CLICK ON IMAGE AND JOIN


LIKE FB PAGE

Showing posts with label TOOLS. Show all posts
Showing posts with label TOOLS. Show all posts

Thursday, 27 February 2014

TAGGED UNDER:

Top 15 Hacking | Cracking | Pen-testing Tools of 2014


Here represent Top 15 Hacking or cracking tools for you all  Pc TiPs AnD TriCkS fans. They is bests of 2014 hacking tool.



1. PWN STAR
A bash script to launch the AP, can be configured with a variety of attack options. Including a php script and server index.html, for phishing. Can act as a multi-client captive portal using php and iptables. Exploitation classics such as crime-PDF, De-auth with aireplay, etc..



General Features:

  • Managing Interfaces and MAC Spoofing
  • Set sniffing
  • Phishing Web
  • Karmetasploit
  • WPA handshake
  • De-auth client
  • Managing Iptables


2. ZED ATTACK PROXY (ZAP)

(ZAP) is an integrated penetration testing tool for finding vulnerabilities in web applications. This tool is designed for use by people with a variety of security experience and as such is ideal for developers and functional testers who are new to penetration testing as well as being a useful addition to the toolbox tester.



Key Features:

  • Intercepting Proxy
  • Active scanners
  • Passive scanners
  • Brute Force scanner
  • Spider
  • Fuzzer
  • Port Scanner
  • Dynamic SSL certificates
  • API
  • Beanshell integration
      ZAP Download Here:


3. SET (SOCIAL ENGINEERING TOOLKIT)

Tools that focus on attacking the human element of weakness and inadvertence. This tool is widely used today and is one of the most successful tools demonstrated at Defcon.



Key Features:

  • Spear-Phishing Attack Vector
  • Java Applet Attack Vector
  • Metasploit Browser Exploit Method
  • Credential Harvester Attack Method
  • Tabnabbing Attack Method
  • Man Left in the Middle Attack Method
  • Web Jacking Attack Method
  • Multi-Attack Web Vector
  • Infectious Media Generator
  • Teensy USB HID Attack Vector



4. BURP SUITE

Burp Suite is a very nice tool for web application security testing. This tool is great for pen-tester and security researchers. It contains a variety of tools with many interfaces between them designed to facilitate and accelerate the process of web application attacks.



General Function:

  • Interception proxies
  • Radar and spiders crawling
  • Webapps scanner
  • Tool assault
  • Repeater and sequencer tools


5. ETTERCAP

Ettercap is a multipurpose sniffer / interceptor / logger for Local Area Network . It supports active and passive dissection of many protocols (even in code) and includes many feature for network and host analysis.



General Function:

  • To capture traffic and data
  • To do logging network
  • Etc.


6. SANS INVESTIGATIVE FORENSIC TOOLKIT (SIFT)

The SANS Investigative Forensic Toolkit (SIFT) Workstation is a VMware Appliance that can be configured with all the requirements to perform a detailed digital forensic. Compatible with Expert Witness Format (E01), Advanced Forensic Format (AFF), and raw (dd) evidence formats. The new version has been completely rebuilt on the Ubuntu base with many additional tools and capabilities that are used in modern forensic technology.


General Function SIFT:

  • iPhone, Blackberry, and Android Forensic Capabilities
  • Registry Viewer (YARU)
  • Compatibility with F-Response Tactical, Standard, and Enterprise
  • PTK 2.0 (Special Release - Not Available for Download)
  • Automated Generation Timeline via log2timeline
  • Many Firefox Investigative Tools
  • Windows Journal Parser and Shellbags Parser (jp and sbag)
  • Many Windows Analysis Utilities (prefetch, usbstor, event logs, and more)
  • Complete Overhaul of Regripper Plugins (added over 80 additional plugins)


7. WIRESHARK

Wireshark is the most widely used and most popular in the world the protocol analyzer, and is the de facto standard across many industries and educational institutions to analyze the network in different protocol.


General Function:

  • Live capture and offline analysis
  • Standard three-pane packet browser
  • Multi-platform: Runs on Windows, Linux, OS X, Solaris, FreeBSD, NetBSD, and many others
  • Captured data network can be browsed via a GUI, or via the TTY-mode tshark utility
  • The most powerful display filters in the industry
  • Rich VoIP analysis
  • Read / write many different capture file formats
  • Etc.


8. WEBSPLOIT

WebSploit is an Open Source Project for Remote Scan and Analysis System of the weaknesses inweb applications.


Key Features: 

[>] Social Engineering Works
[>] Scan, Web Crawler & Analysis
[>] Automatic Exploiter
[>] Support Network Attacks-
[+] Autopwn - Used From Metasploit For Scan and Exploit Target Service
[+] WMAP - Scan, Target Used Crawler From Metasploit WMAP plugin
[+] format infector - inject the payload into reverse and bind file format
[+] phpmyadmin Scanner
[+] LFI Bypasser
[+] Apache Users Scanner
[+] Dir Bruter
[+] admin finder
[ +] MLITM Attack - Man Left In The Middle, XSS Phishing Attacks
[+] MITM - Man In The Middle Attack
[+] Java Applet Attack
[+] MFOD Attack Vector
[+] USB Infection Attack
[+] Dos ARP Attack
[+ ]'s Killer Attack
[+] Attack Fake Update
[+] Fake Access Point Attack


9. WINAUTOPWN

WinAutoPWN is a tool that is used to exploit the Windows Framework directly, so that we are automatically going to be an administrator on the windows. Widely used by "Defacer" Indonesia to deface the Windows Server





10. HASHCAT

Hashcat are a variety of tools to crack passwords in encrypted, it is very powerful for password recovery.


General Function:
  • Multi-Threaded
  • Free
  • Multi-Hash (up to 24 million hashes)
  • Multi-OS (Linux, Windows and OSX native binaries)
  • Multi-Algo (MD4, MD5, SHA1, DCC, NTLM, MySQL, ...)
  • SSE2 accelerated
  • All Attack-Modes except Brute-Force and Permutation can be extended by rules
  • Very fast Rule-engine
  • Rules compatible with JTR and PasswordsPro
  • Possible to resume or limit session
  • Automatically recognizes recovered hashes from outfile at startup
  • Can automatically generate random rules
  • Load saltlist from an external file and then use them in a Brute-Force Attack variant
  • Able to work in an distributed environment
  • Specify multiple wordlists or multiple directories of wordlists
  • Number of threads can be configured
  • Lowest priority threads run on
  • 30 + Algorithms is implemented with performance in mind
  • ... and much more


11. UNISCAN

Uniscan is a scanner for web applications, written in perl for Linux. Currently Uniscan version is 6.2.


General Function:
  • Identification of system pages through a Web Crawler.
  • Use of threads in the crawler.
  • Control the maximum number of requests the crawler.
  • Control of variation of system pages identified by Web Crawler.
  • Control of file extensions that are ignored.
  • Test of pages found via the GET method.
  • Test the forms found via the POST method.
  • Support for SSL requests ( HTTPS ).
  • Proxy support.
  • Generate site list using Google.
  • Generate site list using Bing.
  • Plug-in support for Crawler.
  • Plug-in support for dynamic tests.
  • Plug-in support for static tests.
  • Plug-in support for stress tests.
  • Multi-language support.
  • Web client.


12. OLYYDBG

OllyDbg is a 32-bit assembler debugger for Microsoft Windows. Emphasis on binary code analysis makes it particularly useful in cases where source code is not available.


General Function:
  • Intuitive user interface, no cryptical commands
  • Code analysis - traces registers, recognizes procedures, loops, API calls, switches, tables, constants and strings
  • Directly loads and debugs DLLs
  • Object file scanning - locates routines from object files and libraries
  • Allows for user-defined labels, comments and function descriptions
  • Understands debugging information in Borland ® format
  • Saves patches between sessions, writes them back to executable file and updates fixups
  • Open architecture - many third-party plugins are available
  • No installation - no trash in registry or system directories
  • Debugs multithreaded applications
  • Attaches to running programs
  • Configurable disassembler, supports both MASM and IDEAL formats
  • MMX, 3DNow! and SSE instructions and the data types, Including Athlon extensions
  • Full UNICODE support
  • Dynamically recognizes ASCII and UNICODE strings - also in Delphi format!
  • Recognizes complex code constructs, like call to jump to procedure
  • Decodes calls to more than 1900 standard API and 400 C functions
  • Gives context-sensitive help on API functions from external help file
  • Sets conditional, logging, memory and hardware breakpoints
  • Traces program execution, logs arguments of known functions
  • Shows fixups
  • Dynamically traces stack frames
  • Searches for imprecise commands and masked binary sequences
  • Searches whole allocated memory
  • Finds references to constant or address range
  • Examines and modifies memory , sets breakpoints and Pauses program on-the-fly
  • Assembles commands into the shortest binary form
  • Starts from the floppy disk
13. BBQSQL

BBQSQL an Opensource SQL injection tools with the framework specifically designed to carry out the process in hyper fast, database agnostic, easy to setup, and easy to modify. This is another amazing release from Arsenal Blackhat USA 2012. When conducting security assessments of applications, we often find that it is difficult to SQL vulnerabilities exploitable, with this tool will be extremely easy.

BBQSQL written in the Python programming language. This is very useful when complex SQL injection attack vulnerabilities. BBQSQL also a semi-automated tool, which allows little customization for those who are finding it difficult to trigger a SQL injection. The tool is built to be database agnostic and very versatile. It also has an intuitive UI for setting up the attack much easier.


General Function:
  • SQL Injection Tools
  • URL
  • HTTP Method
  • Headers
  • Cookies
  • Encoding methods
  • Redirect behavior
  • Files
  • HTTP Auth
  • Proxies


14. CRYPTOHAZE

Tools to crack password / hash where cryptohaze supports CUDA, OpenCL , and the CPU code (SSE, AVX, etc.). Can run on OS that support CUDA. These are intended to make it easier to pentester did crack the hash.


General Function:

  • Crack various kinds of hash
  • Showing results from crackhash
  • Cracking on various OS platforms                                          


15. SAMURAI WEB TESTING FRAMEWORK (SWTF)

SWTF is used to do testing / pentest against web application, is used to find a weakness and exploited to perform web. Very comprehensive and widely used in the world, including one used by staff binushacker


General Function:
  • Web Scanner
  • Web Mapping
  • Web Exploitation



Note: This tutorial is only for Educational Purposes, I did not take any responsibility of any misuse, you will be solely responsible for any misuse that you do.

Enjoy Info..!!!!!!!!!!!


Monday, 10 February 2014

TAGGED UNDER:

Kaspersky Antivirus 2014 Free Activation Code For 3 Months

KAV-2014-200x31010-211337
Kaspersky Antivirus is one of the best antivirus available  in market . It Can detect any virus , spam , spywares etc . But it is expensive so we are giving Free Activation Code  For It .

Now You Can Enjoy Free Kaspersky Security for 91 Days ! 

1. First of All Download Kaspersky From There Offical Site [Link] Select Language and Click On Download

2. After Downloading it open antivirus , Then Click on Licensing

3. Then Click on  Activate Application and enter any one of the activation  codes shown below

QCGUH-J8FF6-33WGA-UBY62
4GGYH-S7HEJ-QEGXT-4C88H


Enjoye....


Internet Download Manager 6.18 With Crack

Internet+download+manager
How to Download IDM 6.17 Build 8 ?

Step 1: First Download IDM From HERE
Step 2: Now Download The Crack from HERE 

Step 3: Enjoy The latest version. Say thanks by sharing with your Friends.



Monday, 3 February 2014

TAGGED UNDER: ,

WINDOWS 8 EXTREME PERMANENT ACTIVATER +CRACK LODER DOWNLOAD FREE


YOU CAN DOWNLOAD FROM ANY ONE LINK

TinyFileHost

DOWNLOAD LINK HARE

UPSHARE

DOWNLOAD LINK HERE

TORRENT

DOWNLOAD LINK HERE

And enjoyee,,,




TAGGED UNDER: ,

Activate Windows 8 Using the Activator Mode

Yet another method to activate Windows 8 on your computer is by using the Activator mode. Below is how you can activate Windows 8 on your computer with the Activator mode:-

 How to Activate Windows 8   Windows 8 Activator

  • Download the Windows 8 Activator from here.
  • Extract the downloaded activator to your computer’s desktop.
  • Double click and run the activator file from the extracted folder.
  • If you get prompted for any warnings, proceed.
  • Within a few moments, your computer will restart automatically.
  • And after the restart procedures complete, your Windows 8 will be successfully activated.
The above mentioned are some commonly used and easy methods to activate Windows 8 on your computer. I hope this tutorial proves to be helpful, in case of any questions please do mention them as comments below.



Sunday, 19 January 2014

TAGGED UNDER:

3 Tools to Reveal Who's Hacking your WiFi



While using your home WiFi internet access you might face some slow downs of speed, this may be due to a normal internet down time or (if it persists for a long time) your wifi may be got hacked by a nearby hacker. There are many ways to protect your home Wi-Fi from being hacked, such as using a custom & hard to guess password or also changing the encryption type of the wireless key to WPA or WPA2 as they are meant to be more secure but not perfect against hackers. As we've seen there's a way to Hack WPA/WPA2 Passwords using PIN vulnerabilitythat means even if you think your WiFi is protected with WPA/WPA2 encryption doesn't mean it cannot be hacked.


3 Tools to Reveal Who's Hacking Your WiFi

 1. Wireless Network Watcher 

Wireless Network Watcher programmed by Nirsoft, it helps you analyzing nearby computers connected to the same network (WiFi or Local network). It will analyze and list: Local IP address of the hacker, Computer/Device name, MAC address & other useful info.


2. Who's On My WiFi

Who's on my WiFi is an very easy to use tool that will provide many information about the locally connected hackers on your WiFi home network.


3. NetCut

The famous internet cutter can also be used to analyze who's taking your internet connection after hacking your wifi. Netcut helps you also cut down internet access to connected users even if they know the wifi password, which also helps you protecting yourself from others using netcut.



enjoyeee

Wednesday, 15 January 2014

Internet Download Manager IDM 6.14 Final Incl Crack and Serials by A.k



Internet Download Manager IDM 6.14 Final Incl Crack and Serials link!!!!!!!!!!

Download from these link

IDMan_614 setup
IDM SETUP CLICK HERE

IDMan_crack
IDMan_crack click here

Serials KEY
Serials key click here

InstallNotes
InstallNotes click here

ENJOYEEEEEEEE...
comment...

Sunday, 12 January 2014

TAGGED UNDER: ,

25 Useful software's for Window


Here are 25 Useful software's for Windows :

1. Good Antivirus : its a must to protect ur pc from viruses. U can use BIT DEFENDER , KASPERSKY, K7, AVAST, AVG, NORTON .etc

SEE ALSO:- Kaspersky Antivirus 2014 Free Activation Code For 3 Months

2. VlC ,K-Lite ,GOM,  and Media Player : It can almost play any type of media files. and is simple and easy to use.

3. Registry Cleaners/Tune up Utilities : U need an all in one software which cleans registry errors n junk files from your PC n makes your PC smooth n fast. For this I would recommend Tuneup Utilities /Uniblue Power Suite/Ccleaner.

4. Image Burner (Nero) And power ISO : Nero and power ISO are the best software if you want to burn any type of CD or DVD.

5. Firefox and Google Chrome : These are only best browsers.

6. MS Office / Open Office : We cant imagine a business without MS Office. Right from student to a Business Man its a must software.

7. Adobe Reader : If u want to read ebooks n pdf documents then its a must software. 

8. 7 Zip : Open source Windows utility for manipulating archives. It has the highest compression ratio ever.

9. Internet Download Manager : IDM is a must softwares for PC as it increases ur overall download speed by 5 times.

10. Utorrent : is a light weight and very efficient torrent to download files.

11. Adobe Photoshop / GIMP : must software for editing photos. I suggest GIMP over photoshop.

12. Revo Uninstaller : Revo Uninstaller is a freeware innovative uninstall utility much faster than Windows Add/Remove applet. With its advanced and fast algorithm, it scans before and after you uninstall an application.

13. Adobe Flash Player : This is a must software if you wanna watch flash videos on ur computer.

14. Malware Bytes : is a tool that removes malicious n infected area of your PC n it can optimize your PC performance.

15. Zone Alarm Firewall : is a cutting edge firewall security option which blocks dangerous sites n downloads.

16. Team Viewer : is the best software for remote desktop viewing.

17. Notepad++ : is a free source n best text editor for several programming languages under windows environment.

18. Folder Lock : allows u to store all ur files with a protected password.

19. Sandboxie : software for virus testers . If you download any applicattion from internet just run it in Sandboxie to check whether its infected or not.

20. Keyscrambler : in this world of internet u cant guess when a keylogger gets installed on ur PC n loose ur confidential passwords. Key scrambler software scrambles ur keys n helps to stay safe even if keylogger gets installed.

21. Winrar : is a our software for a PC as u can compress n store files n also most of the files which we download are compressed so winrar is must even to extract those files.

22. File Opener : is a software which can open different formats.

23. VMWARE WORKSTATION : Vmware helps us in installing multiple Operating Systems over one Operating System.

24. DEEP FREEZE : is another virtualization software. It is mainly used to keeping 
computers intact n preventing systems from being infected. It functions similar to Sandboxie. Deep Freeze makes computer configurations indestructible n prevents against unwanted workstation changes regardless of whether they are accidental or malicious.

25. CYBER GHOST VPN : Are you banned from any forum??? Try out this software. If you want to surf
anonymously on web without displaying your real IP address, then u gotto hav it.

Enjoy !!!!!!

SHARE

ad

Contact Form

Name

Email *

Message *

Copyright © 2014 | Pc TiPs AnD TriCkS | REFERENCE | Pc TiPs AnD TriCkS |
Designed By: | ANOOP KAUSHAL | Powered By: | Pc TiPs AnD TriCkS | All Right Reserved.|