Become a top hacker (2003) essential software!

xiaoxiao2021-03-06  62

Become a top hacker (2003) essential software!

CGI latte: CGI web back door CGI web pages, envymask writing ... "Web merger this program can automatically generate web pages, you can synthesize new web pages to the web page, automatically run the EXE file while opening the web. You will merge Trojan In a web page, others have browsed, huh, huh, I didn't say anything ~~~ Haiyang Top Trojan Windows environment will never be killing Trojan, because it is made with ASP, is also a set of ASP online poles Good web editing software, support online changes, edit, delete any text file, and most important is to solve the component ASP upload ... (Chinese CGI-Backdoor Course CGI Trojan (more than ten kinds of Using the latest vulnerability Web Scripting back door covering JSP, PHP, ASP, CGI, etc.) *

After the command line, the door WINSHELL WINSHELL is a Telnet server software running on the Windows platform. The main program is a executable of only 5K, which can be performed independently without relying on any system dynamic connection library, although it is small, Earn we function, support custom port, password protection, multi-user login, NT service method, remote file download, information customization, and unique anti-DDoS feature ... "Invasion NT WINSHELL Using" Gina Gina Trojan's main role When the system user logs in, the name of the user logs in, the login password, etc. are logged into the file, because this DLL is loaded when logging in, so there is nothing like the Findpass class program is Chinese or domain name is Chinese. Get users ... Confucian Wollf1.5 Our hackacke written software, expand Telnet service, integrated file transfer, FTP server, keyboard record, Sniffer (for win2k only), port forwarding, etc., reverse connection, The parameter selection can start or use the system to start the WineggDrop shell 1.50 final version in an extensive Telnet back door program {China's strongest back door} ***************** *********************************************************** *********************** Railfird scanning software! 20CN IPC scanner official version fully automatic IPC scanner, can be used to implant the Trojan, which can be transmitted through the part without configuring a complete firewall, and can detect some users who can not detect in the light-light detection ... (Chinese version) Network broiler hunter a quick look Network broiler's gadget web information show makes the webpage no longer secret, various information, what movie, picture, email address, article, flash, compressed file, executable file ... etc, link address is nowhere to be available ! Successfully download a variety of software, package tutorial, VB, VC, animation tutorial, flash, movie, photo picture

*********************************************************** ******************************************** SQL2.EXE SQL will hear, that is, this vulnerability !

Netscantools a powerful network kit ... (English version)

Dvbbs.exe mobile network logout.asp utilization program

THCSQL is an attack program for the MSSQL OpenDataSource function vulnerability discovered by David Litchfield, in the inner source code.

Small purple V2.0 additional * Small purple * (LB Forum Nightmare) V2.0 Take Edition Add lb.exe, you can get the forum administrator privilege.

LB5 Forum Bomber My Brothers Write Procedures, {Pixabay 2.5 In the original function of the LB5 Forum Bomber Revised 2.0, the following functions are added: 1 Support 6 thread bombings, speed comparative V2.0 Increases double 2 machine intelligence recompancing, with automatic steering positioning function 3 Increase monitoring window 4 Title can be changed ... (MSN Message Attack Machine This is a message attack machine for MSN Messenger (in fact, not limited to MSN) It has a super fast attack speed. According to test, it can reach 5 / sec in ordinary Pentium 200 MMX attack speed. And the software size is small, saving system resources ...

Weird Dog Dedicated Edition 3389 Lander I changed a small program, having a username password, use it to log in to the WIN system 3389, (must)

DameWare NT Utilities A powerful Windows NT / 2000 / XP server remote control software, just use a remote host's management account, you can use it to log in to the interactive control host under remote GUI ... (English) "

Pursue: Find the location of IP!

Willow rubbed eye This small software can list all systems (including hidden) and kill processes. This is shared software ... (Chinese version) "Let the legendary Trojan walk away"

XDebug Ey4S Big Brother Write Windows 2000 Kernel Exploit, it is simple to upgrade the permissions!

Agent's fox can get the latest agent, used to hide true IP, but have the best to make a proxy safe on meat machine!

HACKERDICBUILDER This software is a dictionary production tool, according to the habit of setting passwords, using thread technology, generating dictionary files ... (Chinese version) multi-friend

Scanipc This is the most foolish intrusion software that wood has seen. As long as you set the backdoors and IP range you want to upload, it will start working, the interface is simple and practical, the fully automatic IPC scanner can be used to implant the Trojan, You can detect some users who can't detect through the part without configuring a complete firewall.

Tiny Honeypot This is a simple honeypot program, mainly based on iptables redirection and a xinetd listener, which monitors all the activity information that is currently not used, and provides some return information to the intruder. The response section is written in the Perl program, which provides enough interaction information to fool most of the automatic attack tools and small partial intruders. By default, the program can be installed on the product host, and hardly affect the performance of the host (application platform Linux / POSIX)

ClearLog is used to delete Windows NT / 2K / XP WWW and FTP security log files, usually in invading a server to avoid tracking, using this method to eliminate IP records ... "Invasion Raiders"

LC4 can detect whether the user uses an unsafe password, is the best, the fastest Win NT / 2000 WorkStations password crack tool, which is the latest version. It claims that: less than 48 hours on the P300 machine can be broken 90% Super User (Admin) password. 18% can be broken in less than 10 minutes ...

Dictator DDOS tool, this software is too powerful, not bad, otherwise it may enter prison!

LocatorHack.exe MS Locator! Formuerypacket.wcscpy remote overflow tool is as powerful as WebDAV vulnerabilities. Microsoft Windows Locator Services Remote Buffer Overflow Vulnerability TFTPD32.EXE graphic TPTP tool, do not have a tool such as hacker, say no!

In the IIS5SP3 description, IIS5 installed SP3 overflow successfully, anyway, I didn't succeed in SP3!

SMBRELAY.EXE You can get a NT password has been used with web pages! {recommend}

IECOOKIESVIEW 1.5 can rewrite the cookies information, there is such a tool to make a cookies spoof simple,

Hackpass.exe, md5.exe cracking the software of the MD5 password ~!

DvgetPass.exe mobile network Tongji.asp vulnerability utilization tool, you can get the forum administrator privilege, then upload an ASP Trojan! Oh, just ~~~~

WebADV's overflow success rate for IIS SP3 (SYSTEM permissions after overflow!) *

R_ WebAdv can use version of WebDAV vulnerability to use tools! I heard that Japan, Traditional Chinese can be used, IPScan large-scale network segment fast IPC $ guess

SVC Remote Installation / Delete Win2K Service

3389.vbs Remote installation Win2K terminal service does not need I386

ARPSNIFFER ARP Environment Sniffer (requires WinPCAP2.1 or more) *

ASCII query character and digital ASCII code (often used to encode URL to avoid IDS or script filtering)

CA Remote Cloning Account

CCA checks if there is a cloning account

CRACKVNC remote / local crack WinVNC password (local cost -w parameter)

Pass.dic Password Dictionary

DEBPLOIT WIN2K SP2 Configuring Excellent Lifting Tools

FPIPE port redirection tool

FScan SuperScan Command Line (source port when scanning, support UDP port scan) *

HGOD04 DDoS Apot

Idahack IDA overflow

IDQ.DLL uses ISAPI vulnerability to improve permissions (very valid for SP0 SP1 SP2, is also a great web back door)

IIS IDQ overflow

Inst.zip specifier installation is Win2K service *

IP_mail.rar Software Sending Host Dynamic IP *

IPC.vbs does not rely on IPC $ to open Telnet

ISPC.EXE IDQ.DLL Connection Client

KeyGhost.zip genuine keyboard logger

Log.vbs log clearance (remote clearance does not depend on IPC $)

Msadc.pl Winnt MSADC vulnerability overflow *

MSSQLHACK MSSQL Overflow Procedure 1

MySQL-Client MySQL client

Name.dic's most commonly used Chinese user name (see the user name you usually use is not inside)

Passsniffer size only 3kb non-switch Sniffer software *

PSEXEC logs in to the host through IPC pipelines

Pskill killing process master

PSList column process master

The Chinese version of WinRAR in the RAR command line (function is quite comprehensive) *

Reboot.vbs Remotely restarts the host's script

SDEMO.ZIP Giant Screen Shooting Video Software

Shed Remote Find Win9X Share Resources

SID uses SID column username

SKSERVERGUI SNAKE Multiple Agent Software

SKSOCKSERVER SNAKE Agent

SMBCRACK is a test prototype developed by a stream 5, and the conventional SMB (shared) violent crack tool is different, and there is no system's API, but the use of SMB protocols. Windows 2000 can make multiple passwords to test multiple passwords in the same session ... "Invasion of the Raiders"

SOCKS uses this tool to install Trojan, even if the gateway reresses the hard drive Trojan is also 嘿嘿 *

Sockscap translates SOCKS5 agent into universal agent spc.zip can directly display the remote Win98 shared resource password

WMIHACK is based on WMI service, the account password (does not need IPC)

Skmontor Snake Registry Monitor (Tool)

SQL1.EXE MSSQL Overflow Program 2

SQL2.EXE MSSQL Overflow Program 3

SQLEC MSSQL client

Excellent scanner for the SuperScan GUI interface

SYN SYN attacks the first master

UPX120 especially compression software, commonly used to compress Trojans to avoid anti-virus software

HTTP download software in the wget command line

Win2kpass2 win2k password thief

WinNuke attacks the software of the RPC service (Win2KSP0 / 1/2/3 WinNT WinXP system is unstable)

Smbnuke's software (Win2KSP0 / 1/2/3 Winnt WinXP system crash)

WinPCAP_2_3 nmap, arpsniffer, etc.

WinPCAP_2_3_nogui.exe No installation interface automatically installed WinPCAP_2_3 (Command Line) *

Scanbaby2.0 can use the vulnerability column password crack (cool, go to the RFC in the RFC) *

Superdic_v31 Very comprehensive hacking dictionary generator

GetMin Win2K SP3 Configuration Permissions Enhancement Program (Not bad !!!) *

Whoami is a permission

FSSniffer Giant Non-Switched Sniffer Tools

Twwscan command lines the giant CGI scanner

TFTPD32 is a host pass file for the distant TFTP service (of course there is a shell)

RangeScan custom CGI vulnerability GUI scanner

PWDUMP2 local catching the WinNT / 2K password quota (indispensable)

PWDUMP3 Remote Grasping WinNT / 2K Password Ratings (Nota)

ProceXPNT View System Process and Port Association (GUI Interface) *

NC is not a simple Telnet client.

CMD.txt has any cmd command does not understand?

View the system process and port associations (no procexpnt strong in the GUI interface) without the GUI interface

Brutusa2 full-featured password crack software, support Telnet, FTP, HTTP, etc. password crack

CMD.REG file name automatically complements the REG file (command line: Press the Tab button to automatically make SYS to System, then change to system32)

Registry editor under the regshell command line

Nscopy Backup Man Tool (when you are a user of the Backup Operators group, sometimes your permissions are bigger than admin)

Session.rar has the password quotation value of the Win / NT2000 target host, you can directly send a column value to the host and log in to the host *

Klogger.exe a few KB key record tools, generate klogger.txt files in the current directory after running *

SMB2 Wall SMB Middleman Mitm Attack Tools, insert your own execution command in Session *

XPTSC.Rar WinXP remote terminal client (support WIN2000 / XP)

SQLHACK.ZIP is quite fast MSSQL password violent crafter

MSSQL quite fast MSSQL password violent crackler

NTCRACK.ZIP uses the acquired MD4 Passwd Hash crack account password

Sqlsniffer.rar MSSQL password flats

TelnetHack.rar is remotely opening the Telnet service of the Win2000 machine under the condition of administrator privileges.

RFPORTXP.EXE XP Underlined ports and processes

SqlTools.rar MSSQL Toolkit

ServiceApp.exe Remote Install / Delete Service

Hgod has an option for SYN / DRDOS / UDP / ICMP / IGMP Denial Service Test Function

HSCAN Small Integrated Scanner (supporting Cisco, MySQL, MSSQL, CGI, RPC, IPC (SID), FTP, SSH, SMTP, etc.

HDoor.rar ping back door (ICMP back door) Siduserenum.exe uses SID to get a list of users (the SID of Xiao Yan sometimes not fully listed) *

RPC_LE.EXE uses RPC overflow to restart Win2k (valid for SP3 SP4HOTFIX) *

R3389.exe Query Terminal Server Changed Port (within 1 second) *

SMBSNIFFER.EXE Gets host hash values ​​to access the local host web page (support intercept intranet host hash) *

NetENUM.EXE Gets a large number of information from the other party via the 3389 port air connection *

Aspcode.exe is the second edition of the most effective ASP overflow program (valid for SP2)

SSLProxy is for agents using the SSL encryption protocol (the scanner can scan the SSL host !!!!) *

LSA2 Gets the plain text password for Winnt / 2K in the LSA registry key, including SQLServer (it is useless) *

PSU.exe opens the specified program with the permissions of the specified process

LDAP.MSI LDAP Lightweight Directory Service Client, Get a large number of information such as account list via 389 ports *

ROOTKIT is perfectly hidden from the underlying underdess, the service, the registry key and the kernel-level Win2k back door bound to the port !!! *

Xscan has a powerful scanning software that compares to the flow of light use multithreading to securely vulnerability detection for the designated IP address segment (or single), support the plugin function, providing two operations of the graphical interface and command line, the scanning content includes : Remote operating system types and versions, standard port status and port Banner information, SNMP information, CGI vulnerability, IIS vulnerability, RPC vulnerability, SQL-Server, FTP-Server, SMTP-Server, POP3-Server, NT-Server Weak ports , NT server NetBIOS information, registry information, etc. The scan results are saved in the / log / directory, Index_ *. HTM is the scan results index file. Increase SSL plug-ins for detecting SSL vulnerabilities; upgrade Port, HTTP, IIS plugin ... (

X-WAY2.5 uses multi-threaded forms to vulnerability scan and security test tools, X-Way multiple versions are developed under Win2000. It is recommended that users are also in the Win2000 environment to play best results ... Chinese version) "Scanning tool, don't forget X-WAY2.5"

SSS Russia, the best scanning software, there is also an analysis, a vulnerability description, slow, it is the best scanning software I have seen!

Namp I have always used this command line scanning software, WIN, Linux version, fast, good, support TCP, UDP, ICMP, security scan will not leave a scan log!

The following software didn't want to collect it, because the top hacker did not invade the personal computer, basically no need to write the Trojan, must be a human hand (the Trojan who wrote itself) without any anti-virus software can be found. *********************************************************** **************************************************

Use Trojan Reconstruction Tools: Aspack This is a tool that uses Trojans must use tools. It can compress the Trojan, do not let the anti-virus software come out!

UPX Very good executable file compression software, supported formats include ATARI / TOS, DJGPP2 / COFF, DOS / COM, DOS / EXE, DOS / SYS, RTM32 / PE, TMT / ADAM, WATCOM / LE, WIN32 / PE, Linux / i386, etc., the compression ratio is also very high ... ******************************************* *********************************************************** * Rookie grades Trojan: Black-border near ink magic control Gray pigeon wind snow domestic post-door snow, this version is based on some netizens recommended several functions, one is to configure whether to automatically share the function of the C disk, the other In the viewing menu, add the password to reply with the *, and correct the version 1.3 version, press the cancel button to open the URL in the URL ... (Network Cabin a remote control software, the update is faster You can access the computer in the local area network, and the connection is stable uploads the download speed is fast, but it will be seen as a Trojan virus chasing in many anti-virus manufacturers, requiring users to have their own FTP space ... (Chinese version of the glacial 3 Guangxiang School boys Guangxiang girls PEEP sets remote monitoring software using anti-port technology, which can be used to achieve the function of general remote control software, such as monitoring of the area network and a firewall, and the controlled computer will be automatically returned. The function of the transmission line, the communication port can be arbitrarily modified, and there is independent connection, that is to say, in addition to the other people can't connect monitoring. Other features also have online notices, connection rate adjustment, remote archives, Remote desktop monitoring, remote process management, remote login editing, web pages, DDoS attack, and controlled end-controlled programming elves, resident choices, file bundling and connection mode options ... (Chinese version After the Wooden cattle hidden version, the server is hard disk C drive sharing (full control permission) opens admin $, IPC $ shares, open the Telnet service, automatically create an administrator privilege account: IUSR_Computer Password: IUSR_Computer ... this version Automatically modify the registry, then automatically run IE'en's software through IE remote control. It can remotely control IE action, you can directly intercept the IE and any server data communication, your name, password you entered in IE The like confidential information is in this column. It can store or send this information in plain text. Once the software is launched, any input and output in the remotely monitored browser window will be displayed in local IE'en. Run IEEN_S .exe (Note: Server) Requires administrator privileges to monitor the monitors (installed on this program) QQ, post Various passwords such as boxes, and send to your mailbox ******************************************************** *********************************************************** **postscript:

I have the above software, I have basically tested. With a good tool to have more than half of the software, the above software China's top hacker uses software, all. In fact, it is mainly used by the hacker software to use. It will only use other people's tools. It is not the tool flexible application of top hacking% 10 % 30 experience technology % 60 analysis = a more depth safety test

What is good tool, you can always live for me :)

My URL: www.77169.com My QQ: 59280880

---- Weird Dog

转载请注明原文地址:https://www.9cbs.com/read-118799.html

New Post(0)