1
  1
1
1
header
navigation
Downloads
~Ares~
~Nmap~
~John the Ripper~
~Nikto~
~Cygwin~
~Nessus Security Scanner~
~Sqlninja~
~MSN-Tools~
~Camou121~
~Screenlog~
~UltraKeylogger~
~Angry IP scanner~
~pof~
~Proport~
~StartupMonitor~
~Nbrute~
~Revelation~
~TCPView~
~HTTP-Tunnel~
~Divine Intervention II~
~Eraser~
~Wireshark~
Programs to download

Below is a collection of numerous programms listed in no specific order. I am currently checking out many more toolz and if i feel that any of them are useful, i will add them to the website. Alternativley if you would like to upload any of your own programms, or programms you feel would be of use to others than email me or find me on ares. This would be much appriciated. Also contact me to report any broken links.
Tnx [NT]sky-X

[Ares]
Ares is a free open source file sharing program that enables users to share any digital file including images, audio, video, software, documents, etc. You may now easily publish your files through the Ares decentralized network. As a member of the virtual community, you can search and download just about any file shared by other users. Latest versions support BitTorrent protocol and Shoutcast radio stations. With Ares you can also join chat rooms or host your channel and meet new friends. Dont have ares already? Get it here

[Nmap]
("Network Mapper") is a free and open source (license) utility for network exploration or security auditing. Many systems and network administrators also find it useful for tasks such as network inventory, managing service upgrade schedules, and monitoring host or service uptime. Nmap uses raw IP packets in novel ways to determine what hosts are available on the network, what services (application name and version) those hosts are offering, what operating systems (and OS versions) they are running, what type of packet filters/firewalls are in use, and dozens of other characteristics. It was designed to rapidly scan large networks, but works fine against single hosts. To get nmap click here

[John The Ripper]
is a fast password cracker, currently available for many flavors of Unix (11 are officially supported, not counting different architectures), Windows, DOS, BeOS, and OpenVMS. Its primary purpose is to detect weak Unix passwords. Besides several crypt(3) password hash types most commonly found on various Unix flavors, supported out of the box are Kerberos AFS and Windows NT/2000/XP/2003 LM hashes. To get the Windows version of JTR click here

[Nikito]
is an Open Source (GPL) web server scanner which performs comprehensive tests against web servers for multiple items, including over 3300 potentially dangerous files/CGIs, versions on over 625 servers, and version specific problems on over 230 servers. Scan items and plugins are frequently updated and can be automatically updated (if desired). It will test a web server in the shortest timespan possible Windows Requirements: ActiveState's compiled Net::SSL module (only required if SSL scans are needed). You may want to investigate using Cygwin on Windows, which you can get here. To get Nikito click here

[Cygwin]
Cygwin is a Linux-like environment for Windows. It consists of two parts: A DLL (cygwin1.dll) which acts as a Linux API emulation layer providing substantial Linux API functionality. And a collection of tools which provide Linux look and feel.
Requires an intimate knowlege of Unix/bash. To get the latest release of Cygwin
click here

[Nessus Security Scanner]
Nessus is the world's most popular vulnerability scanner used in over 75,000 organizations world-wide. IT delivers network security products that perform unique distributed and dedicated vulnerability assessments of computer networks. Tenable offers software products which focus on three areas of security information management: Vulnerability Discovery and Management. Security Event Management. And Executive and Technical Communication. Also includes Full SSL support.
Im not hosting this as there are too many releases for a number of operating systems.
However it can be obtained free from the tenable website by clicking here

[Sqlninja]
sqlninja is a little toy,written in perl, that has been coded during a couple of pen-tests done lately and it is aimed to exploit SQL Injection vulnerabilities on web applications that use Microsoft SQL Server as their back-end. Features include:Allows Upload of nc.exe (or any other executable) using the good ol’ debug script trick. TCP/UDP portscan from the target SQL Server to the attacking machine, in order to find a port that is allowed by the firewall of the target network and use it for a reverse shell. Direct and reverse bindshell, both TCP and UDP DNS-tunneled pseudoshell, when no TCP/UDP ports are available for a direct/reverse shell. Ninja runs on any unix/linux-based platform with a perl interpreter and can be obtained here

[MSN-Toolz]
A selection of msn related tools including:
-Block checker
-Flooders
-bombers
-local Password display
-Addons, and more..
I havent used or tried any of these tools but i thought they may be of some interest to a minute group of people. Some feedback regarding this section would be appreciated. Get msn tools click here

[Camou121]
Camouflage allows you to hide files by scrambling them and then attaching them to the file of your choice. This camouflaged file then looks and behaves like a normal file, and can be stored, used or emailed without attracting attention. For example, you could create a picture file that looks and behaves exactly like any other picture file but contains hidden encrypted files, or you could hide a file inside a Word document that would not attract attention if discovered. Essentialy just a user friendly binder. To get Camouflage click here

[Screenlog]
ScreenLog Ver 1.0 can be used to keep a visual log of activities on your computer. You can specify how often you want screenshots to be taken, specify a date and time to start and stop taking screenshots, and view the screen-shots as good quality JPEG images. JPEGs are named based on the date and time at which the screenshot was taken, and saved in a directory of your choice. ScreenLog Ver 1.0 is also completely hidden from the user, thus ensuring hassle free monitoring. To get ScreenLog V1.0 click here

[UltraKeylogger]
UltraKeylogger is a spyware program that logs keystrokes and captures screen shots periodically. It also monitors Internet activity and the contents of the Clipboard. */A handy 'lil' keystroke logger/* Works on all versions of windows and has to be installed locally. To get ultra keylogger click here

[Angry IP Scanner]
Angry IP scanner is a very fast IP scanner and port scanner. It can scan IP addresses in any range as well as any their ports. Its binary file size is very small compared to other IP or port scanners. Angry IP scanner simply pings each IP address to check if it's alive, then optionally it is resolving its hostname, determines the MAC address, scans ports, etc. The amount of gathered data about each host can be extended with the available plugins. It also has additional features, like NetBIOS information (computer name, workgroup name, and currently logged in Windows user), favorite IP address ranges, customizable openers, etc. To Get Angry IP scanner click here

[p0f]
P0f v2 is a versatile passive OS fingerprinting tool. P0f can identify the operating system on: - machines that connect to your box (SYN mode), - machines you connect to (SYN+ACK mode), - machine you cannot connect to (RST+ mode), - machines whose communications you can observe. Basically it can fingerprint anything, just by listening, it doesn’t make ANY active connections to the target machine. To get pof click here

[ProPort]
ProPort is a trojan/nuke protection program. It will monitor local ports for incoming connections or attacks, and optionally disconnect them. ProPort comes with a default list of 300 common trojan ports to monitor (SubSeven, NetBus, Back Orifice, etc), and can be editted by the user. Features include: unlimited port monitoring, auto connection kill, port list editing, attack log, remote filter, process manager, autostart method spy, autostart file editing, and file scanning. Get Proport here

[StartupMonitor]
Monitors all programs that start-up automatically whenever you boot up windows. Is usefull for detecting trojans and spyware running in the background without your knowlege. A simple yet usefull tool. To get startup monitor, click here

[NBrute]
Nbrute is a program for scanning and detecting open ports and testing websites for for password security. NetBrute allows you to scan a single computer or multiple IP addresses for available Windows File & Print Sharing resources. This is probably one of the most dangerous and easily exploitable security holes. It is common for your novice users to have their printers or their entire hard drive shared without being aware of it. This utility will help you to find these resources, so you can secure them with a firewall or by informing your users how to properly configure their shares with tighter security. WebBrute will allow you to scan your web directories that are protected with HTTP authentication, testing the security strength of your users' passwords. This will allow you to better enforce your password maintenance policies to ensure that your users are not using easily guessed passwords, or passwords that match their username. To get Nbrute v10 click here

[Rev v2]
Revelation is a program which Displays passwords hidden behind asterix. It is a handy little tool that is easily operated. To get Revelation V2 click here

[TCPView]
TCPView is a Windows program that will show you detailed listings of all TCP and UDP endpoints on your system, including the local and remote addresses and state of TCP connections. On Windows Server 2008, Vista, NT, 2000 and XP TCPView also reports the name of the process that owns the endpoint. TCPView provides a more informative and conveniently presented subset of the Netstat program that ships with Windows. The TCPView download includes Tcpvcon, a command-line version with the same functionality. To get TCPView click here

[HTTP-Tunnel]
HTTP-Tunnel Client is a program created by HTTP-Tunnel Corporation that masks application data as HTTP traffic to bypass firewalls. This is done by piping all outgoing traffic through the standard HTTP port 80. Since almost all firewalls allow HTTP traffic to pass through, the masked application is allowed to communicate with remote hosts. HTTP-Tunnel uses encryption to maintain transfer security. This extra security is achieved only between the user and HTTP Tunnel company servers, not between the user and the remote host.
These are some common reasons for using HTTP-Tunnel:
- Need to bypass any firewall
- Need secure internet browsing
- Need to use favorite programs with out being monitored by work, school, ISP or government.
- Extra security for online transactions
- Encrypt Internet traffic.
- Need to play online games
- Visit sites that you were previously blocked from accessing
- Prevent 3rd party monitoring or regulation of your Internet browsing and downloads
- Use your favorite applications previously blocked
- Hide your IP address
To get HTTP-Tunnel click here

[DevineIntervention II]
Thought id include one nuker on the web. This program has a number of features including; Nuker just put in the IP adress and what port to attack. Pinger, just put in the IP adress and how much junk to flood with, and a easy to use mailbomber, just put in the target E-mail, and mailserver, then write your message and how many copies to send. To download this tool click here

[Eraser]
Eraser is an advanced security tool (for Windows), which allows you to completely remove sensitive data from your hard drive by overwriting it several times with carefully selected patterns. Works with Windows 95, 98, ME, NT, 2000, XP and DOS. Eraser is Free software and its source code is released under GNU General Public License. An excellent tool for keeping your data really safe, if you’ve deleted it..make sure it’s really gone, you don’t want it hanging around to bite you in the ass. However if there is some data you really, really dont want anyone to find try wiping your hard drive 16 times and install your desired OS a number of times also. =] to get eraser click here

[Wireshark]
Wireshark is the world's foremost network protocol analyzer, and is the standard in many industries. Wireshark has a rich feature set which includes the following:
Hundreds of protocols are supported, with more being added all the time -Live capture and offline analysis are supported
-Standard three-pane packet browser
-Multi-platform: Runs on Windows, Linux, OS X, Solaris, FreeBSD, NetBSD, and many others
-Captured network data can be browsed via a GUI, or via the TTY-mode TShark utility
-The most powerful display filters in the industry
-Rich VoIP analysis
-Read/write many different capture file formats: tcpdump (libpcap), Catapult DCT2000, Cisco Secure IDS iplog, Microsoft Network Monitor, Network General Sniffer® (compressed and uncompressed), Sniffer® Pro, and NetXray®, Network Instruments Observer, Novell LANalyzer, RADCOM WAN/LAN Analyzer, Shomiti/Finisar Surveyor, Tektronix K12xx, Visual Networks Visual UpTime, WildPackets EtherPeek/TokenPeek/AiroPeek, and many others
-Capture files compressed with gzip can be decompressed on the fly
-Live data can be read from Ethernet, IEEE 802.11, PPP/HDLC, ATM, Bluetooth, USB, Token Ring, Frame Relay, FDDI, and others (depending on your platfrom)
-Decryption support for many protocols, including IPsec, ISAKMP, Kerberos, SNMPv3, SSL/TLS, WEP, and WPA/WPA2
-Coloring rules can be applied to the packet list, which eases analysis
-Output can be exported to XML, PostScript®, CSV, or plain text
To get wireshark click here
Register Forgot Pass?