Wireless Hacking: These are tools that help you hack into
wireless networks. Wireless hacking tools though useful, do not make you
a complete hacker. In order to achieve that, you must learn the
different ways in which a secure network can be accessed. Also, you
should work on making your own network as secure as possible.
1. Aircrack-ng : http://www.tenable.com/products/nessus 2. Kismet : http://www.kismetwireless.net 3. inSSIDer : http://www.metageek.net/products/inssider/ 4. KisMAC : http://kismac-ng.org/
Intrusion Detection Systems:
Intrusion detection tools are one of the most important part of any
security arrangement. They allow you to detect those threats that are
potentially dangerous for your system.
1. Snort : http://www.snort.org 2. NetCop : http://sourceforge.net/projects/netcop/ Port Scanners 1. Nmap : http://nmap.org/ 2. Superscan : http://www.mcafee.com/cf/downloads/f...uperscan3.aspx 3. Angry IP Scanner : http://angryip.org/w/Download
Encryption Tools: In an age
where more and more governments are being found spying on their own
citizens, encryption is the word of the day. These tools allow you to
encrypt your data so that even if someone does get through, they can’t
get to the data easily.
1. TrueCrypt : http://www.truecrypt.org/ 2. OpenSSH : http://www.openssh.org/ 3. Putty : http://www.putty.org 4. OpenSSL : http://www.openssl.org/ 5. Tor : https://www.torproject.org 6. OpenVPN : http://openvpn.net/ 7. Stunnel : https://www.stunnel.org/index.html 8. KeePass : http://keepass.info/
Password Crackers: The name is
pretty self explanatory in this case. These tools help you recover
passwords from the data that a computer system is storing or
transmitting over a network.
1. Ophcrack : http://ophcrack.sourceforge.net/ 2. Medusa :http://foofus.net/goons/jmk/medusa/medusa.html 3. RainbowCrack : http://project-rainbowcrack.com/ 4. Wfuzz : http://www.edge-security.com/wfuzz.php 5. Brutus : http://www.hoobie.net/brutus/ 6. L0phtCrack : http://www.l0phtcrack.com/ 7. fgdump : http://foofus.net/goons/fizzgig/fgdump/ 8. THC Hydra : https://www.thc.org/thc-hydra/ 9. John The Ripper : http://www.openwall.com/john/ 10. Aircrack - Aircrack is 802.11 WEP and WPA-PSK keys cracking program. : http://www.aircrack-ng.org/ 11. Cain and Abel : http://www.oxid.it/cain.html
Packet Crafting: Packet
crafting is the technique through which an attacker finds
vulnerabilities or entry points within your firewall. These tools help
you achieve that more easily.
1. Hping : http://www.hping.org/ 2. Scapy : http://www.secdev.org/projects/scapy/ 3. Netcat : http://nc110.sourceforge.net/ 4. Yersinia : http://www.yersinia.net/ 5. Nemesis : http://nemesis.sourceforge.net/ 6. Socat : http://www.dest-unreach.org/socat/doc/socat.html
Traffic Monitoring: These are tools that let you monitor what websites your employees or children are monitoring.
1. Splunk : http://www.splunk.com/ 2. Nagios : http://www.nagios.org/ 3. P0f : http://www.pof.com/ 4. Ngrep : http://ngrep.sourceforge.net/
Packet Sniffers: These are tools that can allow you to capture and visualise the traffic that is coming on your website.
1. Wireshark : http://www.wireshark.org/ 2. Tcpdump : http://www.tcpdump.org/ 3. Ettercap : http://ettercap.github.io/ettercap/ 4. dsniff : http://www.monkey.org/~dugsong/dsniff/ 5. EtherApe : http://etherape.sourceforge.net/
Vulnerability Exploitation: These are the tools that you would use in order to gain access to various places.
1. Metasploit : http://www.metasploit.com/ 2. sqlmap : http://sqlmap.org/ 3. sqlninja : http://sqlninja.sourceforge.net/ 4. Social Engineer Toolkit : https://www.trustedsec.com/downloads...ineer-toolkit/ 5. NetSparker : https://www.mavitunasecurity.com/netsparker/ 6. BeEF : http://beefproject.com/ 7. Dradis : http://dradisframework.org/
Vulnerability Scanners: These
are programs that have been designed to asses a computer or network’s
vulnerability to attacks. The functionality of these tools varies from
one to the other, but they all present a detailed analysis of how
vulnerable your system is.
1. Nessus : http://www.tenable.com/products/nessus 2. OpenVAS : http://www.openvas.org/ 3. Nipper : http://sourceforge.net/projects/nipper/ 4. Secunia PSI : http://secunia.com/products/consumer/psi/sys_req/ 5. Retina : http://www.beyondtrust.com/Products/...curityScanner/ 6. QualysGuard : http://www.qualys.com/enterprises/qualysguard/ 7. Nexpose : http://www.rapid7.com/products/nexpo...-downloads.jsp
Web Vulnerability Scanners:
While vulnerability scanners are meant for your system, web
vulnerability scanners assess the vulnerability of web applications. The
identify the security vulnerabilities that your app may have through
various tests.
1. Burp Suite : http://www.portswigger.net/burp/ 2. WebScarab : https://www.owasp.org/index.php/Cate...Scarab_Project 3. Websecurify : http://www.websecurify.com/ 4. Nikto : http://www.cirt.net/nikto2 5. w3af : http://w3af.org/
Web Proxies: Proxies were
originally created in order to add encapsulation to distributed systems.
The client contacts a proxy server in order to request an item that
exists on your server.
1. Paros : http://sourceforge.net/projects/paros/ 2. Fiddler : http://sourceforge.net/projects/paros/ 3. Ratproxy : https://code.google.com/p/ratproxy/ 4. sslstrip : http://www.thoughtcrime.org/software/sslstrip/
Rootkit Detectors: This tool is
a file and directory integrity checker. It verifies if a file is
trustworthy and informs the user if found otherwise.
1. AIDE (Advanced Intrusion Detection Environment) : http://aide.sourceforge.net/
Firewalls: You obviously know
what a Firewall is. These monitor and control the traffic in your
network, whether incoming or outgoing. They are essential security tools
that are used by the most novice to the most advanced users.
1. Netfilter : http://www.netfilter.org/ 2. PF: OpenBSD Packet Filter : http://www.openbsdindia.org/faq/pf/
Fuzzers: The concept of fuzzing
is usually put to use in order to test the security vulnerabilities of
computer systems or in the software that runs on them.
1. skipfish : https://code.google.com/p/skipfish/ 2. Wfuzz : http://www.edge-security.com/wfuzz.php 3. Wapiti : http://wapiti.sourceforge.net/ 4. W3af : http://w3af.org/
Forensics: This refers to tools
that are used for computer forensic. They are used in order to find
evidence that is existing in computer systems.
1. Sleuth Kit : http://www.sleuthkit.org/ 2. Helix : http://www.dedoimedo.com/computers/helix.html 3. Malteg0 : http://www.paterva.com/web6/ 4. Encase : http://www.guidancesoftware.com/prod.../overview.aspx
Debuggers: These are tools that are used in order to write exploits, reverse engineer binary files and to analyse malware.
1. GDB : http://www.sourceware.org/gdb/ 2. Immunity Debugger : http://www.immunityinc.com/products-immdbg.shtml
Hacking Operating Systems:
These are operating systems that have been designed specifically for
hackers. These distros are preloaded with tools that a hacker needs etc.
1. Backtrack 5r3 : http://www.backtrack-linux.org/downloads/ 2. Kali Linux : http://www.kali.org/ 3. SELinux : http://sourceforge.net/projects/selinux/ 4. Knoppix : http://knoppix.net/ 5. BackBox Linux : http://www.backbox.org/ 6. Pentoo : http://www.pentoo.ch/about 7. Matriux Krypton : http://sourceforge.net/projects/matriux/ 8. NodeZero : http://www.nodezero-linux.org/ 9. Blackbuntu : http://sourceforge.net/projects/blackbuntu/ 10. Samurai Web Testing Framework : http://sourceforge.net/projects/blackbuntu/ 11. WEAKERTH4N : http://weaknetlabs.com/main/?page_id=479 12. CAINE (Computer Aided Investigative Environment) : http://www.caine-live.net/ 13. Bugtraq : http://www.bugtraq-team.com/downloads 14. DEFT : http://www.deftlinux.net/ 15. Helix : http://www.e-fense.com/products.php
Other Hacking Tools: There are
also other miscellaneous hacking tools that are often used by hackers.
They can’t be put into a particular category, but they are still quite
useful.
1. Netcat : http://netcat.sourceforge.net/ 2. Traceroute : http://www.yougetsignal.com/tools/visual-tracert/ 3. Ping.eu : http://ping.eu/ 4. Dig : http://sourceforge.net/projects/htdig/ 5. cURL : http://curl.haxx.se/
ENJOY and be #sAf3
Hacking Tools Direct Links - Techkidoz >>>>> Download Now
ReplyDelete>>>>> Download Full
Hacking Tools Direct Links - Techkidoz >>>>> Download LINK
>>>>> Download Now
Hacking Tools Direct Links - Techkidoz >>>>> Download Full
>>>>> Download LINK