MaHaReT Posted June 23, 2006 Report Posted June 23, 2006 All programs are in rar format. Before you run any .exe file, read carefuly any .text suplied with that program or search in "tutorials" section informations "how to use...". All programs are for knowledge only. To understand how a hacker act. Do not fool around with this programs or u may crash your computer or your friends computers.Contains: Binders: -Amok Joiner -Cool Bind 2.2 -EES Binder 1.0 -NT Pacher 2.1 -Bytes Adder -Scramble Tool 0.2 -Daemon Crypt -Fresh Bind -S Binder Brute Force: -FTP Forcer -Brutus -Hacker Utility -HTTP Brute -Shadow Brute -wwwHack -Dictionary IP/Port Scanner: -Port Scanner -Blue IP Scanner -CGI Scanner -NET Bios Scanner -Scanator -Stealth HTTP Scanner -NEO IP Scanner -Net View -NET Scan Tools -Shadow Scanner Firewall Killers: -Secure Spoof -Setup Killer Pro Trojans: -Beast 207 -Blue Eye -Ilusion -Mo s****r -Thief 210 -Nok Nok 7.0 -Net Devil -Pro Rat -Omerta -Y3K Rat 2K5 Key Loggers: -APlus -Curiosity -Elite KeyLogger -Key Copy -Key Spy -Key Logger -S.K.L. Tutorials: -A few words about exploits -Detailed trojan portlist -Few anonimity tips -Few information about viruses -Find serials for programs easy in Google -Hacking with BIOS tutorial -Hacking with TELNET tutorial -How a trojan work in few words -Hoe can i learn programing -How to get an IP adress -How To hack a website or its member section -How to hack a Yahoo Mail or Hotmail -How to infect a computer with a virus or trojan -Intrested to Webdesign ? -Learning Google search engine -Programing a virus in VB6 for beginers -Removing spyware - malware -Small spyware Glossary -The art of Cyber-War -What is a HACKER ? -Beast trojan tutorial -Hacker's Handbookhttp://rapidshare.de/files/23915946/Comple...s_and_Tools.rarpass : romaniainedit Quote