Beberapa dari kita mungkin penasaran apa yang dimaksud dengan softskill. Kita dapat mengatakan bahwa Softskill merupakan suatu kemampuan atau bakat yang dimiliki oleh setiap manusia. Pada dasarnya Softskill merupakan keterampilan personal, yaitu keterampilan khusus yang bersifat non-teknis, tidak berwujud, dan kepribadian yang menentukan kekuatan sese..
Download Office 2013 Free and Full
Perbaikan versi sebelumnya dan penambahan tools membuat Office 2013 menjadi lebih sempurna.
DOS dan DDOS
Beserta pelindung PC
Video Tutorial Deface
Gunakan dengan bijak.
Software Kecil Untuk Mendapatkan Berbagai Driver
Apapun merk komputer/laptop Anda, gunakan software kecil ini untuk mencari driver
Download Photoshop CS5 Portable
Tidak perlu instal, buka dan dapet di gunakan secara full version
Sunday, 29 September 2013
Hacking Tools
19:28
No comments
Port Scanners :-
Nmap :- This tool developed by Fyodor is one of the best unix and windows based port scanners. This advanced port scanner has a number of useful arguments that gives user a lot of control over the process.
Home:- http://www.insecure.org/
Latest Release:- Nmap 5.50
Download:-http://nmap.org/download.html
Superscan :- A Windows-only port scanner, pinger, and resolver
SuperScan is a free Windows-only closed-source TCP/UDP port scanner by Foundstone. It includes a variety of additionalnetworkingtools such as ping, traceroute, http head, and whois.
Home:- http://www.foundstone.com/
Latest Release:- SuperScan v4.0
Download:-http://www.foundstone.com/us/resources/proddesc/superscan4.htm
Angry IP Scanner :- A fast windows IP scanner and port scanner. Angry IP Scanner can perform basic host discovery and port scans on Windows. Its binary file size is very small compared to other scanners and other pieces of information about the target hosts can be extended with a few plugins.
Home:- http://www.angryziber.com/ [sourceforge.net]
Latest Release:- IPScan 3.0-beta3
Download:-http://www.angryziber.com/w/Download
Unicornscan :- Unicornscan is an attempt at a User-land Distributed TCP/IP stack for information gathering and correlation. It is intended to provide a researchera superior interface for introducing a stimulus into and measuring a response from a TCP/IP enabled device or network. Some of its features include asynchronous stateless TCP scanning with all variationsof TCP flags, asynchronous stateless TCP banner grabbing, and active/passive remote OS, application, and component identification by analyzing responses.
Home:- http://www.unicornscan.org/
Latest Release:- Unicornscan 0.4.7-2
Download:-http://www.unicornscan.org/
OS Fingerprinting Tools :-
Nmap :- This tool developed by Fyodor is one of the best unix and windows based active os fingerprinting tool.
Home:- http://www.insecure.org/
Latest Release:- Nmap 5.50
Download:-http://nmap.org/download.html
P0f :- A passive OS fingerprinting tool. P0f is able to identify the operating system of a target host simply by examining captured packets even when the device in question is behind an overzealous packet firewall.P0f can detect firewall presence, NAT use, existence of load balancers,and more!
Home:- http://lcamtuf.coredump.cx/p0f.shtml
Latest Release:- p0f v2 (2.0.
Download:-http://lcamtuf.coredump.cx/p0f.shtml
Xprobe2 :- Active OS fingerprinting tool. XProbe is a tool for determining the operating system of a remote host. They do this using some of the same techniquesas Nmap as well as some of their own ideas. Xprobe has always emphasizedthe ICMP protocol in its fingerprinting approach.
Home:- http://www.sys-security.com/ [sourceforge.net]
Latest Release:- Xprobe2 0.3
Download:-http://sourceforge.net/projects/xprobe
Vulnerability Scanners :-
Nessus :- Premier UNIX vulnerability assessmenttool
Nessus is the best free network vulnerability scanner available,and the best to run on UNIX at any price. It is constantlyupdated, with more than 11,000 plugins for the free (but registration and EULA-acceptance required) feed. Key features include remote and local (authenticated) security checks, a client/server architecture with a GTK graphical interface,and an embedded scripting language for writing your own plugins or understanding the existing ones.
Home:- http://www.nessus.org/
Latest Release:- Nessus 4
Download:-http://www.nessus.org/download/
GFI LANguard :- A commercialnetwork security scanner for Windows
GFI LANguard scans IP networks to detect what machines are running. Then it tries to discern the host OS and what applications are running. I also tries to collect Windows machine's service pack level, missing security patches, wireless access points, USB devices, open shares, open ports, services/applications active on the computer, key registry entries, weak passwords,users and groups, and more. Scan results are saved to an HTML report, which can be customized/queried. It also includes a patch manager which detects and installs missing patches.
Home:- http://www.gfi.com/
Latest Release:- GFI LANguard Network Security Scanner 8
Download:-http://www.gfi.com/lannetscan/
Retina :- Commercialvulnerability assessmentscanner by eEye
Like Nessus, Retina's function is to scan all the hosts on a network and report on any vulnerabilities found. It was written by eEye, who are well known for their security research.
Home:- http://www.eeye.com/
Latest Release:- Retina Network Security Scanner v5.15.7
Download:-http://www.eeye.com/html/Products/Retina/index.html
Core Impact :- An automated,comprehensive penetration testing product. it is widely consideredto be the most powerful exploitation tool available.It sports a large, regularly updated database of professional exploits, and can do neat tricks like exploitingone machine and then establishing an encrypted tunnel through that machine to reach and exploit other boxes.
Home:- http://www.coresecurity.com/
Latest Release:- Core Impact 4.0
Download:-http://www.coresecurity.com/
ISS Internet Scanner :- Application-level vulnerability assessment
Internet Scanner started off in '92 as a tiny open source scanner by Christopher Klaus. Now he has grown ISS into a billion-dollar company with a myriad of security products.
http://www.iss.net/products_services/enterprise_protection
/vulnerability_assessment//vulnerability_assessment/scanner_internet.php
SARA :- Security Auditor\92s Research Assistant
SARA is a third generationnetwork security analysis tool that Operates under Unix, Linux, MAC OS/X or Windows. The first generation assistant,the Security Administrator's Tool for Analyzing Networks (SATAN) was developed in early 1995. It became the benchmark for network security analysis for several years. However, few updates were provided and the tool slowly became obsolete in the growing threat environment.
Home:- http://www-arc.com/
Download:-http://www-arc.com/sara
Password Crackers :-
Cain and Abel :- The top password recovery tool for Windows. This Windows-only password recovery tool handles an enormous variety of tasks. It can recover passwords by sniffing the network, cracking encrypted passwords using Dictionary, Brute-Force and Cryptanalysis attacks, recording VoIP conversations, decoding scrambled passwords,revealing password boxes, uncoveringcached passwords and analyzing routing protocols.
Home:- http://www.oxid.it/
Latest Release:- cain & abel v4.9.40
Download:-http://www.oxid.it/cain.html
John the Ripper :- A powerful, flexible, and fast multi-platform password hash cracker. John the Ripper is a fast password cracker, currently available for many flavors of Unix, DOS, Win32, BeOS, and OpenVMS. Its primary purpose is to detect weak Unix passwords.It supports several crypt(3) password hash types which are most commonly found on various Unix flavors, as well as Kerberos AFS and Windows NT/2000/XP LM hashes. Several other hash types are added with contributed patches.
Home:- http://www.openwall.com/
Latest Release:- John the Ripper 1.7
Download:-http://www.openwall.com/john/
THC Hydra :- A Fast network authentication cracker which support many different services. When you need to brute force crack a remote authentication service, Hydra is often the tool of choice. It can perform rapid dictionaryattacks against more then 30 protocols,including telnet, ftp, http, https, smb, several databases,and much more.
Home:- http://www.thc.org/
Latest Release:- THC-Hydra v5.4
Download:-http://freeworld.thc.org/thc-hydra/
L0phtcrack:- Windows password auditing and recovery application
L0phtCrack, also known as LC5, attempts to crack Windows passwords from hashes which it can obtain (given proper access) from stand-alone Windows NT/2000 workstations, networked servers, primary domain controllers, or Active Directory.In some cases it can sniff the hashes off the wire. It also has numerous methods of generatingpassword guesses (dictionary, brute force, etc).
Home:- Not Available
Latest Release:- L0phtcrackv5.04
Download:-http://download.insecure.org/stf/lc5-setup.exe
http://download.insecure.org/stf/lc5-crack.zip (keygen)
Pwdump :- Windows password recovery tool.
Pwdump is able to extract NTLM and LanMan hashes from a Windows target, regardlessof whether Syskey is enabled. It is also capable of displayingpassword histories if they are available.It outputs the data in L0phtcrack-compatible form, and can write to an output file.
Home:- http://www.foofus.net/fizzgig/pwdump
Latest Release:- pwdump6 version 1.7.2
Download:-http://swamp.foofus.net/fizzgig/pwdump/downloads.htm
RainbowCrack :- An InnovativePassword Hash Cracker.
The RainbowCrack tool is a hash cracker that makes use of a large-scale time-memory trade-off.A traditional brute force cracker tries all possible plaintextsone by one, which can be time consuming for complex passwords.RainbowCrack uses a time-memory trade-off to do all the cracking-time computation in advance and store the results in so-called "rainbow tables". It does take a long time to precomputethe tables but RainbowCrack can be hundreds of times faster than a brute force cracker once the precomputation is finished.
Home:- http://www.antsight.com/
Latest Release:- rainbowcrack v1.2
Download:-http://www.antsight.com/zsl/rainbowcrack/
Brutus :- A network brute-force authentication cracker
This Windows-only cracker bangs against network services of remote systems trying to guess passwords by using a dictionaryand permutations thereof. It supports HTTP, POP3, FTP, SMB, TELNET, IMAP, NTP, and more.
Home:- http://www.hoobie.net/
Latest Release:- brutus-aet2
Download:-http://www.hoobie.net/brutus/brutus-download.html
EncryptionTools :-
GnuPG /PGP :- Secure your files and communication with the advanced encryption. PGP is the famous encryptionprogram by Phil Zimmerman which helps secure your data from eavesdroppers and other risks. GnuPG is a very well-regarded open source implementation of the PGP standard (the actual executableis named gpg). While GnuPG is always free, PGP costs money for some uses.
http://www.gnupg.org/
http://www.pgp.com/
OpenSSL :- The premier SSL/TLS encryption library. The OpenSSL Project is a collaborative effort to develop a robust, commercial-grade, full-featured, and open source toolkit implementing the Secure Sockets Layer (SSL v2/v3) and Transport Layer Security (TLS v1) protocols as well as a full-strength general purpose cryptography library. The project is managed by a worldwide community of volunteersthat use the Internet to communicate, plan, and develop the OpenSSL toolkit and its related documentation.
http://www.openssl.org/
Tor :- An anonymous Internet communication system Tor is a toolset for a wide range of organizations and people that want to improve their safety and security on the Internet. Using Tor can help you anonymize web browsing and publishing, instant messaging,irc, ssh, and other applications that use the TCP protocol. Tor also provides a platform on which software developerscan build new applications with built-in anonymity,safety, and privacy features.
http://tor.eff.org/
Stunnel :- A general-purpose SSL cryptographic wrapper. The stunnel program is designed to work as an SSL encryptionwrapper between remote client and local or remote server. It can be used to add SSL functionality to commonly used inetd daemons like POP2, POP3, and IMAP servers without any changes in the programs' code.
http://www.stunnel.org/
OpenVPN :- A full-featured SSL VPN solution. OpenVPN is an open-source SSL VPN package which can accommodate a wide range of configurations, including remote access, site-to-site VPNs, WiFi security, and enterprise-scale remote access solutions with load balancing,failover, and fine-grained access-controls. OpenVPN implementsOSI layer 2 or 3 secure network extension using the industry standard SSL/TLS protocol, supports flexible client authentication methods based on certificates, smart cards, and/or 2-factor authentication,and allows user or group-specific access control policies using firewall rules applied to the VPN virtual interface.OpenVPN uses OpenSSL as its primary cryptographic library.
http://openvpn.net/
TrueCrypt :- Open-Source Disk EncryptionSoftware for Windows and Linux. TrueCrypt is an excellent open source disk encryptionsystem. Users can encrypt entire filesystems, which are then on-the-flyencrypted/decrypted as needed without user intervention beyond entering their passphraseintially. A clever hidden volume feature allows you to hide a 2nd layer of particularly sensitive content with plausible deniability about whether it exists. Then if you are forced to give up your passphrase, you give them the first-level secret. Even with that, attackers cannot prove that a second level key even exists.
http://www.truecrypt.org/
Packet Sniffers :-
Ethereal :- This (also known as Wireshark)is a fantastic open source network protocol analyzer for Unix and Windows. It allows you to examine data from a live network or from a capture file on disk. You can interactively browse the capture data, delving down into just the level of packet detail you need. Ethereal has several powerful features, including a rich display filter language and the ability to view the reconstructed stream of a TCP session. It also supports hundreds of protocols and media types.
Home:- http://www.wireshark.org/
Latest Release:- Wireshark 1.0.4 (Ethereal)
Download:-http://www.wireshark.org/download.html
Kismet :- A powerful wireless sniffer. Kismet is a console based 802.11 layer2 wireless network detector, sniffer, and intrusion detection system. It identifiesnetworks by passively sniffing, and can even decloak hidden networks if they are in use. It can automatically detect network IP blocks by sniffing TCP, UDP, ARP, and DHCP packets, log traffic in Wireshark/TCPDump compatibleformat, and even plot detected networks and estimated ranges on downloadedmaps.
Home:- http://www.kismetwireless.net/
Latest Release:- Kismet-2008-05-R1
Download:-http://www.kismetwireless.net/download.shtml
Tcpdump :- The classic sniffer for network monitoringand data acquisition. It is great for tracking down network problems or monitoringactivity. There is a separate Windows port named WinDump. TCPDump is the source of the Libpcap/WinPcap packet capture library.
Home:- http://www.tcpdump.org/
Latest Release:- TCPDUMP 4.0.0
Download:-http://www.tcpdump.org/
Ettercap :- Ettercap is a terminal-based network sniffer/interceptor/logger for ethernet LANs. It supports active and passive dissection of many protocols (even ciphered ones, like ssh and https). Data injection in an established connectionand filtering on the fly is also possible, keeping the connectionsynchronized. Many sniffing modes were implemented to give you a powerful and complete sniffing suite. Plugins are supported.It has the ability to check whether you are in a switched LAN or not, and to use OS fingerprints (active or passive) to let you know the geometry of the LAN.
Home:- http://ettercap.sourceforge.net/
Latest Release:- Ettercap NG-0.7.3
Download:-http://sourceforge.net/projects/ettercap/
DSniff :- A suite of powerful network auditing and penetration-testing tools. This popular and well-engineered suite by Dug Song includes many tools. dsniff, filesnarf,mailsnarf,msgsnarf, urlsnarf, and webspy passively monitor a network for interesting data (passwords, e-mail, files, etc.). arpspoof, dnsspoof, and macof facilitatethe interception of network traffic normally unavailable to an attacker (e.g, due to layer-2 switching). sshmitm and webmitm implement active monkey-in-the-middleattacks against redirectedssh and https sessions by exploitingweak bindings in ad-hoc PKI. Overall, this is a great toolset. It handles pretty much all of your password sniffing needs.
Home:- http://www.monkey.org/
Latest Release:- dsniff-2.3
Download:-http://www.monkey.org/~dugsong/dsniff/
After Earth (2013) BluRay 1080p BRRip
Storyline
After Earth (2013) BluRay 1080p BRRip 5.1CH 1.3GB Hnmovies.
A crash landing leaves Kitai Raige and his father Cypher stranded on Earth, a millennium after events forced humanity’s escape. With Cypher injured, Kitai must embark on a perilous journey to signal for help.
A crash landing leaves Kitai Raige and his father Cypher stranded on Earth, a millennium after events forced humanity’s escape. With Cypher injured, Kitai must embark on a perilous journey to signal for help.
Info
http://www.imdb.com/title/tt1815862/
Ratings: 4.8/10 from 43,373 users
Ratings: 4.8/10 from 43,373 users
White House Down (2013) R6 WEBRiP 525MB
Storyline
White House Down (2013) R6 WEBRiP 525MB Hnmovies.
Capitol Policeman John Cale has just been denied his dream job with the Secret Service of protecting President James Sawyer. Not wanting to let down his little girl with the news, he takes her on a tour of the White House, when the complex is overtaken by a heavily armed paramilitary group. Now, with the nation’s government falling into chaos and time running out, it’s up to Cale to save the president, his daughter, and the country.
Capitol Policeman John Cale has just been denied his dream job with the Secret Service of protecting President James Sawyer. Not wanting to let down his little girl with the news, he takes her on a tour of the White House, when the complex is overtaken by a heavily armed paramilitary group. Now, with the nation’s government falling into chaos and time running out, it’s up to Cale to save the president, his daughter, and the country.
Info
http://www.imdb.com/title/tt2334879/
Ratings: 6.3/10 from 8,176 users
Ratings: 6.3/10 from 8,176 users
Download Movies
World War Z (2013) Bluray 1080p
Storyline
World War Z (2013) Bluray 1080p UNRATED BRRip 5.1CH 1.6GB Hnmovies.
United Nations employee Gerry Lane traverses the world in a race against time to stop the Zombie pandemic that is toppling armies and governments, and threatening to destroy humanity itself.
United Nations employee Gerry Lane traverses the world in a race against time to stop the Zombie pandemic that is toppling armies and governments, and threatening to destroy humanity itself.
Subscribe to:
Posts (Atom)