Extension Factory Builder

Showing posts with label Hacking tools. Show all posts
Showing posts with label Hacking tools. Show all posts

Saturday, 14 July 2012

Malware Statistics | Vulnerability Statistics Screensaver By Kaspersky Security Network Free Download


Kaspersky Security Network is an integral part of Kaspersky Lab technology. With its ‘cloud’ architecture KSN automatically detects and blocks unknown malware and infected/dangerous websites, filters spam, protects children from unwanted content and lots more. Our aim is for users to always have as full a picture as possible of the current threat landscape around the world. That’s why we have come up with the Irida screensaver. It displays statistics about the latest threats that have been detected and blocked using KSN and is updated every 12 hours.


Monday, 28 May 2012

Acunetix Web Vulnerability Scanner Free Download | Scan Your Webserver for vulnerabilities

Acunetix Web Vulnerability Scanner Free Download | Scan Your Webserver for vulnerabilities



Audit your website security with Acunetix Web Vulnerability Scanner
As many as 70% of web sites have vulnerabilities that could lead to the theft of sensitive corporate data such as credit card information and customer lists.
Hackers are concentrating their efforts on web-based applications – shopping carts, forms, login pages, dynamic content, etc. Accessible 24/7 from anywhere in the world, insecure web applications provide easy access to backend corporate databases and also allow hackers to perform illegal activities
using the attacked site. A victim’s website can be used to launch criminal activities such as hosting phishing sites or to transfer illicit content, while abusing the website’s bandwidth and making its owner liable for these unlawful acts.



Firewalls, SSL and locked-down servers are futile against web application hacking!
Web application attacks, launched on port 80/443, go straight through the firewall, past operating system and network level security, and right into the heart of your application and corporate data. Tailor-made web applications are often insufficiently tested, have undiscovered vulnerabilities and are therefore easy prey for hackers.


Find out if your web site is secure before hackers download sensitive data, commit a crime using your web site as a launch pad, and endanger your business. Acunetix Web Vulnerability Scanner crawls your web site, automatically analyzes your web applications and finds perilous SQL injection, Cross site scripting and other vulnerabilities that expose your on line business. Concise reports identify where web applications need to be fixed, thus enabling you to protect your business from impending hacker attacks!
Acunetix Web Vulnerability Scanner includes many innovative features:

  • An automatic Javascript analyzer allowing for security testing of Ajax and Web 2.0 applications
  • Industry’s most a dvanced and in-depth SQL injection and Cross site scripting testing
  • Visual macro recorder makes testing web forms and password protected areas easy
  • Extensive reporting facilities including VISA PCI compliance reports
  • Multi-threaded and lightning fast scanner crawls hundreds of thousands of pages with ease
  • Automate File Upload Forms vulnerability testing
  • Acunetix crawls and analyzes websites including flash content, SOAP and AJAX
  • Innovative AcuSensor Technology that allows accurate scanning for many vulnerabilities
  • Port scanning and network alerts against the web server for complex security checks
Acunetix WVS automatically checks for the following vulnerabilities among others:
  • Version Check
    • Vulnerable Web Servers
    • Vulnerable Web Server Technologies – such as “PHP 4.3.0 file disclosure and possible code execution.
  • Web Server Configuration Checks
    • Checks for Web Servers Problems – Determines if dangerous HTTP methods are enabled on the web server (e.g. PUT, TRACE, DELETE)
    • Verify Web Server Technologies
  • Parameter Manipulation
  • Cross-Site Scripting (XSS) – over 40 different XSS variations are tested.
  • SQL Injection
  • Code Execution
  • Directory Traversal
  • File Inclusion
  • Script Source Code Disclosure
  • CRLF Injection
  • Cross Frame Scripting (XFS)
  • PHP Code Injection
  • XPath Injection
  • Path Disclosure (Unix and Windows)
  • LDAP Injection
  • Cookie Manipulation
  • Arbitrary File creation (AcuSensor Technology)
  • Arbitrary File deletion (AcuSensor Technology)
  • Email Injection (AcuSensor Technology)
  • File Tampering (AcuSensor Technology)
  • URL redirection
  • Remote XSL inclusion
  • MultiRequest Parameter Manipulation
  • Blind SQL/XPath Injection
  • File Checks
  • Checks for Backup Files or Directories – Looks for common files (such as logs, application traces, CVS web repositories)
  • Cross Site Scripting in URI
  • Checks for Script Errors
  • File Uploads
  • Unrestricted File uploads Checks
  • Directory Checks
  • Looks for Common Files (such as logs, traces, CVS)
  • Discover Sensitive Files/Directories
  • Discovers Directories with Weak Permissions
  • Cross Site Scripting in Path and PHPSESSID Session Fixation.
  • Web Applications
  • HTTP Verb Tampering
  • Text Search
  • Directory Listings
  • Source Code Disclosure
  • Check for Common Files
  • Check for Email Addresses
  • Microsoft Office Possible Sensitive Information
  • Local Path Disclosure
  • Error Messages
  • Trojan shell scripts (such as popular PHP shell scripts like r57shell, c99shell etc)Weak Passwords
  • Weak HTTP Passwords
  • GHDB Google Hacking Database
  • Over 1200 GHDB Search Entries in the Database
  • Port Scanner and Network Alerts
  • Port scans the web server and obtains a list of open ports with banners
  • Performs complex network level vulnerability checks on open ports such as:

    • DNS Server vulnerabilities (Open zone transfer, Open recursion, cache poisoning)
    • FTP server checks (list of writable FTP directories, weak FTP passwords, anonymous access allowed)
    • Security and configuration checks for badly configured proxy servers
    • Checks for weak SNMP community strings and weak SSL cyphers
    • and many other network level vulnerability checks!
  • Other vulnerability tests may also be preformed using the manual tools provided, including:
  • Input Validation
  • Authentication attacks
  • Buffer overflows
  • Blind SQL injection
  • Sub domain scanning


Search Terms: web vulnerability scanner,website security scanner,acunetix,acunetix wvs,website vulnerability scanning,vulnerability scanner,acunetix web vulnerability scanner,security scanner,website application scanner,sql injection scanner,sql vulnerability scanner,free,download

Wednesday, 23 May 2012

Nmap 6 Released with 289 new scripts and IPV6 Support Free Download

Nmap 6 Released with 289 new scripts and IPV6 Support Free Download
After the release of Nmap 5.6 Test5  few months Before,Nmap Has came up With the new Version Of Nmap 6.0
Nmap has Released Nmap 6.0 with 289 new scripts..Nmap 6 includes a more powerful Nmap Scripting Engine, 289 new scripts, better web scanning, full IPv6 support, the Nping packet prober, faster scans, and much more.
Nmap is a  Free and  open source Tool for network discovery and security auditing. It is God of Information Gathering.every Information gathering technique can be executed using nmap.As Information gathering is a first step of hacking into some network,Hence a crucial Step and a Important software is Nmap 6.0.


New Features In Nmap 6.0


1. NSE Enhanced


2. Better Web Scanning
3. Full IPv6 Support
4. New Nping Tool
5. Better Zenmap GUI & results viewer
6. Faster scans

For More Details On Nmap Click Here

Download Nmap 6.0 Free
(Read all the content Carefully before downloading the tool,as Little Knowledge is very Dangerous)
Please Share This Post If You Like IT:-)
If Any Query Regarding Nmap,Please Comment:-)

Friday, 18 May 2012

Orion Browser Dumper v1.0 released Free Download | Dump Your browser History and clear all your trashes

Orion Browser Dumper v1.0 released Free Download | Dump Your browser History and clear all your trashes



Jean-Pierre LESUEUR (DarkCoderSc) releases another Browser Forensic tool for Community called "Orion Browser Dumper v1.0". 
This software is an advanced local browser history extractor (dumper), in less than few seconds (like for Browser Forensic Tool) it will extract the whole history content of most famous web browser, Actually Internet Explorer, Mozilla FireFox, Google Chrome, COMODO Dragon, Rockmelt and Opera.

You can download the tool from Official Website of DarkCommet.
Demonstration:


Last week he also release "Browser Forensic Tool v2.0" - Its is also an advanced local browser history search engine, in less than few seconds it will extract the chosen keywords of most famous web browser, actually Internet Explorer, Google Chrome, Mozilla FireFox, RockMelt, Comodo Dragon and Opera.

Thursday, 17 May 2012

How to Block websites like facebook and twitter ? 2 Easy ways To block websites

How to Block websites ? 2 Easiest ways To block websites
block websites
As I Think,You all wants to know that how to black websites in your computer,as parents wants to block illegal or porn sites,some elders want to block facebook and social networking sites,all type of persons wants to block websites in computer or laptop.
There are Two easiest ways,which i want to share with you all that how you can block any website in your computer,these techniques doesnt require any technical skills or programming skills,just follow the Steps written Below,and you can learn easily that how to block a website.


1. Using Host Files
 Host files are already made in windows,as they act as a secondary DNS server,as when we write any url in any url bar.then browser,first searches for the ip Address of the respective URL in windows itself,if it finds the ip with url,then it starts the procedure of connecting with that ip Address,but if it doesnt finds any record for that particular url,then it passes the request to ISP's DNS Server.so we manage to change the host file,so that when the particualr url is entered in browser's Url Bar,it will be redirected to some Ip address.
This is very easy method to block a website,u need to do just,follow the steps below :
1.first go to Windows Drive(mostly It is C Drive)
2.Then navigate to -> windows->system32->drivers->etc
3.in etc folder,open the File name 'hosts' and open in Notepad
it seems to be like in below picture
4.Now add a new entry in the bottom,let you want to block www.facebook.com.then add the line
127.0.0.1  www.facebook.com
This line means that when you try to open the www.facebook.com,then it is redirected to IP Adress 127.0.0.1,which is a back ip of the windows .
5.now save the file.and restart the computer.
6.to unblock it,remove the entry,which you have made.
You can also redirect to any other website,by specifying the Url Inspite of 127.0.0.1
Note:This method works for all browsers.

2.Using Website Block v3.16 software
Website Block v3.16 (Eng/Rus) |DemocraticHackers.in| 1.84 Mb

This utility allows you to block unwanted websites from display in Internet Explorer. If a website is blocked the user is forwarded to a blank page or to a "blocked page" and the contents of the original page are not loaded on your PC. Stop loading banners and ads, stop your kids from spending hours in chat rooms or remove undesired websites from their view. Prevent your children from having access to certain websites content such as adult sites and gambling.

Features
Free real time quotes Block websites of your choice.
Block porn sites Block porn, block adult content based on keywords in URL.
Blocked websites Use password protected mode so that other users can not change settings.
Block website Allows saving and opening blocked websites profiles.
Blocking website Includes password protected uninstall.
Block myspace, block facebook Easily block MySpace, block Facebook and other social networking sites.
Website block Reduce your internet traffic by blocking ads and banners.
Block by keywords Selectively block websites by keywords appearing in URL. Block porn sites, block adult websites by typing unwanted keywords that may be found in the full URL.


Please Share This post,if You like it :-)


Sunday, 13 May 2012

Keylogger Hacking | Hack Facebook Password | Hack Msn Hotmail | Hack Twitter | Hack Gmail,Yahoo,rediff Accounts Most working method

Keylogger Hacking | Hack Facebook Password | Hack Msn Hotmail | Hack Twitter | Hack Gmail,Yahoo,rediff Accounts Most working method

Hello friends today i will explain you how to hack the Facebook password or accounts remotely using keylogger. Its a 100% working hack and you can easily hack anyone’s Facebook account or password using this hack. In thistutorial i will explain you how to hack Facebook and other passwords of any user using 100% FUD keylogger. The keylogger in this tutorial we will discuss is L33ts keylogger adn its 100% FUD(fully undetectable).
Hacking Facebook account is very easy and just requires not more than 10 minutes of work. Don’t worry i will also tell you how to protect your facebook account or passwords from such hacks and hackers. But for this you must know how hackers hack your facebook account. So first i teach you how to hack facebook account remotely and then i will tell how to protect yourself from this.
Note:this method can be used to hack any online application.like facebook password hacking,gmail password hacking,credit card hacking,all bank accounts,as its once installed in victims computer,it will record all keystrokes,as keystrokes all secure inforrmation
NOTE: This tutorial is for Educational purposes only i.e. to make you aware how hackers hack your Facebook accounts. Please don’t misuse it. I am not responsible for any damage caused by you. 
So guys lets start hacking Facebook account or passwords….
Steps to hack Facebook account using Keylogger:
1. Creating the Keylogger Server to hack Facebook passwords.
2. Extracting the Icon from installer.
3. Bind the keylogger server with any software setup.
4. How to spread your keylogger or send it to your friends to hack their Facebook accounts or passwords.
Step 1. Creating the Keylogger Server
1. Download the keylogger.
2. Extract the file, Now you will get two folders:
a. First one contains Keylogger and Binder
b. Second Contains resource hacker tool.( to extract the icons from installers).
3. Now open the Keylogger. It contains two files one for gmail email and other for password. For this create one test account on Gmail and enter it’s details in this.
Hack facebook passwords
4. After entering email and password. Set the time interval usually set 3 mins i.e. after how much time you want to receive logs from the user.
5. Now click on send verification mail. This mail is to test that your keylogger is working correctly or not.
6. After you click this you will receive a confirmation mail on test account which will confirm that keylogger is working.
7. Now click on generate to set the mutex (any secret key to make your keylogger FUD) and then click on compile server.

8. Now save the file to desktop or any other location of your choice. Now your server is ready but it can be easily detected.
Step 2.: Extracting the Icon file from any installer(resource hacker)
1. Open the Resource hacker folder and open the reshacker file.
2. Now go to its menu and open any setup file. Suppose we want to attach our keylogger to Ccleaner setup file. So open the Ccleaner setup with resource hacker.
3. Now in menu there is one action button click on it and then click save all resources.
4. Now save all the resources to desktop or any other location of your choice.
5. It consists of two files one is icon file and other is res file . We only need icon file, so you can delete the other file i.e res file.
6. Now we have Icon of installer file(as discussed above Ccleaner setup Icon).
Step 3: Bind the Keylogger server with any software
1. Now Go to keylogger folder and open the Binder.
2. Now Click on + button given below to add files.
3. Now add the keylogger server and the set up of software (i.e. in our case it’s Ccleaner setup).
4. Now in menu of Binder, Go to Settings. There select the icon that we have generated in the previous step and set the location of output file as shown in figure.
5. Now again go to File’s menu in Binder and click on Bind files.
6. Now your Binded keylogger is ready. Now you have to spread it or send it to the victim that is your friend.
Step4 : How to Spread Keylogger or send it to victim or friend
1. Now you have one Software setup file with keylogger attached with it.(In our case we have Ccleaner setup with keylogger attached with it.
2. Now Spread your keylogger through forums. You might be a member of various forums use them to spread your keylogger in form of software posts. You can use various software’s to spread them that users frequently download.
3. Spread it through pendrives or USB hard drives. Suppose a friend asked you for a software give it the software that has keylogger attached with it.
Note: you can also attach keylogger with images also. But that can be detectable by antivirus. So avoid such type of hacking.

So isn’t that so easy to hack anyone’s Facebook account in just few minutes. 
How to protect yourself from these hacks?
Prevention is always better than cure so always follow these steps:
1. Don’t use cracked softwares and don’t download them from unauthorized websites.
2. Always keep your antivirus and anti-spyware up to date.
3. Always scan the files before transferring them to your USB.
4. Do not allow other users to use your PC i.e password protect it.

Thursday, 10 May 2012

ZIP Password Recovery 2.0.0 with Serial Free Download | Crack Any Password Protected Zip File

ZIP Password Recovery 2.0.0 with Serial Free Download | Crack Any Password Protected Zip File



Do you want to find your ZIP password back? Crack PDF ZIP Password Recovery can help you recover ZIP password in case you forgot or lost the passwords for your ZIP/WinZIP/PKZIP archives. This tool enables you to adopt three strategies to recover ZIP password: the customizable brute-force attack, the brute force attack with trying all combinations, and the dictionary-based attack. With the assistance of Crack PDF ZIP Password Recovery, you can easily get access to your password protected ZIP files again.

-Recovery your forgotten ZIP password in three different ways
-Brute Force Attack with User Defined Mask
-Brute Force Attack with Trying All Combinations

Feature List:
-Able to recover any password for any WinZip/ZIP/ PKZ /ZIP archive.
-Support self-Extracting Zip Files (SFX).
-Able to recover long passwords.
-Three methods are provided to recover ZIP passwords: the brute-force attack (trying all the -combinations), the brute-force attack and the dictionary attack.
-Support advanced 128-bit and 256-bit AES Encryption.
-Allow you to add dictionary files.
-If any part of the password is known, you can select options to minimize recovery time.
-Automatically save password recovering state and can resume after a moment of pause or a crash.
-Auto shutdown the computer after recover ZIP password.

Sunday, 6 May 2012

Browser Forensic Tool v2.0 -darkcodersc software Advanced browser history search engine

Browser Forensic Tool v2.0 -darkcodersc software Advanced browser history search engine




Browser Forensic Tool v2.0 , Developed by DarkCoderSc (Jean-Pierre LESUEUR) ,is an advanced local browser history search engine, in less than few seconds it will extract the chosen keywords of most famous web browser, actually Internet Explorer, Google Chrome, Mozilla FireFox, RockMelt, Comodo Dragon and Opera.


BFT will attempt to find the keyword(s) in the history title and search, if the keyword is present or suspected to be, it will be display in the result list with his URL and Title. The software also give you the possibility to edit the default keywords and of course add / modify your own keywords, to separate keywords subject you can create your own keywords categories and only scan for some keywords in the chosen category .




The program is fully asynchronous so it won't affect your work during the scan time nor it will block the customization of keywords and keylist and can be canceled at anytime.


Wednesday, 2 May 2012

Best browser for hackers with built in features for hackers-OWASP Mantra Browser Security Framework for penetration testers

Best browser for hackers with built in features for hackers- OWASP Mantra Browser Security Framework for penetration testers 





Mantra Browser is a most Recomended Browser for hackers and penetration Testers.it includes security framework which can be very useful to scan various web servers or websites for different attacks like sql injection and XSS attacks.

OWASP Mantra is such an innovative product, a security framework built on top of a browser. Its cross platform, portable and can run out of the box.You can take it with you where ever you go in absolutely any rewritable media including memory cards, flash drives and portable hard disks. More over, Mantra Browser can be used for both offensive security and defensive security related tasks which makes it incredible.
Mantra browser Developed on the firefox which is open source software by mozilla with a security framework.Developers Of mantra security toolkit Also Providing various Tools or addons which can be installed directly in the mantra browser.These Tools can help hackers or penetration testers to undego some work.
Mantra Browser Is Available For different Platforms -windows,linux32,linux64,macintosh.




Tools or Addons Available For Mantra Browser
 OWASP Mantra is a powerful set of tools to make the attacker's task easier. The beta version of Mantra Security Toolkit contains following tools built onto it. Moreover Mantra follows the guidelines and structure of FireCAT which makes it even more accessible. You can also always suggest any tools/ scripts that you would like see in the next release


1. Information Gathering Tools
2.Editors
3.Network Utilities
4.Application Auditing
5.Proxy-Anonymity
6.Miscellanous 


 For More Information :http://www.getmantra.com



Advance Rar Password Recovery with Serial Free Download | Crack Any Rar Passwords Protected File cracked

Advance Rar Password Recovery Free Download with serial | Crack Any Rar Passwords Protected File




This program recovers forgotten passwords for RAR archives. Recovery runs in the background and resumes on the next system start-up. When you have completely forgotten a password, Advanced RAR Password Recovery will run a brute-force attack that applies all possible combinations one by one. In such a case, you can set the minimum and maximum number of characters and the character sets you used (letters, numbers, and non-English characters). If you recall part of the password, you can restrict the search area with a mask such as m***l. If you have used a meaningful word for your password, the dictionary attack helps. You can plug in external dictionaries and check all possible lowercase and uppercase combinations. To decrease recovery time, the program optimizes its code for each type of processor. The trial version limits recovery to three-letter combinations, which doesn't give you the opportunity to fully evaluate performance. If you've forgotten the password for an important archived document, however, Advanced RAR Password Recovery may save you.

Download Advance Password Recovery 



Download It and register with serial :
Serial1:ARPR-83296730531875-CBBVYBXFEXDEVPMB
Serial2:ARPR-83296730531875-CBBVYBXFEXDEVPMB

Saturday, 28 April 2012

WebSploit Toolkit 1.6 Released For Scanning Remote Systems Free Download

WebSploit Toolkit 1.6 Released For Scanning Remote Systems Free Download



WebSploit Is An Open Source Project For Scan And Analysis Remote System From Vulnerability

Description :
[+]Autopwn - Used From Metasploit For Scan and Exploit Target Service
[+]wmap - Scan,Crawler Target Used From Metasploit wmap plugin
[+]format infector - inject reverse & bind payload into file format
[+]phpmyadmin - Search Target phpmyadmin login page
[+]lfi - Scan,Bypass local file inclusion Vulnerability & can be bypass some WAF
[+]apache users - search server username directory (if use from apache webserver)
[+]Dir Bruter - brute target directory with wordlist
[+]admin finder - search admin & login page of target
[+]MLITM Attack - Man Left In The Middle, XSS Phishing Attacks
[+]MITM - Man In The Middle Attack
[+]Java Applet Attack - Java Signed Applet Attack
[+]MFOD Attack Vector - Middle Finger Of Doom Attack Vector
[+]USB Infection Attack - Create Executable Backdoor For Infect USB For Windows

Related Posts Plugin for WordPress, Blogger...
 
Submitdomainname.com Link Exchange with Democratic Hackers | Learn Ethical Hacking