Dizzie Inc.

</Technology.Made.Easy>

BEST HACKING tools OF 2018


crypters

Aegis (FREE/PAID)

 Aegis Crypter is one the most popular FUD crypers in the world.  FUD crypters can be used to encrypt viruses, RATs, keyloggers, spyware, etc. to make them undetectable from antiviruses. When these .exe files are encrypted with FUD crypters they become undetectable to antiviruses as well.

Aegis Crypter is one the most popular FUD crypers in the world.

FUD crypters can be used to encrypt viruses, RATs, keyloggers, spyware, etc. to make them undetectable from antiviruses. When these .exe files are encrypted with FUD crypters they become undetectable to antiviruses as well.

 Insanity Protector is a powerful FUD Crypter.

Insanity Protector is a powerful FUD Crypter.



DEBUGGERS

GDB (FREE)

 GDB is a GNU Project debugger. The unique feature of this debugger enables the user to see what is happening inside one program while it is being executed or check a program at the moment of the crash.

GDB is a GNU Project debugger. The unique feature of this debugger enables the user to see what is happening inside one program while it is being executed or check a program at the moment of the crash.

IMMUNITY DEBUGGER (FREE)

 Immunity Debuggr is a powerful debugger for analyzing malware. Its unique features include an advanced user interface with heap analysis tool and function graphing.

Immunity Debuggr is a powerful debugger for analyzing malware. Its unique features include an advanced user interface with heap analysis tool and function graphing.

Ping.EU

 Ping.eu is a tracing tool that helps the user to know the time that the data packets took to reach the host. This is an online application where you just need to place the host name or IP address and fetch the result.

Ping.eu is a tracing tool that helps the user to know the time that the data packets took to reach the host. This is an online application where you just need to place the host name or IP address and fetch the result.


ENCRYPTION TOOLS

truecrypt (FREE)

 TrueCrypt is open source encryption tool which can encrypt a partition in the Windows environment (except Windows 8); it’s equipped for creating a virtual encrypted disk in a file. Moreover, it has the capability to encrypt the complete storage device. TrueCrypt can run on different operating systems like Linux, Microsoft Windows, and OSX. TrueCrypt stores the encryption keys in the RAM of the computer.

TrueCrypt is open source encryption tool which can encrypt a partition in the Windows environment (except Windows 8); it’s equipped for creating a virtual encrypted disk in a file. Moreover, it has the capability to encrypt the complete storage device. TrueCrypt can run on different operating systems like Linux, Microsoft Windows, and OSX. TrueCrypt stores the encryption keys in the RAM of the computer.

openssh (FREE)

 OpenSSH is the short name for Open Secure Shell and is a free software suite which is used to make your network connections secured. It uses the SSH protocol to provide encrypted communication sessions in a computer network. It was designed originally as an alternative to the Secure Shell Software developed by SSH Communications Security. The tool was designed as a part of the OpenBSD project.

OpenSSH is the short name for Open Secure Shell and is a free software suite which is used to make your network connections secured. It uses the SSH protocol to provide encrypted communication sessions in a computer network. It was designed originally as an alternative to the Secure Shell Software developed by SSH Communications Security. The tool was designed as a part of the OpenBSD project.

openssl (FREE)

 OpenSSL is an open source encryption tool which implements the TLS and SSL protocols. OpenSSL’s core library is written in the C programming language. The fundamental cryptographic functions are implemented by it. OpenSSL versions are available for operating systems like UNIX, Solaris, Linux and Mac OS X. The project was undertaken in 1988 with the objective of inventing free encryption tools for the programs being used on the internet.

OpenSSL is an open source encryption tool which implements the TLS and SSL protocols. OpenSSL’s core library is written in the C programming language. The fundamental cryptographic functions are implemented by it. OpenSSL versions are available for operating systems like UNIX, Solaris, Linux and Mac OS X. The project was undertaken in 1988 with the objective of inventing free encryption tools for the programs being used on the internet.

tor (FREE)

 Tor is a free encryption tool and has the capability to provide online anonymity as well as censorship resistance. Internal traffic is directed through a free network which consists of more than five thousand relays so that the user’s actual location can be hidden. It is difficult to track the Internet activities like visiting websites and instant messages; the most important goal of this tool is to ensure the personal privacy of the users.

Tor is a free encryption tool and has the capability to provide online anonymity as well as censorship resistance. Internal traffic is directed through a free network which consists of more than five thousand relays so that the user’s actual location can be hidden. It is difficult to track the Internet activities like visiting websites and instant messages; the most important goal of this tool is to ensure the personal privacy of the users.

openvpn (FREE)

 OpenVPN   provides a full-featured open source SSL VPN solution that accommodates a wide range of configurations, including remote access, site-to-site VPNs, Wi-Fi security, and enterprise-scale remote access solutions with load balancing, failover, and fine-grained access-controls.

OpenVPN provides a full-featured open source SSL VPN solution that accommodates a wide range of configurations, including remote access, site-to-site VPNs, Wi-Fi security, and enterprise-scale remote access solutions with load balancing, failover, and fine-grained access-controls.


EXPLOITATION

metasploit (FREE)

 Metasploit was released in the year 2004 and it was an instant hit in the world of computer security. Metasploit provides data on the vulnerabilities in the security system and it helps in conducting penetration testing too.

Metasploit was released in the year 2004 and it was an instant hit in the world of computer security. Metasploit provides data on the vulnerabilities in the security system and it helps in conducting penetration testing too.

BEEF (FREE)

 BeEF is the short term for The Browser Exploitation Framework. It is a tool for penetration testing which concentrates on a web browser and thus accesses the actual security position of the environment it’s targeting.

BeEF is the short term for The Browser Exploitation Framework. It is a tool for penetration testing which concentrates on a web browser and thus accesses the actual security position of the environment it’s targeting.

KMSPICO WINDOWS 10 ACTIVATOR (FREE)

 KMSpico is the most popular tool for activating Windows 10 without a product key.

KMSpico is the most popular tool for activating Windows 10 without a product key.

windows 8 activator (FREE)

 Windows 8 Activator is the most popular tool for activating Windows 8 without a product key.

Windows 8 Activator is the most popular tool for activating Windows 8 without a product key.

WINDOWS 7 LOADER (FREE)

 Windows 7 Loader is the most popular tool for activating Windows 7 without a product key.

Windows 7 Loader is the most popular tool for activating Windows 7 without a product key.

WINDOWS XP ACTIVATION (FREE)

 Windows XP Activationr is the most popular tool for activating Windows XP without a product key.

Windows XP Activationr is the most popular tool for activating Windows XP without a product key.

YOUTUBE VIEW INCREASER (FREE)

 YouTube View Increaser is a Youtube bot designed for boosting Youtube views.

YouTube View Increaser is a Youtube bot designed for boosting Youtube views.


FORENSICS

sleuth kit (FREE)

 Sleuth Kit is an open source digital intervention or forensic toolkit. It runs on varied operating systems including Windows, Linux, OS X and many other Unix systems. It can be used for analyzing disk images along with in-depth analysis of file systems like FAT, Ext3, HFS+, UFS and NTFS.

Sleuth Kit is an open source digital intervention or forensic toolkit. It runs on varied operating systems including Windows, Linux, OS X and many other Unix systems. It can be used for analyzing disk images along with in-depth analysis of file systems like FAT, Ext3, HFS+, UFS and NTFS.

helix (FREE)

 Helix is a Linux based incident response system. It is also used in system investigation and analysis along with data recovery and security auditing. The most recent version of this tool is based on Ubuntu that promises ease of use and stability.

Helix is a Linux based incident response system. It is also used in system investigation and analysis along with data recovery and security auditing. The most recent version of this tool is based on Ubuntu that promises ease of use and stability.


GOVERNMENT MALWARE

FINFISHER (NSA) [FREE]

 FinFisher, also known as FinSpy, is surveillance software marketed by Lench IT Solutions plc, which markets the spyware through law enforcement channels.  FinFisher can be covertly installed on targets' computers by exploiting security lapses in the update procedures of non-suspect software. The company has been criticized by human rights organizations for selling these capabilities to repressive or non-democratic states known for monitoring and imprisoning political dissidents. Egyptian dissidents who ransacked the offices of Egypt's secret police following the overthrow of Egyptian President Hosni Mubarak reported that they had discovered a contract with Gamma International for €287,000 for a license to run the FinFisher software. In 2014, an American citizen sued the Ethiopian government for surreptitiously installing FinSpy onto his computer in America and using it to wiretap his private Skype calls and monitor his entire family’s every use of the computer for a period of months.

FinFisher, also known as FinSpy, is surveillance software marketed by Lench IT Solutions plc, which markets the spyware through law enforcement channels.

FinFisher can be covertly installed on targets' computers by exploiting security lapses in the update procedures of non-suspect software. The company has been criticized by human rights organizations for selling these capabilities to repressive or non-democratic states known for monitoring and imprisoning political dissidents. Egyptian dissidents who ransacked the offices of Egypt's secret police following the overthrow of Egyptian President Hosni Mubarak reported that they had discovered a contract with Gamma International for €287,000 for a license to run the FinFisher software. In 2014, an American citizen sued the Ethiopian government for surreptitiously installing FinSpy onto his computer in America and using it to wiretap his private Skype calls and monitor his entire family’s every use of the computer for a period of months.

SpyFiles4 Download

Doublepulsar (NSA) [FREE]

 DoublePulsar is a backdoor implant tool developed by the U.S. National Security Agency's Equation Group that was leaked by The Shadow Brokers in early 2017.

DoublePulsar is a backdoor implant tool developed by the U.S. National Security Agency's Equation Group that was leaked by The Shadow Brokers in early 2017.

 Stuxnet is a malicious computer worm, first uncovered in 2010 by Kaspersky Lab. Thought to have been in development since at least 2005, Stuxnet targets SCADA systems and was responsible for causing substantial damage to Iran's nuclear program. Although neither country has openly admitted responsibility, the worm is believed to be a jointly built American/Israeli cyberweapon.

Stuxnet is a malicious computer worm, first uncovered in 2010 by Kaspersky Lab. Thought to have been in development since at least 2005, Stuxnet targets SCADA systems and was responsible for causing substantial damage to Iran's nuclear program. Although neither country has openly admitted responsibility, the worm is believed to be a jointly built American/Israeli cyberweapon.

Download

THE Equation Group (NSA)

 The Equation Group, classified as an advanced persistent threat, is the code name for the Tailored Access Operations (TAO) unit of the United States National Security Agency (NSA). Kaspersky Labs describes them as one of the most sophisticated cyber attack groups in the world and "the most advanced ... we have seen", operating alongside but always from a position of superiority with the creators of Stuxnet and Flame. Most of their targets have been in Iran, Russia, Pakistan, Afghanistan, India, Syria, and Mali.

The Equation Group, classified as an advanced persistent threat, is the code name for the Tailored Access Operations (TAO) unit of the United States National Security Agency (NSA). Kaspersky Labs describes them as one of the most sophisticated cyber attack groups in the world and "the most advanced ... we have seen", operating alongside but always from a position of superiority with the creators of Stuxnet and Flame. Most of their targets have been in Iran, Russia, Pakistan, Afghanistan, India, Syria, and Mali.


Keyloggers

Revealer Keylogger (FREE)

 Invisible and free keylogger for Windows 10, 8, 7, Vista or XP. Revealer Keylogger Free allows you to monitor user activity on your computer.

Invisible and free keylogger for Windows 10, 8, 7, Vista or XP. Revealer Keylogger Free allows you to monitor user activity on your computer.


NETWORK HACKING TOOLS

NMAP (FREE)

 Nmap or Network Mapper is a free open source utility tool for network discovery and security auditing solution for you. It is a flexible, powerful, portable and easy-to-use tool that is supported by most of the operating systems like Linux, Windows, Solaris, Mac OS and others.

Nmap or Network Mapper is a free open source utility tool for network discovery and security auditing solution for you. It is a flexible, powerful, portable and easy-to-use tool that is supported by most of the operating systems like Linux, Windows, Solaris, Mac OS and others.

Official Download

superscan (FREE)

 SuperScan is a multi-functional application that is designed for scanning TPC ports. This is also a pinger and address resolver. It also has useful features like ping, traceroute, WhoIs and HTTP request. There is no need of installation as it is a portable application.

SuperScan is a multi-functional application that is designed for scanning TPC ports. This is also a pinger and address resolver. It also has useful features like ping, traceroute, WhoIs and HTTP request. There is no need of installation as it is a portable application.

Download

angry ip scanner (FREE)

 Angry IP Scanner is a fast port and IP address scanner. It is a lightweight and cross-platform application that has the capacity to scan the IP addresses in any range and also in their ports. It simply pings each IP address.

Angry IP Scanner is a fast port and IP address scanner. It is a lightweight and cross-platform application that has the capacity to scan the IP addresses in any range and also in their ports. It simply pings each IP address.


PACKET CRAFTing

hping (FREE)

 Earlier Hping was used as a security tool. Now it is used as a command-line oriented TCP/IP packet analyzer or assembler. You can use this for Firewall testing, advanced port scanning, network testing by using fragmentation, TOS, and different other protocols.

Earlier Hping was used as a security tool. Now it is used as a command-line oriented TCP/IP packet analyzer or assembler. You can use this for Firewall testing, advanced port scanning, network testing by using fragmentation, TOS, and different other protocols.

badge-download.png

Official Download

scapy (FREE)

 Scapy is a powerful and interactive packet manipulation program. Scapy has the capability to decode or forge the packets of a large number of protocols at a time. One of the best features is that it can confuse the process of decoding and interpreting.

Scapy is a powerful and interactive packet manipulation program. Scapy has the capability to decode or forge the packets of a large number of protocols at a time. One of the best features is that it can confuse the process of decoding and interpreting.

Official Download

ostinato (FREE)

 Network traffic generator and network test tool. Load test and functional test. Many Protocols. GUI and Python API. Windows, Linux, Mac OSX, BSD.

Network traffic generator and network test tool. Load test and functional test. Many Protocols. GUI and Python API. Windows, Linux, Mac OSX, BSD.


PACKET SNIFFERS

wireshark (FREE)

 If you want to input a security system, Wireshark is the must-have security tool. It monitors every single byte of the data that is transferred via the network system. If you are a network administrator or penetration tester this tool is a must have.

If you want to input a security system, Wireshark is the must-have security tool. It monitors every single byte of the data that is transferred via the network system. If you are a network administrator or penetration tester this tool is a must have.

Official Download

TCPDUMP (FREE)

 Tcpdump is a command-line packet analyzer. After completing the designated task of packet capturing Tcpdump will throw the report that will contain numbers of captured packet and packets received by the filter. The user can use flags like –v, -r and –w to run this packet analyzer tool.

Tcpdump is a command-line packet analyzer. After completing the designated task of packet capturing Tcpdump will throw the report that will contain numbers of captured packet and packets received by the filter. The user can use flags like –v, -r and –w to run this packet analyzer tool.

Official Download

etherape (FREE)

 EtherApe is graphical network monitor for UNIX model PCs after etherman. This interactive tool graphically displays network activity. It features link layer and TCP/IP modes. It supports Token Ring, FDDI, Ethernet, PPP, SLIP, ISDN and other WLAN devices.  Web Proxies: Proxies fundamentally assist in adding encapsulation to distributed systems. The client can request an item on your server by contacting a proxy server.

EtherApe is graphical network monitor for UNIX model PCs after etherman. This interactive tool graphically displays network activity. It features link layer and TCP/IP modes. It supports Token Ring, FDDI, Ethernet, PPP, SLIP, ISDN and other WLAN devices.

Web Proxies: Proxies fundamentally assist in adding encapsulation to distributed systems. The client can request an item on your server by contacting a proxy server.

badge-download.png

PASSWORD CRACKERS

KonBoot (FREE/PAID)

 Kon-Boot is an application which will silently bypass the authentication process of Windows based operating systems. Without overwriting your old password! In other words you can login to your Windows profile without knowing your password. Easy to use and excellent for tech repairs, data recovery and security audits.

Kon-Boot is an application which will silently bypass the authentication process of Windows based operating systems. Without overwriting your old password! In other words you can login to your Windows profile without knowing your password. Easy to use and excellent for tech repairs, data recovery and security audits.

badge-download.png

Download

BRUTUS (FREE)

 Brutus is one of the most flexible and free password crackers which operates remotely. It is popular also because of its high speed and operates under operating systems such as Windows 2000, Windows NT and Windows 9x. Currently, it does not operate under the UNIX operating system. Brutus was initially designed to check network devices like routers for common as well as default passwords.

Brutus is one of the most flexible and free password crackers which operates remotely. It is popular also because of its high speed and operates under operating systems such as Windows 2000, Windows NT and Windows 9x. Currently, it does not operate under the UNIX operating system. Brutus was initially designed to check network devices like routers for common as well as default passwords.

badge-download.png

Official Download

OPHCRACK (FREE)

 Ophcrack is a free password cracker software which is based on the effective implementation of the rainbow tables. It runs on a number of Operating Systems like Mac OS X, Unix/Linux and Windows Operating System. It is equipped with real-time graphs for analyzing the passwords and is an open source software. Ophcrack has the capability to crack both NTLM hashes as well as LM hashes.

Ophcrack is a free password cracker software which is based on the effective implementation of the rainbow tables. It runs on a number of Operating Systems like Mac OS X, Unix/Linux and Windows Operating System. It is equipped with real-time graphs for analyzing the passwords and is an open source software. Ophcrack has the capability to crack both NTLM hashes as well as LM hashes.

badge-download.png

Official Download

john the ripper (FREE)

 John the Ripper is a free software for password cracking which was originally designed for the Unix Operating System. At present, it can run on 15 Operating systems which include 11 different versions of UNIX, Win32, DOS, and BeOS. It has the capability to combine several password crackers into a single package which has made it one of the most popular cracking tools for hackers.

John the Ripper is a free software for password cracking which was originally designed for the Unix Operating System. At present, it can run on 15 Operating systems which include 11 different versions of UNIX, Win32, DOS, and BeOS. It has the capability to combine several password crackers into a single package which has made it one of the most popular cracking tools for hackers.

badge-download.png

RATs (REMOTE ADMINISTRATION TOOL)

DarkCOMET (FREE)

 DarkComet is the most popular remote administration tool in the world. While no longer maintained, it is still incredibly featured, powerful, and very stable.

DarkComet is the most popular remote administration tool in the world. While no longer maintained, it is still incredibly featured, powerful, and very stable.

Njrat (FREE)

 njRAT is a great remote administration tool with good features and very stable.

njRAT is a great remote administration tool with good features and very stable.

QuasarRAT (Free)

 Quasar is a fast and light-weight remote administration tool coded in C#. Providing high stability and an easy-to-use user interface, Quasar is a fantastic remote administration solution.

Quasar is a fast and light-weight remote administration tool coded in C#. Providing high stability and an easy-to-use user interface, Quasar is a fantastic remote administration solution.

badge-download.png

ROOTKIT DETECTORS

hijackthis (FREE)

 HijackThis is a free and open-source tool to detect malware and adware on Microsoft Windows. It was originally created by Merijn Bellekom, and later sold to Trend Micro. The program is notable for quickly scanning a user's computer to display the most common locations of malware, rather than relying on a database of known spyware.

HijackThis is a free and open-source tool to detect malware and adware on Microsoft Windows. It was originally created by Merijn Bellekom, and later sold to Trend Micro. The program is notable for quickly scanning a user's computer to display the most common locations of malware, rather than relying on a database of known spyware.

Official Download

aide (advanced intrusion detection environment) [FREE]

AIDE is a directory and file integrity checker that helps in creating a database using the regular expression rules that it finds from the config files. This tool also supports message digest algorithms and file attributes like File type, Permissions, Inode, Uid, Gid, and others.

Firewalls: Firewalls monitor and control network traffic. A firewall is the quintessential security tool used by novices and tech experts alike. Here are a few of the best ones for hackers:

Official Download

nETFILTER (FREE)

 Netfilter offers software for the packet filtering framework that works within the Linux 2.4.x and later series of the kernel. The software of Netfilter help in packet mangling including packet filtering along with network address and port translation.

Netfilter offers software for the packet filtering framework that works within the Linux 2.4.x and later series of the kernel. The software of Netfilter help in packet mangling including packet filtering along with network address and port translation.


TRAFFIC monitoring TOOLS

Splunk (FREE)

 If you want to convert your data into powerful insights Splunk tools are the best options for you. The Splunk tools are the leading platforms for operational intelligence. It can collect any type of data from any machine in real time.

If you want to convert your data into powerful insights Splunk tools are the best options for you. The Splunk tools are the leading platforms for operational intelligence. It can collect any type of data from any machine in real time.

Official Download

nagios (FREE)

 Nagios is the name for the industry standard in monitoring IT infrastructure. The Nagios tools help you monitor your entire IT infrastructure and have the capability to detect problems well ahead they occur. It can also detect security breaches and share data availability with stakeholders.

Nagios is the name for the industry standard in monitoring IT infrastructure. The Nagios tools help you monitor your entire IT infrastructure and have the capability to detect problems well ahead they occur. It can also detect security breaches and share data availability with stakeholders.

Official Download

ngrep (FREE)

 Ngrep or network grep is a pcap-aware tool that allows you to extend hexadecimal or regular expressions in order to match it against the data loads of the packet. It can recognize IPv4/6, UDP, TCP, Ethernet, SLIP, PPP, FDDI and many others.

Ngrep or network grep is a pcap-aware tool that allows you to extend hexadecimal or regular expressions in order to match it against the data loads of the packet. It can recognize IPv4/6, UDP, TCP, Ethernet, SLIP, PPP, FDDI and many others.

 


VULNERABILITY SCANNERS

nessus (FREE)

 Nessus is the world’s most popular vulnerable scanner topping the list in the years 2000, 2003 and in the year 2006 survey on security tools. It's free to use vulnerability scanner for personal use in the nonenterprise environment.

Nessus is the world’s most popular vulnerable scanner topping the list in the years 2000, 2003 and in the year 2006 survey on security tools. It's free to use vulnerability scanner for personal use in the nonenterprise environment.

Official Download

openvas (FREE)

 OpenVAS scanner is tipped by many to be the most advanced vulnerability scanner in the world and is a powerful and comprehensive tool for scanning as well as providing solutions for vulnerability management. It is free software and is maintained daily.

OpenVAS scanner is tipped by many to be the most advanced vulnerability scanner in the world and is a powerful and comprehensive tool for scanning as well as providing solutions for vulnerability management. It is free software and is maintained daily.

Official Download

nipper (FREE)

 Nipper is a parser for network infrastructure and its full form is Network Infrastructure Parser. This open source scanner helps with features like auditing, configuring and managing devices for network infrastructure as well as managing the computer networks.

Nipper is a parser for network infrastructure and its full form is Network Infrastructure Parser. This open source scanner helps with features like auditing, configuring and managing devices for network infrastructure as well as managing the computer networks.


WEB VULNERABILITY SCANNERS

burp suite (FREE/Paid)

 Burp Suite is a tool for conducting the security test of web-based applications. It has a collection of tools which work together and conduct the entire process of testing with an objective to find as well as exploit the vulnerabilities in the security.

Burp Suite is a tool for conducting the security test of web-based applications. It has a collection of tools which work together and conduct the entire process of testing with an objective to find as well as exploit the vulnerabilities in the security.

Official Download

webscarab (FREE)

 Webscarab is a testing tool for web security applications and has been written in Java and thus is operating system independent. It acts as a proxy and lets users change web requests by web browsers and web server replies. Webscarab often records the traffic to conduct a further review.

Webscarab is a testing tool for web security applications and has been written in Java and thus is operating system independent. It acts as a proxy and lets users change web requests by web browsers and web server replies. Webscarab often records the traffic to conduct a further review.

badge-download.png

Official Download

websecurify (FREE)

 Website security is a crucial factor for both personal as well as organization websites. The prime goal should be to detect the vulnerability of your website before an intruder detects it. Websecurify is a testing tool for website security and can be used to detect the vulnerability of your webs

Website security is a crucial factor for both personal as well as organization websites. The prime goal should be to detect the vulnerability of your website before an intruder detects it. Websecurify is a testing tool for website security and can be used to detect the vulnerability of your webs


WIRELESS HACKING TOOLS

aircrack-ng (FREE)

 Aircrack-ng is a software suite specially designed for a wireless network and which operates under both the Windows and the Linux Operating System. Aircrack-ng consists of a packet sniffer, WPA cracker, and analysis tool and a detector for the wireless Local Area Networks (802.11). The best part of this software suit is one need not install it to use it. It is a collection of files which can be easily used with a command prompt.

Aircrack-ng is a software suite specially designed for a wireless network and which operates under both the Windows and the Linux Operating System. Aircrack-ng consists of a packet sniffer, WPA cracker, and analysis tool and a detector for the wireless Local Area Networks (802.11). The best part of this software suit is one need not install it to use it. It is a collection of files which can be easily used with a command prompt.

Official Download

Airsnort (FREE)

 AirSnort is a wireless LAN (WLAN) tool which cracks encryption keys on 802.11b WEP networks. AirSnort operates by passively monitoring transmissions, computing the encryption key when enough packets have been gathered.

AirSnort is a wireless LAN (WLAN) tool which cracks encryption keys on 802.11b WEP networks. AirSnort operates by passively monitoring transmissions, computing the encryption key when enough packets have been gathered.

Official Download

Kismet (FREE)

 Kismet is a wireless detector system which detects possible intrusion to an 802.11 layer2 wireless network, it is also a sniffer. There is certain plug-in supported by Kismet which enables sniffing media like DECT. It also has the capacity to infer whether a nonbeaconing network is present or not via the data traffic in the network and a network is identified by this tool by collecting data packets passively, detecting hidden and standard named networks.

Kismet is a wireless detector system which detects possible intrusion to an 802.11 layer2 wireless network, it is also a sniffer. There is certain plug-in supported by Kismet which enables sniffing media like DECT. It also has the capacity to infer whether a nonbeaconing network is present or not via the data traffic in the network and a network is identified by this tool by collecting data packets passively, detecting hidden and standard named networks.

The Internet is becoming the town square for the global village of tomorrow.
— Bill Gates

RESOURCES

About Us         Contact Us         FAQ         Terms of Service        Privacy Policy

© 2018 Dizzie Inc. All Rights Reserved.