07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Hack tools</category><category domain="http://www.blogger.com/atom/ns#">Sql injection</category><title>Enema v.1.6 SQL Injection Tool Released</title><description>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; font-size: 13px; line-height: 18px; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhDH5aQwoURCA4H8wC3dOd98F1MrVYHspNHTx66H1JlMQwwY3bq_gnWjR93uZzYhCAB51Gr7TAYigV09gIGLfUGirg2sYdHB-aO8urkKwx6V29A_2Lnz2mqi8N3lixZtzv7FUIu9dPSl8o/s1600/main+screen.jpeg&quot; imageanchor=&quot;1&quot; style=&quot;clear: left; float: left; margin-bottom: 1em; margin-right: 1em; text-decoration: none;&quot;&gt;&lt;span style=&quot;color: white; font-family: Century Gothic, Helvetica, sans-serif;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;108&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhDH5aQwoURCA4H8wC3dOd98F1MrVYHspNHTx66H1JlMQwwY3bq_gnWjR93uZzYhCAB51Gr7TAYigV09gIGLfUGirg2sYdHB-aO8urkKwx6V29A_2Lnz2mqi8N3lixZtzv7FUIu9dPSl8o/s200/main+screen.jpeg&quot; style=&quot;-webkit-box-shadow: rgba(0, 0, 0, 0.2) 0px 0px 0px; border-bottom-left-radius: 0px; border-bottom-right-radius: 0px; border-top-left-radius: 0px; border-top-right-radius: 0px; border: 1px solid transparent; box-shadow: rgba(0, 0, 0, 0.2) 0px 0px 0px; padding: 8px; position: relative;&quot; width=&quot;200&quot; /&gt;&lt;/span&gt;&lt;/a&gt;&lt;/div&gt;
&lt;span style=&quot;color: white; font-family: Century Gothic, Helvetica, sans-serif;&quot;&gt;&lt;strong style=&quot;font-size: 13px; line-height: 18px;&quot;&gt;OpenSource tool for sql injection security testing&lt;/strong&gt;&lt;br style=&quot;font-size: 13px; line-height: 18px;&quot; /&gt;&lt;br style=&quot;font-size: 13px; line-height: 18px;&quot; /&gt;&lt;i style=&quot;font-size: 13px; line-height: 18px;&quot;&gt;SQLSentinel is an opensource tool that automates the process of finding the sql injection on a website. SQLSentinel includes a spider web and sql errors finder. You give in input a site and &amp;nbsp;&lt;/i&gt;&lt;br style=&quot;font-size: 13px; line-height: 18px;&quot; /&gt;&lt;br style=&quot;font-size: 13px; line-height: 18px;&quot; /&gt;&lt;br style=&quot;font-size: 13px; line-height: 18px;&quot; /&gt;&lt;i style=&quot;font-size: 13px; line-height: 18px;&quot;&gt;SQLSentinel crawls and try to exploit parameters validation error for you. When job is finished, it can generate a pdf report which contains the url vuln found and the url crawled.&lt;/i&gt;&lt;span style=&quot;font-size: 13px; line-height: 18px;&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;b style=&quot;font-size: 13px; line-height: 18px;&quot;&gt;&amp;nbsp;&lt;/b&gt;&lt;br style=&quot;font-size: 13px; line-height: 18px;&quot; /&gt;&lt;br style=&quot;font-size: 13px; line-height: 18px;&quot; /&gt;&lt;b style=&quot;font-size: 13px; line-height: 18px;&quot;&gt;Download:&lt;/b&gt;&lt;span style=&quot;font-size: 13px; line-height: 18px;&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;a href=&quot;http://sourceforge.net/projects/sqlsentinel/files/SQLSentinel%20v%200.1/&quot; style=&quot;font-size: 13px; line-height: 18px; text-decoration: none;&quot;&gt;Here&lt;/a&gt;&lt;/span&gt;&lt;/div&gt;
</description><link>https://hax0rtools.blogspot.com/2013/10/enema-v16-sql-injection-tool-released.html</link><author>noreply@blogger.com (Unknown)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhDH5aQwoURCA4H8wC3dOd98F1MrVYHspNHTx66H1JlMQwwY3bq_gnWjR93uZzYhCAB51Gr7TAYigV09gIGLfUGirg2sYdHB-aO8urkKwx6V29A_2Lnz2mqi8N3lixZtzv7FUIu9dPSl8o/s72-c/main+screen.jpeg" height="72" width="72"/><thr:total>1</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-5850186663859316637.post-5071149314060970310</guid><pubDate>Fri, 18 Oct 2013 17:08:00 +0000</pubDate><atom:updated>2013-10-18T10:08:29.739-07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Hack tools</category><category domain="http://www.blogger.com/atom/ns#">Sql injection</category><title>sqlcake v.1.1 Released</title><description>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; font-size: 13px; line-height: 18px; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiv-2hjJhD1vuGYZEnG49tbN2LvC1rc8N6e84M9nVLTMQdn1cXgja8qVLg_mqx9XMR22kN2gh2R0yNI9kOFtwXFVcL1yg3mtc6Sw3dQThra9clFT1meUlqj23kbi_Ud_zCOuipIlKIQIhM/s1600/sqlcake0.jpeg&quot; imageanchor=&quot;1&quot; style=&quot;clear: left; float: left; margin-bottom: 1em; margin-right: 1em; text-decoration: none;&quot;&gt;&lt;span style=&quot;color: white; font-family: Century Gothic, Helvetica, sans-serif;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;100&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiv-2hjJhD1vuGYZEnG49tbN2LvC1rc8N6e84M9nVLTMQdn1cXgja8qVLg_mqx9XMR22kN2gh2R0yNI9kOFtwXFVcL1yg3mtc6Sw3dQThra9clFT1meUlqj23kbi_Ud_zCOuipIlKIQIhM/s200/sqlcake0.jpeg&quot; style=&quot;-webkit-box-shadow: rgba(0, 0, 0, 0.2) 0px 0px 0px; border-bottom-left-radius: 0px; border-bottom-right-radius: 0px; border-top-left-radius: 0px; border-top-right-radius: 0px; border: 1px solid transparent; box-shadow: rgba(0, 0, 0, 0.2) 0px 0px 0px; padding: 8px; position: relative;&quot; width=&quot;200&quot; /&gt;&lt;b&gt;&lt;br /&gt;&lt;/b&gt;&lt;/span&gt;&lt;/a&gt;&lt;/div&gt;
&lt;span style=&quot;color: white; font-family: Century Gothic, Helvetica, sans-serif;&quot;&gt;&lt;b style=&quot;font-size: 13px; line-height: 18px;&quot;&gt;Automatic SQL injection and database information gathering tool.&lt;/b&gt;&lt;span style=&quot;font-size: 13px; line-height: 18px;&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;i style=&quot;font-size: 13px; line-height: 18px;&quot;&gt;&amp;nbsp;&lt;/i&gt;&lt;br style=&quot;font-size: 13px; line-height: 18px;&quot; /&gt;&lt;br style=&quot;font-size: 13px; line-height: 18px;&quot; /&gt;&lt;i style=&quot;font-size: 13px; line-height: 18px;&quot;&gt;Automatic dump database &amp;amp; interactive sql shell tool dumps the current database structure including tables and columns and turns into an interactive mysql prompt with extra features &amp;nbsp;&lt;/i&gt;&lt;br style=&quot;font-size: 13px; line-height: 18px;&quot; /&gt;&lt;br style=&quot;font-size: 13px; line-height: 18px;&quot; /&gt;&lt;i style=&quot;font-size: 13px; line-height: 18px;&quot;&gt;- sqlcake is an automatic SQL injection exploitation kit written in&amp;nbsp;&lt;a href=&quot;http://www.ruby-lang.org/&quot; style=&quot;text-decoration: none;&quot;&gt;Ruby&lt;/a&gt;. It&#39;s designed for system administration and penetration testing.&lt;br /&gt;- sqlcake offers a few useful functions to gather database information easily by sql injection usage.&lt;br /&gt;- sqlcake also allows you to bypass magic quotes, dump tables and columns and gives you the possibility to run an interactive MySQL shell.&lt;br /&gt;- sqlcake supports union stacked queries for real fast processing and blind injections with logarithmic techniques for saving time.&amp;nbsp;&lt;/i&gt;&lt;br style=&quot;font-size: 13px; line-height: 18px;&quot; /&gt;&lt;i style=&quot;font-size: 13px; line-height: 18px;&quot;&gt;&lt;br /&gt;&lt;/i&gt;&lt;br style=&quot;font-size: 13px; line-height: 18px;&quot; /&gt;&lt;b style=&quot;font-size: 13px; line-height: 18px;&quot;&gt;Download:&lt;/b&gt;&lt;span style=&quot;font-size: 13px; line-height: 18px;&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;a href=&quot;http://sourceforge.net/projects/sqlcake/files/&quot; style=&quot;font-size: 13px; line-height: 18px; text-decoration: none;&quot;&gt;Here&lt;/a&gt;&lt;/span&gt;&lt;/div&gt;
</description><link>https://hax0rtools.blogspot.com/2013/10/sqlcake-v11-released.html</link><author>noreply@blogger.com (Unknown)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiv-2hjJhD1vuGYZEnG49tbN2LvC1rc8N6e84M9nVLTMQdn1cXgja8qVLg_mqx9XMR22kN2gh2R0yNI9kOFtwXFVcL1yg3mtc6Sw3dQThra9clFT1meUlqj23kbi_Ud_zCOuipIlKIQIhM/s72-c/sqlcake0.jpeg" height="72" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-5850186663859316637.post-8685178364623626916</guid><pubDate>Fri, 18 Oct 2013 17:06:00 +0000</pubDate><atom:updated>2013-10-18T10:06:35.159-07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Hack tools</category><category domain="http://www.blogger.com/atom/ns#">Tutorials</category><title>[WFacebook] Facebook Password Cracker</title><description>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
&lt;span style=&quot;color: white; font-family: Century Gothic, Helvetica, sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; font-size: 16px; line-height: 22px; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgrNEKuYmUkaoyt9Mb-MxZVAXOsJlS3hlxRJto3r8tshLStrrhiVboV70-YA4MhIDqguUOVTmAXGg2OT3J_NRNHOCRhNW2NGbn75OXT9qFHCEAl__11ity4LZ4PPccQJrwk_9ggRjjp8V0/s1600/Facebook+Password+Cracker.png&quot; imageanchor=&quot;1&quot; style=&quot;border: none; margin-left: 1em; margin-right: 1em; text-decoration: none;&quot;&gt;&lt;span style=&quot;color: white; font-family: Century Gothic, Helvetica, sans-serif;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;245&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgrNEKuYmUkaoyt9Mb-MxZVAXOsJlS3hlxRJto3r8tshLStrrhiVboV70-YA4MhIDqguUOVTmAXGg2OT3J_NRNHOCRhNW2NGbn75OXT9qFHCEAl__11ity4LZ4PPccQJrwk_9ggRjjp8V0/s400/Facebook+Password+Cracker.png&quot; style=&quot;-webkit-transition: all 1s; border: none; padding: 5px; position: relative; transition: all 1s;&quot; width=&quot;400&quot; /&gt;&lt;/span&gt;&lt;/a&gt;&lt;/div&gt;
&lt;span style=&quot;color: white; font-family: Century Gothic, Helvetica, sans-serif;&quot;&gt;&lt;br style=&quot;font-size: 16px; line-height: 22px;&quot; /&gt;&lt;span style=&quot;font-size: 16px; line-height: 22px;&quot;&gt;Facebook Password Cracker.&lt;/span&gt;&lt;br style=&quot;font-size: 16px; line-height: 22px;&quot; /&gt;&lt;br style=&quot;font-size: 16px; line-height: 22px;&quot; /&gt;&lt;b style=&quot;font-size: 16px; line-height: 22px;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: medium;&quot;&gt;Video:&lt;/span&gt;&lt;/b&gt;&lt;span style=&quot;font-size: 16px; line-height: 22px;&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;a href=&quot;http://www.blogger.com/blogger.g?blogID=5850186663859316637&quot; name=&quot;more&quot; style=&quot;font-size: 16px; line-height: 22px;&quot;&gt;&lt;/a&gt;&lt;/span&gt;&lt;br /&gt;
&lt;center style=&quot;font-size: 16px; line-height: 22px;&quot;&gt;
&lt;span style=&quot;color: white; font-family: Century Gothic, Helvetica, sans-serif;&quot;&gt;&lt;iframe allowfullscreen=&quot;&quot; frameborder=&quot;0&quot; height=&quot;315&quot; src=&quot;http://www.youtube.com/embed/1RKjJYbFxMM?rel=0&quot; width=&quot;420&quot;&gt;&lt;/iframe&gt;&lt;/span&gt;&lt;/center&gt;
&lt;span style=&quot;color: white; font-family: Century Gothic, Helvetica, sans-serif;&quot;&gt;&lt;br style=&quot;font-size: 16px; line-height: 22px;&quot; /&gt;&lt;/span&gt;
&lt;br /&gt;
&lt;div style=&quot;font-size: 16px; line-height: 22px; text-align: center;&quot;&gt;
&lt;b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: large;&quot;&gt;&lt;a href=&quot;https://github.com/s1kr10s/WFacebook&quot; style=&quot;border: none; text-decoration: none;&quot; target=&quot;_blank&quot;&gt;&lt;span style=&quot;color: white; font-family: Century Gothic, Helvetica, sans-serif;&quot;&gt;Download&amp;nbsp;WFacebook&lt;/span&gt;&lt;/a&gt;&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;
&lt;/div&gt;
</description><link>https://hax0rtools.blogspot.com/2013/10/wfacebook-facebook-password-cracker.html</link><author>noreply@blogger.com (Unknown)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgrNEKuYmUkaoyt9Mb-MxZVAXOsJlS3hlxRJto3r8tshLStrrhiVboV70-YA4MhIDqguUOVTmAXGg2OT3J_NRNHOCRhNW2NGbn75OXT9qFHCEAl__11ity4LZ4PPccQJrwk_9ggRjjp8V0/s72-c/Facebook+Password+Cracker.png" height="72" width="72"/><thr:total>2</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-5850186663859316637.post-6529291576478047410</guid><pubDate>Fri, 18 Oct 2013 16:52:00 +0000</pubDate><atom:updated>2013-10-18T09:52:57.374-07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Hack tools</category><category domain="http://www.blogger.com/atom/ns#">Wireless</category><title>[WiFi Password Dump] Command-line Tool to Recover Wireless Passwords</title><description>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
&lt;div class=&quot;separator&quot; style=&quot;background-color: #f3f3f3; clear: both; color: #1b1b1b; font-family: Calibri; font-size: 16px; line-height: 22px; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg6zV_hAOybccAsTZAAZqKrjrLPoHjblqA4ob1z9FOhfbbXSc-NolN9cZZaUJdQEijyTRLzlv9gZ-9ar0mx07G3W5WYDVbIINmDiptN5peFT4ubJs7NCHLEbaJjT1YGhU4SrZ6VqdNBQuA/s1600/wifipassworddump.jpg&quot; imageanchor=&quot;1&quot; style=&quot;border: none; color: #0065ff; margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;283&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg6zV_hAOybccAsTZAAZqKrjrLPoHjblqA4ob1z9FOhfbbXSc-NolN9cZZaUJdQEijyTRLzlv9gZ-9ar0mx07G3W5WYDVbIINmDiptN5peFT4ubJs7NCHLEbaJjT1YGhU4SrZ6VqdNBQuA/s400/wifipassworddump.jpg&quot; style=&quot;-webkit-transition: all 1s; background-color: white; border-bottom-left-radius: 30%; border-bottom-right-radius: 0%; border-top-left-radius: 0%; border-top-right-radius: 30%; border: none; box-shadow: rgb(0, 0, 0) 0px 0px 15px; padding: 5px; position: relative; transition: all 1s;&quot; width=&quot;400&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;b style=&quot;background-color: #f3f3f3; color: #1b1b1b; font-family: Calibri; font-size: 16px; line-height: 22px;&quot;&gt;&lt;br /&gt;&lt;/b&gt;&lt;span style=&quot;background-color: #f3f3f3; color: #1b1b1b; font-family: Calibri; font-size: 16px; line-height: 22px;&quot;&gt;&lt;/span&gt;&lt;br /&gt;
&lt;div style=&quot;background-color: #f3f3f3; color: #1b1b1b; font-family: Calibri; font-size: 16px; line-height: 22px; text-align: justify;&quot;&gt;
&lt;strong&gt;WiFi Password Dump&lt;/strong&gt;&amp;nbsp;is the free command-line tool to quickly recover all the Wireless account passwords stored on your system.&lt;br /&gt;&lt;a href=&quot;&quot; name=&quot;more&quot;&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br style=&quot;background-color: #f3f3f3; color: #1b1b1b; font-family: Calibri; font-size: 16px; line-height: 22px;&quot; /&gt;
&lt;table cellpadding=&quot;&quot; cellspacing=&quot;0&quot; style=&quot;background-color: #f3f3f3; color: #1b1b1b; font-family: Calibri; font-size: 16px; line-height: 22px; width: 666px;&quot;&gt;&lt;tbody&gt;
&lt;tr&gt;&lt;td style=&quot;text-align: justify;&quot;&gt;It automatically recovers all type of Wireless Keys/Passwords (&lt;strong&gt;WEP/WPA/WPA2&lt;/strong&gt;&amp;nbsp;etc) stored by Windows Wireless Configuration Manager.&lt;br /&gt;&lt;br /&gt;For each recovered WiFi account, it displays following information&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td style=&quot;height: 8px;&quot;&gt;&lt;ul style=&quot;color: green; line-height: 28px; margin: 0.5em 0px; padding: 0px 2.5em;&quot;&gt;
&lt;li style=&quot;margin: 0px 0px 0.25em; padding: 0px; text-align: justify;&quot;&gt;WiFi Name (SSID)&lt;/li&gt;
&lt;li style=&quot;margin: 0px 0px 0.25em; padding: 0px; text-align: justify;&quot;&gt;Security Settings (WEP-64/WEP-128/WPA2/AES/TKIP)&lt;/li&gt;
&lt;li style=&quot;margin: 0px 0px 0.25em; padding: 0px; text-align: justify;&quot;&gt;Password Type&lt;/li&gt;
&lt;li style=&quot;margin: 0px 0px 0.25em; padding: 0px; text-align: justify;&quot;&gt;Password in Hex format&lt;/li&gt;
&lt;li style=&quot;margin: 0px 0px 0.25em; padding: 0px; text-align: justify;&quot;&gt;Password in clear text&lt;/li&gt;
&lt;/ul&gt;
&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td style=&quot;text-align: justify;&quot;&gt;Being&amp;nbsp;&lt;strong&gt;command-line&lt;/strong&gt;&amp;nbsp;tool makes it useful for penetration testers and forensic investigators. For GUI version check out the&amp;nbsp;&lt;a href=&quot;http://securityxploded.com/wifi-password-decryptor.php&quot; style=&quot;border: none; color: #094eb8; text-decoration: none;&quot;&gt;Wi-Fi Password Decryptor.&lt;/a&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;/tbody&gt;&lt;/table&gt;
&lt;/div&gt;
</description><link>https://hax0rtools.blogspot.com/2013/10/wifi-password-dump-command-line-tool-to.html</link><author>noreply@blogger.com (Unknown)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg6zV_hAOybccAsTZAAZqKrjrLPoHjblqA4ob1z9FOhfbbXSc-NolN9cZZaUJdQEijyTRLzlv9gZ-9ar0mx07G3W5WYDVbIINmDiptN5peFT4ubJs7NCHLEbaJjT1YGhU4SrZ6VqdNBQuA/s72-c/wifipassworddump.jpg" height="72" width="72"/><thr:total>1</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-5850186663859316637.post-7822159550318551375</guid><pubDate>Fri, 18 Oct 2013 16:50:00 +0000</pubDate><atom:updated>2013-10-18T09:50:33.497-07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">security</category><title>[SterJo NetStalker v.1.0] Security software able to detect all authorized and unauthorized connections</title><description>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
&lt;span style=&quot;color: white; font-family: Century Gothic, Helvetica, sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; font-size: 16px; line-height: 22px; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhmNv5knCuFguCtI56df9Wdchfn_pGQOT_x0fofsTif23pq5U-qw4Wmlo9igs1GGRd6v4F2QKMs5JJLl7f2khGcSZwpc2cJtcV0-YPOdVqMHc_4bAX3DPdoDvizqBxrmtWoVktvoYGthZo/s1600/scr_netstalker.png&quot; imageanchor=&quot;1&quot; style=&quot;border: none; margin-left: 1em; margin-right: 1em; text-decoration: none;&quot;&gt;&lt;span style=&quot;color: white; font-family: Century Gothic, Helvetica, sans-serif;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;293&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhmNv5knCuFguCtI56df9Wdchfn_pGQOT_x0fofsTif23pq5U-qw4Wmlo9igs1GGRd6v4F2QKMs5JJLl7f2khGcSZwpc2cJtcV0-YPOdVqMHc_4bAX3DPdoDvizqBxrmtWoVktvoYGthZo/s400/scr_netstalker.png&quot; style=&quot;-webkit-transition: all 1s; border: none; padding: 5px; position: relative; transition: all 1s;&quot; width=&quot;400&quot; /&gt;&lt;/span&gt;&lt;/a&gt;&lt;/div&gt;
&lt;span style=&quot;color: white; font-family: Century Gothic, Helvetica, sans-serif;&quot;&gt;&lt;br style=&quot;font-size: 16px; line-height: 22px;&quot; /&gt;&lt;/span&gt;
&lt;br /&gt;
&lt;div style=&quot;font-size: 16px; line-height: 22px; text-align: justify;&quot;&gt;
&lt;span style=&quot;color: white; font-family: Century Gothic, Helvetica, sans-serif;&quot;&gt;&lt;b&gt;SterJo NetStalker&lt;/b&gt;&amp;nbsp;is innovative and&amp;nbsp;&lt;b&gt;FREE&lt;/b&gt;&amp;nbsp;security software able to detect all authorized and unauthorized connections to your computer and send you alert for each new connection.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;font-size: 16px; line-height: 22px; text-align: justify;&quot;&gt;
&lt;/div&gt;
&lt;span style=&quot;color: white; font-family: Century Gothic, Helvetica, sans-serif;&quot;&gt;&lt;a href=&quot;http://www.blogger.com/blogger.g?blogID=5850186663859316637&quot; name=&quot;more&quot; style=&quot;font-size: 16px; line-height: 22px;&quot;&gt;&lt;/a&gt;&lt;br style=&quot;font-size: 16px; line-height: 22px;&quot; /&gt;&lt;/span&gt;
&lt;br /&gt;
&lt;div style=&quot;font-size: 16px; line-height: 22px; text-align: justify;&quot;&gt;
&lt;span style=&quot;color: white; font-family: Century Gothic, Helvetica, sans-serif;&quot;&gt;The software is based on similar principles as most firewalls work and also could create a custom security policies with an advantage to run it totally portable. It serves as an entry point into your computer and instantly informs you about all the processes able to establish a connection with an external network.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;font-size: 16px; line-height: 22px; text-align: justify;&quot;&gt;
&lt;span style=&quot;color: white; font-family: Century Gothic, Helvetica, sans-serif;&quot;&gt;If making an analysis of all open ports on your system with a standard port scanner would take a few minutes, with this program it would be done only in a few milliseconds. This is also quite powerful software for making analysis of all running processes on your system as well as those that look suspicious.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;font-size: 16px; line-height: 22px; text-align: justify;&quot;&gt;
&lt;span style=&quot;color: white; font-family: Century Gothic, Helvetica, sans-serif;&quot;&gt;The program offers an option to display details about all connections and closing individual connection or entire process.&lt;/span&gt;&lt;/div&gt;
&lt;span style=&quot;color: white; font-family: Century Gothic, Helvetica, sans-serif;&quot;&gt;&lt;br style=&quot;font-size: 16px; line-height: 22px;&quot; /&gt;&lt;/span&gt;
&lt;br /&gt;
&lt;div style=&quot;font-size: 16px; line-height: 22px; text-align: justify;&quot;&gt;
&lt;span style=&quot;color: white; font-family: Century Gothic, Helvetica, sans-serif;&quot;&gt;If you are one of those who want to know exactly where your connections are targeted then this program is the ideal solution for you.&lt;/span&gt;&lt;/div&gt;
&lt;span style=&quot;color: white; font-family: Century Gothic, Helvetica, sans-serif;&quot;&gt;&lt;br style=&quot;font-size: 16px; line-height: 22px;&quot; /&gt;&lt;/span&gt;
&lt;div style=&quot;font-size: 16px; line-height: 22px; text-align: center;&quot;&gt;
&lt;b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: large;&quot;&gt;&lt;a href=&quot;http://www.sterjosoft.com/netstalker.html&quot; style=&quot;border: none; text-decoration: none;&quot; target=&quot;_blank&quot;&gt;&lt;span style=&quot;color: white; font-family: Century Gothic, Helvetica, sans-serif;&quot;&gt;Download&amp;nbsp;SterJo NetStalker v.1.0&lt;/span&gt;&lt;/a&gt;&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;
&lt;/div&gt;
</description><link>https://hax0rtools.blogspot.com/2013/10/sterjo-netstalker-v10-security-software.html</link><author>noreply@blogger.com (Unknown)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhmNv5knCuFguCtI56df9Wdchfn_pGQOT_x0fofsTif23pq5U-qw4Wmlo9igs1GGRd6v4F2QKMs5JJLl7f2khGcSZwpc2cJtcV0-YPOdVqMHc_4bAX3DPdoDvizqBxrmtWoVktvoYGthZo/s72-c/scr_netstalker.png" height="72" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-5850186663859316637.post-3838354316818610513</guid><pubDate>Fri, 18 Oct 2013 16:35:00 +0000</pubDate><atom:updated>2013-10-18T09:36:47.747-07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Hack tools</category><category domain="http://www.blogger.com/atom/ns#">Tutorials</category><category domain="http://www.blogger.com/atom/ns#">XSS</category><title>[CookieCatcher] Session Hijacking Tool</title><description>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; font-size: 16px; line-height: 22px; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjtQ7Uatv8rt5OU2QEP1dKebvsVbwdz616eGQ3Hnmh18XQ5rDhzY8-pzWugKUj1S7mJQ4cIzZcNqnwtrtuemJivsaWX6ba-uB_EkW607zCtAhSsoI_aPoAf9So8dxkgmgGDM7JtJRR4RzA/s1600/CookieCatcher.bmp&quot; imageanchor=&quot;1&quot; style=&quot;border: none; margin-left: 1em; margin-right: 1em; text-decoration: none;&quot;&gt;&lt;span style=&quot;color: white; font-family: Century Gothic, Helvetica, sans-serif;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;227&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjtQ7Uatv8rt5OU2QEP1dKebvsVbwdz616eGQ3Hnmh18XQ5rDhzY8-pzWugKUj1S7mJQ4cIzZcNqnwtrtuemJivsaWX6ba-uB_EkW607zCtAhSsoI_aPoAf9So8dxkgmgGDM7JtJRR4RzA/s400/CookieCatcher.bmp&quot; style=&quot;-webkit-transition: all 1s; border: none; padding: 5px; position: relative; transition: all 1s;&quot; width=&quot;400&quot; /&gt;&lt;/span&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div style=&quot;font-size: 16px; line-height: 22px; text-align: justify;&quot;&gt;
&lt;span style=&quot;color: white; font-family: Century Gothic, Helvetica, sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;font-size: 16px; line-height: 22px; text-align: justify;&quot;&gt;
&lt;span style=&quot;color: white; font-family: Century Gothic, Helvetica, sans-serif;&quot;&gt;CookieCatcher is an open source application which was created to assist in the exploitation of XSS (Cross Site Scripting) vulnerabilities within web applications to steal user session IDs (aka Session Hijacking). The use of this application is purely educational and should not be used without proper permission from the target application.&lt;a href=&quot;http://www.blogger.com/blogger.g?blogID=5850186663859316637&quot; name=&quot;more&quot;&gt;&lt;/a&gt;&lt;/span&gt;&lt;/div&gt;
&lt;span style=&quot;color: white; font-family: Century Gothic, Helvetica, sans-serif;&quot;&gt;&lt;br style=&quot;font-size: 16px; line-height: 22px;&quot; /&gt;&lt;b style=&quot;font-size: 16px; line-height: 22px;&quot;&gt;Features&lt;/b&gt;&lt;b style=&quot;font-size: 16px; line-height: 22px;&quot;&gt;:&lt;/b&gt;&lt;br style=&quot;font-size: 16px; line-height: 22px;&quot; /&gt;&lt;span style=&quot;font-size: 16px; line-height: 22px;&quot;&gt;- Prebuilt payloads to steal cookie data&lt;/span&gt;&lt;br style=&quot;font-size: 16px; line-height: 22px;&quot; /&gt;&lt;span style=&quot;font-size: 16px; line-height: 22px;&quot;&gt;- Just copy and paste payload into a XSS vulnerability&lt;/span&gt;&lt;br style=&quot;font-size: 16px; line-height: 22px;&quot; /&gt;&lt;span style=&quot;font-size: 16px; line-height: 22px;&quot;&gt;- Will send email notification when new cookies are stolen&lt;/span&gt;&lt;br style=&quot;font-size: 16px; line-height: 22px;&quot; /&gt;&lt;span style=&quot;font-size: 16px; line-height: 22px;&quot;&gt;- Will attempt to refresh cookies every 3 minutes to avoid inactivity timeouts&lt;/span&gt;&lt;br style=&quot;font-size: 16px; line-height: 22px;&quot; /&gt;&lt;span style=&quot;font-size: 16px; line-height: 22px;&quot;&gt;- Provides full HTTP requests to hijack sessions through a proxy (BuRP, etc)&lt;/span&gt;&lt;br style=&quot;font-size: 16px; line-height: 22px;&quot; /&gt;&lt;span style=&quot;font-size: 16px; line-height: 22px;&quot;&gt;- Will attempt to load a preview when viewing the cookie data&lt;/span&gt;&lt;br style=&quot;font-size: 16px; line-height: 22px;&quot; /&gt;&lt;span style=&quot;font-size: 16px; line-height: 22px;&quot;&gt;- PAYLOADS&lt;/span&gt;&lt;br style=&quot;font-size: 16px; line-height: 22px;&quot; /&gt;&lt;span style=&quot;font-size: 16px; line-height: 22px;&quot;&gt;- Basic AJAX Attack&lt;/span&gt;&lt;br style=&quot;font-size: 16px; line-height: 22px;&quot; /&gt;&lt;span style=&quot;font-size: 16px; line-height: 22px;&quot;&gt;- HTTPONLY evasion for Apache CVE-20120053&lt;/span&gt;&lt;br style=&quot;font-size: 16px; line-height: 22px;&quot; /&gt;&lt;span style=&quot;font-size: 16px; line-height: 22px;&quot;&gt;- More to come&lt;/span&gt;&lt;br style=&quot;font-size: 16px; line-height: 22px;&quot; /&gt;&lt;br style=&quot;font-size: 16px; line-height: 22px;&quot; /&gt;&lt;strong style=&quot;font-size: 16px; line-height: 22px;&quot;&gt;Video Demo:&lt;/strong&gt;&lt;span style=&quot;font-size: 16px; line-height: 22px;&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;a href=&quot;http://www.youtube.com/watch?v=2GH6RRozOpY&quot; style=&quot;border: none; font-size: 16px; line-height: 22px; text-decoration: none;&quot;&gt;http://www.youtube.com/watch?v=2GH6RRozOpY&lt;/a&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;color: white; font-family: Century Gothic, Helvetica, sans-serif;&quot;&gt;&lt;br /&gt;
Download :&lt;a href=&quot;https://github.com/DisK0nn3cT/CookieCatcher&quot;&gt;https://github.com/DisK0nn3cT/CookieCatcher&lt;/a&gt;&lt;/span&gt;&lt;/div&gt;
</description><link>https://hax0rtools.blogspot.com/2013/10/cookiecatcher-is-open-source.html</link><author>noreply@blogger.com (Unknown)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjtQ7Uatv8rt5OU2QEP1dKebvsVbwdz616eGQ3Hnmh18XQ5rDhzY8-pzWugKUj1S7mJQ4cIzZcNqnwtrtuemJivsaWX6ba-uB_EkW607zCtAhSsoI_aPoAf9So8dxkgmgGDM7JtJRR4RzA/s72-c/CookieCatcher.bmp" height="72" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-5850186663859316637.post-7011659446655414270</guid><pubDate>Fri, 18 Oct 2013 16:29:00 +0000</pubDate><atom:updated>2013-10-18T09:29:54.558-07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Email Hacking</category><category domain="http://www.blogger.com/atom/ns#">Spam Tools</category><title>SpearPhisher – A Simple Phishing Email Generation Tool</title><description>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
&lt;span style=&quot;color: white; font-family: Century Gothic, Helvetica, sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; font-size: 13px; line-height: 18px; text-align: center;&quot;&gt;
&lt;em&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgIWDSpLFVYT6ElROBVxydVMP51cbpK6OF0BiXDO0cVvpoN-AQOMUeGUJgT4jlTSSoHcSQcl0vluL9dXdLVCfUchyphenhyphen3eD_AlzUAzDyqa0dGsTjmZSTb5Mb7Rzso2YPnPMvm1rDa3gH8N5g8/s1600/spearphiser1.png&quot; imageanchor=&quot;1&quot; style=&quot;clear: left; float: left; margin-bottom: 1em; margin-right: 1em; text-decoration: none;&quot;&gt;&lt;span style=&quot;color: white; font-family: Century Gothic, Helvetica, sans-serif;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;153&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgIWDSpLFVYT6ElROBVxydVMP51cbpK6OF0BiXDO0cVvpoN-AQOMUeGUJgT4jlTSSoHcSQcl0vluL9dXdLVCfUchyphenhyphen3eD_AlzUAzDyqa0dGsTjmZSTb5Mb7Rzso2YPnPMvm1rDa3gH8N5g8/s200/spearphiser1.png&quot; style=&quot;-webkit-box-shadow: rgba(0, 0, 0, 0.2) 0px 0px 0px; border-bottom-left-radius: 0px; border-bottom-right-radius: 0px; border-top-left-radius: 0px; border-top-right-radius: 0px; border: 1px solid transparent; box-shadow: rgba(0, 0, 0, 0.2) 0px 0px 0px; padding: 8px; position: relative;&quot; width=&quot;200&quot; /&gt;&lt;em&gt;&lt;br /&gt;&lt;/em&gt;&lt;/span&gt;&lt;/a&gt;&lt;/em&gt;&lt;/div&gt;
&lt;span style=&quot;color: white; font-family: Century Gothic, Helvetica, sans-serif;&quot;&gt;&lt;br style=&quot;font-size: 13px; line-height: 18px;&quot; /&gt;&lt;em style=&quot;font-size: 13px; line-height: 18px;&quot;&gt;SpearPhisher is a simple point and click Windows GUI tool designed for (mostly) non-technical people who would like to supplement the education and awareness aspect of their information security program. Not only is it useful to non-technical folks, penetration testers may find it handy for sending quick and easy ad-hoc phishing emails. The tool supports specifying different sending names and email addresses, multiple recipients via TO, CC, BCC, and allows bulk loading with one recipient email address per line in a file. It allows customization of the subject, adding one attachment, and SSL support for SMTP enabled mail servers. One of the popular features with our client is the WYSIWYG HTML editor that allows virtually anyone to use the tool; previewing results as you point and click edit your malicious email body. If you want to add custom XSS exploits, client side attacks, or other payloads such as a Java Applet code generated by the Social Engineer Toolkit (SET), its split screen editor allows more advanced users to edit HTML directly.&lt;/em&gt;&lt;br style=&quot;font-size: 13px; line-height: 18px;&quot; /&gt;Download : &lt;a href=&quot;https://www.trustedsec.com/files/SpearPhisherBETA.zip&quot;&gt;Here&lt;/a&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;color: white; font-family: Century Gothic, Helvetica, sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span style=&quot;color: white; font-family: Century Gothic, Helvetica, sans-serif;&quot;&gt;Official website : &lt;a href=&quot;https://www.trustedsec.com/september-2013/introducing-spearphisher-simple-phishing-email-generation-tool/&quot;&gt;Here&lt;/a&gt;&lt;/span&gt;&lt;/div&gt;
</description><link>https://hax0rtools.blogspot.com/2013/10/spearphisher-simple-phishing-email.html</link><author>noreply@blogger.com (Unknown)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgIWDSpLFVYT6ElROBVxydVMP51cbpK6OF0BiXDO0cVvpoN-AQOMUeGUJgT4jlTSSoHcSQcl0vluL9dXdLVCfUchyphenhyphen3eD_AlzUAzDyqa0dGsTjmZSTb5Mb7Rzso2YPnPMvm1rDa3gH8N5g8/s72-c/spearphiser1.png" height="72" width="72"/><thr:total>1</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-5850186663859316637.post-3886810459992095494</guid><pubDate>Fri, 18 Oct 2013 16:25:00 +0000</pubDate><atom:updated>2013-10-18T09:25:41.456-07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Hack tools</category><category domain="http://www.blogger.com/atom/ns#">Sql injection</category><category domain="http://www.blogger.com/atom/ns#">Tutorials</category><title>BBQSQL - Blind SQL Injection Exploitation Tool</title><description>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; font-size: 13px; line-height: 18px; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgNFGQreLlfiY0b_6tGyImSQyg1RTHKXV7AhyTxo7HcEeUmKsDWj_k21T8TNYw4_b2b3oYMTpZgHNs9HM8r_iiFhMxOBxLOKEiS7zbR26UGaDmOFgau2dLquVltNpqo0zBJyN0aJDPgnpU/s1600/111.jpg&quot; imageanchor=&quot;1&quot; style=&quot;clear: left; float: left; margin-bottom: 1em; margin-right: 1em; text-decoration: none;&quot;&gt;&lt;span style=&quot;color: white; font-family: Century Gothic, Helvetica, sans-serif;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;200&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgNFGQreLlfiY0b_6tGyImSQyg1RTHKXV7AhyTxo7HcEeUmKsDWj_k21T8TNYw4_b2b3oYMTpZgHNs9HM8r_iiFhMxOBxLOKEiS7zbR26UGaDmOFgau2dLquVltNpqo0zBJyN0aJDPgnpU/s200/111.jpg&quot; style=&quot;-webkit-box-shadow: rgba(0, 0, 0, 0.2) 0px 0px 0px; border-bottom-left-radius: 0px; border-bottom-right-radius: 0px; border-top-left-radius: 0px; border-top-right-radius: 0px; border: 1px solid transparent; box-shadow: rgba(0, 0, 0, 0.2) 0px 0px 0px; padding: 8px; position: relative;&quot; width=&quot;187&quot; /&gt;&lt;/span&gt;&lt;/a&gt;&lt;span style=&quot;color: white; font-family: Century Gothic, Helvetica, sans-serif;&quot;&gt;&amp;nbsp;&amp;nbsp;&lt;/span&gt;&lt;/div&gt;
&lt;span style=&quot;color: white; font-family: Century Gothic, Helvetica, sans-serif;&quot;&gt;&lt;i style=&quot;font-size: 13px; line-height: 18px;&quot;&gt;BBQSQL&amp;nbsp;is a SQL injection framework specifically designed to be hyper fast, database agnostic, easy to setup, and easy to modify. &amp;nbsp;The tool is extremely effective at exploiting a particular type of SQL injection flaw known as blind/semi-blind SQL injection. &amp;nbsp;When doing application security assessments we often uncover SQL vulnerabilities that are difficult to exploit.&amp;nbsp;&lt;/i&gt;&lt;br style=&quot;font-size: 13px; line-height: 18px;&quot; /&gt;&lt;br style=&quot;font-size: 13px; line-height: 18px;&quot; /&gt;&lt;i style=&quot;font-size: 13px; line-height: 18px;&quot;&gt;While current tools have an enormous amount of capability, when you can’t seem to get them to work you are out of luck. &amp;nbsp;We frequently end up writing custom scripts to help aid in the tricky data extraction, but a lot of time is invested in developing, testing and debugging these scripts. &amp;nbsp;&lt;/i&gt;&lt;br style=&quot;font-size: 13px; line-height: 18px;&quot; /&gt;&lt;i style=&quot;font-size: 13px; line-height: 18px;&quot;&gt;&lt;br /&gt;&lt;/i&gt;&lt;span style=&quot;font-size: 13px; line-height: 18px;&quot;&gt;&lt;/span&gt;&lt;i style=&quot;font-size: 13px; line-height: 18px;&quot;&gt;&lt;/i&gt;&lt;span style=&quot;font-size: 13px; line-height: 18px;&quot;&gt;&lt;/span&gt;&lt;i style=&quot;font-size: 13px; line-height: 18px;&quot;&gt;BBQSQL helps automate the process of exploiting tricky blind SQL injection. &amp;nbsp;We developed a very easy UI to help you setup all the requirements for your particular vulnerability and provide real time configuration checking to make sure your data looks right. &amp;nbsp;On top of being easy to use, it was designed using the event driven concurrency provided by Python’s gevent. &amp;nbsp;This allows BBQSQL to run much faster than existing single/multithreaded applications.&amp;nbsp;&lt;/i&gt;&lt;br style=&quot;font-size: 13px; line-height: 18px;&quot; /&gt;&lt;i style=&quot;font-size: 13px; line-height: 18px;&quot;&gt;&lt;br /&gt;&lt;/i&gt;&lt;span style=&quot;font-size: 13px; line-height: 18px;&quot;&gt;&lt;/span&gt;&lt;b style=&quot;font-size: 13px; line-height: 18px;&quot;&gt;Download:&lt;/b&gt;&lt;span style=&quot;font-size: 13px; line-height: 18px;&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;a href=&quot;https://github.com/neohapsis/bbqsql&quot;&gt;&lt;span style=&quot;font-size: x-small;&quot;&gt;&lt;span style=&quot;line-height: 18px;&quot;&gt;H&lt;/span&gt;&lt;/span&gt;ere&lt;/a&gt;&lt;span style=&quot;font-size: 13px; line-height: 18px;&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;i style=&quot;background-color: #141414; color: white; font-family: Century Gothic, Tahoma, Helvetica, FreeSans, sans-serif; font-size: 13px; line-height: 18px;&quot;&gt;&lt;br /&gt;&lt;/i&gt;&lt;/div&gt;
</description><link>https://hax0rtools.blogspot.com/2013/10/bbqsql-blind-sql-injection-exploitation.html</link><author>noreply@blogger.com (Unknown)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgNFGQreLlfiY0b_6tGyImSQyg1RTHKXV7AhyTxo7HcEeUmKsDWj_k21T8TNYw4_b2b3oYMTpZgHNs9HM8r_iiFhMxOBxLOKEiS7zbR26UGaDmOFgau2dLquVltNpqo0zBJyN0aJDPgnpU/s72-c/111.jpg" height="72" width="72"/><thr:total>1</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-5850186663859316637.post-3616338343316633863</guid><pubDate>Fri, 18 Oct 2013 16:21:00 +0000</pubDate><atom:updated>2013-10-18T09:21:38.453-07:00</atom:updated><title>DroidSQLi - MySQL Injection tool for Android</title><description>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
&lt;span style=&quot;color: white;&quot;&gt;&lt;em style=&quot;font-family: Century Gothic, Tahoma, Helvetica, FreeSans, sans-serif; font-size: 13px; line-height: 18px;&quot;&gt;DroidSQLi is the first automated MySQL Injection tool for Android. It allows you to test your MySQL-based web application against SQL injection attacks. &amp;nbsp;&lt;/em&gt;&lt;br style=&quot;font-family: Century Gothic, Tahoma, Helvetica, FreeSans, sans-serif; font-size: 13px; line-height: 18px;&quot; /&gt;&lt;em style=&quot;font-family: Century Gothic, Tahoma, Helvetica, FreeSans, sans-serif; font-size: 13px; line-height: 18px;&quot;&gt;&lt;br /&gt;&lt;/em&gt;&lt;span style=&quot;font-family: Century Gothic, Tahoma, Helvetica, FreeSans, sans-serif; font-size: 13px; line-height: 18px;&quot;&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; font-family: Century Gothic, Tahoma, Helvetica, FreeSans, sans-serif; font-size: 13px; line-height: 18px; text-align: center;&quot;&gt;
&lt;span style=&quot;color: white;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjagFuNV1S1fbSLp03EJdqmWdQNf0OBeMlBlLRnfnP_iFs0Y2UdMy2kZIKcAxNhXitK-luPWYKR1YyLpug4bbBUBOv30F3fD-IG2dX4E4pKHbLzZjr7G2zZlaHayw4ieKoY02Mm-zGS8NM/s1600/unnamed.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em; text-decoration: none;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;200&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjagFuNV1S1fbSLp03EJdqmWdQNf0OBeMlBlLRnfnP_iFs0Y2UdMy2kZIKcAxNhXitK-luPWYKR1YyLpug4bbBUBOv30F3fD-IG2dX4E4pKHbLzZjr7G2zZlaHayw4ieKoY02Mm-zGS8NM/s200/unnamed.jpg&quot; style=&quot;-webkit-box-shadow: rgba(0, 0, 0, 0.2) 0px 0px 0px; border-bottom-left-radius: 0px; border-bottom-right-radius: 0px; border-top-left-radius: 0px; border-top-right-radius: 0px; border: 1px solid transparent; box-shadow: rgba(0, 0, 0, 0.2) 0px 0px 0px; padding: 8px; position: relative;&quot; width=&quot;111&quot; /&gt;&lt;/a&gt;&lt;em&gt;&lt;br /&gt;&lt;/em&gt;&lt;/span&gt;&lt;/div&gt;
&lt;span style=&quot;color: white;&quot;&gt;&lt;br style=&quot;font-family: Century Gothic, Tahoma, Helvetica, FreeSans, sans-serif; font-size: 13px; line-height: 18px;&quot; /&gt;&lt;br style=&quot;font-family: Century Gothic, Tahoma, Helvetica, FreeSans, sans-serif; font-size: 13px; line-height: 18px;&quot; /&gt;&lt;strong style=&quot;font-family: Century Gothic, Tahoma, Helvetica, FreeSans, sans-serif; font-size: 13px; line-height: 18px;&quot;&gt;DroidSQLi supports the following injection techniques:&lt;/strong&gt;&lt;br style=&quot;font-family: Century Gothic, Tahoma, Helvetica, FreeSans, sans-serif; font-size: 13px; line-height: 18px;&quot; /&gt;&lt;span style=&quot;font-family: Century Gothic, Tahoma, Helvetica, FreeSans, sans-serif; font-size: 13px; line-height: 18px;&quot;&gt;- Time based injection&lt;/span&gt;&lt;br style=&quot;font-family: Century Gothic, Tahoma, Helvetica, FreeSans, sans-serif; font-size: 13px; line-height: 18px;&quot; /&gt;&lt;span style=&quot;font-family: Century Gothic, Tahoma, Helvetica, FreeSans, sans-serif; font-size: 13px; line-height: 18px;&quot;&gt;- Blind injection&lt;/span&gt;&lt;br style=&quot;font-family: Century Gothic, Tahoma, Helvetica, FreeSans, sans-serif; font-size: 13px; line-height: 18px;&quot; /&gt;&lt;span style=&quot;font-family: Century Gothic, Tahoma, Helvetica, FreeSans, sans-serif; font-size: 13px; line-height: 18px;&quot;&gt;- Error based injection&lt;/span&gt;&lt;br style=&quot;font-family: Century Gothic, Tahoma, Helvetica, FreeSans, sans-serif; font-size: 13px; line-height: 18px;&quot; /&gt;&lt;span style=&quot;font-family: Century Gothic, Tahoma, Helvetica, FreeSans, sans-serif; font-size: 13px; line-height: 18px;&quot;&gt;- Normal injection&lt;/span&gt;&lt;br style=&quot;font-family: Century Gothic, Tahoma, Helvetica, FreeSans, sans-serif; font-size: 13px; line-height: 18px;&quot; /&gt;&lt;br style=&quot;font-family: Century Gothic, Tahoma, Helvetica, FreeSans, sans-serif; font-size: 13px; line-height: 18px;&quot; /&gt;&lt;strong style=&quot;font-family: Century Gothic, Tahoma, Helvetica, FreeSans, sans-serif; font-size: 13px; line-height: 18px;&quot;&gt;Get it from&lt;/strong&gt;&lt;span style=&quot;font-family: Century Gothic, Tahoma, Helvetica, FreeSans, sans-serif; font-size: 13px; line-height: 18px;&quot;&gt;&amp;nbsp;&amp;nbsp;&lt;/span&gt;&lt;a href=&quot;https://play.google.com/store/apps/details?id=net.edgard.droidsqli&quot; style=&quot;font-family: Century Gothic, Tahoma, Helvetica, FreeSans, sans-serif; font-size: 13px; line-height: 18px; text-decoration: none;&quot;&gt;https://play.google.com/store/apps/details?id=net.edgard.droidsqli&lt;/a&gt;&lt;/span&gt;&lt;/div&gt;
</description><link>https://hax0rtools.blogspot.com/2013/10/droidsqli-mysql-injection-tool-for.html</link><author>noreply@blogger.com (Unknown)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjagFuNV1S1fbSLp03EJdqmWdQNf0OBeMlBlLRnfnP_iFs0Y2UdMy2kZIKcAxNhXitK-luPWYKR1YyLpug4bbBUBOv30F3fD-IG2dX4E4pKHbLzZjr7G2zZlaHayw4ieKoY02Mm-zGS8NM/s72-c/unnamed.jpg" height="72" width="72"/><thr:total>1</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-5850186663859316637.post-3006771570505193441</guid><pubDate>Fri, 18 Oct 2013 16:20:00 +0000</pubDate><atom:updated>2013-10-18T09:20:14.431-07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Hack tools</category><category domain="http://www.blogger.com/atom/ns#">Sql injection</category><title>jSQL Injection v0.3</title><description>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiqLTYTKp2lCnV65bKXvs9oTdv1gCOU193HQOe774BEAFAEMyrUmu_u0ukarkywT4_0YvC0UO0Hj9NV4zO3Pe8vpG_YrnIebAZMPONEOb0ezQtI1VqVZe_aIlWE7Tqo3fkNcyHZ5fReJbI/s1600/111.png&quot; imageanchor=&quot;1&quot; style=&quot;clear: left; float: left; font-size: 13px; line-height: 18px; margin-bottom: 1em; margin-right: 1em; text-decoration: none;&quot;&gt;&lt;span style=&quot;font-family: Century Gothic, Helvetica, sans-serif;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;150&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiqLTYTKp2lCnV65bKXvs9oTdv1gCOU193HQOe774BEAFAEMyrUmu_u0ukarkywT4_0YvC0UO0Hj9NV4zO3Pe8vpG_YrnIebAZMPONEOb0ezQtI1VqVZe_aIlWE7Tqo3fkNcyHZ5fReJbI/s200/111.png&quot; style=&quot;-webkit-box-shadow: rgba(0, 0, 0, 0.2) 0px 0px 0px; border-bottom-left-radius: 0px; border-bottom-right-radius: 0px; border-top-left-radius: 0px; border-top-right-radius: 0px; border: 1px solid transparent; box-shadow: rgba(0, 0, 0, 0.2) 0px 0px 0px; padding: 8px; position: relative;&quot; width=&quot;200&quot; /&gt;&lt;/span&gt;&lt;/a&gt;&lt;span style=&quot;font-family: Century Gothic, Helvetica, sans-serif;&quot;&gt;&lt;br style=&quot;color: white; font-size: 13px; line-height: 18px;&quot; /&gt;&lt;br style=&quot;color: white; font-size: 13px; line-height: 18px;&quot; /&gt;&lt;i style=&quot;color: white; font-size: 13px; line-height: 18px;&quot;&gt;&amp;nbsp;&lt;/i&gt;&lt;i style=&quot;color: white; font-size: 13px; line-height: 18px;&quot;&gt;jSQL Injection is a lightweight application used to find database information from a distant server.&amp;nbsp;&lt;/i&gt;&lt;br style=&quot;color: white; font-size: 13px; line-height: 18px;&quot; /&gt;&lt;i style=&quot;color: white; font-size: 13px; line-height: 18px;&quot;&gt;&lt;br /&gt;jSQL is free, open source and cross-platform (Windows, Linux, Mac OS X, Solaris).&amp;nbsp;&lt;/i&gt;&lt;br style=&quot;color: white; font-size: 13px; line-height: 18px;&quot; /&gt;&lt;br style=&quot;color: white; font-size: 13px; line-height: 18px;&quot; /&gt;&lt;br style=&quot;color: white; font-size: 13px; line-height: 18px;&quot; /&gt;&lt;br style=&quot;color: white; font-size: 13px; line-height: 18px;&quot; /&gt;&lt;br style=&quot;color: white; font-size: 13px; line-height: 18px;&quot; /&gt;&lt;b style=&quot;color: white; font-size: 13px; line-height: 18px;&quot;&gt;Features:&lt;/b&gt;&lt;span style=&quot;color: white; font-size: 13px; line-height: 18px;&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;ul style=&quot;color: white; font-size: 13px; line-height: 18px; list-style-image: initial; list-style-position: initial; margin: 0.5em 0px; padding: 0px 2.5em;&quot;&gt;
&lt;li style=&quot;border: none; margin: 0px 0px 0.25em; padding: 0.25em 0px;&quot;&gt;&lt;span style=&quot;font-family: Century Gothic, Helvetica, sans-serif;&quot;&gt;GET, POST, header, cookie methods&lt;/span&gt;&lt;/li&gt;
&lt;li style=&quot;border: none; margin: 0px 0px 0.25em; padding: 0.25em 0px;&quot;&gt;&lt;span style=&quot;font-family: Century Gothic, Helvetica, sans-serif;&quot;&gt;Normal, error based, blind, time based algorithms&lt;/span&gt;&lt;/li&gt;
&lt;li style=&quot;border: none; margin: 0px 0px 0.25em; padding: 0.25em 0px;&quot;&gt;&lt;span style=&quot;font-family: Century Gothic, Helvetica, sans-serif;&quot;&gt;Automatic best algorithm selection&lt;/span&gt;&lt;/li&gt;
&lt;li style=&quot;border: none; margin: 0px 0px 0.25em; padding: 0.25em 0px;&quot;&gt;&lt;span style=&quot;font-family: Century Gothic, Helvetica, sans-serif;&quot;&gt;Thread control (start/pause/resume/stop)&lt;/span&gt;&lt;/li&gt;
&lt;li style=&quot;border: none; margin: 0px 0px 0.25em; padding: 0.25em 0px;&quot;&gt;&lt;span style=&quot;font-family: Century Gothic, Helvetica, sans-serif;&quot;&gt;Expose URL calls&lt;/span&gt;&lt;/li&gt;
&lt;li style=&quot;border: none; margin: 0px 0px 0.25em; padding: 0.25em 0px;&quot;&gt;&lt;span style=&quot;font-family: Century Gothic, Helvetica, sans-serif;&quot;&gt;Simple evasion&lt;/span&gt;&lt;/li&gt;
&lt;li style=&quot;border: none; margin: 0px 0px 0.25em; padding: 0.25em 0px;&quot;&gt;&lt;span style=&quot;font-family: Century Gothic, Helvetica, sans-serif;&quot;&gt;Data retrieving progression bar&lt;/span&gt;&lt;/li&gt;
&lt;li style=&quot;border: none; margin: 0px 0px 0.25em; padding: 0.25em 0px;&quot;&gt;&lt;span style=&quot;font-family: Century Gothic, Helvetica, sans-serif;&quot;&gt;Proxy setting&lt;/span&gt;&lt;/li&gt;
&lt;li style=&quot;border: none; margin: 0px 0px 0.25em; padding: 0.25em 0px;&quot;&gt;&lt;span style=&quot;font-family: Century Gothic, Helvetica, sans-serif;&quot;&gt;Distant file reading&lt;/span&gt;&lt;/li&gt;
&lt;li style=&quot;border: none; margin: 0px 0px 0.25em; padding: 0.25em 0px;&quot;&gt;&lt;span style=&quot;font-family: Century Gothic, Helvetica, sans-serif;&quot;&gt;Webshell deposit&lt;/span&gt;&lt;/li&gt;
&lt;li style=&quot;border: none; margin: 0px 0px 0.25em; padding: 0.25em 0px;&quot;&gt;&lt;span style=&quot;font-family: Century Gothic, Helvetica, sans-serif;&quot;&gt;Terminal for webshell commands&lt;/span&gt;&lt;/li&gt;
&lt;li style=&quot;border: none; margin: 0px 0px 0.25em; padding: 0.25em 0px;&quot;&gt;&lt;span style=&quot;font-family: Century Gothic, Helvetica, sans-serif;&quot;&gt;Configuration backup&lt;/span&gt;&lt;/li&gt;
&lt;li style=&quot;border: none; margin: 0px 0px 0.25em; padding: 0.25em 0px;&quot;&gt;&lt;span style=&quot;font-family: Century Gothic, Helvetica, sans-serif;&quot;&gt;jSQL version checker&lt;/span&gt;&lt;/li&gt;
&lt;li style=&quot;border: none; margin: 0px 0px 0.25em; padding: 0.25em 0px;&quot;&gt;&lt;span style=&quot;font-family: Century Gothic, Helvetica, sans-serif;&quot;&gt;Supports MySQL&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;span style=&quot;font-family: Century Gothic, Helvetica, sans-serif;&quot;&gt;&lt;br style=&quot;color: white; font-size: 13px; line-height: 18px;&quot; /&gt;&lt;b style=&quot;color: white; font-size: 13px; line-height: 18px;&quot;&gt;Download:&amp;nbsp;&lt;a href=&quot;https://code.google.com/p/jsql-injection/downloads/list&quot; style=&quot;text-decoration: none;&quot;&gt;https://code.google.com&lt;/a&gt;&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;
</description><link>https://hax0rtools.blogspot.com/2013/10/jsql-injection-v03.html</link><author>noreply@blogger.com (Unknown)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiqLTYTKp2lCnV65bKXvs9oTdv1gCOU193HQOe774BEAFAEMyrUmu_u0ukarkywT4_0YvC0UO0Hj9NV4zO3Pe8vpG_YrnIebAZMPONEOb0ezQtI1VqVZe_aIlWE7Tqo3fkNcyHZ5fReJbI/s72-c/111.png" height="72" width="72"/><thr:total>0</thr:total></item></channel></rss>