background preloader

Just4Today.NET - Free Usenet

Just4Today.NET - Free Usenet
Related:  Hacking Tools / Downloads / Scripts & Codes

Surf Anonymous Free - Your Ultimate Free Online Protection [APP][BETA]USB Cleaver - USB Password Recovery Tool [APP][BETA]USB Cleaver - USB Password Recovery Tool Hi there! Those of you who are familiar with USB Haksaw or USB Switchblade then you probably know what this app is all about. For those who a not familiar GOTO Description just like the USB Switchblade you can select the payload you want to use to shorten the hack time. This program is very beta! and welcome as much feedback and I can get! : Description The goal of the USB Cleaver is to silently recover information from a target Windows 2000 or higher computer, including password hashes, LSA secrets, IP information, etc... beauty lies in the fact that the payload can run silently and without modifying the system or sending network traffic, making it near invisible. : Payloads : Disclaimer This program will hold no responsibility for your action. [DualBoot TF101] - [Wx86/Wx64] Tubuntu dual boot one click tool [USB Cleaver] [APP] [BETA] - Password recovery and foresics tool.

PortableApps.com - Portable software for USB, portable and cloud drives Proxy 4 Free - Public Proxy Servers, Anonymous Proxy, Proxy List - Protect Your Online Privacy! Panopticlick John the Ripper password cracker John the Ripper is free and Open Source software, distributed primarily in source code form. If you would rather use a commercial product tailored for your specific operating system, please consider John the Ripper Pro, which is distributed primarily in the form of "native" packages for the target operating systems and in general is meant to be easier to install and use while delivering optimal performance. This version integrates lots of contributed patches adding GPU support (OpenCL and CUDA), support for a hundred of additional hash and cipher types (including popular ones such as NTLM, raw MD5, etc., and even things such as encrypted OpenSSH private keys, ZIP and RAR archives, PDF files, etc.), as well as some optimizations and features. Unfortunately, its overall quality is lower than the official version's. Requires OpenSSL. There are unofficial binary builds (by John the Ripper user community members) for Windows, Linux, Solaris, and Mac OS X.

PET - CyberWiki Thanks for visiting the CIS PET wiki. This is meant to be a list of free technologies aimed at empowering Internet users to gain better control over their data. It's very simple to add an entry---just click the "edit" tab, copy and paste the previous entry, and substitute the name, description, and address. Abine - A Firefox / Internet Explorer plugin that blocks third party advertising networks, manages HTTP, DOM, and Flash cookies, and securely manages site logins. Currently in private beta, but invites aren't hard to get. Abine Privacy SuiteAd Blockers for Browsers - Firefox: Adblock Plus Chrome: AdBlock Safari: AdBlock Anon email services - Send anonymous email awxcnx.de Email drop drop.ioAnonymouse - A Web search portal hosted on an island off the coast of Somalia. There are also a variety of resources describing or otherwise devoted to privacy enhancing technology.

How to Hide Data in Image, Audio & Video Files: Steganography Ever wondered to know how to hide secret data in image, audio and video files? Well, in this post I will take you through a concept called steganography using which, it is possible to hide your secret information in image files, songs or any other file of your choice. At the end of this post, you can also download free stegnographic tools and start hiding your data. What is Steganography? Steganography is a means of obscuring data where secret messages are hidden inside computer files such as images, sound files, videos and even executable files so that, no one except the sender and the receiver will suspect the existence of stealth information in it. The main advantage of steganography over other methods such as cryptography is that, it will not arose suspicion even if the files fall in the hands of a third party. What are the Applications of Steganography? Steganography is mainly used to obscure confidential information/data during storage or transmission. How to Use Stego Magic?

Cryptocat Ophcrack Reverse IP Lookup - Find Other Web Sites Hosted on a Web Server Find other sites hosted on a web server by entering a domain or IP address above. Note: For those of you interested, as of May 2014, my database has grown to over 100 million domain names. I am now offering this domain list for purchase. A reverse IP domain check takes a domain name or IP address pointing to a web server and searches for other sites known to be hosted on that same web server. Data is gathered from search engine results, which are not guaranteed to be complete. Background All web sites are hosted on web servers, which are computers running specialized software that distribute web content as requested. As of 2003, more than 87% of all active domains names were found to share their IP addresses (i.e. their web servers) with one or more additional domains. While IP sharing is typically transparent to ordinary users, it may cause complications for both search engine optimization and web site filtering. Concerning SEO (search engine optimization) Concerning web site filtering

Related: