Tampilkan postingan dengan label Tool's. Tampilkan semua postingan
Tampilkan postingan dengan label Tool's. Tampilkan semua postingan

Rabu, 05 Desember 2012

3 In 1 SQLi Tools - Havij 1.15 Pro +Tor + XCodeXploitScanner

Keknya ada tools bagus yang doyan mainan ma SQL Injection.

yang pertama.. tak lain dan tak bukan adalah Havij versi 1.15 Pro

Kedua adalah TOR  (Anonymity Online) Version 2.2.34-2

Ketiga.. tool lokal buatan om Poni dari X-Code, yakni XCodeXploitScanner

yang mo donlot monggo ke link berikut:

3 In 1 SQL Injection Tools

Minggu, 22 April 2012

Rapid7 Nexpose : Free Vulnerability Scanner Tool

Rapid7 Nexpose enables a holistic approach to vulnerability management so that security and network operations teams can make better decisions, faster.

Nexpose ensures that you can:
  • Scan 100% of your infrastructure : scan physical and virtual networks, databases, operating systems and web applications to ensure you know about all of your vulnerabilities and misconfigurations
  • Accurately understand your real risk exposure : with continuous discovery of physical and virtual assets along with integrated information on Malware and Exploit exposure, Nexpose provides accurate insight into where your most significant risks exist
  • Prioritize vulnerabilities quickly and accurately : scans can uncover thousands of vulnerabilities; with Real Risk, Nexpose effectively prioritizes your remediation efforts so you don't waste time
  • Verify that vulnerabilities have been remediated : with integrated data from Metasploit, your security teams can verify that remediation efforts have been successful, reducing duplicate efforts and more effective risk reduction
  • Based on detailed risk reporting across all physical and virtual assets Nexpose provides a contextualized, detailed, sequenced remediation roadmap with time estimates for each task, leading to more effective and efficient reduction of risk.
Download :  Rapid7 Nexpose

PE Explorer 1.99 R6 Full

PE Explorer is the most feature-packed program for inspecting the inner workings of your own software, and more importantly, third party Windows applications and libraries for which you do not have source code.

PE Explorer lets you open, view and edit a variety of different 32-bit Windows executable file types (also called PE files) ranging from the common, such as EXE, DLL and ActiveX Controls, to the less familiar types, such as SCR (Screensavers), CPL (Control Panel Applets), SYS, MSSTYLES, BPL, DPL and more (including executable files that run on MS Windows Mobile platform).

With PE Explorer You Can

  • See what's inside an executable and what it does
  • Change and customize the GUI elements of your Windows programs
  • Track down what a program accesses and which DLLs are called
  • Understand the way a program works, behaves, and interacts with others
  • Verify the publisher and the integrity of the signed executable files
  • Say good bye to digging through bloated help files just to hash out an API reference
  • Open UPX-, Upack- and NsPack-compressed files seamlessly in PE Explorer, without long workarounds
  • Special support for Delphi applications

Homepage:  http://www.heaventools.com/
OS: Windows XP/Vista/7 (x86/x64)
Language: English
Size: 4.02 MB

Resource Hacker

Resource Hacker is an application that provides basically the easiest method to get past the .exe or .dll extension in order to see the resources inside a certain file, providing you even more than that.

Resource Hacker has a very simple and clean interface and although it’s not exactly the kind of application that should be used by beginners, it does all things a lot easier.

With a classy look that reminds us of older Windows versions, this app provides all the tools you need when opening executables or DLL files through a single click.

Thus you can save resources as a binary file or with a .res extensions, you can replace icons, cursors and bitmaps, change texts and add new resources in a second.

Right clicking on a file components opens a new options menu, giving you the power to save, replace, rename or delete resources, but also to change languages on the go.

Resource Hacker is compatible with Win32 executable files (*.exe, *.dll, *.cpl, *.ocx) but also with Win32 resource files (*.res).

Download :
Resource Hacker

Rabu, 15 Februari 2012

Acunetix v.8.0 Consultant Editon

Audit your website security with Acunetix Web Vulnerability Scanner.

As many as 70% of web sites have vulnerabilities that could lead to the theft of sensitive corporate data such as credit card information and customer lists.

Hackers are concentrating their efforts on web-based applications - shopping carts, forms, login pages, dynamic content, etc. Accessible 24/7 from anywhere in the world, insecure web applications provide easy access to backend corporate databases.

Firewalls, SSL and locked-down servers are futile against web application hacking!

Web application attacks, launched on port 80/443, go straight through the firewall, past operating system and network level security, and right in to the heart of your application and corporate data. Tailor-made web applications are often insufficiently tested, have undiscovered vulnerabilities and are therefore easy prey for hackers.

More Info & Innovative Features...

Rabu, 03 Agustus 2011

ProRat V.19 Full Password

Is a backdoor trojan prorat class Rat, which has many functions spy. His name is a fusion of the English word professional, along with the acronym rat (Remote Administrator Tool). Created in Visual Basic, the program has more than 15 versions, one of the best programs to hack computers.Resources.Prorate allows attackers to perform malicious actions on the machines many of his victims.

These include:
* Keystrokes (Keylogger)
* Playing with Mariana adoleta Copelli
* Having a dog at home
* Steal passwords
* Full control over files
* Formatting drives
* Printer Control
* Open / close CD drive
* Hide taskbar, desktop and start button
* Take screenshots
* Show system information
* View webcam
* Listen to Mike
* Download and run files
And many other things, how to catch a mouse, keyboard, monitor ...
* View the work area of ​​the victim
* Format the computer and the victim among many many others.

Most antivirus software can detect and remove prorat. However, you can compress and encrypt the executable, so it is not detected. A well known example is unzip the file using UPX infected and then protect it with Themida. However, several anti-virus programs already recognize this technique and still detect the server. You can remove the server (server) with a good antivirus boot or by going to task manager and canceling the process because the server is just going to run and type msconfig there you just go in and remove the boot server.

Download ProRat V.19 Full Password Smiley

AirSnort 0.2.6 Wifi Hack

AirSnort is a wireless LAN (WLAN) tool which recovers encryption keys. AirSnort operates by passively monitoring transmissions, computing the encryption key when enough packets have been gathered. 802.11b, using the Wired Equivalent Protocol (WEP), is crippled with numerous security flaws. 

Most damning of these is the weakness described in " Weaknesses in the Key Scheduling Algorithm of RC4 " by Scott Fluhrer, Itsik Mantin and Adi Shamir. Adam Stubblefield was the first to implement this attack, but he has not made his software public. AirSnort, along with WEPCrack, which was released about the same time as AirSnort, are the first publicly available implementaions of this attack.

Download AirSnort 0.2.6 Wifi Hack