Downloads

Title: Ethical Hacking & Penetration Testing 
Author: Brad Causey & Bobby Rogers 

Computer Hacking is no longer the black art of computer geniuses. Exploit scripts and hacks are available to anyone with a web browser, so prepare yourself to protect your network by looking at security from a hacker’s eyes. Understanding what attack vectors might be used on your systems is a fundamental piece of the security toolkit. VTC Authors Brad Causey and Bobby Rogers present computer security from an angle that aims to put you into the seat, to protect your network through Ethical Hacking and Penetration Testing. To begin learning today, simply click the links. 

Title Description Read more..
Your rating: None Average: 3.7 (50 votes)

F.B.I RAT (Full Backdoor Intergration) V0.1

Supports xp/Vista/Windows 7, all features have been tested on these OS's including injection, but there have been some limitations on the sniffer.

Features:Read more..

Your rating: None Average: 3.7 (46 votes)

This application will generate network unlock codes for your mobile phone which you simply enter into the phone keypad to unlock your phone to all networks

Usage:
remove your sim card and switch on the phone

type *#06# to get phone serial number and enter this into the program along with your phone model number and current network

click on calculate button and you will receive a list of unlock codes
(i usually find that either the first or last code works fine)

enter the code into your phone (use the * key for the pw+ characters)

your phone will say something like 'sim restrictions lifted' and then reboot itself

thats it you can now use any simcard in your phone

Download:
Your rating: None Average: 4.3 (23 votes)

Features:
* Download any book from Google Books marked as 'Full view'
* Partially download any book from Google Books marked as 'Limited preview'
* Access to any book available only for US citizens
* Searching for hidden pages (not indexed by Google Books)


download
Your rating: None Average: 3.9 (11 votes)

Medusa is intended to be a speedy, massively parallel, modular, login brute-forcer. The goal is to support as many services which allow remote authentication as possible. The author considers following items as some of the key features of this application:
  • Thread-based parallel testing. Brute-force testing can be performed against multiple hosts, users or passwords concurrently.
  • Flexible user input. Target information (host/user/password) can be specified in a variety of ways. For example, each item can be either a single entry or a file containing multiple entries. Additionally, a combination file format allows the user to refine their target listing.
  • Modular design. Each service module exists as an independent .mod file.Read more..
    Your rating: None Average: 3.6 (20 votes)

“Offensive Security 101 v.2.0? is a course designed for network administrators and security professionals who need to get acquainted with the world of offensive security. The course introduces the latest hacking tools and techniques, and includes remote live labs for exercising the material presented to the students.

This course gives a solid understanding of the penetration testing process, and is equally important for those wanting to either defend or attack their network.

Offensive Security 101 v.2.0 qualifies you for 40 ISC2 CPE Credits. This applies to students who submit their exercise documentation at the end of the course, or pass the certification challenge.
Read more..
Your rating: None Average: 3.2 (12 votes)

Search

Loading

Sponsered links

Bookmark Us!

Share/Save

Page Rank

Quotes

First say to yourself what you would be; and then do what you have to do.

Explore Tags

Follow Us