MasterZ of Hackz

Top Stories

Wednesday, 19 June 2013

TOP 10 HACKING TOOLS

TOP 10 HACKING TOOLS 2013 

Application's download links and tutorial's available in the download link itself ..


# 1  Nmap

Nmap  is a free and open source (license) utility for network discovery and security auditing. Nmap uses raw IP packets in novel ways to determine what hosts are available on the network, what services (application name and version) those hosts are offering, what operating systems (and OS versions) they are running, what type of packet filters/firewalls are in use, and dozens of other characteristics.


                     DOWNLOAD IT FROM -->>  http://adf.ly/QmQej <<--HERE

# 2  WIRESHARK

Wireshark is a network protocol analyzer. It lets you capture and interactively browse the traffic running on a computer network.




                           DOWNLOAD IT FROM -->>http://adf.ly/QmQog<<--HERE


# 3 METASPLOIT COMMUNITY EDITION

Metasploit Community Edition simplifies network discovery and vulnerability verification for
specific exploits, increasing the effectiveness of vulnerability scanners. This helps prioritize
remediation and eliminate false positives, providing true security risk intelligence



DOWNLOAD IT FROM -->> http://adf.ly/QmRHY<<--HERE

# 4  JOHN THE RIPPER

John the Ripper is a fast password cracker, currently available for many flavors of Unix, 
Windows, DOS, BeOS, and OpenVMS. Its primary purpose is to detect weak Unix passwords. 
Besides several crypt(3) password hash types most commonly found on various Unix systems,
supported out of the box are Windows LM hashes, plus lots of other hashes and ciphers in 
the community-enhanced version.



DOWNLOAD IT FROM -->> http://adf.ly/QmRjF<<--HERE

 # 5  ETTERCAP

Ettercap is a comprehensive suite for man in the middle attacks. It features sniffing of
live connections, content filtering on the fly and many other interesting tricks. It supports
active and passive dissection of many protocols and includes many features for network and host analysis.


DOWNLOAD IT FROM -->>http://adf.ly/QmRy0<<--HERE


 # 6 THC-HYDRA

A very fast network logon cracker which support many different services.



DOWNLOAD IT FROM -->> http://adf.ly/QmSXX<<--HERE


 # 7 H-PING

hping is a command-line oriented TCP/IP packet assembler/analyzer. The interface is inspired
to the ping(8) unix command, but hping isn&#8217;t only able to send ICMP echo requests
It supports TCP, UDP, ICMP and RAW-IP protocols, has a traceroute mode, the ability
to send files between a covered channel, and many other features.




DOWNLOAD IT FROM -->> http://adf.ly/QmSn8<<-- HERE


 # 8 NIKTO

Nikto is an Open Source (GPL) web server scanner which performs comprehensive tests 
gainst web servers for multiple items, including over 6400 potentially dangerous files/CGIs,
checks for outdated versions of over 1200 servers, and version specific problems on over
270 servers. It also checks for server configuration items such as the presence of multiple
index files, HTTP server options, and will attempt to identify installed web servers and software.



DOWNLOAD IT FROM -->> http://adf.ly/QmRWg<<--HERE


 # 9 NCAT

Ncat is a feature-packed networking utility which reads and writes data across networks from the 
command line. Ncat was written for the Nmap Project as a much-improved reimplementation of the venerable Netcat. It uses both TCP and UDP for communication and is designed to be a reliable 
back-end tool to instantly provide network connectivity to other applications and users. Ncat 
will not only work with IPv4 and IPv6 but provides the user with a virtually limitless 
number of potential uses.



DOWNLOAD IT FROM -->> http://adf.ly/PKDUP<<--HERE


# 10  SQLMAP

Sqlmap is an open source penetration testing tool that automates the process of detecting and
exploiting SQL injection flaws and taking over of database servers. It comes with a powerful 
detection engine, many niche features for the ultimate penetration tester and a broad range of 
switches lasting from database fingerprinting, over data fetching from the database, to accessing
the underlying file system and executing commands on the operating system
via out-of-band connections.




DOWNLOAD IT FROM -->> http://adf.ly/QmSH9 <<-- HERE




Note: This tutorial is only for Educational Purposes, I did not take any responsibility of any misuse, you will be solely responsible for any misuse that you do.

Share this post
  • Share to Facebook
  • Share to Twitter
  • Share to Google+
  • Share to Stumble Upon
  • Share to Evernote
  • Share to Blogger
  • Share to Email
  • Share to Yahoo Messenger
  • More...

0 comments

:) :-) :)) =)) :( :-( :(( :d :-d @-) :p :o :>) (o) [-( :-? (p) :-s (m) 8-) :-t :-b b-( :-# =p~ :-$ (b) (f) x-) (k) (h) (c) cheer

 

© 2015 TeChNoSoFt© ∙ Designed by BlackPulse