background preloader

Useful sites

Facebook Twitter

Free hacking linux. Discover. Install. Save & Share. Google Code - Code Playground. LucyPhone.com - Never Wait on Hold Again. SearchBug. Top 15 Open Source/Free Security/Hacking Tools.

1.

Top 15 Open Source/Free Security/Hacking Tools

Nmap Nmap (“Network Mapper”) is a free and open source (license) utility for network discovery and security auditing. Nmap uses raw IP packets in novel ways to determine what hosts are available on the network, what services (application name and version) those hosts are offering, what operating systems (and OS versions) they are running, what type of packet filters/firewalls are in use, and dozens of other characteristics. Nmap homepage. 2. Wireshark is a network protocol analyzer. 3. Metasploit Community Edition simplifies network discovery and vulnerability verification for specific exploits, increasing the effectiveness of vulnerability scanners. 4.

Nikto is an Open Source (GPL) web server scanner which performs comprehensive tests against web servers for multiple items, including over 6400 potentially dangerous files/CGIs, checks for outdated versions of over 1200 servers, and version specific problems on over 270 servers. 5. 6. ettercap 7. 8. 9. 10. w3af 11. hping. Next Generation Hackers Portal. There’s a seemingly endless number of free open-source tools for penetration testing, and most of them seem to gravitate around the Kali Linux distribution.

Next Generation Hackers Portal

But with so many free tools, it’s easy to miss out on some of the best ones. So today we’re going to take a closer look at Armitage, define what it is, and define how it works. However, there’s a few things that you need to know before we start digging into the dirty details of how to use this tool. Naturally, I do have to give a brief warning before we get started, too. Hacking - Beginning txt. Know the Trade – Your IT Security Information Portal CISSP/CEH/CISA/Hacker and Penetration Testing Specialist. Google Hacking allintitle:Brains, Corp. camera.

Know the Trade – Your IT Security Information Portal CISSP/CEH/CISA/Hacker and Penetration Testing Specialist

Using Googles Full Capabilities. « XBOX, XBOX 360, PS2, PS3, PSP, & MORE! – Your source for the latest in console modding. Well most of you use Google to probably look up porn.

Using Googles Full Capabilities. « XBOX, XBOX 360, PS2, PS3, PSP, & MORE! – Your source for the latest in console modding.

Other just search stuff. And others use Google to hack. Using Google, and some finely crafted searches we can find a lot of interesting information. For Example we can find: Credit Card Numbers Passwords Software / MP3′s …… (and on and on and on) Presented below is just a sample of interesting searches that we can send to google to obtain info that some people might not want us having.. After you get a taste using some of these, try your own crafted searches to find info that you would be interested in. How to use Google for Hacking. Google serves almost 80 percent of all search queries on the Internet, proving itself as the most popular search engine.

How to use Google for Hacking.

However Google makes it possible to reach not only the publicly available information resources, but also gives access to some of the most confidential information that should never have been revealed. In this post I will show how to use Google for exploiting security vulnerabilities within websites. How to use Google for Hacking. Web World Wide » 50 Free Internet Tools for Tin-Foil Hat Wearers. If your wardrobe includes a shiny tin-foil hat, then you will love these free Ma Internet tools.

Web World Wide » 50 Free Internet Tools for Tin-Foil Hat Wearers

Whether you want to protect yourself from Internet snoopers, want to spy on those out to get you, or want to be able to track trends that you know will lead to something big, then these tools will help you get the job done. Facebook Timeline Hack Template (update) Russian Password Crackers: fastest, tested password recovery software. Main Page. How to easily delete your online accounts. Spring Financial is a finance company based in Canada.

how to easily delete your online accounts

The company was founded in 2014. Spring Financial is a subsidiary of Canada Drives, which is a leading auto financing company in Canada. The Chief Executive Officer is Michael Galpin. The Director is Cody Green. The Customer Relations Manager is Laura Marchand. Upon loan approval, the funds will go into a secure trust account. Canceling your loan is simple. Nirsoft. InterPals Penpals. Travel inspiration by price. Juxtapost - All your favorite things, side-by-side. The Internet is Beautiful - List of tools. Mobile HTML5 - compatibility tables for iPhone, Android, BlackBerry, Symbian, iPad and other mobile devices. FIPLAB - Amazing Mobile and Desktop Apps.

SiteSupport - Remote Desktop for Web Apps. ThinRDP for Remote Desktop Services. Five Best Remote Desktop Tools. Tools. GooSync - Google Synchronization. Spoon lets you run desktop apps anywhere with no installs. Where are you? Skweezer, Inc. : Innovating mobile web and mobile advertising so. Not Sharing My Info! - Permanent anonymous email address. Home page - Imei.info. PC Suite - 91 Softwares - PandaApp.com. CookieSwap. Onlyport. US Identify - People Search Database. 20Search.

Comprehensive list of Search Engines - The Search Engine List. Creepy! Track Michael Arrington, Or Anyone Else, Via Geolocation. Creepy is a free program for Windows and Linux that can be used to track Twitter and Flickr users.

Creepy! Track Michael Arrington, Or Anyone Else, Via Geolocation

Track how? Via the geolocation feature that both services make use of. All you need to do is to enter the Flickr or Twitter username in the application and wait until the first longitude and latitude information are retrieved. Add the time of posting plus integration of Google Maps, Virtual Maps and Open Street Maps and you have created a movement profile of that user.

The tweet and tweet url, or the image title and Flickr link are posted in a box at the bottom of the application for each individual hit. Want to know where Michael Arrington, Techcrunch founder was on January 23? Creepy can also search for usernames on Twitter or Flickr. The people tracker extracts the geolocation information from various sources.On Twitter,geolocation information added by mobile device tweets are used as well as IP address to location lookups if the web interface was used to write a message. Social Bookmarking Sharing Button Widget. >Share.

Social Bookmarking Sharing Button Widget

Wibki - Unlock the Web: A Homepage for your Bookmarks! About. Infinite Scroll in Greasemonkey – Autopagerize « Infinite Scroll. Recommended Gateway Sites for the Deep Web. Recommended Gateway Sites for the Deep Web And Specialized and Limited-Area Search Engines This portion of the Internet consists of information that requires interaction to display such as dynamically-created pages, real-time information and databases.

Recommended Gateway Sites for the Deep Web

Currently estimated to be over 100 times larger than the surface web, the Deep Web houses billions of documents in databases and other sources, over 95% of which are available to the public. Meet new people – KWICK! Community. Social Media Tools. Lycos Mail. Inbox. Download music, movies, games, software! The Pirate Bay - The galaxy's most resilient BitTorrent site. Kategorie:Download-Portal. IsoHunt › the BitTorrent & P2P search engine. Infogr.am. Reddit Metrics - Discover fastest growing reddits. Woobox - Sweepstakes, Coupons, and more for Facebook Pages & Twitter. MillionShort.

People Search tools - Find person's address, phone, email: white pages. Shadowserver. Shadowserver. The Coolest Sites on the Web. Random Website Machine. Searching. BackTrack Linux. Hacker Threads. Insecure. BrowsingHistoryView - View browsing history of your Web browsers. See Also MyLastSearch - View your latest searches with major search engines. NK2Edit - Edit, merge and fix the AutoComplete files (.NK2) of Microsoft Outlook. Description BrowsingHistoryView is a utility that reads the history data of 4 different Web browsers (Internet Explorer, Mozilla Firefox, Google Chrome, and Safari) and displays the browsing history of all these Web browsers in one table. The browsing history table includes the following information: Visited URL, Title, Visit Time, Visit Count, Web browser and User Profile. Versions History Version 2.17: You can now specify environment variables in the history files of the 'Load history from the specified history files' option.

System Requirements This utility works on any version of Windows, starting from Windows 2000, and up to Windows 10. AboveTopSecret forum: Interesting Websites, page 1. Check Usernames - Social Media Username Availability. Username Search - Search for any username or email address to find the identity amongst billions. Online Code Editor - Codeanywhere - Codeanywhere. Free programs to open any file extension! Search for people and get their online visibility score. AppExplorer - find the best iPhone apps. BigBoss.com. Midnight Research Labs - SEAT. SEAT aaron posted in on August 23rd, 2006. Free People Search. EntityCube. No. 1 free people search - Find anyone on the web. Real Time Search - Social Mention.

Addictomatic: Inhale the Web. SSL Labs - Projects / Public SSL Server Database - SSL Server Test. MyIPNeighbors Reverse IP Lookup. Free online network utilities - traceroute, nslookup, automatic whois lookup, ping, finger. Domain - reports and all about ips, networks and dns. Virtual Hacking Lab. Web Application exploits, php exploits, asp exploits.

Old Version Downloads - OldApps.com. OldVersion.com. Exploits Database. Smartsniff Password Sniffer. Related Links. Smartsniff Password Sniffer. Index of /branches/NIGHTLY/jd/plugins/decrypter/ Jdownloader database. ************Jackforum**************** INSERT INTO CONFIG VALUES('DLCCONFIG','aced0005737200116a6176612e7574696c2e486173684d61700507dac1c31660d103000246000a6c6f6164466163746f724900097468726573686f6c6478703f4000000000000c7708000000100000000078') INSERT INTO CONFIG VALUES('DLCrypt','aced0005737200116a6176612e7574696c2e486173684d61700507dac1c31660d103000246000a6c6f6164466163746f724900097468726573686f6c6478703f4000000000000c7708000000100000000078') INSERT INTO CONFIG VALUES('1gabba.com','aced0005737200116a6176612e7574696c2e486173684d61700507dac1c31660d103000246000a6c6f6164466163746f724900097468726573686f6c6478703f4000000000000c7708000000100000000078') INSERT INTO CONFIG VALUES('affg.biz','aced0005737200116a6176612e7574696c2e486173684d61700507dac1c31660d103000246000a6c6f6164466163746f724900097468726573686f6c6478703f4000000000000c7708000000100000000078')

Passwords - SkullSecurity. Password dictionaries These are dictionaries that come with tools/worms/etc, designed for cracking passwords. As far as I know, I'm not breaking any licensing agreements by mirroring them with credit; if you don't want me to host one of these files, let me know and I'll remove it. Leaked passwords Passwords that were leaked or stolen from sites. Packet Storm Word Lists. "Crack Me If You Can" - DEFCON 2011. Requested MD5 Hash queue.