Monday, September 3, 2012

Facebook Chat Text Generator


Facebook Chat Text Generator

This is the new awesome Chat Text Generator, it work just like the original Chat Codes Maker but instead of making codes from images, it lets you format your text with cool smileys and awesome fonts. It is very simple to make it work, just type your text and paste the code, that’s it.

Font:
Use keyboard shortcuts Ctrl+A to select codes and Ctrl+C to copy codes.

Wednesday, July 25, 2012

Cain & Abel – Download the Super Fast and Flexible Password Cracker with Network Sniffing




Cain & Abel has some awesome stuff built in like native network sniffing and network password grabbing.


Cain & Abel is a password recovery tool for Microsoft Operating Systems. It allows easy recovery of various kind of passwords by sniffing the network, cracking encrypted passwords using Dictionary, Brute-Force and Cryptanalysis attacks, recording VoIP conversations, decoding scrambled passwords, recovering wireless network keys, revealing password boxes, uncovering cached passwords and analyzing routing protocols. The program does not exploit any software vulnerabilities or bugs that could not be fixed with little effort. It covers some security aspects/weakness present in protocol’s standards, authentication methods and caching mechanisms; its main purpose is the simplified recovery of passwords and credentials from various sources, however it also ships some “non standard” utilities for Microsoft Windows users.



Cain & Abel has been developed in the hope that it will be useful for network administrators, teachers, security consultants/professionals, forensic staff, security software vendors, professional penetration tester and everyone else that plans to use it for ethical reasons. The author will not help or support any illegal activity done with this program. Be warned that there is the possibility that you will cause damages and/or loss of data using this software and that in no events shall the author be liable for such damages or loss of data. Please carefully read the License Agreement included in the program before using it.


The latest version is faster and contains a lot of new features like APR (Arp Poison Routing) which enables sniffing on switched LANs and Man-in-the-Middle attacks. The sniffer in this version can also analyze encrypted protocols such as SSH-1 and HTTPS, and contains filters to capture credentials from a wide range of authentication mechanisms. The new version also ships routing protocols authentication monitors and routes extractors, dictionary and brute-force crackers for all common hashing algorithms and for several specific authentications, password/hash calculators, cryptanalysis attacks, password decoders and some not so common utilities related to network and system security.

You can download Cain & Abel v4.9.4 for Windows NT/2000/XP here:
► Cain & Abel  ◄

Password: HACKRICH.BLOGSPOT.COM

Tuesday, July 24, 2012

Brutus Password Cracker


Brutus is one of the fastest, most flexible remote password crackers you can get your hands on – it’s also free. It is available for Windows 9x, NT and 2000, there is no UN*X version available although it is a possibility at some point in the future. Brutus was first made publicly available in October 1998 and since that time there have been at least 70,000 downloads and over 175,000 visitors to this page. Development continues so new releases will be available in the near future.






Brutus was written originally to help me check routers etc. for default and common passwords.


Features


Brutus version AET2 is the current release and includes the following authentication types :

HTTP (Basic Authentication)
HTTP (HTML Form/CGI)
POP3
FTP
SMB
Telnet
Other types such as IMAP, NNTP, NetBus etc are freely downloadable from this site and simply imported into your copy of Brutus. You can create your own types or use other peoples.


The current release includes the following functionality :

Multi-stage authentication engine
60 simultaneous target connections
No username, single username and multiple username modes
Password list, combo (user/password) list and configurable brute force modes
Highly customisable authentication sequences
Load and resume position
Import and Export custom authentication types as BAD files seamlessly
SOCKS proxy support for all authentication types
User and password list generation and manipulation functionality
HTML Form interpretation for HTML Form/CGI authentication types
Error handling and recovery capability inc. resume after crash/failure.


You can download it here:
Brutus Aet-2

Password: HACKRICH.BLOGSPOT.COM

Monday, July 23, 2012

Hcon Security Testing Framework (HconSTF) v0.4 – Fire Base

HconSTF is an Open Source Penetration Testing Framework based on different browser technologies, Which helps any security professional to assists in the Penetration testing or vulnerability scanning assessment. It contains webtools which are capable of carrying out XSS attacks, SQL Injection, siXSS, CSRF, Trace XSS, RFI, LFI, etc. It could prove useful to anybody interested in the information security domain – students, security professionals, web developers and so on...




Features :

  •   Categorized and comprehensive toolset
  •  Contains hundreds of tools and features and script for different tasks like SQLi, XSS, Dorks, OSINT to name a few
  •   HconSTF webUI with online tools (same as the Aqua base version of HconSTF)
  •   Each and every option is configured for penetration testing and Vulnerability assessments
  •   Specially configured and enhanced for gaining easy & solid anonymity
  •   Works for web app testing assessments specially for OWASP top 10
  •   Easy to use & collaborative Operating System like interface
  •   Multi-Language support (feature in heavy development translators needed)


You can download HconSTF 0.4 beta here:


HconSTF_v0.4_Freedom_portable.exe



Saturday, February 4, 2012

CEH – Certified Ethical Hacker v7 Certification Training




 This CEH Certification will fortify the application knowledge of security officers, auditors, security professionals, site administrators, and anyone who is concerned about the integrity of the network infrastructure. CEH candidates will be immersed into an interactive network hacking environment where they will be shown how to scan, test, hack and secure their own systems. Candidates will begin by understanding how perimeter defenses work and then be lead into scanning and attacking their own networks. No real network is harmed. CEH candidates then learn how intruders escalate privileges and what steps can be taken to secure a system. Candidates will also learn about Intrusion Detection, Policy Creation, Social Engineering, DDoS Attacks, Buffer Overflows and Virus Creation. Learn the art of penetration testing (pen testing) in order to create network intrusion vulnerability prevention plans.


Topics Covered in Our Ethical Hacking Training
  • Developing the hacker’s mind
  • Network surveying
  • Port scanning
  • System identification/OS fingerprinting
  • Vulnerability research and verification
  • Service identification
  • Internet application testing
  • Document grinding
  • Recognizing security issues within an organization
  • Performing legal assessments on remote/foreign networks
  • Examining an organization for weaknesses as through the eyes of an industrial spy or a competitor
  • Implementing the right tools for each task of the Methodology
  • Competitive Intelligence
  • Exploiting vulnerabilities remotely
  • Examining appropriate countermeasures to thwart malicious hacking
CEH v7 Training Audience

The Certified Ethical Hacker certification will fortify the application knowledge of security officers, auditors, security professionals, site administrators, and anyone who is concerned about the integrity of the network infrastructure.
Certified Ethical Hacker Bootcamp Pre-Requisite

A Certified Ethical Hacker bootcamp training class candidate should have at least two years of information technology experience, a strong working knowledge of TCP/IP, and a basic familiarity with Linux or strong working support knowledge of Microsoft XP or Vista.

  Download torrent  

Dun forget to share this blog if u think we helped you and/or if u like this blog share it join our facebook page to get upadates.. :)

Tuesday, January 17, 2012

Windows Password Recovery Tools 1

█► Password recovery tools for variety of "Windows" programs, including "Internet Explorer", "Outlook Express", "Microsoft Outlook", "Dialup entries of Windows", "Yahoo Messenger", "MSN Messenger", and more..... ◄█





 █ MessenPass *nirsoft*




 Recovers the passwords of most popular Instant Messenger programs in Windows: MSN Messenger, Windows Messenger, Windows Live Messenger, Yahoo Messenger, ICQ Lite 4.x/2003, AOL Instant Messenger provided with Netscape 7, Trillian, Miranda, and GAIM...

◄Download►

 

█ Mail PassView █ *nirsoft*



 
 
 

Mail PassView is a small password-recovery tool that reveals the passwords and other account details for the following email clients:

    "Outlook Express"
    ╪  "Microsoft Outlook 2000" (POP3 and SMTP Accounts only)
    "Microsoft Outlook 2002/2003/2007/2010" (POP3, IMAP, HTTP and SMTP Accounts)
    "Windows Mail"
    "Windows Live Mail"
    "IncrediMail"
    "Eudora"
    "Netscape 6.x/7.x" (If the password is not encrypted with master password)
    "Mozilla Thunderbird" (If the password is not encrypted with master password)
    "Group Mail Free"
    "Yahoo! Mail" - If the password is saved in Yahoo! Messenger application.
    "Hotmail/MSN mail" - If the password is saved in MSN/Windows/Live Messenger application.
    "Gmail" - If the password is saved by Gmail Notifier application, Google Desktop, or by Google Talk....





►Download◄




 ►IE PassView◄    *nirsoft*




 ♫ IE PassView is a small password management utility that reveals the passwords stored by Internet Explorer Web browser, and allows you to delete passwords that you don't need anymore. It supports all versions of Internet Explorer, from version 4.0 and up to 9.0.
♫ For each password that is stored by Internet Explorer, the following information is displayed: Web address, Password Type (AutoComplete, Password-Protected Web Site, or FTP), Storage Location (Registry, Credentials File, or Protected Storage), and the user name/password pair. You can select one or more items from the passwords list and export them into text/html/csv/xml file....




█ Protected Storage PassView █ *nirsoft*
  



Recovers all passwords stored inside the Windows Protected Storage, including the AutoComplete passwords of Internet Explorer, passwords of Password-protected sites, MSN Explorer Passwords, and more...



◄ Download ►







Related Posts Plugin for WordPress, Blogger...

IP info

hAckRich

Tags

study (19) education (18) coding (11) Codes (9) ciphers (9) cryptology (9) CRYPTOGRAPHY (8) Hacking Tutorials (5) Ethical hacker/hacking (4) Exploits and Incident Handling (4) HACKING WINDOWS (4) Make A Cipher (4) Windows (4) password breakers/crackers (4) Dictionary (3) Ebook (3) Facebook (3) Facebook Emoticons (3) Google Dork (3) Google Hacks (3) facebook symbols (3) php hack (3) tools (3) ASCII art (2) Facebook Animated Gif Image Status (2) GRE (2) GRE Dictionary (2) Hack a Website (2) IELTS (2) Java: A Beginner's Guide (2) Password Cracking (2) Password Recovery (2) SOCIAL ENGINEERING TOOLKIT (2) Session hijacking (2) find the vulnerability (2) java (2) password-auditing (2) password-cracker (2) php (2) Abel (1) Backtrack 5 (1) Barron’s GRE word list (1) Breaking Ciphers (1) CIPHERTEXT (1) CRYPTANALYSIS (1) Caesar's Shift Cipher (1) Cain (1) Cain and Abel (1) Crypters Binders RC4 (1) DOS (1) Facebook Chat Text Generator (1) Fast leech generator (1) Hacking Tools (1) HconSTF (1) List of best anonymizers (1) Make fake virus (1) Number Shift Cipher (1) One Pig's Pen (1) RFI (1) Remote file inclusion (1) SEO (1) SQL injection (1) Security 504 Hacker Techniques (1) Steal/trace ip (1) The Key (1) The Rail Fences (1) Toefl (1) Uses of proxy server (1) Virus (1) Vocabulary Word List (1) Winding Way Cipher (1) blog tips (1) brute force (1) brute forcing. (1) brutus (1) brutus-aet2 (1) brutus-aet2.zip (1) brutus-password-cracker (1) bypass web-filters (1) chat (1) command prompt (1) cookie stealing (1) crackers (1) e (1) fast download (1) hacking-software (1) hot file (1) improve site (1) ip catcher (1) ip tracker (1) leech (1) leecher (1) list of proxy servers (1) mail (1) mega upload (1) mobile (1) network-sniffing (1) rapid share (1) regular download link into premium (1) serial keys 94fbr (1) symbols (1) th3j35t3r's DOS tool (1)

Hackrich

welcome

☁ Partners Link Cloud ☁