Showing posts with label Ebook. Show all posts
Showing posts with label Ebook. Show all posts

Friday, November 8, 2013

Hacking Google maps and google Earth

  
  

This one-of-a-kind resource contains 500 pages of jaw-dropping hacks,mods,andcustomizations.These  include creating mashups with data from other sources suchas Flickr, building a space station tracker, hacking Maps with  Firefox PiggyBank, and building a complete community site with Maps and Earth. Now you can map out locations, get driving directions, zoom into any point on the globe,display real time traffic, and much more

NOTE : Password For the links is xSeLLizE







        
                                                              

Hacking Gps Free Ebook

                                    Hacking Gps Free Ebook

                                       

  • This is the "user manual" that didn't come with any of the 30 million GPS receivers currently in use, showing readers how to modify,tweak, and hack their Gps to take it to the new levels!
  •  Crazy-cool modifications include exploiting secret keycodes, revealing hidden features, building power cords and cables, hacking the battery and antenna, protecting a GPS from impact and falls, making a screen Protector and solar Powering a Gps
  • Potential power users will take the function and performance of their GPS to a whole new level by hacking into the firmware and hacking into a Pc Connection with a GPS
  • Fear not! Any potentially dangerous mod (to the device) is clearly labeled, with precautions listed that should be taken
  • Game time! Readers can check out GPS games,check into hacking  geocaching,and even use a GPS as a metal detector 

                                                               
                                                               Download Here

Hacking Ubuntu Linux Free ebook



Ubuntu, an African word meaning “humanity to others,” is the hottest thing in

Linux today. This down-and-dirty book shows you how they can blow away the default  
system settings and get Ubuntu to behave however you want. You’ll learn how to
optimize its appearance, speed, usability, and security and get the low-down on
hundreds of hacks such as running Ubuntu from a USB drive, installing it on a Mac,
enabling multiple CPUs, and putting scripts in menus and panels


Tuesday, November 5, 2013

Top 15 Hacking | Cracking | Pentesting Tools of 2013

                Top 15 Hacking | Cracking | Pentesting                                          Tools of 2013

Here represent Top 15 Hacking or cracking tools for you all hackerspositive fanz. They is bests of 2013 hacking tools.
1. PWN STAR

A bash script to launch the AP, can be configured with a variety of attack options. Including a php script and server index.html, for phishing. Can act as a multi-client captive portal using php and iptables. Exploitation classics such as crime-PDF, De-auth with aireplay, etc..



General Features:


  • Managing Interfaces and MAC Spoofing
  • Set sniffing
  • Phishing Web
  • Karmetasploit
  • WPA handshake
  • De-auth client
  • Managing Iptables



2. ZED ATTACK PROXY (ZAP)

(ZAP) is an integrated penetration testing tool for finding vulnerabilities in web applications. This tool is designed for use by people with a variety of security experience and as such is ideal for developers and functional testers who are new to penetration testing as well as being a useful addition to the toolbox tester.


Key Features:


  • Intercepting Proxy
  • Active scanners
  • Passive scanners
  • Brute Force scanner
  • Spider
  • Fuzzer
  • Port Scanner
  • Dynamic SSL certificates
  • API
  • Beanshell integration

                                                    ZAP Download Here:


3. SET (SOCIAL ENGINEERING TOOLKIT)

Tools that focus on attacking the human element of weakness and inadvertence. This tool is widely used today and is one of the most successful tools demonstrated at Defcon.



Key Features:



4. BURP SUITE


Burp Suite is a very nice tool for web application security testing. This tool is great for pentester and security researchers. It contains a variety of tools with many interfaces between them designed to facilitate and accelerate the process of web application attacks.



General Function:


  • Spear-Phishing Attack Vector
  • Java Applet Attack Vector
  • Metasploit Browser Exploit Method
  • Credential Harvester Attack Method
  • Tabnabbing Attack Method
  • Man Left in the Middle Attack Method
  • Web Jacking Attack Method
  • Multi-Attack Web Vector
  • Infectious Media Generator
  • Teensy USB HID Attack Vector

  • Interception proxies
  • Radar and spiders crawling
  • Webapps scanner
  • Tool assault
  • Repeater and sequencer tools


5. ETTERCAP


Ettercap is a multipurpose sniffer / interceptor / logger for Local Area Network . It supports active and passive dissection of many protocols (even in code) and includes many feature for network and host analysis.




General Function:

  • To capture traffic and data
  • To do logging network
  • Etc.


6. SANS INVESTIGATIVE FORENSIC TOOLKIT (SIFT)


The SANS Investigative Forensic Toolkit (SIFT) Workstation is a VMware Appliance that can be configured with all the requirements to perform a detailed digital forensic. Compatible with Expert Witness Format (E01), Advanced Forensic Format (AFF), and raw (dd) evidence formats. The new version has been completely rebuilt on the Ubuntu base with many additional tools and capabilities that are used in modern forensic technology.


General Function SIFT:

  • iPhone, Blackberry, and Android Forensic Capabilities
  • Registry Viewer (YARU)
  • Compatibility with F-Response Tactical, Standard, and Enterprise
  • PTK 2.0 (Special Release - Not Available for Download)
  • Automated Generation Timeline via log2timeline
  • Many Firefox Investigative Tools
  • Windows Journal Parser and Shellbags Parser (jp and sbag)
  • Many Windows Analysis Utilities (prefetch, usbstor, event logs, and more)
  • Complete Overhaul of Regripper Plugins (added over 80 additional plugins)


7. WIRESHARK

Wireshark is the most widely used and most popular in the world the protocol analyzer, and is the de facto standard across many industries and educational institutions to analyze the network in different protocol.



General Function:

  • Live capture and offline analysis
  • Standard three-pane packet browser
  • Multi-platform: Runs on Windows, Linux, OS X, Solaris, FreeBSD, NetBSD, and many others
  • Captured data network can be browsed via a GUI, or via the TTY-mode tshark utility
  • The most powerful display filters in the industry
  • Rich VoIP analysis
  • Read / write many different capture file formats
  • Etc.

8. WEBSPLOIT

WebSploit is an Open Source Project for Remote Scan and Analysis System of the weaknesses in web applications.



Key Features: 

[>] Social Engineering Works
[>] Scan, Web Crawler & Analysis
[>] Automatic Exploiter
[>] Support Network Attacks
-
[+] Autopwn - Used From Metasploit For Scan and Exploit Target Service
[+] WMAP - Scan, Target Used Crawler From Metasploit WMAP plugin
[+] format infector - inject the payload into reverse and bind file format
[+] phpmyadmin Scanner
[+] LFI Bypasser
[+] Apache Users Scanner
[+] Dir Bruter
[+] admin finder
[ +] MLITM Attack - Man Left In The Middle, XSS Phishing Attacks
[+] MITM - Man In The Middle Attack
[+] Java Applet Attack
[+] MFOD Attack Vector
[+] USB Infection Attack
[+] Dos ARP Attack
[+ ]'s Killer Attack
[+] Attack Fake Update
[+] Fake Access Point Attack


9. WINAUTOPWN


WinAutoPWN is a tool that is used to exploit the Windows Framework directly, so that we are automatically going to be an administrator on the windows. Widely used by "Defacer" Indonesia to deface the Windows Server




10. HASHCAT

Hashcat are a variety of tools to crack passwords in encrypted, it is very powerful for password recovery.


General Function:

  • Multi-Threaded
  • Free
  • Multi-Hash (up to 24 million hashes)
  • Multi-OS (Linux, Windows and OSX native binaries)
  • Multi-Algo (MD4, MD5, SHA1, DCC, NTLM, MySQL, ...)
  • SSE2 accelerated
  • All Attack-Modes except Brute-Force and Permutation can be extended by rules
  • Very fast Rule-engine
  • Rules compatible with JTR and PasswordsPro
  • Possible to resume or limit session
  • Automatically recognizes recovered hashes from outfile at startup
  • Can automatically generate random rules
  • Load saltlist from an external file and then use them in a Brute-Force Attack variant
  • Able to work in an distributed environment
  • Specify multiple wordlists or multiple directories of wordlists
  • Number of threads can be configured
  • Lowest priority threads run on
  • 30 + Algorithms is implemented with performance in mind
  • ... and much more



11. UNISCAN

Uniscan is a scanner for web applications, written in perl for Linux. Currently Uniscan version is 6.2.



General Function:

  • Identification of system pages through a Web Crawler.
  • Use of threads in the crawler.
  • Control the maximum number of requests the crawler.
  • Control of variation of system pages identified by Web Crawler.
  • Control of file extensions that are ignored.
  • Test of pages found via the GET method.
  • Test the forms found via the POST method.
  • Support for SSL requests ( HTTPS ).
  • Proxy support.
  • Generate site list using Google.
  • Generate site list using Bing.
  • Plug-in support for Crawler.
  • Plug-in support for dynamic tests.
  • Plug-in support for static tests.
  • Plug-in support for stress tests.
  • Multi-language support.
  • Web client.



12. OLYYDBG

OllyDbg is a 32-bit assembler debugger for Microsoft Windows. Emphasis on binary code analysis makes it particularly useful in cases where source code is not available.



General Function:

  • Intuitive user interface, no cryptical commands
  • Code analysis - traces registers, recognizes procedures, loops, API calls, switches, tables, constants and strings
  • Directly loads and debugs DLLs
  • Object file scanning - locates routines from object files and libraries
  • Allows for user-defined labels, comments and function descriptions
  • Understands debugging information in Borland ® format
  • Saves patches between sessions, writes them back to executable file and updates fixups
  • Open architecture - many third-party plugins are available
  • No installation - no trash in registry or system directories
  • Debugs multithreaded applications
  • Attaches to running programs
  • Configurable disassembler, supports both MASM and IDEAL formats
  • MMX, 3DNow! and SSE instructions and the data types, Including Athlon extensions
  • Full UNICODE support
  • Dynamically recognizes ASCII and UNICODE strings - also in Delphi format!
  • Recognizes complex code constructs, like call to jump to procedure
  • Decodes calls to more than 1900 standard API and 400 C functions
  • Gives context-sensitive help on API functions from external help file
  • Sets conditional, logging, memory and hardware breakpoints
  • Traces program execution, logs arguments of known functions
  • Shows fixups
  • Dynamically traces stack frames
  • Searches for imprecise commands and masked binary sequences
  • Searches whole allocated memory
  • Finds references to constant or address range
  • Examines and modifies memory , sets breakpoints and Pauses program on-the-fly
  • Assembles commands into the shortest binary form
  • Starts from the floppy disk
13. BBQSQL

BBQSQL an Opensource SQL injection tools with the framework specifically designed to carry out the process in hyper fast, database agnostic, easy to setup, and easy to modify. This is another amazing release from Arsenal Blackhat USA 2012. When conducting security assessments of applications, we often find that it is difficult to SQL vulnerabilities exploitable, with this tool will be extremely easy.

BBQSQL written in the Python programming language. This is very useful when complex SQL injection attack vulnerabilities. BBQSQL also a semi-automated tool, which allows little customization for those who are finding it difficult to trigger a SQL injection. The tool is built to be database agnostic and very versatile. It also has an intuitive UI for setting up the attack much easier.



General Function:

  • SQL Injection Tools
  • URL
  • HTTP Method
  • Headers
  • Cookies
  • Encoding methods
  • Redirect behavior
  • Files
  • HTTP Auth
  • Proxies

14. CRYPTOHAZE

Tools to crack password / hash where cryptohaze supports CUDA, OpenCL , and the CPU code (SSE, AVX, etc.). Can run on OS that support CUDA. These are intended to make it easier to pentester did crack the hash.



General Function:

  • Crack various kinds of hash
  • Showing results from crackhash
  • Cracking on various OS platforms

                                          


15. SAMURAI WEB TESTING FRAMEWORK (SWTF)
SWTF is used to do testing / pentest against web application, is used to find a weakness and exploited to perform web. Very comprehensive and widely used in the world, including one used by staff binushacker



General Function:


  • Web Scanner
  • Web Mapping
  • Web Exploitation



Note: This tutorial is only for Educational Purposes, I did not take any responsibility of any misuse, you will be solely responsible for any misuse that you do.

Enjoy Info..!

70 Hacking eBook Collection

                    Hacking eBook Collection

hacking ebook


Huge Hacking Ebook Collection for the hacking beginners and to the security experts to learn about the exploitation, sniffing, SQL attacks and more about the world of hacking. See list of eBooks Below.


  1. Hacking The Windows Registry
  2. Hugo Cornwall – The Hacker’s Handbook
  3. Hacking into computer systems -a beginners guide
  4. Hacking_IIS_Servers
  5. Addison-Wesley Professional.Honeypots- Tracking Hackers
  6. Wiley.The Database Hacker’s Handbook- Defending Database Servers
  7. John Wiley &_ Sons.Hacking GMail (ExtremeTech)
  8. Hacking.Guide.V3.1
  9. A-List Publishing.Hacker Linux Uncovered
  10. Hacker’S.Delight
  11. Hacker.Bibel
  12. HackerHighSchool
  13. Hacker’s Desk Reference
  14. A Beginners Guide To Hacking Computer Systems
  15. Addison Wesley — Hackers Delight 2002
  16. addison wesley — web hacking — attacks and defense
  17. Addison Wesley, The Outlook Answer Book Useful Tips Tricks And Hacks (2005) Bbl Lotb
  18. amazon-hacks
  19. Anti-Hacker ToolKit — McGraw Hill 2E 2004
  20. Attacking the DNS Protocol
  21. Auerbach.Practical.Hacking.Techniques.and.Countermeasures.Nov.2006
  22. Auerbach.Pub.The.Hackers.Handbook.The.Strategy.Behind.Breaking.into.and.Defending.Networks
  23. bsd-hacks
  24. ceh-official-certified-ethical-hacker-review-guide-exam
  25. Certified Ethical Hacker (CEH) v3.0 Official Course
  26. Computer — Hackers Secrets — e-book
  27. cracking-sql-passwords
  28. Crc Press — The Hacker’S Handbook
  29. Credit.Card.Visa.Hack.Ucam.Cl.Tr.560
  30. DangerousGoogle-SearchingForSecrets
  31. database hacker handbook
  32. Dummies — Hack How To Create Keygens (1)
  33. ebay-hacks-100-industrial-strength-tips-and-tools
  34. ebook.oreilly.-.windows.xp.hacks.sharereactor
  35. eBooks.OReilly.-.Wireless.Hacks.100.Industrial.-.Strength.Tips.and.Tools
  36. ethical hacking, student guide
  37. excel-hacks
  38. For.Dummies.Hacking.for.Dummies.Apr.2004.eBook-DDU
  39. For.Dummies.Hacking.Wireless.Networks.For.Dummies.Sep.2005.eBook-DDU
  40. google-hacks
  41. Hack IT Security Through Penetration Testing
  42. Hack Proofing — Your Network — Internet Tradecraft
  43. Hack Proofing Linux A Guide to Open Source Security
  44. Hack Proofing Sun Solaris 8
  45. Hack Proofing Your E-Commerce Site
  46. Hack Proofing Your Identity In The Information Age
  47. Hack Proofing Your Network Second Edition
  48. Hack Proofing Your Network_First Edition
  49. Hack Proofing Your Web Applications
  50. Hacker Disassembling Uncovered
  51. hacker ethic
  52. Hacker Linux Uncovered
  53. Hacker Web Exploitation Uncovered
  54. Hacker’S.Delight
  55. hacker-disassembling
  56. Hackers Beware
  57. Hackers Secrets Revealed
  58. Hackers Secrets
  59. Hackers, Heroes Of The Computer Revolution
  60. Hackers_Secrets
  61. Hacker_s_Guide
  62. Hacking — Firewalls And Networks How To Hack Into Remote Computers
  63. Hacking — The Art of Exploitation
  64. Hacking Cisco Routers
  65. Hacking Exposed — Network Security Secrets & Solutions, 2nd Edition
  66. Hacking Exposed Network Security Secrets & Solutions, Third Edition ch1
  67. Hacking For Dummies 1
  68. Hacking For Dummies 2
  69. Hacking For Dummies 3
  70. Hacking.Guide. V4

Download Link - RareFile


Note: This tutorial is only for Educational Purposes, I did not take any responsibility of any misuse, you will be solely responsible for any misuse that you do.

Related Posts Plugin for WordPress, Blogger...